full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/4280.ps1 | 4280.ps1 |
Function Get-FireWallRule
{
Param (
$Name,
$Direction,
$Enabled,
$Protocol,
$profile,
$action,
$grouping
)
$Rules = (New-object -comObject HNetCfg.FwPolicy2).rules
If ($name) { $rules= $rules | where-object {$_.name -like $name}}
If ($direction) {$rules= $rules | where-object {$_.direction -eq $direction}}
If ($Enabled) {$rules= $rules | where-object {$_.Enabled -eq $Enabled}}
If ($protocol) {$rules= $rules | where-object {$_.protocol -eq $protocol}}
If ($profile) {$rules= $rules | where-object {$_.Profiles -bAND $profile}}
If ($Action) {$rules= $rules | where-object {$_.Action -eq $Action}}
If ($Grouping) {$rules= $rules | where-object {$_.Grouping -Like $Grouping}}
$rules
}
Function Get-FireWallRulesAll
{
Netsh.exe Advfirewall show allprofiles
$spaces1 = " " * 71
$spaces2 = " " * 64
Get-FireWallRule -Enabled $true | sort name | `
format-table -property `
@{label="Name" + $spaces1 ; expression={$_.name} ; width=75}, `
@{label="Action" ; expression={$Fwaction[$_.action]} ; width=6 }, `
@{label="Direction" ; expression={$fwdirection[$_.direction]} ; width=9 }, `
@{label="Protocol" ; expression={$FwProtocols[$_.protocol]} ; width=8 }, `
@{label="Local Ports" ; expression={$_.localPorts} ; width=11}, `
@{label="Application Name" + $spaces2 ; expression={$_.applicationname} ; width=80}
} |
combined_dataset/train/non-malicious/sample_50_57.ps1 | sample_50_57.ps1 | #
# Module manifest for module 'OCI.PSModules.Generativeaiinference'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceEmbedText',
'Invoke-OCIGenerativeaiinferenceSummarizeText',
'New-OCIGenerativeaiinferenceText'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_61_2.ps1 | sample_61_2.ps1 | # ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
function Remove-ServiceFabricApplicationType
{
<#
.SYNOPSIS
Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version.
.DESCRIPTION
Removes all the applications for the specified service fabric application type & version and unregisters the applications type and version.
.NOTES
WARNING: This script file is invoked by Visual Studio. Its parameters must not be altered.
.PARAMETER ApplicationTypeName
The name of the application type to remove.
.PARAMETER ApplicationTypeVersion
The version of the application type to remove.
.EXAMPLE
Remove-ApplicationType.ps1 -ApplicationTypeName 'MyApplicationType' -ApplicationTypeVersion '1.0.0.0'
#>
Param
(
[Parameter(Mandatory=$true)]
[String]
$ApplicationTypeName,
[Parameter(Mandatory=$true)]
[String]
$ApplicationTypeVersion
)
Write-Host "Removing application type..."
try
{
[void](Test-ServiceFabricClusterConnection)
}
catch
{
Write-Warning "Unable to Verify connection to Service Fabric cluster."
throw
}
$nodes = Get-ServiceFabricNode
foreach ($app in Get-ServiceFabricApplication)
{
if ($app.ApplicationTypeName -eq $ApplicationTypeName -and $app.ApplicationTypeVersion -eq $ApplicationTypeVersion)
{
try
{
$app | Remove-ServiceFabricApplication -Force
}
catch [System.TimeoutException]
{
# Catch operation timeout and continue with force remove replica.
}
foreach ($node in $nodes)
{
[void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $app.ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove)
}
}
}
$reg = Get-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $ApplicationTypeVersion }
if ($reg)
{
$reg | Unregister-ServiceFabricApplicationType -ApplicationTypeVersion $ApplicationTypeVersion -Force
}
Write-Host "Finished removing the application type"
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDzslfuKADb8KjT
# nAcLb76G3U3PWS65zaDijbWow04TEKCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPMCYqkzFtPBEdDyJm1qDx6/
# ukQg7tah6lzToJW7YJeqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAFNcDIGwYzpqOAl3Kobv/qPkvlM6mEAY4ijiylZ9H+1ETzKGaYS07ifj3
# tnJeUk1IfASwttw8c+vNSK07t5ukBynX4IifD/OeB7e3kg9fjreU7//+csZvzljI
# X3WEohlMpw/Itp74tUvVXIAsW+TX9YVtMoPGfJtdLzuVVFVAr4U+h7SJE+B9El/I
# s0X8Ifxyrr/oPK8oHIpxSOREtiKWMLd+dawAG/pA8buVr0lZZA9BeTtOaafHYqbz
# NkGBPTNwBaE0CiNjoIdWurW/o5eQ2cunTuDJ6qH9NnWrUACMqKNUsvKp8syUzl/u
# EDq4Tib8Bd3T1UMEnbOWk42b3icrUaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDGh9ixrxVVUBy6Rj9IbH4c1Zr0dZ4zafX9OCRJVODJiwIGZSiGVNck
# GBMyMDIzMTAxNzE4MzMyMi4yMTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAdebDR5XLoxRjgABAAAB1zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MzdaFw0yNDAyMDExOTEyMzdaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDErGCkN2X/UvuNCcfl0yVBNo+LIIyzG7A10X5kVgGn
# p9s8mf4aZsukZu5rvLs7NqaNExcwnPuHIWdp6kswja1Yw9SxTX+E0leq+WBucIRK
# WdcMumIDBgLE0Eb/3/BY95ZtT1XsnnatBFZhr0uLkDiT9HgrRb122sm7/YkyMigF
# kT0JuoiSPXoLL7waUE9teI9QOkojqjRlcIC4YVNY+2UIBM5QorKNaOdz/so+TIF6
# mzxX5ny2U/o/iMFVTfvwm4T8g/Yqxwye+lOma9KK98v6vwe/ii72TMTVWwKXFdXO
# ysP9GiocXt38cuP9c8aE1eH3q4FdGTgKOd0rG+xhCgsRF8GqLT7k58VpQnJ8u+yj
# RW6Lomt5Rcropgf9EH8e4foDUoUyU5Q7iPgwOJxYhoKxRjGZlthDmp5ex+6U6zv9
# 5rd973668pGpCku0IB43L/BTzMcDAV4/xu6RfcVFwarN/yJq5qfZyMspH5gcaTCV
# AouXkQTc8LwtfxtgIz53qMSVR9c9gkSnxM5c1tHgiMX3D2GBnQan95ty+CdTYAAh
# jgBTcyj9P7OGEMhr3lyaZxjr3gps6Zmo47VOTI8tsSYHhHtD8BpBog39L5e4/lDJ
# g/Oq4rGsFKSxMXuIRZ1E08dmX67XM7qmvm27O804ChEmb+COR8Wb46MFEEz62ju+
# xQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFK6nwLv9WQL3NIxEJyPuJMZ6MI2NMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSBd3UJ+IsvdMCX+K7xqHa5UBtVC1CaXZv
# HRd+stW0lXA/dTNneCW0TFrBoJY59b9fnbTouPReaku2l3X5bmhsao6DCRVuqcmh
# VPAZySXGeoVfj52cLGiyZLEw6TQzu6D++vjNOGmSibO0KE9Gdv8hQERx5RG0KgrT
# mk8ckeC1VUqueUQHKVCESqTDUDD8dXTLWCmm6HqmQX6/+gKDSXggwpc75hi2AbKS
# o4tulMwTfXJdGdwrsiHjkz8nzIW/Z3PnMgGFU76KuzYFV0XyH9DTS/DPO86RLtQj
# A5ZlVGymTPfTnw7kxoiLJN/yluMHIkHSzpaJvCiqX+Dn1QGREEnNIZeRekvLourq
# PREIOTm1bJRJ065c9YX7bJ0naPixzm5y8Y2B+YIIEAi4jUraOh3oE7a4JvIW3Eg3
# oNqP7qhpd7xMLxq2WnM+U9bqWTeT4VCopAhXu2uGQexdLq7bWdcYwyEFDhS4Z9N0
# uw3h6bjB7S4MX96pfYSEV0MKFGOKbmfCUS7WemkuFqZy0oNHPPx+cfdNYeSF6bhO
# PHdsro1EVd3zWIkdD1G5kEDPnEQtFartM8H+bv5zUhAUJs8qLzuFAdBZQLueD9XZ
# eynjQKwEeAz63xATICh8tOUM2zMgSEhVL8Hm45SB6foes4BTC0Y8SZWov3Iahtvw
# yHFbUqs1YjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAx
# W9uizG3hEY89uL2uu+X+mG/rdaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6NjzdTAiGA8yMDIzMTAxNzExNTAx
# M1oYDzIwMjMxMDE4MTE1MDEzWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDo2PN1
# AgEAMAoCAQACAg3fAgH/MAcCAQACAhOhMAoCBQDo2kT1AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAKoK2wUwxy/dy6ilNGOns2b1lA/TQcUejCKXFKrYqDTS
# GD7AnU8HkDXe5keqG9/VXhBQQVTBeAr0tC1XGpBDhoLojMbniwWF7+ximf+zcQ+V
# xnvvODG/PRbF5WUWDW3kAS+FcDpeeJyCEh0X3K8xNsMIMRtkx5VDiI2aN/PqwNtO
# nEPkEN9Ko87YeSeANnQD9pB/R5TBY3CIID90a4smAQhcYaTe80Px3pH5Tk+s+xH9
# WhV4lThu8W/9ngpt0fF3WiFPYOVn5N1Luwiqy8u7cNjVR4JPNSMOTDni8Z1aWvLA
# CPAQ4WTuPjPFLJK99+iMGj08Ro3Msrvj9Tf9i+FAAl8xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdebDR5XLoxRjgABAAAB
# 1zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBqDGgr8GSLKdOzpvVhTfgD6AQJ1PlW/PO52qUZmWym
# czCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJzePl5LXn1PiqNjx8YN7TN1
# ZI0d1ZX/2zRdnI97rJo7MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHXmw0eVy6MUY4AAQAAAdcwIgQgyL73ma9OdQ2wI2yEwGE2J/4u
# lsOO4sJcj4adQ8CrC8swDQYJKoZIhvcNAQELBQAEggIAGpsUJVuKnwyZ7B/iy28w
# LNMQr9PrYHtsiBldl4wY1fFJOFddf+ATD4pkIqZLK1dt0eRB522LeDB93SS9J2vm
# rLlCPcox9uQk0XcftMKy0L4TUdmGVKZKPeninq22hmxXyTQaDdBwy3HJk3n7mqQu
# SGmOjOB4f+Cf6vFWL9Hv3UBeb/LgTthPTwfkRjdryytFmx0epnxKCfqRUglZ9ZRu
# nlRnSoPlv6SVW1zI43g1L6aGrQQZlkCOmq8ocXYL2d5KNX4g7SyjTqGN1syooxrf
# FZWTmMNnZX3hT0/J/hj0dHKWpFpYuDy4oGf/9mKH0BntC0PyRJ5r4IFFFKeStJ9i
# TAQ5Ag7LYGRh+BV+KnpljbS1wBBFCKjVFQNfdM9/NcGz7qHVXAocJMP+uHHV+eKw
# zSxwOGBG0LXCPH78up9tcXRWeNY4O2xuTmd7/JQF+wLc36EPkK3J15unHherQ1ab
# jzIjN6Xw8n0Rxka8q1foz91xW0In10WUSjBMnJBbzW95mrOwK4xbzFKhJ9nH3mHx
# yQv+pu9XBaiVa+cLYRDkcp/CKsGW+xY8FFh224icoNnogPOumBLFYxH8kYLS8QIR
# i5668a/MChElXwp2mP7k32ARMQiKthwlGzmyxxFxvNwIz+IDCTCQFqChsa4xLYNv
# cqWtRiY07arFmE709Q9ZtkA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/219.ps1 | 219.ps1 | function Get-ParentGroup
{
[CmdletBinding()]
PARAM(
[Parameter(Mandatory = $true)]
[String[]]$Name
)
BEGIN
{
TRY{
if(-not(Get-Module Activedirectory -ErrorAction Stop)){
Write-Verbose -Message "[BEGIN] Loading ActiveDirectory Module"
Import-Module ActiveDirectory -ErrorAction Stop}
}
CATCH
{
Write-Warning -Message "[BEGIN] An Error occured"
Write-Warning -Message $error[0].exception.message
}
}
PROCESS
{
TRY
{
FOREACH ($Obj in $Name)
{
$ADObject = Get-ADObject -LDAPFilter "(|(anr=$obj)(distinguishedname=$obj))" -Properties memberof -ErrorAction Stop
IF($ADObject)
{
if ($ADObject.count -gt 1){Write-Warning -Message "More than one object found with the $obj request"}
FOREACH ($Account in $ADObject)
{
Write-Verbose -Message "[PROCESS] $($Account.name)"
$Account | Select-Object -ExpandProperty memberof | ForEach-Object -Process {
$CurrentObject = Get-Adobject -LDAPFilter "(|(anr=$_)(distinguishedname=$_))" -Properties Samaccountname
Write-Output $CurrentObject | Select-Object Name,SamAccountName,ObjectClass, @{L="Child";E={$Account.samaccountname}}
Write-Verbose -Message "Inception - $($CurrentObject.distinguishedname)"
Get-ParentGroup -OutBuffer $CurrentObject.distinguishedname
}
}
}
ELSE {
}
}
}
CATCH{
Write-Warning -Message "[PROCESS] An Error occured"
Write-Warning -Message $error[0].exception.message }
}
END
{
Write-Verbose -Message "[END] Get-NestedMember"
}
} |
combined_dataset/train/non-malicious/sample_10_3.ps1 | sample_10_3.ps1 | #
# Module manifest for module 'OCI.PSModules.Apmsynthetics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmsynthetics.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b2901c22-2813-4f21-ae94-09094aa70e0e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmsynthetics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmsynthetics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmsyntheticsDedicatedVantagePoint',
'Get-OCIApmsyntheticsDedicatedVantagePointsList',
'Get-OCIApmsyntheticsMonitor', 'Get-OCIApmsyntheticsMonitorResult',
'Get-OCIApmsyntheticsMonitorsList',
'Get-OCIApmsyntheticsOnPremiseVantagePoint',
'Get-OCIApmsyntheticsOnPremiseVantagePointsList',
'Get-OCIApmsyntheticsPublicVantagePointsList',
'Get-OCIApmsyntheticsScript', 'Get-OCIApmsyntheticsScriptsList',
'Get-OCIApmsyntheticsWorker', 'Get-OCIApmsyntheticsWorkersList',
'Invoke-OCIApmsyntheticsAggregateNetworkData',
'New-OCIApmsyntheticsDedicatedVantagePoint',
'New-OCIApmsyntheticsMonitor',
'New-OCIApmsyntheticsOnPremiseVantagePoint',
'New-OCIApmsyntheticsScript', 'New-OCIApmsyntheticsWorker',
'Remove-OCIApmsyntheticsDedicatedVantagePoint',
'Remove-OCIApmsyntheticsMonitor',
'Remove-OCIApmsyntheticsOnPremiseVantagePoint',
'Remove-OCIApmsyntheticsScript', 'Remove-OCIApmsyntheticsWorker',
'Update-OCIApmsyntheticsDedicatedVantagePoint',
'Update-OCIApmsyntheticsMonitor',
'Update-OCIApmsyntheticsOnPremiseVantagePoint',
'Update-OCIApmsyntheticsScript', 'Update-OCIApmsyntheticsWorker'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmsynthetics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/datareader to dataset.ps1 | datareader to dataset.ps1 | @@This code was copied from the site http://www.ti4fun.com
@@-----------------------------------------------------------
Public Function ConvDataReaderToDataTable(Byval command As System.Data.SqlClient.SqlCommand) As System.Data.DataTable
Dim datatable As New System.Data.DataTable
Dim reader As System.Data.SqlClient.SqlDataReader = command.ExecuteReader()
Try
datatable.Load(reader)
Finally
reader.Close()
command.Connection = Nothing
End Try
Return datatable
End Function
@@This code was copied from the site http://www.ti4fun.com
@@-----------------------------------------------------------
|
combined_dataset/train/non-malicious/3551.ps1 | 3551.ps1 |
$containerName = "pstestwlvm1bca8"
$resourceGroupName = "pstestwlRG1bca8"
$vaultName = "pstestwlRSV1bca8"
$resourceId = "/subscriptions/da364f0f-307b-41c9-9d47-b7413ec45535/resourceGroups/pstestwlRG1bca8/providers/Microsoft.Compute/virtualMachines/pstestwlvm1bca8"
$policyName = "HourlyLogBackup"
function Enable-Protection(
$vault,
$container)
{
$policy = Get-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Name $policyName
$protectableItems = Get-AzRecoveryServicesBackupProtectableItem `
-VaultId $vault.ID `
-Container $container `
-WorkloadType "MSSQL";
Enable-AzRecoveryServicesBackupProtection `
-VaultId $vault.ID `
-Policy $policy `
-ProtectableItem $protectableItems[1]
$item = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $container `
-WorkloadType MSSQL;
return $item
}
function Cleanup-Vault(
$vault,
$item,
$container)
{
Disable-AzureRmRecoveryServicesBackupProtection `
-VaultId $vault.ID `
-Item $item `
-RemoveRecoveryPoints `
-Force;
Unregister-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-Container $container
} |
combined_dataset/train/non-malicious/sample_15_92.ps1 | sample_15_92.ps1 | @{
GUID = "A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author = "PowerShell"
CompanyName = "Microsoft Corporation"
Copyright = "Copyright (c) Microsoft Corporation."
ModuleVersion = "7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion = "3.0"
FunctionsToExport = @()
CmdletsToExport = "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage"
AliasesToExport = @()
NestedModules = "Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWNhoZaJT5e8B1
# Q5H12dpK/1OtcJflTmkUj5T5DHeB1KCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII6raYMkfTa+0mZhw9hnCu1d
# zwZDXcInd9yxKhuSWdG7MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAcSY2M36DPhx3ZSwPbWOQsZPOhWDCMg1czUOgnK/2pUNGyYgR6VcvFRib
# 35rHXvwvj0BU2kzD6b/q4YREjNyBHeBSM5lD+NGb74k9bO8NbDKQ2eUr/xvoNtCr
# THwrOnCsq7/B2qJfYaptVCWDkkiTF5sh7hsKzITC+pTT1x2Wog3UtTgsH67Sj1kY
# j35e3DVPIGopgQQ/rjVGMQcMLHlNawYMW/i2iXs46Wt5Ns5jfdN0KqoEtCr386yS
# x+ZeGCWeSK/0AQPakW216cJs7xo7I3jFHEQ6ixP9DGw1J45knHSxP0/fPmlXbljk
# FMwvfzq+CYrgQHBQ0jp176J65foLs6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDRcqYLfGMzX91Dl5/K5Da/y9SM2INaoRIheu6dEgM0HAIGZwf/oHmE
# GBMyMDI0MTAxNjE1MjgzMy45ODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0
# lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt
# XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP
# mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8
# LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT
# 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT
# 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28
# /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu
# bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv
# 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB
# YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl
# JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K
# 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx
# mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u
# 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4
# 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT
# 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6
# ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL
# a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W
# qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp
# InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr
# UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h
# Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL
# cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rm93DAiGA8yMDI0MTAxNjA0MjE0
# OFoYDzIwMjQxMDE3MDQyMTQ4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqub3c
# AgEAMAoCAQACAhWPAgH/MAcCAQACAhNyMAoCBQDquw9cAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBACbJPRmIdE3WH1e57OYJ8eFfsWWTi/YXUdV83U5CZtOS
# AT6Fp/tIe3Npo2sHXIHAV7q5+deIIsTzIppKrue349SQ7W2wwNggNLY+MMJpRyT7
# Z5w/WpEgAzZCZQMOzH9TrEs1QQiNQxMNip/ArKuiZydCnN2lpno6WR8AFUB4sBDI
# r/lyChJEjnNFXJZv1n2yX3o9vKtBiCQLrdf/M+1MhxBX3eTDKBsmIleEC7Vwmu/W
# BmiYgoraqVWsojYgmuUo2M+OGVOTyamb1Tq3BZll3I1vcySiHyHMHQfZM3cN1Mw/
# eMNII+HFu/eW1ZN6PlO+Z1enQzzQ3CfW1MCcEEoK6rYxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB
# 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCEhPDMN+n6iKM3D5APTAhygj4BUybp6cmF5i5eeT/o
# ajCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db
# cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg63C7e/ZiDyhwIXuZIZxhp/gw
# jbHP1Li08qLFXSPFeH4wDQYJKoZIhvcNAQELBQAEggIALAkaaOwEFnyorE1qn1jq
# bCKMFyq//Dud3aq4H5AEUnlANQ4oym9G7p8vXhgmYoAJQt/LXmrpPVYGb5LIJ+Mo
# W4zXZ8JpcU2CFVExPoke1sMwZBkWvpT5YxBrQt1MDVB5KxXzMkTQBQQxlnjVycBA
# XfwO46HXYVEuNU38ljONCfsMEp4O52Z2M/H9nHyhpgniopb5Mofd3xrrE89a+VgK
# ivRaVockUegOvCfGSCLiYnvZcRKkHGmJxreWVU0gaUUj3bbmrINcpo3fwyC1Eig1
# Mu5zc1cHrRhBEtnv6Jc5zBZc7UqLdCHYuZq/lnU2OGFo6Wl+bR+Lehc92uDWBJfo
# 8Dmul1sQz87Np9P+uIbJpc+z6unRNnLLqiFT8IZSHOBxJSu670Ez0mtO3bLb8KWN
# CraTzIgQm0UGHjJLJyoyJFYCBv3Xi0lFTnC7TiQLcGiCQSxU+BiZkoEl23aQ+KPP
# bWJ1WyjaEwtLOS7jUPMs/1xhzPvCZ3zKN+hjRDn0aiHzC2sR6TWdzcguKMzWdb4X
# wm+2ONyeVbkE+gZt9Gs3ysQiWy35Vamt/aAj5v5bVzRVASPsVurRotRz0kde2uBJ
# vcdXI6g6e4ubU7ccwjSLroZueJS0nTNk3Upo/qIbVtHk5EMW17Wx92ImgxJIkXXt
# JDA59zg9Qop1yFIK65McnWU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3379.ps1 | 3379.ps1 |
function Initialize-Mappings
{
param
(
[Parameter(Mandatory = $false)]
[string[]]$PathsToIgnore,
[Parameter(Mandatory = $false)]
[Hashtable]$CustomMappings
)
$Mappings = [ordered]@{}
Get-ChildItem -Path $Script:RootPath -File | ForEach-Object { $Mappings[$_.Name] = @() }
Get-ChildItem -Path $Script:RootPath -Directory | Where-Object { $_.Name -ne "src" } | ForEach-Object { $Mappings[$_.Name] = @() }
Get-ChildItem -Path $Script:SrcPath -File | ForEach-Object { $Mappings["src/$_.Name"] = @() }
if ($CustomMappings -ne $null)
{
$CustomMappings.GetEnumerator() | ForEach-Object { $Mappings[$_.Name] = $_.Value }
}
if ($null -ne $PathsToIgnore)
{
foreach ($Path in $PathsToIgnore)
{
$Mappings[$Path] = $null
$Mappings.Remove($Path)
}
}
return $Mappings
}
function Format-Json
{
param
(
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[hashtable]$InputObject
)
$Tab = " "
return $InputObject | ConvertTo-Json -Depth 4 -Compress | ForEach-Object { $_.Replace("{", "{`n$Tab").Replace("],", "],`n$Tab").Replace(":[", ":[`n$Tab$Tab").Replace("`",", "`",`n$Tab$Tab").Replace("`"]", "`"`n$Tab]").Replace("]}", "]`n}") }
}
function Create-Key
{
param
(
[Parameter(Mandatory = $true)]
[string]$FilePath
)
$Key = ""
$TempFilePath = $FilePath
while ($true)
{
$TempItem = Get-Item -Path $TempFilePath
$Name = $TempItem.Name
$Key = $Name + "/" + $Key
if ($Name -eq "src")
{
break
}
if ($null -ne $TempItem.Parent)
{
$TempFilePath = $TempItem.Parent.FullName
}
else
{
$TempFilePath = $TempItem.Directory.FullName
}
}
return $Key
}
function Create-ProjectToFullPathMappings
{
$Mappings = [ordered]@{}
foreach ($ServiceFolder in $Script:ServiceFolders)
{
$CsprojFiles = Get-ChildItem -Path $ServiceFolder -Filter "*.csproj" -Recurse
foreach ($CsprojFile in $CsprojFiles)
{
$Mappings[$CsprojFile.BaseName] = $CsprojFile.FullName
}
}
return $Mappings
}
function Create-SolutionToProjectMappings
{
$Mappings = [ordered]@{}
foreach ($ServiceFolder in $Script:ServiceFolders)
{
$SolutionFiles = Get-ChildItem -Path $ServiceFolder.FullName -Filter "*.sln"
foreach ($SolutionFile in $SolutionFiles)
{
$Mappings = Add-ProjectDependencies -Mappings $Mappings -SolutionPath $SolutionFile.FullName
}
}
return $Mappings
}
function Add-ProjectDependencies
{
param
(
[Parameter(Mandatory = $true)]
[hashtable]$Mappings,
[Parameter(Mandatory = $true)]
[string]$SolutionPath
)
$CommonProjectsToIgnore = @( "Authentication", "Authentication.ResourceManager", "Authenticators", "ScenarioTest.ResourceManager", "TestFx", "Tests" )
$ProjectDependencies = @()
$Content = Get-Content -Path $SolutionPath
$Content | Select-String -Pattern "`"[a-zA-Z0-9.]*`"" | ForEach-Object { $_.Matches[0].Value.Trim('"') } | Where-Object { $CommonProjectsToIgnore -notcontains $_ } | ForEach-Object { $ProjectDependencies += $_ }
$Mappings[$SolutionPath] = $ProjectDependencies
return $Mappings
}
function Create-ProjectToSolutionMappings
{
$Mappings = [ordered]@{}
foreach ($ServiceFolder in $Script:ServiceFolders)
{
$Mappings = Add-SolutionReference -Mappings $Mappings -ServiceFolderPath $ServiceFolder.FullName
}
return $Mappings
}
function Add-SolutionReference
{
param
(
[Parameter(Mandatory = $true)]
[hashtable]$Mappings,
[Parameter(Mandatory = $true)]
[string]$ServiceFolderPath
)
$CsprojFiles = Get-ChildItem -Path $ServiceFolderPath -Filter "*.csproj" -Recurse | Where-Object { $_.FullName -notlike "*Stack*" -and $_.FullName -notlike "*.Test*" }
foreach ($CsprojFile in $CsprojFiles)
{
$Key = $CsprojFile.BaseName
$Mappings[$Key] = @()
$Script:SolutionToProjectMappings.Keys | Where-Object { $Script:SolutionToProjectMappings[$_] -contains $Key } | ForEach-Object { $Mappings[$Key] += $_ }
}
return $Mappings
}
function Create-ModuleMappings
{
$PathsToIgnore = @("tools")
$CustomMappings = @{}
$Script:ModuleMappings = Initialize-Mappings -PathsToIgnore $PathsToIgnore -CustomMappings $CustomMappings
foreach ($ServiceFolder in $Script:ServiceFolders)
{
$Key = "src/$($ServiceFolder.Name)"
$ModuleManifestFiles = Get-ChildItem -Path $ServiceFolder.FullName -Filter "*.psd1" -Recurse | Where-Object { $_.FullName -notlike "*.Test*" -and `
$_.FullName -notlike "*Release*" -and `
$_.FullName -notlike "*Debug*" -and `
$_.Name -like "Az.*" }
if ($null -ne $ModuleManifestFiles)
{
$Value = @()
$ModuleManifestFiles | ForEach-Object { $Value += $_.BaseName }
$Script:ModuleMappings[$Key] = $Value
}
}
}
function Create-CsprojMappings
{
$PathsToIgnore = @("tools")
$CustomMappings = @{}
$Script:CsprojMappings = Initialize-Mappings -PathsToIgnore $PathsToIgnore -CustomMappings $CustomMappings
foreach ($ServiceFolder in $Script:ServiceFolders)
{
Add-CsprojMappings -ServiceFolderPath $ServiceFolder.FullName
}
}
function Add-CsprojMappings
{
param
(
[Parameter(Mandatory = $true)]
[string]$ServiceFolderPath
)
$Key = Create-Key -FilePath $ServiceFolderPath
$CsprojFiles = Get-ChildItem -Path $ServiceFolderPath -Filter "*.csproj" -Recurse
if ($null -ne $CsprojFiles)
{
$Values = New-Object System.Collections.Generic.HashSet[string]
foreach ($CsprojFile in $CsprojFiles)
{
$Project = $CsprojFile.BaseName
foreach ($Solution in $Script:ProjectToSolutionMappings[$Project])
{
foreach ($ReferencedProject in $Script:SolutionToProjectMappings[$Solution])
{
$TempValue = $Script:ProjectToFullPathMappings[$ReferencedProject]
if (-not [string]::IsNullOrEmpty($TempValue))
{
$Values.Add($TempValue) | Out-Null
}
}
}
}
$Script:CsprojMappings[$Key] = $Values
}
}
$Script:RootPath = (Get-Item -Path $PSScriptRoot).Parent.FullName
$Script:SrcPath = Join-Path -Path $Script:RootPath -ChildPath "src"
$Script:ServiceFolders = Get-ChildItem -Path $Script:SrcPath -Directory
$Script:ProjectToFullPathMappings = Create-ProjectToFullPathMappings
$Script:SolutionToProjectMappings = Create-SolutionToProjectMappings
$Script:ProjectToSolutionMappings = Create-ProjectToSolutionMappings
Create-ModuleMappings
Create-CsprojMappings
$Script:ModuleMappings | Format-Json | Set-Content -Path (Join-Path -Path $Script:RootPath -ChildPath "ModuleMappings.json")
$Script:CsprojMappings | Format-Json | Set-Content -Path (Join-Path -Path $Script:RootPath -ChildPath "CsprojMappings.json") |
combined_dataset/train/non-malicious/sample_24_74.ps1 | sample_24_74.ps1 | [CmdletBinding()]
param
(
[Parameter(Mandatory)]
[string]$MergeCommitSha
)
Import-Module $(Join-Path $PSSCriptRoot Helpers.psm1)
class DeleteEvent {
[string]$Author;
[string]$Sha;
[DateTime]$CommitDate;
DeleteEvent([string]$author, [string]$sha, [string]$datestring) {
$this.Sha = $sha
try {
$this.CommitDate = $($datestring | ConvertTo-DateTime | Get-Date)
}
catch {
}
$this.Author = $author
}
}
class PRFile {
[string]$FileName;
[string]$PreviousFileName;
[string]$Content;
[string[]]$Blame;
[string[]]$Patch;
[string[]]$Commits;
[string[]]$WordDiff;
[string]$PreviousContent;
[bool]$Added;
[bool]$Deleted;
PRFile([string]$path, [string]$old) {
$this.FileName = $path;
$this.PreviousFileName = $old
$this.Commits = @();
$this.Added = $false;
$this.Deleted = $false;
}
}
class PRCommit {
[string]$Sha;
[string]$MergeCommitSha;
[datetime]$CommitDate;
[string[]]$Patch;
[string]$Author;
[string]$PreviousFileName;
[string]$NewFileName;
[string]$Content;
PRCommit([string]$sha, [string]$merge, [string]$datestring, [string[]]$patch, [string]$author, [string]$old, [string]$new) {
$this.Sha = $;
$this.MergeCommitSha = $merge;
try {
$this.CommitDate = $($datestring | ConvertTo-DateTime | Get-Date);
}
catch {
}
$this.Patch = $patch;
$this.Author = $author;
$this.NewFileName = $new;
$this.PreviousFileName = $old;
}
}
try {
$jsonObjects = @()
if (![String]::IsNullOrEmpty($MergeCommitSha)) {
$addedFiles = $($(git log --name-status --oneline --format='' --diff-filter=A "$($MergeCommitSha)^-")3>&1 2>&1)
foreach ($file in $addedFiles) {
if ("$file" -match "(?mi)fatal:") {
continue;
}
$file = @($file -split "(?mi)^[RA][ \t]+")[-1]
if (![String]::IsNullOrEmpty($file)) {
$prFile = New-Object PRFile -ArgumentList $file, ""
try {
$prFile.Content = $($(git show "$($MergeCommitSha):$($file)") -join "`r`n")3>&1 2>&1
$prFile.PreviousContent = $($(git show "$($MergeCommitSha)^:$($file)") -join "`r`n") 3>&1 2>&1
$prFile.Blame = @(($(git blame -e --date=short $file $MergeCommitSha)) 3>&1 2>&1)
$prFile.Patch = @($(git diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file) 3>&1 2>&1)
$prFile.WordDiff = @($(git diff --word-diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file 3>&1 2>&1))
$prFile.Commits = @((git log --oneline --format='%H||%aE||%aN' $MergeCommitSha~...$MergeCommitSha) 3>&1 2>&1)
}
catch {
continue
}
$prFile.Added = $true
$jsonObjects += $prFile
}
}
$deletedFiles = $($(git log --name-status --oneline --format='' --diff-filter=D "$($MergeCommitSha)^-")3>&1 2>&1)
foreach ($file in $deletedFiles) {
if ("$file" -match "(?mi)fatal:") {
continue;
}
$file = @($file -split "(?mi)^[RD][ \t]+")[-1]
if (![String]::IsNullOrEmpty($file)) {
try {
$prFile = New-Object PRFile -ArgumentList $file, ""
$prFile.Deleted = $true
$jsonObjects += $prFile
}
catch {
continue
}
}
}
$files = $($(git log --name-only --oneline --format='' --diff-filter=Mad "$($MergeCommitSha)^-" 3>&1 2>&1) | Microsoft.PowerShell.Utility\Select-Object -Unique)
foreach ($file in $files) {
if ("$file" -match "(?mi)fatal:") {
continue;
}
$prFile = New-Object PRFile -ArgumentList $file, ""
$file = @($file -split "(?mi)^[MR][ \t]+")[-1]
if (![String]::IsNullOrEmpty($file)) {
try {
$prFile.Content = $($(git show "$($MergeCommitSha):$($file)") -join "`r`n")3>&1 2>&1
$prFile.PreviousContent = $($(git show "$($MergeCommitSha)^:$($file)") -join "`r`n") 3>&1 2>&1
$prFile.Blame = @(($(git blame -e --date=short $file $MergeCommitSha)) 3>&1 2>&1)
$prFile.Patch = @($(git diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file) 3>&1 2>&1)
$prFile.WordDiff = @($(git diff --word-diff --output-indicator-new=~ --output-indicator-old=^ "$($MergeCommitSha)^-" -- $file 3>&1 2>&1))
$prFile.Commits = @((git log --oneline --format='%H||%aE||%aN' $MergeCommitSha~...$MergeCommitSha) 3>&1 2>&1)
}
catch
{
continue
}
$jsonObjects += $prFile
}
}
}
return Microsoft.PowerShell.Utility\ConvertTo-Json -Depth 20 $jsonObjects
}
catch {
Microsoft.PowerShell.Utility\Write-Host $_
$_.InvocationInfo
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDr+Wg++70c9JqE
# rz7mFj8WIaWPN6ge/DGXKwHqQqNeHKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILwvc9D3euvLhZ6BUU1/keGa
# /UvsYyA7YIDUPvGkG+cDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAY7IJqVPOExSW8vYWTgKMoHOpl0MKl/PGM6dpa2kardS3uzCzIzRmz9xz
# SDSiaAYFvN9G5WpVRAdPoz9R1u5LiTnq2+vdiqQoE2OtkT4dOBScIZgxfMJdijKz
# a4yLJ/x58qH2+6+yKY/3HcUbIDAHT5odXQlNWrMuu5JNcfTzz32WReJNA0l4GzUz
# AKWlwSLkhavtepS8XRb6ItXwp77xg89FAgaQtEwgiKcM1GS+RVBFUP08RjHrfjlH
# xFfJU+Js4fMKASjWB5bFNkqkhT/sjkMMHD9qSwMugZqKlGZ4lFvbSOAMfug7s2Jh
# 7KRXkJEhj/fgcae3qM5eykSIMR2vDKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB22owBXDkiXhIYQbOsm8UgcsB+gpBmlYdjM68NCkmH5QIGZc4rK+Mq
# GBMyMDI0MDIyMjE4NTc1MC43MTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz
# CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd
# seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x
# Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+
# TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ
# sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9
# f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP
# aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja
# VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn
# WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9
# 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw
# qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema
# ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo
# ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5
# EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+
# xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7
# ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH
# u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ
# 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1
# 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN
# ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh
# y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0
# SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu
# HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6YHj8TAiGA8yMDI0MDIyMjE1MTcw
# NVoYDzIwMjQwMjIzMTUxNzA1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpgePx
# AgEAMAoCAQACAhv4AgH/MAcCAQACAhPHMAoCBQDpgzVxAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBABeHBZwf9nAXsvpSvAUxDFLyPcvbzKF5jVTt8WUgx/N6
# tcUK3QaP18R6QnTlaGEcABhUWTWLEJtzidClDZhVpkBwR/oCSi3ZF+Ui8rFnzW6x
# v6DXp5ldLtmZqkUN22xxvCEgZU/ji+ruSolwWq7Ou2Kb3g4dzTeeBNzs2DmgJDyy
# MP/ptGNaWF3dXzadZfvh9+4kJgkMRC8eBATp5fymENUJ5qr2KhMohY79WX4yROr2
# P1KwAQQLWiQ0/twYKTmEdTUywD0WV4qz1IMf8lBVJtJP1bZM9ZaGHtL4g1xoo5/d
# v53psY8oCbyF8Pl1JlPoSChyg+kDLwsDe2PFoJp/8zExggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB
# 7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBJpfLoWW5AveGYixfXOVi8Bc3xGnrEwNfrgpMkjL3n
# VjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrI
# wrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJyHVRPSranhgDN+jA+EO5/Fh
# mg7T9dyo5+QnS7TFtDAwDQYJKoZIhvcNAQELBQAEggIAdd3J1Le5qKCZ2GKu7xf2
# oDtnDtQyS+Ld0ushBFpRtXfghHTvAQamF6L222g4T0WQXmlb+wJii/rNh1SxjFqq
# 3wRnWLzaWFgh75ELluNF4Ncm1B/Wch1Qk6n3SKROuFIGfR7bzY4d3hr8u0ko8e8u
# 8ueLVGpSebQYGolUH81fSG03cBCWv1WVAuLBxDl92/wkiTsWc+GwmkNIHndE7hb6
# DB8tkGKYd2k4KsqHygYk0HZ8gEVacJTUQ17KouqcTNtjqjhtKmBkidhXydsS9ePm
# DEaOsJsbxxkB9rxNs2LhDdz9R0NuKcqQaDshWIzo+T+6hUlNJUxr8B+fC20zfO8I
# XXcYaA1Y/I3u2I1td4AYQvZUOu1L9YXMhMLdmrp+jGNo9fssFppqwx9C2HrBzzGC
# X1nhPUa1MIQDjqQCxqPmQUTv5PXl2aPS+/We7PS0ey/wW7JQqrrk3VKD1VANAFk8
# DDiCSsipfdrI+Wrp2hNQCQULg+lXCixzW6K48XazjaqoGmh2+GoDWcM7wn6Zfpdw
# 0TymqPReyEfGDhuabBBxs/89xH6gm9EryJqrIrQ4JACL3bZ9Ogb7tpNBzAdJDiqq
# T1b5j/mMpfJYvW315LRdke5JO0D2r/UVFfOJr/1h9RJCM+yC1U8gW024LLzLqe5U
# mXCqxzS3qDSAEqyAl2gU1Is=
# SIG # End signature block
|
combined_dataset/train/non-malicious/TabExpansion_15.ps1 | TabExpansion_15.ps1 | ## Tab-Completion
#################
## Please dot souce this script file.
## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list.
##
## What this can do is:
##
## [datetime]::n<tab>
## [datetime]::now.d<tab>
## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell"
## $c = [ref]$a; $d = [ref]$b,$c
## $d[0].V<tab>[0][0].Get<tab>
## $d[1].V<tab>[0,0].tos<tab>
## $function:a<tab>
## $env:a<tab>
## [System.Type].a<tab>
## [datetime].Assembly.a<tab>
## ).a<tab> # shows System.Type properties and methods...
## #native command name expansion
## fsu<tab>
## #command option name expansion (for fsutil ipconfig net powershell only)
## fsutil <tab>
## ipconfig <tab>
## net <tab>
## powershell <tab>
## #TypeNames and Type accelerators expansion
## [Dec<tab>
## [system.Man<tab>.auto<tab>.p<tab>
## New-Object -TypeName IO.Dir<tab>
## New-Object System.win<tab>.for<tab>.bu<tab>
## #ProgIDs expansion
## New-Object -Com shel<tab>
## #Enum option expansion
## Set-ExecutionPolicy <tab>
## Set-ExecutionPolicy All<tab>
## Set-ExcusionPolisy -ex <tab>
## Get-TraceSource Inte<tab>
## iex -Errora <tab> -wa Sil<tab>
## #WmiClasses expansion
## Get-WmiObject -class Win32_<tab>
## gwmi __Instance<tab>
## #Encoding expansion
## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab>
## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab>
## #PSProvider name expansion
## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab>
## Get-PSProvider <tab>
## pwd -psp al<tab>
## #PSDrive name expansion
## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab>
## Get-PSDrive <tab>
## pwd -psd <tab>
## #PSSnapin name expansion
## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab>
## Get-Command -PSSnapin <tab>
## Remove-PSSnapin <tab>
## Get-PSSnapin M<tab>
## #Eventlog name and expansion
## Get-Eventlog -Log <tab>
## Get-Eventlog w<tab>
## #Eventlog's entrytype expansion
## Get-EventLog -EntryType <tab>
## Get-EventLog -EntryType Er<tab>
## Get-EventLog -Ent <tab>
## #Service name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab>
## New-Service -DependsOn <tab>
## New-Service -Dep e<tab>
## Get-Service -n <tab>
## Get-Service <tab>,a<tab>,p<tab>
## gsv <tab>
## #Service display name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab>
## Get-Service -Dis <tab>
## gsv -Dis <tab>,w<tab>,b<tab>
## #Cmdlet and Topic name expansion (this also support default help function and man alias)
## Get-Help [-Name] about_<tab>
## Get-Help <tab>
## #Category name expansion (this also support default help function and man alias)
## Get-Help -Category c<tab>,<tab>
## #Command name expansion
## Get-Command [-Name] <tab>
## Get-Command -Name <tab>
## gcm a<tab>,<tab>
## #Scope expansion
## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias
## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab>
## Clear-Variable -Scope G<tab>
## Set-Alias -s <tab>
## #Process name expansion
## [Get-Process | Stop-Process] [-Name] <tab>
## Stop-Process -Name <tab>
## Stop-Process -N pow<tab>
## Get-Process <tab>
## ps power<tab>
## #Trace sources expansion
## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab>
## #Trace -ListenerOption expansion
## [Set-TraceSource | Trace-Command] -ListenerOption <tab>
## Set-TraceSource -Lis <tab>,n<tab>
## #Trace -Option expansion
## [Set-TraceSource | Trace-Command] -Option <tab>
## Set-TraceSource -op <tab>,con<tab>
## #ItemType expansion
## New-Item -Item <tab>
## ni -ItemType d<tab>
## #ErrorAction and WarningAction option expansion
## CMDLET [-ErrorAction | -WarningAction] <tab>
## CMDLET -Errora s<tab>
## CMDLET -ea con<tab>
## CMDLET -wa <tab>
## #Continuous expansion with comma when parameter can treat multiple option
## # if there are spaces, occur display bug in the line
## # if strings contains '$' or '-', not work
## Get-Command -CommandType <tab>,<tab><tab>,cm<tab>
## pwd -psp <tab>,f<tab>,va<tab>
## Get-EventLog -EntryType <tab>,i<tab>,s<tab>
## #Enum expansion in method call expression
## # this needs one or more spaces after left parenthesis or comma
## $str = "day night"
## $str.Split( " ",<space>rem<tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR
## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success
## $type = [System.Type]
## $type.GetMembers(<space>Def<tab>
## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab>
## # this can do continuous enum expansion with comma and no spaces
## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>"
## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab>
## #Better '$_.' expansion when cmdlet output objects or method return objects
## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> }
## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB }
## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> }
## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" }
## $data = Get-Process
## $data[2,4,5] | % { $_.<tab>
## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type
## #Property name expansion by -Property parameter
## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object |
## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab>
## Select-Object -ExcludeProperty <tab>
## Select-Object -ExpandProperty <tab>
## gcm Get-Acl|select -exp Par<tab>
## ps |group na<tab>
## ls | ft A<tab>,M<tab>,L<tab>
## #Hashtable key expansion in the variable name and '.<tab>'
## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} }
## $hash.pow<tab>.pro<tab>
## #Parameter expansion for function, filter and script
## man -f<tab>
## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1
## .\\foobar.ps1 -<tab> -b<tab>
## #Enum expansion for function, filter and scripts
## # this can do continuous enum expansion with comma and no spaces
## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab>
## #Enum expansion for assignment expression
## #needs space(s) after '=' and comma
## #strongly-typed with -as operator and space(s)
## $ErrorActionPreference =<space><tab>
## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3
## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab>
## #Path expansion with variable and '\\' or '/'
## $PWD\\../../<tab>\\<tab>
## "$env:SystemDrive/pro<tab>/<tab>
## #Operator expansion which starts with '-'
## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2'
## 1..9 -co<tab> 5
## #Keyword expansion
## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } }
## #Variable name expansion (only global scope)
## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab>
## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab>
## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab>
## Tee-Object -Variable <tab>
## gv pro<tab>,<tab>
## Remove-Variable -Name out<tab>,<tab>,ps<tab>
## ... | ... | tee -v <tab>
## #Alias name expansion
## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab>
## Export-Alias -Name <tab>
## Get-Alias i<tab>,e<tab>,a<tab>
## epal -n for<tab>
## #Property name expansion with -groupBy parameter
## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab>
## ps | ft -g <tab>
## gcm | Format-Wide -GroupBy Par<tab>
## #Type accelerators expansion with no characters
## [<tab>
## New-Object -typename <tab>
## New-Object <tab>
## # File glob expansion with '@'
## ls *.txt@<tab>
## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma
## ls * -Filter *.txt # 2 <tab> refactoring
## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern
## This can also use '^'(hat) or '~'(tilde) for Excluding
## ls <hat>*.txt@<tab>
## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma
## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring
## *.txt<tilde>foo*<tilde>bar*@<tab>
## ls file.txt # 1 <tab> expanding with comma
## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring
## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> )
## ls * -Filter * -Excluding foo*, bar*<Enter>
## #ls<tab>
## #1<tab>
## # Command buffer stack with ';'(semicolon)
## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1
## echo "PowerShell"<semicolon><tab> # push command2
## get-process<semicolon><tab> # push command3
## {COMMAND}<Enter> # execute another command
## get-process # Auto pop command3 from stack by LIFO
## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon)
## get-process; <semicolon><comma><tab>
## get-process; echo "PowerShell" # pop command2 from stack by LIFO
## # Function name expansion after 'function' or 'filter' keywords
## function cl<tab>
## #Switch syntax option expansion
## switch -w<tab> -f<tab>
## #Better powershell.exe option expansion with '-'
## powershell -no<tab> -<tab> -en<tab>
## #A part of PowerShell attributes expansion ( CmdletBinding, Parameter, Alias, Validate*, Allow* )
## [par<tab>
## [cmd<tab>
## #Member expansion for CmdletBinding and Parameter attributes
## [Parameter(man<tab>,<tab>1,val<tab>$true)]
## [CmdletBinding( <tab>"foo", su<tab>$true)]
## #Several current date/time formats with Ctrl+D
## <Ctrl+D><tab><tab><tab><tab><tab>...
## #Hand-operated pop from command buffer with Ctrl+P (this is also available with ';:' or ';,')
## <command>;<tab> # push command
## <Ctrl+D><tab> # pop
## #Paste clipboard with Ctrl+V
## <Ctrl+V><tab>
## # Cut current line with Ctrl+X
## <command><Ctrl+X><tab>
## # Cut words with a character after Ctrl+X until the character
## 1: PS > dir -Filter *.txt<Ctrl+X>-<tab> # Cut words until '-'
## 2: PS > dir -
## 3: PS > dir -<Ctrl+V><tab> # Paste words that were copyed now
## # Cut last word in current line with Ctrl+Z
## 1: PS > Get-ChildItem *.txt<Ctrl+Z><tab> # Cut last word in current line
## 2: PS > Get-ChildItem
## 3: PS > Get-ChildItem -Exclude <Ctrl+V><tab> # Paste last word that was copyed now
## #[ScriptBlock] member expansion for [ScriptBlock] literal
## { 1+1 }.inv<tab>
## #A part of history commands expansion with Ctrl+L (using split(";"),split("|"),split(";|") )
## ls -Force -Recurse -Filter *.txt | ? { $_.LastWriteTime -lt [DateTime]::Today } ; echo PowerShell
## ls<Ctrl+L><tab><tab>
## ?<Ctrl+L><tab><tab>
## ec<Ctrl+L><tab>
## # Using Ctrl+K, characters insertion (bihind space or semi-coron or pipe operator) feature : it encloses tokens with parnthesis by default
## 1 - 1 - 1 - 1<Ctrl+K><tab>
## 1 - 1 - 1 - (1)<tab>
## 1 - 1 - 1 (- 1)<tab>
## 1 - 1 - (1 - 1)<tab><tab><tab>...
## with double Ctrl+K, it encloses tokens with $( )
## for ( $i=0;$j=1<Ctrl+K><Ctrl+K><tab><tab>
## for ( $($i=0;$j=1)
## if there is a character between <Ctrl+K> and <tab>, it is inserted between tokens
## 1+1 | {$_*2}<Ctrl+K>%<tab>
## 1+1 | %{$_*2}
## 1+1 +1+1<Ctrl+K>;<tab>
## 1+1 ;+1+1
## if the character is ( or { or {, tokens are enclosed ( ) or { } or {}
## int<Ctrl+K>[<tab>
## [int]
## with double Ctrl+K, and if there is a character between <Ctrl+K> and <tab>, it is inserted between tokens with '$'
## C:\\WINDOWS\\system32\\notepad.exe<Ctrl+K><Ctrl+K>{<tab>
## ${C:\\WINDOWS\\system32\\notepad.exe}
## % and ? are given special treatment with double Ctrl+K, these enclose tokens with % { } or ? { } behind '|'
## ls | $_.LastWriteTime -gt "2009/5"<Ctrl+K><Ctrl+K>?<tab>
## ls | ? {$_.LastWriteTime -gt "2009/5"}
## ls | $_.FullName<Ctrl+K><Ctrl+K>%<tab>
## ls | % {$_.FullName}
## # WMI Namespaces expansion for Get-WmiObject
## gwmi -Namespace <tab>
## Get-WmiObject -Namespace root\\asp<tab>
## # WMI Classes expansion which is corresponding to WMI Namespace (*)
## gwmi -Namespace ROOT\\CIMV2\\ms_409 -Class <tab>_<tab>
### Generate ProgIDs list...
if ( Test-Path $PSHOME\\ProgIDs.txt )
{
$_ProgID = type $PSHOME\\ProgIDs.txt -ReadCount 0
}
else
{
$_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\")
$_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_subkey in $_HKCR.GetSubKeyNames() )
{
foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") )
{
if ($_i -ne $null)
{
$_ProgID.Add($_i.GetValue(""))
}
}
}
'$_ProgID was updated...' | Out-Host
$_ProgID = $_ProgID|sort -Unique
Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose
}
### Generate TypeNames list...
if ( Test-Path $PSHOME\\TypeNames.txt )
{
$_TypeNames = type $PSHOME\\TypeNames.txt -ReadCount 0
}
else
{
$_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() )
{
foreach ( $_type in $_asm.GetTypes() )
{
$_TypeNames.Add($_type.FullName)
}
}
'$_TypeNames was updated...' | Out-Host
$_TypeNames = $_TypeNames | sort -Unique
Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose
}
if ( Test-Path $PSHOME\\TypeNames_System.txt )
{
$_TypeNames_System = type $PSHOME\\TypeNames_System.txt -ReadCount 0
}
else
{
$_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.'
'$_TypeNames_System was updated...' | Out-Host
Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose
}
### Generate Namespaces list...
if ( Test-Path $PSHOME\\WMINamespaces.txt )
{
$_WMINamespaces = type $PSHOME\\WMINamespaces.txt -ReadCount 0
}
else
{
$_WMINamespaces = & {
$sb = {
param ($ns)
gwmi __NAMESPACE -Namespace $ns -com . |
% {
$ns = $_.__NAMESPACE + "\\" + $_.Name
$ns
& $sb $ns
}
}
& $sb root
}
$_WMINamespaces = $_WMINamespaces + "ROOT" | sort
'$_WMINamespaces was updated...' | Out-Host
Set-Content -Value $_WMINamespaces -Path $PSHOME\\WMINamespaces.txt -Verbose
}
### Get default WMI Namespace...
$_WMIdftNS = $_WMINamespaces -eq (Get-ItemProperty HKLM:\\SOFTWARE\\Microsoft\\WBEM\\Scripting)."Default Namespace"
### Generate WMIClasses list...
if ( Test-Path $PSHOME\\WMIClasses.txt )
{
$_WMIClasses = Import-Clixml $PSHOME\\WMIClasses.txt
}
else
{
$_new = '=(New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ));'
$_WMIClasses = iex ('@{"' + [String]::Join( "`"$_new`"", $_WMINamespaces ) + "`"$_new}")
foreach ( $_namespace in $_WMINamespaces )
{
foreach ( $_class in gwmi -Namespace $_namespace -List )
{
$_WMIClasses.$_namespace.Add($_class.Name)
}
$_WMIClasses.$_namespace.Sort()
}
'$_WMIClasses was updated...' | Out-Host
Export-Clixml -InputObject $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose
}
[Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null
$global:_cmdstack = New-Object Collections.Stack
$global:_snapin = $null
$global:_TypeAccelerators = "ADSI", "Array", "Bool", "Byte", "Char", "Decimal", "Double", "float", "hashtable", "int", "Long", "PSObject", "ref",
"Regex", "ScriptBlock", "Single", "String", "switch", "Type", "WMI", "WMIClass", "WMISearcher", "xml"
$global:_cmdline = New-Object Collections.ArrayList
iex (@'
function prompt {
h -Count 1 -OutVariable line |
% { $_.CommandLine.Split("|"); $_.CommandLine.Split(";"); $_.CommandLine.Split(";"); $_.CommandLine.Split(";|") } |
Get-Unique | ? { $_ -ne $line.CommandLine -and $_ -notmatch '^\\s*$' } |
% { $_.Trim(" ") } |
? { $global:_cmdline -notcontains $_ } | % { Set-CommandLine $_ | Out-Null }
if ($_cmdstack.Count -gt 0) {
$line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait($line)
}
'@ + @"
${function:prompt}
}
"@)
function Write-ClassNames ( $data, $i, $prefix='', $sep='.' )
{
$preItem = ""
foreach ( $class in $data -like $_opt )
{
$Item = $class.Split($sep)
if ( $preItem -ne $Item[$i] )
{
if ( $i+1 -eq $Item.Count )
{
if ( $prefix -eq "[" )
{
$suffix = "]"
}
elseif ( $sep -like "[_\\]" )
{
$suffix = ""
}
else
{
$suffix = " "
}
}
else
{
$suffix = ""
}
$prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix
$preItem = $Item[$i]
}
}
}
function Get-PipeLineObject {
$i = -2
$property = $null
do {
$str = $line.Split("|")
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1]
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
if ( $_cmdlet -eq "?" )
{
$_cmdlet = "Where-Object"
}
$global:_exp = $_cmdlet
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Select-Object" -eq $_cmdlet )
{
if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' )
{
$property = $Matches[1] + ";" + $property
}
}
$i--
} while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet )
if ( $global:_forgci -eq $null )
{
$a = @(ls "Alias:\\")[0]
$e = @(ls "Env:\\")[0]
$f = @(ls "Function:\\")[0]
$h = @(ls "HKCU:\\")[0]
$v = @(ls "Variable:\\")[0]
$c = @(ls "cert:\\")[0]
$global:_forgci = gi $PSHOME\\powershell.exe |
Add-Member -Name CommandType -MemberType 'NoteProperty' -Value $f.CommandType -PassThru |
Add-Member -Name Definition -MemberType 'NoteProperty' -Value $a.Definition -PassThru |
Add-Member -Name Description -MemberType 'NoteProperty' -Value $a.Description -PassThru |
Add-Member -Name Key -MemberType 'NoteProperty' -Value $e.Key -PassThru |
Add-Member -Name Location -MemberType 'NoteProperty' -Value $c.Location -PassThru |
Add-Member -Name LocationName -MemberType 'NoteProperty' -Value $c.LocationName -PassThru |
Add-Member -Name Options -MemberType 'NoteProperty' -Value $a.Options -PassThru |
Add-Member -Name ReferencedCommand -MemberType 'NoteProperty' -Value $a.ReferencedCommand -PassThru |
Add-Member -Name ResolvedCommand -MemberType 'NoteProperty' -Value $a.ResolvedCommand -PassThru |
Add-Member -Name ScriptBlock -MemberType 'NoteProperty' -Value $f.ScriptBlock -PassThru |
Add-Member -Name StoreNames -MemberType 'NoteProperty' -Value $c.StoreNames -PassThru |
Add-Member -Name SubKeyCount -MemberType 'NoteProperty' -Value $h.SubKeyCount -PassThru |
Add-Member -Name Value -MemberType 'NoteProperty' -Value $e.Value -PassThru |
Add-Member -Name ValueCount -MemberType 'NoteProperty' -Value $h.ValueCount -PassThru |
Add-Member -Name Visibility -MemberType 'NoteProperty' -Value $a.Visibility -PassThru |
Add-Member -Name Property -MemberType 'NoteProperty' -Value $h.Property -PassThru |
Add-Member -Name ResolvedCommandName -MemberType 'NoteProperty' -Value $a.ResolvedCommandName -PassThru |
Add-Member -Name Close -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteSubKeyTree -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Flush -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetSubKeyNames -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValueKind -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValueNames -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsValidValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name OpenSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name SetValue -MemberType 'ScriptMethod' -Value {} -PassThru
}
if ( $global:_mix -eq $null )
{
$f = gi $PSHOME\\powershell.exe
$t = [type]
$s = ""
$global:_mix = `
Add-Member -InputObject (New-Object PSObject) -Name Mode -MemberType 'NoteProperty' -Value $f.Mode -PassThru |
Add-Member -Name Assembly -MemberType 'NoteProperty' -Value $t.Assembly -PassThru |
Add-Member -Name AssemblyQualifiedName -MemberType 'NoteProperty' -Value $t.AssemblyQualifiedName -PassThru |
Add-Member -Name Attributes -MemberType 'NoteProperty' -Value $f.Attributes -PassThru |
Add-Member -Name BaseType -MemberType 'NoteProperty' -Value $t.BaseType -PassThru |
Add-Member -Name ContainsGenericParameters -MemberType 'NoteProperty' -Value $t.ContainsGenericParameters -PassThru |
Add-Member -Name CreationTime -MemberType 'NoteProperty' -Value $f.CreationTime -PassThru |
Add-Member -Name CreationTimeUtc -MemberType 'NoteProperty' -Value $f.CreationTimeUtc -PassThru |
Add-Member -Name DeclaringMethod -MemberType 'NoteProperty' -Value $t.DeclaringMethod -PassThru |
Add-Member -Name DeclaringType -MemberType 'NoteProperty' -Value $t.DeclaringType -PassThru |
Add-Member -Name Exists -MemberType 'NoteProperty' -Value $f.Exists -PassThru |
Add-Member -Name Extension -MemberType 'NoteProperty' -Value $f.Extension -PassThru |
Add-Member -Name FullName -MemberType 'NoteProperty' -Value $f.FullName -PassThru |
Add-Member -Name GenericParameterAttributes -MemberType 'NoteProperty' -Value $t.GenericParameterAttributes -PassThru |
Add-Member -Name GenericParameterPosition -MemberType 'NoteProperty' -Value $t.GenericParameterPosition -PassThru |
Add-Member -Name GUID -MemberType 'NoteProperty' -Value $t.GUID -PassThru |
Add-Member -Name HasElementType -MemberType 'NoteProperty' -Value $t.HasElementType -PassThru |
Add-Member -Name IsAbstract -MemberType 'NoteProperty' -Value $t.IsAbstract -PassThru |
Add-Member -Name IsAnsiClass -MemberType 'NoteProperty' -Value $t.IsAnsiClass -PassThru |
Add-Member -Name IsArray -MemberType 'NoteProperty' -Value $t.IsArray -PassThru |
Add-Member -Name IsAutoClass -MemberType 'NoteProperty' -Value $t.IsAutoClass -PassThru |
Add-Member -Name IsAutoLayout -MemberType 'NoteProperty' -Value $t.IsAutoLayout -PassThru |
Add-Member -Name IsByRef -MemberType 'NoteProperty' -Value $t.IsByRef -PassThru |
Add-Member -Name IsClass -MemberType 'NoteProperty' -Value $t.IsClass -PassThru |
Add-Member -Name IsCOMObject -MemberType 'NoteProperty' -Value $t.IsCOMObject -PassThru |
Add-Member -Name IsContextful -MemberType 'NoteProperty' -Value $t.IsContextful -PassThru |
Add-Member -Name IsEnum -MemberType 'NoteProperty' -Value $t.IsEnum -PassThru |
Add-Member -Name IsExplicitLayout -MemberType 'NoteProperty' -Value $t.IsExplicitLayout -PassThru |
Add-Member -Name IsGenericParameter -MemberType 'NoteProperty' -Value $t.IsGenericParameter -PassThru |
Add-Member -Name IsGenericType -MemberType 'NoteProperty' -Value $t.IsGenericType -PassThru |
Add-Member -Name IsGenericTypeDefinition -MemberType 'NoteProperty' -Value $t.IsGenericTypeDefinition -PassThru |
Add-Member -Name IsImport -MemberType 'NoteProperty' -Value $t.IsImport -PassThru |
Add-Member -Name IsInterface -MemberType 'NoteProperty' -Value $t.IsInterface -PassThru |
Add-Member -Name IsLayoutSequential -MemberType 'NoteProperty' -Value $t.IsLayoutSequential -PassThru |
Add-Member -Name IsMarshalByRef -MemberType 'NoteProperty' -Value $t.IsMarshalByRef -PassThru |
Add-Member -Name IsNested -MemberType 'NoteProperty' -Value $t.IsNested -PassThru |
Add-Member -Name IsNestedAssembly -MemberType 'NoteProperty' -Value $t.IsNestedAssembly -PassThru |
Add-Member -Name IsNestedFamANDAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamANDAssem -PassThru |
Add-Member -Name IsNestedFamily -MemberType 'NoteProperty' -Value $t.IsNestedFamily -PassThru |
Add-Member -Name IsNestedFamORAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamORAssem -PassThru |
Add-Member -Name IsNestedPrivate -MemberType 'NoteProperty' -Value $t.IsNestedPrivate -PassThru |
Add-Member -Name IsNestedPublic -MemberType 'NoteProperty' -Value $t.IsNestedPublic -PassThru |
Add-Member -Name IsNotPublic -MemberType 'NoteProperty' -Value $t.IsNotPublic -PassThru |
Add-Member -Name IsPointer -MemberType 'NoteProperty' -Value $t.IsPointer -PassThru |
Add-Member -Name IsPrimitive -MemberType 'NoteProperty' -Value $t.IsPrimitive -PassThru |
Add-Member -Name IsPublic -MemberType 'NoteProperty' -Value $t.IsPublic -PassThru |
Add-Member -Name IsSealed -MemberType 'NoteProperty' -Value $t.IsSealed -PassThru |
Add-Member -Name IsSerializable -MemberType 'NoteProperty' -Value $t.IsSerializable -PassThru |
Add-Member -Name IsSpecialName -MemberType 'NoteProperty' -Value $t.IsSpecialName -PassThru |
Add-Member -Name IsUnicodeClass -MemberType 'NoteProperty' -Value $t.IsUnicodeClass -PassThru |
Add-Member -Name IsValueType -MemberType 'NoteProperty' -Value $t.IsValueType -PassThru |
Add-Member -Name IsVisible -MemberType 'NoteProperty' -Value $t.IsVisible -PassThru |
Add-Member -Name LastAccessTime -MemberType 'NoteProperty' -Value $f.LastAccessTime -PassThru |
Add-Member -Name LastAccessTimeUtc -MemberType 'NoteProperty' -Value $f.LastAccessTimeUtc -PassThru |
Add-Member -Name LastWriteTime -MemberType 'NoteProperty' -Value $f.LastWriteTime -PassThru |
Add-Member -Name LastWriteTimeUtc -MemberType 'NoteProperty' -Value $f.LastWriteTimeUtc -PassThru |
Add-Member -Name MemberType -MemberType 'NoteProperty' -Value $t.MemberType -PassThru |
Add-Member -Name MetadataToken -MemberType 'NoteProperty' -Value $t.MetadataToken -PassThru |
Add-Member -Name Module -MemberType 'NoteProperty' -Value $t.Module -PassThru |
Add-Member -Name Name -MemberType 'NoteProperty' -Value $t.Name -PassThru |
Add-Member -Name Namespace -MemberType 'NoteProperty' -Value $t.Namespace -PassThru |
Add-Member -Name Parent -MemberType 'NoteProperty' -Value $f.Parent -PassThru |
Add-Member -Name ReflectedType -MemberType 'NoteProperty' -Value $t.ReflectedType -PassThru |
Add-Member -Name Root -MemberType 'NoteProperty' -Value $f.Root -PassThru |
Add-Member -Name StructLayoutAttribute -MemberType 'NoteProperty' -Value $t.StructLayoutAttribute -PassThru |
Add-Member -Name TypeHandle -MemberType 'NoteProperty' -Value $t.TypeHandle -PassThru |
Add-Member -Name TypeInitializer -MemberType 'NoteProperty' -Value $t.TypeInitializer -PassThru |
Add-Member -Name UnderlyingSystemType -MemberType 'NoteProperty' -Value $t.UnderlyingSystemType -PassThru |
Add-Member -Name PSChildName -MemberType 'NoteProperty' -Value $f.PSChildName -PassThru |
Add-Member -Name PSDrive -MemberType 'NoteProperty' -Value $f.PSDrive -PassThru |
Add-Member -Name PSIsContainer -MemberType 'NoteProperty' -Value $f.PSIsContainer -PassThru |
Add-Member -Name PSParentPath -MemberType 'NoteProperty' -Value $f.PSParentPath -PassThru |
Add-Member -Name PSPath -MemberType 'NoteProperty' -Value $f.PSPath -PassThru |
Add-Member -Name PSProvider -MemberType 'NoteProperty' -Value $f.PSProvider -PassThru |
Add-Member -Name BaseName -MemberType 'NoteProperty' -Value $f.BaseName -PassThru |
Add-Member -Name Clone -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CompareTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Contains -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CopyTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Create -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateObjRef -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateSubdirectory -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Delete -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name EndsWith -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name FindInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name FindMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetArrayRank -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetConstructor -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetConstructors -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetCustomAttributes -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetDefaultMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetDirectories -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetElementType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEnumerator -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEvent -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEvents -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetField -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFields -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFiles -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFileSystemInfos -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericArguments -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericParameterConstraints -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericTypeDefinition -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterface -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterfaceMap -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMember -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMethod -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMethods -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetNestedType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetNestedTypes -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetObjectData -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetProperties -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetProperty -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetTypeCode -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IndexOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name InitializeLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Insert -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name InvokeMember -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsAssignableFrom -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsDefined -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsInstanceOfType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsNormalized -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsSubclassOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name LastIndexOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name LastIndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeArrayType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeByRefType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeGenericType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakePointerType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MoveTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Normalize -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name PadLeft -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name PadRight -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Refresh -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Remove -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Replace -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name SetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Split -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name StartsWith -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Substring -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToCharArray -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToLower -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToLowerInvariant -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToUpper -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToUpperInvariant -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Trim -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name TrimEnd -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name TrimStart -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Chars -MemberType 'NoteProperty' -Value $s.Chars -PassThru
}
if ( "Add-Member" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Compare-Object" -eq $_cmdlet )
{
$global:_dummy = (Compare-Object 1 2)[0]
}
if ( "ConvertFrom-SecureString" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "ConvertTo-SecureString" -eq $_cmdlet )
{
$global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force
}
if ( "ForEach-Object" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Acl" -eq $_cmdlet )
{
$global:_dummy = Get-Acl
}
if ( "Get-Alias" -eq $_cmdlet )
{
$global:_dummy = (Get-Alias)[0]
}
if ( "Get-AuthenticodeSignature" -eq $_cmdlet )
{
$global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe
}
if ( "Get-ChildItem" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-Command" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-Content" -eq $_cmdlet )
{
$global:_dummy = (type $PSHOME\\profile.ps1)[0]
}
if ( "Get-Credential" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Culture" -eq $_cmdlet )
{
$global:_dummy = Get-Culture
}
if ( "Get-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( "Get-Event" -eq $_cmdlet )
{
$global:_dummy = (Get-Event)[0]
}
if ( "Get-EventLog" -eq $_cmdlet )
{
$global:_dummy = Get-EventLog Windows` PowerShell -Newest 1
}
if ( "Get-ExecutionPolicy" -eq $_cmdlet )
{
$global:_dummy = Get-ExecutionPolicy
}
if ( "Get-Help" -eq $_cmdlet )
{
$global:_dummy = Get-Help Add-Content
}
if ( "Get-History" -eq $_cmdlet )
{
$global:_dummy = Get-History -Count 1
}
if ( "Get-Host" -eq $_cmdlet )
{
$global:_dummy = Get-Host
}
if ( "Get-Item" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-ItemProperty" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Location" -eq $_cmdlet )
{
$global:_dummy = Get-Location
}
if ( "Get-Member" -eq $_cmdlet )
{
$global:_dummy = (1|Get-Member)[0]
}
if ( "Get-Module" -eq $_cmdlet )
{
$global:_dummy = (Get-Module)[0]
}
if ( "Get-PfxCertificate" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Process" -eq $_cmdlet )
{
$global:_dummy = ps powershell
}
if ( "Get-PSBreakpoint" -eq $_cmdlet )
{
$global:_dummy =
Add-Member -InputObject (New-Object PSObject) -Name Action -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Command -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Enabled -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name HitCount -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Id -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Script -MemberType 'NoteProperty' -Value '' -PassThru
}
if ( "Get-PSCallStack" -eq $_cmdlet )
{
$global:_dummy = Get-PSCallStack
}
if ( "Get-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Function
}
if ( "Get-PSProvider" -eq $_cmdlet )
{
$global:_dummy = Get-PSProvider FileSystem
}
if ( "Get-PSSnapin" -eq $_cmdlet )
{
$global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core
}
if ( "Get-Service" -eq $_cmdlet )
{
$global:_dummy = (Get-Service)[0]
}
if ( "Get-TraceSource" -eq $_cmdlet )
{
$global:_dummy = Get-TraceSource AddMember
}
if ( "Get-UICulture" -eq $_cmdlet )
{
$global:_dummy = Get-UICulture
}
if ( "Get-Variable" -eq $_cmdlet )
{
$global:_dummy = Get-Variable _
}
if ( "Get-WmiObject" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Group-Object" -eq $_cmdlet )
{
$global:_dummy = 1 | group
}
if ( "Measure-Command" -eq $_cmdlet )
{
$global:_dummy = Measure-Command {}
}
if ( "Measure-Object" -eq $_cmdlet )
{
$global:_dummy = Measure-Object
}
if ( "New-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Alias
}
if ( "New-TimeSpan" -eq $_cmdlet )
{
$global:_dummy = New-TimeSpan
}
if ( "Resolve-Path" -eq $_cmdlet )
{
$global:_dummy = $PWD
}
if ( "Select-String" -eq $_cmdlet )
{
$global:_dummy = " " | Select-String " "
}
if ( "Set-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( $property -ne $null)
{
foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) )
{
$global:_dummy = @($global:_dummy.$name)[0]
}
}
}
function Set-CommandLine ( [string]$script ) { $global:_cmdline.Add($script) }
function Get-CommandLine ( [string]$name ) {
$name = $name -replace '\\?','`?'
$global:_cmdline -like "$name*"
}
function TabExpansion {
# This is the default function to use for tab expansion. It handles simple
# member expansion on variables, variable name expansion and parameter completion
# on commands. It doesn't understand strings so strings containing ; | ( or { may
# cause expansion to fail.
param($line, $lastWord)
& {
# Helper function to write out the matching set of members. It depends
# on dynamic scoping to get $_base, _$expression and $_pat
function Write-Members ($sep='.')
{
# evaluate the expression to get the object to examine...
Invoke-Expression ('$_val=' + $_expression)
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
$_method = [Management.Automation.PSMemberTypes] `
'Method,CodeMethod,ScriptMethod,ParameterizedProperty'
if ($sep -eq '.')
{
$members =
(
[Object[]](Get-Member -InputObject $_val.PSextended $_pat) +
[Object[]](Get-Member -InputObject $_val.PSadapted $_pat) +
[Object[]](Get-Member -InputObject $_val.PSbase $_pat)
)
if ( $_val -is [Hashtable] )
{
[Microsoft.PowerShell.Commands.MemberDefinition[]]$_keys = $null
foreach ( $_name in $_val.Keys )
{
$_keys += `
New-Object Microsoft.PowerShell.Commands.MemberDefinition `
[int],$_name,"Property",0
}
$members += [Object[]]$_keys | ? { $_.Name -like $_pat }
}
foreach ($_m in $members | sort membertype,name -Unique)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
else
{
foreach ($_m in Get-Member -Static -InputObject $_val $_pat |
Sort-Object membertype,name)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
}
switch ([int]$line[-1])
{
# Ctrl+D several date/time formats
4 {
"[DateTime]::Now"
[DateTime]::Now
[DateTime]::Now.ToString("yyyyMMdd")
[DateTime]::Now.ToString("MMddyyyy")
[DateTime]::Now.ToString("yyyyMMddHHmmss")
[DateTime]::Now.ToString("MMddyyyyHHmmss")
'd f g m o r t u y'.Split(" ") | % { [DateTime]::Now.ToString($_) }
break TabExpansion;
}
# Ctrl+K put parentheses behind space or semi-coron or pipe operator
11 {
if ( $line -ne $( "=" + [Char]11 ) )
{
if ( $line[-2] -eq 11 )
{
$left = '$' + "("
$line = $line.Substring(0,$line.length-2)
}
else
{
$left = "("
$line = $line.Substring(0,$line.length-1)
}
$global:_ctrlk = @()
$l = $line.Length
while ( $l -ge 0 )
{
$i = $line.Substring(0,$l).LastIndexOfAny(" ;|")
$global:_ctrlk += $line.Insert($i+1, $left) + ")"
$l = $i
}
$global:_ctrlk += $line
[Windows.Forms.SendKeys]::SendWait("{Esc}=^K{TAB}")
}
else {
$global:_ctrlk
}
break TabExpansion;
}
# Ctrl+L a part of history commands expansion
12 {
Get-CommandLine $lastWord.SubString(0, $lastword.Length-1)
break TabExpansion;
}
# Ctrl+P hand-operated pop from command buffer stack
16 {
$_base = $lastword.SubString(0, $lastword.Length-1)
$_buf = $global:_cmdstack.Pop()
if ( $_buf.Contains("'") )
{
$line = ($line.SubString(0, $line.Length-1) + $_buf) -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait("{Esc}$line")
}
else {
$_base + $_buf
}
break TabExpansion;
}
# Ctrl+R $Host.UI.RawUI.
18 {
'$Host.UI.RawUI.'
'$Host.UI.RawUI'
break TabExpansion;
}
# Ctrl+V paste clipboard
22 {
$_base = $lastword.SubString(0, $lastword.Length-1)
$global:_clip = New-Object System.Windows.Forms.TextBox
$global:_clip.Multiline = $true
$global:_clip.Paste()
$line = ($line.SubString(0, $line.Length-1) + $global:_clip.Text) -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait("{Esc}$line")
break TabExpansion;
}
# Ctrl+X cut current line
24 {
$_clip = new-object System.Windows.Forms.TextBox;
$_clip.Multiline = $true;
$_clip.Text = $line.SubString(0, $line.Length-1)
$_clip.SelectAll()
$_clip.Copy()
[System.Windows.Forms.SendKeys]::SendWait("{ESC}")
break TabExpansion;
}
# Ctrl+Z cut last word in current line
26 {
$line.SubString(0, $line.Length-1) -match '(^(.*\\s)([^\\s]*)$)|(^[^\\s]*$)' | Out-Null
$_clip = new-object System.Windows.Forms.TextBox;
$_clip.Multiline = $true;
$_clip.Text = $Matches[3]
$_clip.SelectAll()
$_clip.Copy()
[System.Windows.Forms.SendKeys]::SendWait("{ESC}")
$line = $Matches[2] -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait($line)
break TabExpansion;
}
}
switch ( [int]$line[-2] )
{
# Ctrl+K put character behind space or semi-coron or pipe operator
11 {
switch ( $line[-1] )
{
'{' { $right = '}' }
'(' { $right = ')' }
'[' { $right = ']' }
}
$left = $line[-1]
$delimiter = " ;|"
if ( $line[-3] -eq 11 )
{
if ( $line[-1] -eq '%' -or $line[-1] -eq '?' )
{
$left = ' ' + $left + ' {'; $right = '}'
$delimiter = '|'
}
else
{
$left = '$' + $left
}
$line = $line.Substring(0,$line.length-3)
}
else
{
$line = $line.Substring(0,$line.length-2)
}
$global:_ctrlk = @()
$l = $line.Length
while ( $l -ge 0 )
{
$i = $line.Substring(0,$l).LastIndexOfAny($delimiter)
$global:_ctrlk += $line.Insert($i+1, $left) + $right
$l = $i
}
$global:_ctrlk += $line
[Windows.Forms.SendKeys]::SendWait("{Esc}=^K{TAB}")
break TabExpansion;
}
# Ctrl+X cut words with a character after Ctrl+X until the character
24 {
$line.SubString(0, $line.Length-2) -match "(^(.*$($line[-1]))([^$($line[-1])]*)`$)|(^[^\\$($line[-1])]*`$)" | Out-Null
$_clip = new-object System.Windows.Forms.TextBox;
$_clip.Multiline = $true;
$_clip.Text = $Matches[3]
$_clip.SelectAll()
$_clip.Copy()
[System.Windows.Forms.SendKeys]::SendWait("{ESC}")
$line = $Matches[2] -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait($line)
break TabExpansion;
}
}
switch -regex ($lastWord)
{
# Handle property and method expansion at '$_'
'(^.*)(\\$_\\.)(\\w*)$' {
$_base = $matches[1]
$_expression = '$global:_dummy'
$_pat = $matches[3] + '*'
$global:_dummy = $null
Get-PipeLineObject
if ( $global:_dummy -eq $null )
{
if ( $global:_exp -match '^\\$.*\\(.*$' )
{
$type = ( iex $_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' )
{
$tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1]
$type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' )
{
$global:_dummy = @(iex $Matches[1])[0]
}
else
{
$global:_dummy = $global:_mix
}
}
Write-Members
break;
}
# Handle property and method expansion rooted at variables...
# e.g. $a.b.<tab>
'(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
$_pat = $matches[4] + '*'
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle simple property and method expansion on static members...
# e.g. [datetime]::n<tab>
'(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
Write-Members '::'
break;
}
# Handle complex property and method expansion on static members
# where there are intermediate properties...
# e.g. [datetime]::now.d<tab>
'(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' {
$_base = $matches[1] # everything before the expression
$_expression = $matches[2].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[5] + '*' # the member to look for...
Write-Members
break;
}
# Handle property and method expansion rooted at variables...
# e.g. { 1+1 }.inv<tab>
'(^.*})\\.(\\w*)$' {
$_base = $matches[1]
$_pat = $matches[2] + '*'
foreach ( $_m in {} | Get-Member $_pat | sort membertype,name )
{
if ($_m.MemberType -eq "Method")
{
$_base + '.' + $_m.name + '('
}
else {
$_base + '.' + $_m.name
}
}
break;
}
# Handle variable name expansion...
'(^.*\\$)(\\w+)$' {
$_prefix = $matches[1]
$_varName = $matches[2]
foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*'))
{
$_prefix + $_v.name
}
break;
}
# Handle item name expansion in variable notation...
'(^.*\\${)(((\\w+):([\\\\/]?))[^\\\\/]+([\\\\/][^\\\\/]*)*)$' {
$_prefix = $matches[1]
$_driveName = $matches[3]
$_itemName = $matches[2] + "*"
Get-ChildItem $_itemName |
% {
if ( $matches[5] -and $_.PSProvider.Name -eq "FileSystem" )
{
$output = $_prefix + $_.FullName
}
elseif ( $_.PSProvider.Name -eq "FileSystem" -and $matches[6] )
{
$cd = (Get-Location -PSDrive $matches[4]).Path
$output = $_prefix + $_driveName + $_.FullName.Substring($cd.Length+1)
}
elseif ( $_.PSProvider.Name -eq "FileSystem" )
{
$cd = (Get-Location -PSDrive $matches[4]).Path
$output = $_prefix + $_driveName + $_.FullName.Substring($cd.Length+1)
}
else
{
$output = $_prefix + $_driveName + $_.Name
}
if ( $_.PSIsContainer )
{
$output
}
else
{
$output + "}"
}
}
break;
}
# Handle PSDrive name expansion in variable notation...
'(^.*\\${)(\\w+)$' {
$_prefix = $matches[1]
$_driveName = $matches[2] + "*"
Get-PSDrive $_driveName | % { $_prefix + $_ + ':' }
break;
}
# Handle env&function drives variable name expansion...
'(^.*\\$)(.*\\:)(\\w+)$' {
$_prefix = $matches[1]
$_drive = $matches[2]
$_varName = $matches[3]
if ($_drive -eq "env:" -or $_drive -eq "function:")
{
foreach ($_v in Get-ChildItem ($_drive + $_varName + '*'))
{
$_prefix + $_drive + $_v.name
}
}
break;
}
# Handle array's element property and method expansion
# where there are intermediate properties...
# e.g. foo[0].n.b<tab>
'(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$'
{
$_base = $matches[1]
$_expression = $matches[2].TrimEnd('.')
$_pat = $Matches[8] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle property and method expansion rooted at type object...
# e.g. [System.Type].a<tab>
'(^\\[(\\w|\\.)+\\])\\.(\\w*)$'
{
if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; }
$_expression = $Matches[1]
$_pat = $Matches[$matches.Count-1] + '*'
Write-Members
break;
}
# Handle complex property and method expansion on type object members
# where there are intermediate properties...
# e.g. [datetime].Assembly.a<tab>
'^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' {
$_expression = $matches
|
combined_dataset/train/non-malicious/sample_62_41.ps1 | sample_62_41.ps1 | # default-build.yml
# Description: Defines a build phase for invoking build.sh/cmd
# Parameters:
# jobName: string
# The name of the job. Defaults to the name of the OS. No spaces allowed
# jobDisplayName: string
# The friendly job name to display in the UI. Defaults to the name of the OS.
# agentOs: string
# Used in templates to define variables which are OS specific. Typically from the set { Windows, Linux, macOS }
# buildArgs: string
# Additional arguments to pass to the build.sh/cmd script.
# Note: -ci is always passed
# beforeBuild: [steps]
# Additional steps to run before build.sh/cmd
# steps: [steps]
# Instead of running build.cmd/sh, run these build steps.
# afterBuild: [steps]
# Additional steps to run after build.sh/cmd
# artifacts: [array]
# name: string
# The name of the artifact container
# - path: string
# The file path to artifacts output
# includeForks: boolean
# Should artifacts from forks be published?
# publishOnError: boolean
# Should artifacts be published if previous step failed?
# dependsOn: string | [ string ]
# For fan-out/fan-in. https://learn.microsoft.com/en-us/azure/devops/pipelines/yaml-schema?view=azure-devops&tabs=schema#job
# condition: string
# A condition which can be used to skip the job completely
# codeSign: boolean
# This build definition is enabled for code signing. (Only applies to Windows)
# buildDirectory: string
# Specifies what directory to run build.sh/cmd
# isAzDOTestingJob: boolean
# Determines if this job runs tests on the AzDO build agent. Controls some (currently Windows-only)
# installations and enables test publication (unless enablePublishTestResults is overridden).
# enablePublishTestResults: boolean
# Determines if test results should be published. Defaults to the isAzDOTestingJob setting.
# enableSbom: boolean
# Determines if an SBOM should be created. Defaults to true. Ignored in public builds.
# variables: [array]
# Job-specific variables. Defined using either name/value pairs or a variable list (using name or group syntax).
#
# See https://learn.microsoft.com/en-us/azure/devops/pipelines/yaml-schema for details
#
parameters:
# jobName: '' - use agentOs by default.
# jobDisplayName: '' - use agentOs by default.
agentOs: 'Windows'
buildArgs: ''
beforeBuild: []
# steps: [] don't define an empty object default because there is no way in template expression yet to check "if isEmpty(parameters.steps)"
afterBuild: []
artifacts: []
dependsOn: ''
condition: ''
codeSign: false
buildDirectory: $(System.DefaultWorkingDirectory)/eng/
isAzDOTestingJob: false
enablePublishTestResults: ''
enableSbom: true
variables: []
configuration: 'Release'
container: ''
enableRichCodeNavigation: ''
installNodeJs: true
installJdk: true # Ignored unless agentOs == Windows.
timeoutInMinutes: 180
testRunTitle: $(AgentOsName)-$(BuildConfiguration)
useHostedUbuntu: true
# We need longer than the default amount of 5 minutes to upload our logs/artifacts. (We currently take around 5 mins in the best case).
# This makes sure we have time to upload everything in the case of a build timeout - really important for investigating a build
# timeout due to test hangs.
cancelTimeoutInMinutes: 15
jobs:
- ${{ if ne(variables['System.TeamProject'], 'internal') }}:
- template: /eng/common/templates/job/job.yml@self
parameters:
name: ${{ coalesce(parameters.jobName, parameters.agentOs) }}
displayName: ${{ coalesce(parameters.jobDisplayName, parameters.agentOs) }}
dependsOn: ${{ parameters.dependsOn }}
${{ if ne(parameters.condition, '') }}:
condition: ${{ parameters.condition }}
${{ if ne(parameters.enableRichCodeNavigation, '') }}:
enableRichCodeNavigation: true
richCodeNavigationLanguage: 'csharp,typescript,java'
timeoutInMinutes: ${{ parameters.timeoutInMinutes }}
cancelTimeoutInMinutes: ${{ parameters.cancelTimeoutInMinutes }}
${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}:
enablePublishTestResults: true
testResultsFormat: xUnit # Have no vsTest results in any job.
mergeTestResults: true
testRunTitle: ${{ parameters.testRunTitle }}
enableSbom: ${{ parameters.enableSbom }}
enableTelemetry: true
helixRepo: dotnet/aspnetcore
helixType: build.product/
workspace:
clean: all
# Map friendly OS names to the right queue
# See https://github.com/dotnet/arcade/blob/master/Documentation/ChoosingAMachinePool.md
pool:
${{ if eq(parameters.agentOs, 'macOS') }}:
vmImage: macOS-11
${{ if eq(parameters.agentOs, 'Linux') }}:
${{ if eq(parameters.useHostedUbuntu, true) }}:
vmImage: ubuntu-20.04
${{ if eq(parameters.useHostedUbuntu, false) }}:
name: $(DncEngPublicBuildPool)
demands: ImageOverride -equals Build.Ubuntu.2004.Amd64.Open
${{ if eq(parameters.agentOs, 'Windows') }}:
name: $(DncEngPublicBuildPool)
demands: ImageOverride -equals 1es-windows-2022-open
${{ if ne(parameters.container, '') }}:
container: ${{ parameters.container }}
${{ if ne(parameters.disableComponentGovernance, '') }}:
disableComponentGovernance: ${{ parameters.disableComponentGovernance }}
variables:
- AgentOsName: ${{ parameters.agentOs }}
- ASPNETCORE_TEST_LOG_MAXPATH: "200" # Keep test log file name length low enough for artifact zipping
- BuildScriptArgs: ${{ parameters.buildArgs }}
- _BuildConfig: ${{ parameters.configuration }}
- BuildConfiguration: ${{ parameters.configuration }}
- BuildDirectory: ${{ parameters.buildDirectory }}
- DOTNET_CLI_HOME: $(System.DefaultWorkingDirectory)
- DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true
- TeamName: AspNetCore
- ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}:
- JAVA_HOME: $(Agent.BuildDirectory)\.tools\jdk\win-x64
- ${{ if ne(parameters.codeSign, true) }}:
- _SignType: ''
- LC_ALL: 'en_US.UTF-8'
- LANG: 'en_US.UTF-8'
- LANGUAGE: 'en_US.UTF-8'
# Log environment variables in binary logs to ease debugging
- MSBUILDLOGALLENVIRONMENTVARIABLES: true
# Rely on task Arcade injects, not auto-injected build step.
- skipComponentGovernanceDetection: true
- ${{ each variable in parameters.variables }}:
# handle a variable list using "name" and "value" properties
# example:
# - name: [key]
# value: [value]
- ${{ if ne(variable.name, '') }}:
- name: ${{ variable.name }}
value: ${{ variable.value }}
# handle variable groups
- ${{ if ne(variable.group, '') }}:
- group: ${{ variable.group }}
# handle name/value pairs (converting them into variable list entries)
# example:
# - [name]: [value]
- ${{ if and(eq(variable.name, ''), eq(variable.group, '')) }}:
- ${{ each pair in variable }}:
- name: ${{ pair.key }}
value: ${{ pair.value }}
steps:
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: df -h
displayName: Disk size
- ${{ if eq(parameters.agentOs, 'macOS') }}:
- script: sudo xcode-select -s /Applications/Xcode_12.5.1.app/Contents/Developer
displayName: Use XCode 12.5.1
- checkout: self
clean: true
- ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}:
- powershell: ./eng/scripts/InstallProcDump.ps1
displayName: Install ProcDump
- powershell: ./eng/scripts/StartDumpCollectionForHangingBuilds.ps1 $(ProcDumpPath)procdump.exe artifacts/dumps/ (Get-Date).AddMinutes(160) dotnet
displayName: Start background dump collection
- ${{ if eq(parameters.installNodeJs, 'true') }}:
- task: NodeTool@0
displayName: Install Node 18.x
inputs:
versionSpec: 18.x
- ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}:
- powershell: ./eng/scripts/InstallJdk.ps1
displayName: Install JDK 11
- ${{ if eq(parameters.isAzDOTestingJob, true) }}:
- powershell: |
Write-Host "##vso[task.setvariable variable=SeleniumProcessTrackingFolder]$(Build.SourcesDirectory)\artifacts\tmp\selenium\"
./eng/scripts/InstallGoogleChrome.ps1
displayName: Install Chrome
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- powershell: Write-Host "##vso[task.prependpath]$(DOTNET_CLI_HOME)\.dotnet\tools"
displayName: Add dotnet tools to path
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: echo "##vso[task.prependpath]$(DOTNET_CLI_HOME)/.dotnet/tools"
displayName: Add dotnet tools to path
- ${{ parameters.beforeBuild }}
# Add COMPlus_* environment variables to build steps.
- ${{ if ne(parameters.steps, '')}}:
- ${{ each step in parameters.steps }}:
# Include all properties e.g. `task: CmdLine@2` or `displayName: Build x64` _except_ a provided `env:`.
# Aim here is to avoid having two `env:` properties in the expanded YAML.
- ${{ each pair in step }}:
${{ if ne(pair.key, 'env') }}:
${{ pair.key }}: ${{ pair.value }}
env:
# Include the variables we always want.
COMPlus_DbgEnableMiniDump: 1
COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core"
DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token)
# Expand provided `env:` properties, if any.
${{ if step.env }}:
${{ step.env }}
- ${{ if eq(parameters.steps, '')}}:
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- script: $(BuildDirectory)\build.cmd -ci -nobl -Configuration $(BuildConfiguration) $(BuildScriptArgs)
/p:DotNetSignType=$(_SignType)
displayName: Run build.cmd
env:
COMPlus_DbgEnableMiniDump: 1
COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core"
DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token)
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: $(BuildDirectory)/build.sh --ci --nobl --configuration $(BuildConfiguration) $(BuildScriptArgs)
displayName: Run build.sh
env:
COMPlus_DbgEnableMiniDump: 1
COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core"
DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token)
- ${{ parameters.afterBuild }}
- ${{ if eq(parameters.agentOs, 'Linux') }}:
- script: df -h && du -h --threshold=50MB ..
displayName: Disk utilization
- ${{ if eq(parameters.agentOs, 'macOS') }}:
- script: df -h && du -h -d 3 ..
displayName: Disk utilization
- ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}:
- powershell: ./eng/scripts/FinishDumpCollectionForHangingBuilds.ps1 artifacts/dumps/
displayName: Finish background dump collection
continueOnError: true
condition: always()
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- powershell: eng\scripts\KillProcesses.ps1
displayName: Kill processes
continueOnError: true
condition: always()
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: eng/scripts/KillProcesses.sh
displayName: Kill processes
continueOnError: true
condition: always()
- ${{ each artifact in parameters.artifacts }}:
- task: PublishBuildArtifacts@1
displayName: Upload artifacts from ${{ artifact.path }}
condition: and(or(succeeded(), eq('${{ artifact.publishOnError }}', 'true')), or(eq(variables['system.pullrequest.isfork'], false), eq('${{ artifact.includeForks }}', 'true')))
continueOnError: true
inputs:
# Assume runtime variable values are absolute paths already.
${{ if startsWith(artifact.path, '$(') }}:
pathToPublish: ${{ artifact.path }}
${{ if not(startsWith(artifact.path, '$(')) }}:
pathToPublish: $(Build.SourcesDirectory)/${{ artifact.path }}
${{ if eq(artifact.name, '') }}:
artifactName: artifacts-$(AgentOsName)-$(BuildConfiguration)
${{ if ne(artifact.name, '') }}:
artifactName: ${{ artifact.name }}
artifactType: Container
parallel: true
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- powershell: $(Build.SourcesDirectory)/eng/scripts/UploadCores.ps1 -ProcDumpOutputPath artifacts/dumps/
condition: failed()
displayName: Upload cores
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: $(Build.SourcesDirectory)/eng/scripts/upload-cores.sh
condition: failed()
displayName: Upload cores
- ${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}:
- task: PublishTestResults@2
displayName: Publish js test results
condition: always()
inputs:
testResultsFormat: JUnit
testResultsFiles: '**/artifacts/log/**/*.junit.xml'
testRunTitle: $(AgentOsName)-$(BuildConfiguration)-js
mergeTestResults: true
buildConfiguration: $(BuildConfiguration)
buildPlatform: $(AgentOsName)
- ${{ if eq(variables['System.TeamProject'], 'internal') }}:
- template: /eng/common/templates-official/job/job.yml@self
parameters:
name: ${{ coalesce(parameters.jobName, parameters.agentOs) }}
displayName: ${{ coalesce(parameters.jobDisplayName, parameters.agentOs) }}
dependsOn: ${{ parameters.dependsOn }}
${{ if ne(parameters.condition, '') }}:
condition: ${{ parameters.condition }}
${{ if ne(parameters.enableRichCodeNavigation, '') }}:
enableRichCodeNavigation: true
richCodeNavigationLanguage: 'csharp,typescript,java'
timeoutInMinutes: ${{ parameters.timeoutInMinutes }}
cancelTimeoutInMinutes: ${{ parameters.cancelTimeoutInMinutes }}
${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.codeSign, 'true')) }}:
enableMicrobuild: true
enablePublishBuildAssets: true
enablePublishUsingPipelines: ${{ variables._PublishUsingPipelines }}
${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}:
enablePublishTestResults: true
testResultsFormat: xUnit # Have no vsTest results in any job.
mergeTestResults: true
testRunTitle: ${{ parameters.testRunTitle }}
enableSbom: ${{ parameters.enableSbom }}
enableTelemetry: true
helixRepo: dotnet/aspnetcore
helixType: build.product/
workspace:
clean: all
# Map friendly OS names to the right queue
# See https://github.com/dotnet/arcade/blob/master/Documentation/ChoosingAMachinePool.md
pool:
${{ if eq(parameters.agentOs, 'macOS') }}:
name: Azure Pipelines
image: macOS-11
os: macOS
${{ if eq(parameters.agentOs, 'Linux') }}:
name: $(DncEngInternalBuildPool)
image: 1es-ubuntu-2004
os: linux
${{ if eq(parameters.agentOs, 'Windows') }}:
name: $(DncEngInternalBuildPool)
# Visual Studio Enterprise - contains some stuff, like SQL Server and IIS Express, that we use for testing
image: 1es-windows-2022
os: windows
${{ if ne(parameters.container, '') }}:
container: ${{ parameters.container }}
${{ if ne(parameters.disableComponentGovernance, '') }}:
disableComponentGovernance: ${{ parameters.disableComponentGovernance }}
variables:
- AgentOsName: ${{ parameters.agentOs }}
- ASPNETCORE_TEST_LOG_MAXPATH: "200" # Keep test log file name length low enough for artifact zipping
- BuildScriptArgs: ${{ parameters.buildArgs }}
- _BuildConfig: ${{ parameters.configuration }}
- BuildConfiguration: ${{ parameters.configuration }}
- BuildDirectory: ${{ parameters.buildDirectory }}
- DOTNET_CLI_HOME: $(System.DefaultWorkingDirectory)
- DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true
- TeamName: AspNetCore
- ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}:
- JAVA_HOME: $(Agent.BuildDirectory)\.tools\jdk\win-x64
- ${{ if eq(parameters.codeSign, true) }}:
- ${{ if notin(variables['Build.Reason'], 'PullRequest') }}:
- _SignType: real
- ${{ if in(variables['Build.Reason'], 'PullRequest') }}:
- _SignType: test
- LC_ALL: 'en_US.UTF-8'
- LANG: 'en_US.UTF-8'
- LANGUAGE: 'en_US.UTF-8'
# Log environment variables in binary logs to ease debugging
- MSBUILDLOGALLENVIRONMENTVARIABLES: true
# Rely on task Arcade injects, not auto-injected build step.
- skipComponentGovernanceDetection: true
- ${{ each variable in parameters.variables }}:
# handle a variable list using "name" and "value" properties
# example:
# - name: [key]
# value: [value]
- ${{ if ne(variable.name, '') }}:
- name: ${{ variable.name }}
value: ${{ variable.value }}
# handle variable groups
- ${{ if ne(variable.group, '') }}:
- group: ${{ variable.group }}
# handle name/value pairs (converting them into variable list entries)
# example:
# - [name]: [value]
- ${{ if and(eq(variable.name, ''), eq(variable.group, '')) }}:
- ${{ each pair in variable }}:
- name: ${{ pair.key }}
value: ${{ pair.value }}
steps:
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: df -h
displayName: Disk size
- ${{ if eq(parameters.agentOs, 'macOS') }}:
- script: sudo xcode-select -s /Applications/Xcode_12.5.1.app/Contents/Developer
displayName: Use XCode 12.5.1
- checkout: self
clean: true
- ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}:
- powershell: ./eng/scripts/InstallProcDump.ps1
displayName: Install ProcDump
- powershell: ./eng/scripts/StartDumpCollectionForHangingBuilds.ps1 $(ProcDumpPath)procdump.exe artifacts/dumps/ (Get-Date).AddMinutes(160) dotnet
displayName: Start background dump collection
- ${{ if eq(parameters.installNodeJs, 'true') }}:
- task: NodeTool@0
displayName: Install Node 18.x
inputs:
versionSpec: 18.x
- ${{ if and(eq(parameters.installJdk, 'true'), eq(parameters.agentOs, 'Windows')) }}:
- powershell: ./eng/scripts/InstallJdk.ps1
displayName: Install JDK 11
- ${{ if eq(parameters.isAzDOTestingJob, true) }}:
- powershell: |
Write-Host "##vso[task.setvariable variable=SeleniumProcessTrackingFolder]$(Build.SourcesDirectory)\artifacts\tmp\selenium\"
./eng/scripts/InstallGoogleChrome.ps1
displayName: Install Chrome
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- powershell: Write-Host "##vso[task.prependpath]$(DOTNET_CLI_HOME)\.dotnet\tools"
displayName: Add dotnet tools to path
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: echo "##vso[task.prependpath]$(DOTNET_CLI_HOME)/.dotnet/tools"
displayName: Add dotnet tools to path
- ${{ parameters.beforeBuild }}
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- task: PowerShell@2
displayName: Setup Private Feeds Credentials
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/SetupNugetSources.ps1
arguments: -ConfigFile $(Build.SourcesDirectory)/NuGet.config -Password $Env:Token
env:
Token: $(dn-bot-dnceng-artifact-feeds-rw)
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- task: Bash@3
displayName: Setup Private Feeds Credentials
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/SetupNugetSources.sh
arguments: $(Build.SourcesDirectory)/NuGet.config $Token
env:
Token: $(dn-bot-dnceng-artifact-feeds-rw)
# Add COMPlus_* environment variables to build steps.
- ${{ if ne(parameters.steps, '')}}:
- ${{ each step in parameters.steps }}:
# Include all properties e.g. `task: CmdLine@2` or `displayName: Build x64` _except_ a provided `env:`.
# Aim here is to avoid having two `env:` properties in the expanded YAML.
- ${{ each pair in step }}:
${{ if ne(pair.key, 'env') }}:
${{ pair.key }}: ${{ pair.value }}
env:
# Include the variables we always want.
COMPlus_DbgEnableMiniDump: 1
COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core"
DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token)
# Expand provided `env:` properties, if any.
${{ if step.env }}:
${{ step.env }}
- ${{ if eq(parameters.steps, '')}}:
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- script: $(BuildDirectory)\build.cmd -ci -nobl -Configuration $(BuildConfiguration) $(BuildScriptArgs)
/p:DotNetSignType=$(_SignType)
displayName: Run build.cmd
env:
COMPlus_DbgEnableMiniDump: 1
COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core"
DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token)
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: $(BuildDirectory)/build.sh --ci --nobl --configuration $(BuildConfiguration) $(BuildScriptArgs)
displayName: Run build.sh
env:
COMPlus_DbgEnableMiniDump: 1
COMPlus_DbgMiniDumpName: "$(System.DefaultWorkingDirectory)/dotnet-%d.%t.core"
DotNetBuildsInternalReadSasToken: $(dotnetbuilds-internal-container-read-token)
- ${{ parameters.afterBuild }}
- ${{ if eq(parameters.agentOs, 'Linux') }}:
- script: df -h && du -h --threshold=50MB ..
displayName: Disk utilization
- ${{ if eq(parameters.agentOs, 'macOS') }}:
- script: df -h && du -h -d 3 ..
displayName: Disk utilization
- ${{ if and(eq(parameters.agentOs, 'Windows'), eq(parameters.isAzDOTestingJob, true)) }}:
- powershell: ./eng/scripts/FinishDumpCollectionForHangingBuilds.ps1 artifacts/dumps/
displayName: Finish background dump collection
continueOnError: true
condition: always()
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- powershell: eng\scripts\KillProcesses.ps1
displayName: Kill processes
continueOnError: true
condition: always()
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: eng/scripts/KillProcesses.sh
displayName: Kill processes
continueOnError: true
condition: always()
- ${{ each artifact in parameters.artifacts }}:
- task: 1ES.PublishPipelineArtifact@1
displayName: Upload artifacts from ${{ artifact.path }}
condition: and(or(succeeded(), eq('${{ artifact.publishOnError }}', 'true')), or(eq(variables['system.pullrequest.isfork'], false), eq('${{ artifact.includeForks }}', 'true')))
continueOnError: true
inputs:
# Assume runtime variable values are absolute paths already.
${{ if startsWith(artifact.path, '$(') }}:
path: ${{ artifact.path }}
${{ if not(startsWith(artifact.path, '$(')) }}:
path: $(Build.SourcesDirectory)/${{ artifact.path }}
${{ if eq(artifact.name, '') }}:
artifactName: artifacts-$(AgentOsName)-$(BuildConfiguration)
${{ if ne(artifact.name, '') }}:
artifactName: ${{ artifact.name }}
artifactType: Container
parallel: true
- ${{ if eq(parameters.agentOs, 'Windows') }}:
- powershell: $(Build.SourcesDirectory)/eng/scripts/UploadCores.ps1 -ProcDumpOutputPath artifacts/dumps/
condition: failed()
displayName: Upload cores
- ${{ if ne(parameters.agentOs, 'Windows') }}:
- script: $(Build.SourcesDirectory)/eng/scripts/upload-cores.sh
condition: failed()
displayName: Upload cores
- ${{ if and(eq(parameters.isAzDOTestingJob, true), ne(parameters.enablePublishTestResults, false)) }}:
- task: PublishTestResults@2
displayName: Publish js test results
condition: always()
inputs:
testResultsFormat: JUnit
testResultsFiles: '**/artifacts/log/**/*.junit.xml'
testRunTitle: $(AgentOsName)-$(BuildConfiguration)-js
mergeTestResults: true
buildConfiguration: $(BuildConfiguration)
buildPlatform: $(AgentOsName)
|
combined_dataset/train/non-malicious/sample_43_60.ps1 | sample_43_60.ps1 | <#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
Import-Module $PSScriptRoot\AzStackHci.Storage.Helpers.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lnTxt -FileName AzStackHci.Storage.Strings.psd1
function Invoke-AzStackHciStorageValidation
{
<#
.SYNOPSIS
Perform AzStackHci Storage Validation
.DESCRIPTION
Perform AzStackHci Storage Validation to check the readiness for the storage subsystem on an exsting HCI stamp to be upgraded to the next generation of HCI stamp.
The validation will cover the Storage Space Direct status, storage pool status, capacity for infrastructure volumes, etcs.
.EXAMPLE
PS C:\> Invoke-AzStackHciStorageValidation -PoolConfigXml $poolxml
.INPUTS
Inputs (if any)
.OUTPUTS
Output (if any)
.NOTES
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true, HelpMessage = "Pool configuration xml from Storage role.")]
[XML]
$PoolConfigXml,
[Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")]
[switch]
$PassThru,
[Parameter(Mandatory = $false, HelpMessage = "Tests to include.")]
[ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers })]
[ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers) })]
[string[]]
$Include,
[Parameter(Mandatory = $false, HelpMessage = "Tests to exclude.")]
[ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers })]
[ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers) })]
[string[]]
$Exclude,
[Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")]
[string]$OutputPath,
[Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")]
[switch]$CleanReport = $false,
[Parameter(Mandatory = $false, HelpMessage = "Show only failed results on screen.")]
[switch]$ShowFailedOnly
)
try
{
$script:ErrorActionPreference = 'Stop'
Set-AzStackHciOutputPath -Path $OutputPath
Write-AzStackHciHeader -invocation $MyInvocation -params $PSBoundParameters -PassThru:$PassThru
Test-ModuleUpdate -PassThru:$PassThru
# Call/Initialise reporting
$envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport
$envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport
Import-Module $PSScriptRoot\AzStackHci.Storage.Helpers.psm1 -Force -DisableNameChecking -Global
Write-Progress -Id 1 -Activity "Checking AzStackHci Dependancies" -Status "Storage Configuration" -PercentComplete 0 -ErrorAction SilentlyContinue
# Get the clustered storage subsystem name (this acts like an assert)
$storageSubSystem = Get-StorageSubSystem Cluster* -ErrorAction Ignore
if (-not $storageSubSystem) {
throw $lnTxt.ErrNoStorageSubsystemFound
}
Log-Info -Message "StorageSubSystem: `n$($storageSubSystem | ft | Out-String)"
# Get cluster nodes
$clusterNodes = Get-ClusterNode
Log-Info -Message "Cluster Nodes: `n$($clusterNodes | ft | Out-String)"
$nodeCount = $clusterNodes.Count
# Run validations
$TestList = Get-TestListByFunction -ModuleName AzStackHci.Storage.Helpers
$script:envchktestList = Select-TestList -Include $Include -Exclude $Exclude -TestList $TestList
$TotalTestCount = ($script:envchktestList).Count
$i = 0
$result = @()
$progressParams = @{
Id = 1
Activity = "Checking AzStackHci Storage Configuration"
Status = "Testing '$storageSubSystem'"
ErrorAction = 'SilentlyContinue'
}
:noTestsBreak foreach ($test in $script:envchktestList)
{
$OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName
Log-Info -Message $OpMsg
Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100)
$splat = @{
PoolConfigXml = $PoolConfigXml
NodeCount = $nodeCount
}
$Result += Invoke-Expression "$test @splat"
}
# Feedback results - user scenario
Log-Info "Storage Validation" -ConsoleOut:(-not $PassThru)
if (-not $PassThru)
{
$progressParams = @{
Id = 3
Activity = "Formating Results"
Status = "Writing Results for '$storageSubSystem'"
PercentComplete = 1
ErrorAction = 'SilentlyContinue'
}
Write-Progress @progressParams
Write-AzStackHciResult -Title "${storageSubSystem}:" -Result $result -ShowFailedOnly:$ShowFailedOnly -Seperator ': '
Write-Summary -Result $result -Property1 Detail
}
else
{
return $result
}
}
catch
{
Log-Info -Message "" -ConsoleOut
Log-Info -Message "$($_.Exception.Message)" -ConsoleOut -Type Error
Log-Info -Message "$($_.ScriptStackTrace)" -ConsoleOut -Type Error
$cmdletFailed = $true
}
finally
{
$Script:ErrorActionPreference = 'SilentlyContinue'
# Write result to telemetry channel
foreach ($r in $result)
{
Write-ETWResult -Result $r
}
# Write validation result to report object and close out report
$envcheckerReport | Add-Member -MemberType NoteProperty -Name 'Storage' -Value $result -Force
$envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport
Write-AzStackHciEnvReport -report $envcheckerReport
Write-AzStackHciFooter -invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCANFTXGPLLkRgdu
# D5QKpyfMv5HLkxXJIrcfHM1aNM4Ez6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK2Qbc5JkRWN1s6B5WOpLj8B
# LcwD+VXQr01RNB4E8Bv5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAWmoWJYkXJGB0HMnam+XnbGsHbriDY6UltyDUBqBTAZdu/3KR+XrjWpE
# zsA7CwANeKHTEYjtrNt/W1U04mVtk3YvnRf+/0Pa5ciXiBN3Pt4RbgA+KO7Jqea4
# GfvQsNo9DKSCsVfHRtyoHn7CfQU8EQ2ogQA7SS9ZFY5ARStXIbVFuEc1rA+pLS1R
# J0rnvrx8jEpjZ4wdHpYqoK4KsRXrPJgzeOF+NzzqBflrn6uDGw3lc3uGJbREhjkH
# 0q+gcMSZtMN8aIRQrONeRjCKAdGlbMVCUohO9eCCrqpjJ+zSrzVjqy3qeUuPzaRj
# bKer9JQjh0b4uIvM0NSEJbeZsfPWaqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCgRQA3/vHWA9brtw49PvdZAd+bv0diaRHLErH+rWe4wgIGZbqjMwdT
# GBMyMDI0MDIxMjE0MDUzMC44MTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA
# 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu
# jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi
# y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD
# NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgVvFvazU/Vin74YF6/tHzmwp9UNCQJkoLGZ2THXtrHs0wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A
# MA0GCSqGSIb3DQEBCwUABIICAKW0XD3reE36cdnvYsxo3AZxOEoXhrcPE7laW5mT
# I0kTVdvCA1ymSdNM9YgrN0sBtAe1H7W94omOllH2u/otuAfEo0JLbYa6ePGmQ76z
# Hg1V4bGMyq1zGpFDXnH7MvEt5VOe9D4z8tywg1XLlN2lFMXk45MF5IDoFp2WmLc5
# 80wFtAXGGvNkrqZsSRmvoHy5QPTe+9sme+2xgDFEr6VFNzZ+Ia9z1pZZT8taN+gF
# 7eCAApzMD0QCBnouhaqhmIRTdpWJb4JsWfIvGlMDJ2+NJIhP9VAh9mKeLeRsFgTs
# tdm3cBvrxCCx+EEsyPllqJQko20AmfSPrwNEJr1mDGACUGkp6wg+PxouI7sX2uB+
# qYUqhxeqDnqJV//DUfS4fwYDuMAvviUrGUhPLvjVZMtUdn846R8E2e6ddSrcR3lX
# v9BdEDPZ7efGx4RTxjNb1u030ASpF6XcrMh4LQ5Z9p7rv9LLpQD4CVBpqgvCq/75
# 2HxlbgCWGZVN6KXDOnaCfytXHyaRAqDsBRXAYJiZW/F5Qs/hBpcHwEaH3o7HhkF0
# wiT1pGOWUjep7NsNUsBZWLjgnQv2d6vG2K1euGupTpB3n2igFeXxsW+vdxEnMCQo
# Tl45FYITLrq664YfOQnnlHvEegTa+xUm//57x9FVhbu5J0MmMFhROjTO3JdQKUhe
# 4/HA
# SIG # End signature block
|
combined_dataset/train/non-malicious/Select-UserGroup.ps1 | Select-UserGroup.ps1 | New-Grid -ControlName SelectUserGroups -Columns Auto,* -Rows 4 {
$GetGroups = {
$user = Get-QADUuser $this.Text -SizeLimit 1
if($User.LogonName -eq $this.Text -or $User.Email -eq $this.Text) {
$this.Foreground = "Black"
$Group.ItemsSource = Get-QADGroup -ContainsMember $user
$UserName.Text = $user.LogonName
$EmailAddress.Text = $user.Email
} else {
$this.Foreground = "Red"
$Group.ItemsSource = @()
}
}
New-Label "Name"
New-Textbox -name UserName -minwidth 100 -Column 1 -On_LostFocus $GetGroups
New-Label "Email" -Row 1
New-Textbox -name EmailAddress -minwidth 100 -Column 1 -Row 1 -On_LostFocus $GetGroups
New-Label "Group" -Row 2
New-Listbox -name Group -Column 1 -Row 2
New-Button "OK" -Row 3 -Column 1 -On_Click { Get-ParentControl | Set-UIValue -Passthru | Close-Control }
} -Show
|
combined_dataset/train/non-malicious/43.ps1 | 43.ps1 |
[CmdletBinding(DefaultParameterSetName="NormalRun")]
Param(
[parameter(Mandatory=$true,ParameterSetName="NormalRun")]
[alias("s")]
[ValidateScript({
if (!($_.contains("/"))){
$True
}
else {
Throw "Please use the hostname FQDN and not the HTTPS URL. Example: 'scep-contoso.msappproxy.net'"
}
}
)]
[string]$server,
[parameter(Mandatory=$true,ParameterSetName="NormalRun")]
[alias("q")]
[ValidateRange(1,31)]
[INT]$querysize,
[parameter(ParameterSetName="Help")]
[alias("h","?","/?")]
[switch]$help,
[parameter(ParameterSetName="Help")]
[alias("u")]
[switch]$usage
)
function Show-Usage{
Write-Host
Write-Host "-help -h Displays the help."
Write-Host "-usage -u Displays this usage information."
Write-Host "-querysize -q Specify the size of the query string payload to use as a number of kilobytes (i.e. 20 or 25). Maximum value is 31"
Write-Host "-server -s Specify NDES server public DNS name in the form FQDN. For example ExternalDNSName.Contoso.com"
Write-Host
}
function Get-NDESURLHelp{
write-host "Validate-NDESUrl will check that requests from devices enrolled in Microsoft Intune will get through all the network protections (such as a reverse proxy) and make it to the NDES server."
Write-Host
write-host "Since the certificate requests include a payload query string that is longer than what is allowed by default settings in Windows, IIS and some reverse proxy servers, those servers need to be configured to allow long query strings and web requests."
write-host "This tool will simulate a SCEP request with a large payload, allowing you to check the IIS logs on the NDES server to ensure that the request is not being blocked anywhere along the way."
Write-Host
}
if($help){
Get-NDESURLHelp
break
}
if($usage){
Show-Usage
break
}
if ((Get-WmiObject -class Win32_OperatingSystem).ProductType -notlike "1"){
if (Test-Path HKLM:SOFTWARE\Microsoft\Cryptography\MSCEP) {
Write-Host
Write-Host "Error: This appears to be the NDES server. Please run this script from a different machine. An external (guest) connection is best." -BackgroundColor Red
write-host "Exiting......................"
break
}
}
Write-host
Write-host "......................................................."
Write-host
Write-Host "Trying base NDES URI... " -ForegroundColor Yellow
Write-host
if (resolve-dnsname $server -ErrorAction SilentlyContinue){
$NDESUrl = "https://$($server)/certsrv/mscep/mscep.dll"
$BaseURLstatuscode = try {(Invoke-WebRequest -Uri $NDESUrl).statuscode} catch {$_.Exception.Response.StatusCode.Value__}
if ($BaseURLstatuscode -eq "200"){
Write-Warning "$($NDESUrl) returns a status code 200 . This usually signifies an error with the Intune Connector registering itself or not being installed."
Write-Host
Write-Host "This state will _not_ provide a working NDES infrastructure, although validation of long URI support can continue."
Write-Host
}
elseif ($BaseURLstatuscode -eq "403"){
Write-Host "Success: " -ForegroundColor Green -NoNewline
write-host "Proceeding with validation!"
}
else {
Write-Warning "Unexpected Error code! This usually signifies an error with the Intune Connector registering itself or not being installed."
Write-Host
Write-host "Expected value is a 403. We received a $($BaseURLstatuscode). This state will _not_ provide a working NDES infrastructure, although we can proceed with the validation included in this test"
}
}
else {
write-host "Error: Cannot resolve $($server)" -BackgroundColor Red
Write-Host
Write-Host "Please ensure a DNS record is in place and name resolution is successful"
Write-Host
Write-Host "Exiting................................................"
Write-Host
exit
}
Write-host
Write-host "......................................................."
Write-host
Write-Host "Trying to retrieve CA Capabilities... " -ForegroundColor Yellow
Write-host
$GetCACaps = "$($NDESUrl)?operation=GetCACaps&message=NDESLongUrlValidatorStep1of3"
$CACapsStatuscode = try {(Invoke-WebRequest -Uri $GetCACaps).statuscode} catch {$_.Exception.Response.StatusCode.Value__}
if (-not ($CACapsStatuscode -eq "200")){
Write-host "Retrieving the following URL: " -NoNewline
Write-Host "$GetCACaps" -ForegroundColor Cyan
Write-host
write-host "Error: Server returned a $CACapsStatuscode error. " -BackgroundColor Red
Write-Host
write-host "For a list of IIS error codes, please visit the below link."
Write-Host "URL: https://support.microsoft.com/en-gb/help/943891/the-http-status-code-in-iis-7-0--iis-7-5--and-iis-8-0"
}
else {
Write-host "Retrieving the following URL: " -NoNewline
Write-Host "$GetCACaps" -ForegroundColor Cyan
Write-host
$CACaps = (Invoke-WebRequest -Uri $GetCACaps).content
if ($CACaps) {
Write-Host "Success: " -ForegroundColor Green -NoNewline
write-host "CA CApabilities retrieved:"
Write-Host
write-host $CACaps
}
else {
write-host "Error: Server is not returning CA Capabilities." -BackgroundColor Red
Write-Host
write-host "PLEASE NOTE: This is not a long URI issue. Please investigate the NDES configuration."
Write-Host
}
}
Write-host
Write-host "......................................................."
Write-host
Write-Host "Trying to retrieve CA Certificates... " -ForegroundColor Yellow
Write-host
$GetCACerts = "$($NDESUrl)?operation=GetCACerts&message=NDESLongUrlValidatorStep2of3"
$CACertsStatuscode = try {(Invoke-WebRequest -Uri $GetCACerts).statuscode} catch {$_.Exception.Response.StatusCode.Value__}
if (-not ($CACertsStatuscode -eq "200")){
Write-host "Attempting to retrieve certificates from the following URL: " -NoNewline
Write-Host "$GetCACerts" -ForegroundColor Cyan
Write-host
write-host "Error: Server returned a $CACertsStatuscode error. " -BackgroundColor Red
Write-Host
write-host "For a list of IIS error codes, please visit the below link."
Write-Host "URL: https://support.microsoft.com/en-gb/help/943891/the-http-status-code-in-iis-7-0--iis-7-5--and-iis-8-0"
}
else {
Write-host "Attempting to retrieve certificates from the following URI: " -NoNewline
Write-Host "$GetCACerts" -ForegroundColor Cyan
Write-Host
$CACerts = (Invoke-WebRequest -Uri $GetCACerts).content
if ($CACerts) {
Invoke-WebRequest -Uri $GetCACerts -ContentType "application/x-x509-ca-ra-cert" -OutFile "$env:temp\$server.p7b"
Write-Host "Success: " -ForegroundColor Green -NoNewline
write-host "certificates retrieved. File written to disk: $env:temp\$server.p7b"
}
else {
write-host "Error: Server is not returning CA certificates." -BackgroundColor Red
Write-Host
write-host "PLEASE NOTE: This is _not_ a long URI issue. Please investigate the NDES configuration."
Write-Host
}
}
Write-host
Write-host "......................................................."
Write-host
Write-Host "Querying URI with simulated SCEP challenge... " -ForegroundColor Yellow
Write-host
$ChallengeUrlTemp = "$($NDESUrl)?operation=PKIOperation&message=<SCEP CHALLENGE STRING>"
Write-host "Retrieving the following URI: " -NoNewline
Write-Host "$ChallengeUrlTemp" -ForegroundColor Cyan
Write-host
Write-Host "Using a query size of $($querysize)KB... "
Write-Host
$challengeBase = "NDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallengeNDESLongUrlValidatorFakeChallenge";
for ($i=1; $i -le $querySize; $i++){
$testChallenge += $challengeBase + ($i + 1)
}
$LongUrl = "$($NDESUrl)?operation=PKIOperation&message=$($testChallenge)"
$LongUrlStatusCode = try {(Invoke-WebRequest -Uri $LongUrl).statuscode} catch {$_.Exception.Response.StatusCode.Value__}
if ($LongUrlStatusCode -eq "414"){
write-host "Error: HTTP Error 414. The $($querysize)KB URI is too long. " -BackgroundColor Red
Write-Host
Write-Host "Please ensure all servers and network devices support long URI's" -ForegroundColor Blue
write-host
}
elseif (-not ($LongUrlStatusCode -eq "200")) {
write-host "Error: HTTP Error $($LongUrlStatusCode)" -BackgroundColor Red
Write-Host
Write-Host "Please check your network configuration." -ForegroundColor Blue -BackgroundColor white
write-host
write-host "For a list of IIS error codes, please visit the below link."
Write-Host "URL: https://support.microsoft.com/en-gb/help/943891/the-http-status-code-in-iis-7-0--iis-7-5--and-iis-8-0"
}
else {
Write-Host "Success: " -ForegroundColor Green -NoNewline
write-host "Server accepts a $($querysize)KB URI."
}
Write-host
Write-host "......................................................."
Write-host
Write-host "End of NDES URI validation" -ForegroundColor Yellow
Write-Host
write-host "Ending script..." -ForegroundColor Yellow
Write-host
|
combined_dataset/train/non-malicious/sample_19_67.ps1 | sample_19_67.ps1 | #
# Add-AppxDevPackage.ps1 is a PowerShell script designed to install app
# packages created by Visual Studio for developers. To run this script from
# Explorer, right-click on its icon and choose "Run with PowerShell".
#
# Visual Studio supplies this script in the folder generated with its
# "Prepare Package" command. The same folder will also contain the app
# package (a .appx file), the signing certificate (a .cer file), and a
# "Dependencies" subfolder containing all the framework packages used by the
# app.
#
# This script simplifies installing these packages by automating the
# following functions:
# 1. Find the app package and signing certificate in the script directory
# 2. Prompt the user to acquire a developer license and to install the
# certificate if necessary
# 3. Find dependency packages that are applicable to the operating system's
# CPU architecture
# 4. Install the package along with all applicable dependencies
#
# All command line parameters are reserved for use internally by the script.
# Users should launch this script from Explorer.
#
# .Link
# http://go.microsoft.com/fwlink/?LinkId=243053
param(
[switch]$Force = $false,
[switch]$GetDeveloperLicense = $false,
[switch]$SkipLoggingTelemetry = $false,
[string]$CertificatePath = $null
)
$ErrorActionPreference = "Stop"
# The language resources for this script are placed in the
# "Add-AppDevPackage.resources" subfolder alongside the script. Since the
# current working directory might not be the directory that contains the
# script, we need to create the full path of the resources directory to
# pass into Import-LocalizedData
$ScriptPath = $null
try
{
$ScriptPath = (Get-Variable MyInvocation).Value.MyCommand.Path
$ScriptDir = Split-Path -Parent $ScriptPath
}
catch {}
if (!$ScriptPath)
{
PrintMessageAndExit $UiStrings.ErrorNoScriptPath $ErrorCodes.NoScriptPath
}
$LocalizedResourcePath = Join-Path $ScriptDir "Add-AppDevPackage.resources"
Import-LocalizedData -BindingVariable UiStrings -BaseDirectory $LocalizedResourcePath
$ErrorCodes = Data {
ConvertFrom-StringData @'
Success = 0
NoScriptPath = 1
NoPackageFound = 2
ManyPackagesFound = 3
NoCertificateFound = 4
ManyCertificatesFound = 5
BadCertificate = 6
PackageUnsigned = 7
CertificateMismatch = 8
ForceElevate = 9
LaunchAdminFailed = 10
GetDeveloperLicenseFailed = 11
InstallCertificateFailed = 12
AddPackageFailed = 13
ForceDeveloperLicense = 14
CertUtilInstallFailed = 17
CertIsCA = 18
BannedEKU = 19
NoBasicConstraints = 20
NoCodeSigningEku = 21
InstallCertificateCancelled = 22
BannedKeyUsage = 23
ExpiredCertificate = 24
'@
}
$IMAGE_FILE_MACHINE_i386 = 0x014c
$IMAGE_FILE_MACHINE_AMD64 = 0x8664
$IMAGE_FILE_MACHINE_ARM64 = 0xAA64
$IMAGE_FILE_MACHINE_ARM = 0x01c0
$IMAGE_FILE_MACHINE_THUMB = 0x01c2
$IMAGE_FILE_MACHINE_ARMNT = 0x01c4
$MACHINE_ATTRIBUTES_UserEnabled = 0x01
$MACHINE_ATTRIBUTES_KernelEnabled = 0x02
$MACHINE_ATTRIBUTES_Wow64Container = 0x04
# First try to use IsWow64Process2 to determine the OS architecture
try
{
$IsWow64Process2_MethodDefinition = @"
[DllImport("kernel32.dll", SetLastError = true)]
public static extern bool IsWow64Process2(IntPtr process, out ushort processMachine, out ushort nativeMachine);
"@
$Kernel32 = Add-Type -MemberDefinition $IsWow64Process2_MethodDefinition -Name "Kernel32" -Namespace "Win32" -PassThru
$Proc = Get-Process -id $pid
$processMachine = New-Object uint16
$nativeMachine = New-Object uint16
$Res = $Kernel32::IsWow64Process2($Proc.Handle, [ref] $processMachine, [ref] $nativeMachine)
if ($Res -eq $True)
{
switch ($nativeMachine)
{
$IMAGE_FILE_MACHINE_i386 { $ProcessorArchitecture = "x86" }
$IMAGE_FILE_MACHINE_AMD64 { $ProcessorArchitecture = "amd64" }
$IMAGE_FILE_MACHINE_ARM64 { $ProcessorArchitecture = "arm64" }
$IMAGE_FILE_MACHINE_ARM { $ProcessorArchitecture = "arm" }
$IMAGE_FILE_MACHINE_THUMB { $ProcessorArchitecture = "arm" }
$IMAGE_FILE_MACHINE_ARMNT { $ProcessorArchitecture = "arm" }
}
}
}
catch
{
# Ignore exception and fall back to using environment variables to determine the OS architecture
}
$Amd64AppsSupportedOnArm64 = $False
if ($null -eq $ProcessorArchitecture)
{
$ProcessorArchitecture = $Env:Processor_Architecture
# Getting $Env:Processor_Architecture on arm64 machines will return x86. So check if the environment
# variable "ProgramFiles(Arm)" is also set, if it is we know the actual processor architecture is arm64.
# The value will also be x86 on amd64 machines when running the x86 version of PowerShell.
if ($ProcessorArchitecture -eq "x86")
{
if ($null -ne ${Env:ProgramFiles(Arm)})
{
$ProcessorArchitecture = "arm64"
}
elseif ($null -ne ${Env:ProgramFiles(x86)})
{
$ProcessorArchitecture = "amd64"
}
}
}
elseif ("arm64" -eq $ProcessorArchitecture)
{
# If we successfully determined the OS to be arm64 with the above call to IsWow64Process2 and we're on Win11+
# we need to check for a special case where amd64 apps are supported as well.
if ([Environment]::OSVersion.Version -ge (new-object 'Version' 10,0,22000))
{
try
{
$GetMachineTypeAttributes_MethodDefinition = @"
[DllImport("api-ms-win-core-processthreads-l1-1-7.dll", EntryPoint = "GetMachineTypeAttributes", ExactSpelling = true, PreserveSig = false)]
public static extern void GetMachineTypeAttributes(ushort Machine, out ushort machineTypeAttributes);
"@
$ProcessThreads = Add-Type -MemberDefinition $GetMachineTypeAttributes_MethodDefinition -Name "processthreads_l1_1_7" -Namespace "Win32" -PassThru
$machineTypeAttributes = New-Object uint16
$ProcessThreads::GetMachineTypeAttributes($IMAGE_FILE_MACHINE_AMD64, [ref] $machineTypeAttributes)
# We're looking for the case where the UserEnabled flag is set
if (($machineTypeAttributes -band $MACHINE_ATTRIBUTES_UserEnabled) -ne 0)
{
$Amd64AppsSupportedOnArm64 = $True
}
}
catch
{
# Ignore exceptions and maintain assumption that amd64 apps aren't supported on this machine
}
}
}
function PrintMessageAndExit($ErrorMessage, $ReturnCode)
{
Write-Host $ErrorMessage
try
{
# Log telemetry data regarding the use of the script if possible.
# There are three ways that this can be disabled:
# 1. If the "TelemetryDependencies" folder isn't present. This can be excluded at build time by setting the MSBuild property AppxLogTelemetryFromSideloadingScript to false
# 2. If the SkipLoggingTelemetry switch is passed to this script.
# 3. If Visual Studio telemetry is disabled via the registry.
$TelemetryAssembliesFolder = (Join-Path $PSScriptRoot "TelemetryDependencies")
if (!$SkipLoggingTelemetry -And (Test-Path $TelemetryAssembliesFolder))
{
$job = Start-Job -FilePath (Join-Path $TelemetryAssembliesFolder "LogSideloadingTelemetry.ps1") -ArgumentList $TelemetryAssembliesFolder, "VS/DesignTools/SideLoadingScript/AddAppDevPackage", $ReturnCode, $ProcessorArchitecture
Wait-Job -Job $job -Timeout 60 | Out-Null
}
}
catch
{
# Ignore telemetry errors
}
if (!$Force)
{
Pause
}
exit $ReturnCode
}
#
# Warns the user about installing certificates, and presents a Yes/No prompt
# to confirm the action. The default is set to No.
#
function ConfirmCertificateInstall
{
$Answer = $host.UI.PromptForChoice(
"",
$UiStrings.WarningInstallCert,
[System.Management.Automation.Host.ChoiceDescription[]]@($UiStrings.PromptYesString, $UiStrings.PromptNoString),
1)
return $Answer -eq 0
}
#
# Validates whether a file is a valid certificate using CertUtil.
# This needs to be done before calling Get-PfxCertificate on the file, otherwise
# the user will get a cryptic "Password: " prompt for invalid certs.
#
function ValidateCertificateFormat($FilePath)
{
# certutil -verify prints a lot of text that we don't need, so it's redirected to $null here
certutil.exe -verify $FilePath > $null
if ($LastExitCode -lt 0)
{
PrintMessageAndExit ($UiStrings.ErrorBadCertificate -f $FilePath, $LastExitCode) $ErrorCodes.BadCertificate
}
# Check if certificate is expired
$cert = Get-PfxCertificate $FilePath
if (($cert.NotBefore -gt (Get-Date)) -or ($cert.NotAfter -lt (Get-Date)))
{
PrintMessageAndExit ($UiStrings.ErrorExpiredCertificate -f $FilePath) $ErrorCodes.ExpiredCertificate
}
}
#
# Verify that the developer certificate meets the following restrictions:
# - The certificate must contain a Basic Constraints extension, and its
# Certificate Authority (CA) property must be false.
# - The certificate's Key Usage extension must be either absent, or set to
# only DigitalSignature.
# - The certificate must contain an Extended Key Usage (EKU) extension with
# Code Signing usage.
# - The certificate must NOT contain any other EKU except Code Signing and
# Lifetime Signing.
#
# These restrictions are enforced to decrease security risks that arise from
# trusting digital certificates.
#
function CheckCertificateRestrictions
{
Set-Variable -Name BasicConstraintsExtensionOid -Value "2.5.29.19" -Option Constant
Set-Variable -Name KeyUsageExtensionOid -Value "2.5.29.15" -Option Constant
Set-Variable -Name EkuExtensionOid -Value "2.5.29.37" -Option Constant
Set-Variable -Name CodeSigningEkuOid -Value "1.3.6.1.5.5.7.3.3" -Option Constant
Set-Variable -Name LifetimeSigningEkuOid -Value "1.3.6.1.4.1.311.10.3.13" -Option Constant
Set-Variable -Name UwpSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.1" -Option Constant
Set-Variable -Name DisposableSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.2" -Option Constant
$CertificateExtensions = (Get-PfxCertificate $CertificatePath).Extensions
$HasBasicConstraints = $false
$HasCodeSigningEku = $false
foreach ($Extension in $CertificateExtensions)
{
# Certificate must contain the Basic Constraints extension
if ($Extension.oid.value -eq $BasicConstraintsExtensionOid)
{
# CA property must be false
if ($Extension.CertificateAuthority)
{
PrintMessageAndExit $UiStrings.ErrorCertIsCA $ErrorCodes.CertIsCA
}
$HasBasicConstraints = $true
}
# If key usage is present, it must be set to digital signature
elseif ($Extension.oid.value -eq $KeyUsageExtensionOid)
{
if ($Extension.KeyUsages -ne "DigitalSignature")
{
PrintMessageAndExit ($UiStrings.ErrorBannedKeyUsage -f $Extension.KeyUsages) $ErrorCodes.BannedKeyUsage
}
}
elseif ($Extension.oid.value -eq $EkuExtensionOid)
{
# Certificate must contain the Code Signing EKU
$EKUs = $Extension.EnhancedKeyUsages.Value
if ($EKUs -contains $CodeSigningEkuOid)
{
$HasCodeSigningEKU = $True
}
# EKUs other than code signing and lifetime signing are not allowed
foreach ($EKU in $EKUs)
{
if ($EKU -ne $CodeSigningEkuOid -and $EKU -ne $LifetimeSigningEkuOid -and $EKU -ne $UwpSigningEkuOid -and $EKU -ne $DisposableSigningEkuOid)
{
PrintMessageAndExit ($UiStrings.ErrorBannedEKU -f $EKU) $ErrorCodes.BannedEKU
}
}
}
}
if (!$HasBasicConstraints)
{
PrintMessageAndExit $UiStrings.ErrorNoBasicConstraints $ErrorCodes.NoBasicConstraints
}
if (!$HasCodeSigningEKU)
{
PrintMessageAndExit $UiStrings.ErrorNoCodeSigningEku $ErrorCodes.NoCodeSigningEku
}
}
#
# Performs operations that require administrative privileges:
# - Prompt the user to obtain a developer license
# - Install the developer certificate (if -Force is not specified, also prompts the user to confirm)
#
function DoElevatedOperations
{
if ($GetDeveloperLicense)
{
Write-Host $UiStrings.GettingDeveloperLicense
if ($Force)
{
PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense
}
try
{
Show-WindowsDeveloperLicenseRegistration
}
catch
{
$Error[0] # Dump details about the last error
PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed
}
}
if ($CertificatePath)
{
Write-Host $UiStrings.InstallingCertificate
# Make sure certificate format is valid and usage constraints are followed
ValidateCertificateFormat $CertificatePath
CheckCertificateRestrictions
# If -Force is not specified, warn the user and get consent
if ($Force -or (ConfirmCertificateInstall))
{
# Add cert to store
certutil.exe -addstore TrustedPeople $CertificatePath
if ($LastExitCode -lt 0)
{
PrintMessageAndExit ($UiStrings.ErrorCertUtilInstallFailed -f $LastExitCode) $ErrorCodes.CertUtilInstallFailed
}
}
else
{
PrintMessageAndExit $UiStrings.ErrorInstallCertificateCancelled $ErrorCodes.InstallCertificateCancelled
}
}
}
#
# Checks whether the machine is missing a valid developer license.
#
function CheckIfNeedDeveloperLicense
{
$Result = $true
try
{
$Result = (Get-WindowsDeveloperLicense | Where-Object { $_.IsValid } | Measure-Object).Count -eq 0
}
catch {}
return $Result
}
#
# Launches an elevated process running the current script to perform tasks
# that require administrative privileges. This function waits until the
# elevated process terminates, and checks whether those tasks were successful.
#
function LaunchElevated
{
# Set up command line arguments to the elevated process
$RelaunchArgs = '-ExecutionPolicy Unrestricted -file "' + $ScriptPath + '"'
if ($Force)
{
$RelaunchArgs += ' -Force'
}
if ($NeedDeveloperLicense)
{
$RelaunchArgs += ' -GetDeveloperLicense'
}
if ($SkipLoggingTelemetry)
{
$RelaunchArgs += ' -SkipLoggingTelemetry'
}
if ($NeedInstallCertificate)
{
$RelaunchArgs += ' -CertificatePath "' + $DeveloperCertificatePath.FullName + '"'
}
# Launch the process and wait for it to finish
try
{
$PowerShellExePath = (Get-Process -Id $PID).Path
$AdminProcess = Start-Process $PowerShellExePath -Verb RunAs -ArgumentList $RelaunchArgs -PassThru
}
catch
{
$Error[0] # Dump details about the last error
PrintMessageAndExit $UiStrings.ErrorLaunchAdminFailed $ErrorCodes.LaunchAdminFailed
}
while (!($AdminProcess.HasExited))
{
Start-Sleep -Seconds 2
}
# Check if all elevated operations were successful
if ($NeedDeveloperLicense)
{
if (CheckIfNeedDeveloperLicense)
{
PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed
}
else
{
Write-Host $UiStrings.AcquireLicenseSuccessful
}
}
if ($NeedInstallCertificate)
{
$Signature = Get-AuthenticodeSignature $DeveloperPackagePath -Verbose
if ($Signature.Status -ne "Valid")
{
PrintMessageAndExit ($UiStrings.ErrorInstallCertificateFailed -f $Signature.Status) $ErrorCodes.InstallCertificateFailed
}
else
{
Write-Host $UiStrings.InstallCertificateSuccessful
}
}
}
#
# Finds all applicable dependency packages according to OS architecture, and
# installs the developer package with its dependencies. The expected layout
# of dependencies is:
#
# <current dir>
# \Dependencies
# <Architecture neutral dependencies>.appx\.msix
# \x86
# <x86 dependencies>.appx\.msix
# \x64
# <x64 dependencies>.appx\.msix
# \arm
# <arm dependencies>.appx\.msix
# \arm64
# <arm64 dependencies>.appx\.msix
#
function InstallPackageWithDependencies
{
$DependencyPackagesDir = (Join-Path $ScriptDir "Dependencies")
$DependencyPackages = @()
if (Test-Path $DependencyPackagesDir)
{
# Get architecture-neutral dependencies
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" }
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" }
# Get architecture-specific dependencies
if (($ProcessorArchitecture -eq "x86" -or $ProcessorArchitecture -eq "amd64" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "x86")))
{
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.appx") | Where-Object { $_.Mode -NotMatch "d" }
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.msix") | Where-Object { $_.Mode -NotMatch "d" }
}
if ((($ProcessorArchitecture -eq "amd64") -or ($ProcessorArchitecture -eq "arm64" -and $Amd64AppsSupportedOnArm64)) -and (Test-Path (Join-Path $DependencyPackagesDir "x64")))
{
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.appx") | Where-Object { $_.Mode -NotMatch "d" }
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.msix") | Where-Object { $_.Mode -NotMatch "d" }
}
if (($ProcessorArchitecture -eq "arm" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm")))
{
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.appx") | Where-Object { $_.Mode -NotMatch "d" }
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.msix") | Where-Object { $_.Mode -NotMatch "d" }
}
if (($ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm64")))
{
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.appx") | Where-Object { $_.Mode -NotMatch "d" }
$DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.msix") | Where-Object { $_.Mode -NotMatch "d" }
}
}
Write-Host $UiStrings.InstallingPackage
$AddPackageSucceeded = $False
try
{
if ($DependencyPackages.FullName.Count -gt 0)
{
Write-Host $UiStrings.DependenciesFound
$DependencyPackages.FullName
Add-AppxPackage -Path $DeveloperPackagePath.FullName -DependencyPath $DependencyPackages.FullName -ForceApplicationShutdown
}
else
{
Add-AppxPackage -Path $DeveloperPackagePath.FullName -ForceApplicationShutdown
}
$AddPackageSucceeded = $?
}
catch
{
$Error[0] # Dump details about the last error
}
if (!$AddPackageSucceeded)
{
if ($NeedInstallCertificate)
{
PrintMessageAndExit $UiStrings.ErrorAddPackageFailedWithCert $ErrorCodes.AddPackageFailed
}
else
{
PrintMessageAndExit $UiStrings.ErrorAddPackageFailed $ErrorCodes.AddPackageFailed
}
}
}
#
# Main script logic when the user launches the script without parameters.
#
function DoStandardOperations
{
# Check for an .appx or .msix file in the script directory
$PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" }
if ($PackagePath -eq $null)
{
$PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" }
}
$PackageCount = ($PackagePath | Measure-Object).Count
# Check for an .appxbundle or .msixbundle file in the script directory
$BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.appxbundle") | Where-Object { $_.Mode -NotMatch "d" }
if ($BundlePath -eq $null)
{
$BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.msixbundle") | Where-Object { $_.Mode -NotMatch "d" }
}
$BundleCount = ($BundlePath | Measure-Object).Count
# Check for an .eappx or .emsix file in the script directory
$EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.eappx") | Where-Object { $_.Mode -NotMatch "d" }
if ($EncryptedPackagePath -eq $null)
{
$EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.emsix") | Where-Object { $_.Mode -NotMatch "d" }
}
$EncryptedPackageCount = ($EncryptedPackagePath | Measure-Object).Count
# Check for an .eappxbundle or .emsixbundle file in the script directory
$EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.eappxbundle") | Where-Object { $_.Mode -NotMatch "d" }
if ($EncryptedBundlePath -eq $null)
{
$EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.emsixbundle") | Where-Object { $_.Mode -NotMatch "d" }
}
$EncryptedBundleCount = ($EncryptedBundlePath | Measure-Object).Count
$NumberOfPackages = $PackageCount + $EncryptedPackageCount
$NumberOfBundles = $BundleCount + $EncryptedBundleCount
# There must be at least one package or bundle
if ($NumberOfPackages + $NumberOfBundles -lt 1)
{
PrintMessageAndExit $UiStrings.ErrorNoPackageFound $ErrorCodes.NoPackageFound
}
# We must have exactly one bundle OR no bundle and exactly one package
elseif ($NumberOfBundles -gt 1 -or
($NumberOfBundles -eq 0 -and $NumberOfpackages -gt 1))
{
PrintMessageAndExit $UiStrings.ErrorManyPackagesFound $ErrorCodes.ManyPackagesFound
}
# First attempt to install a bundle or encrypted bundle. If neither exists, fall back to packages and then encrypted packages
if ($BundleCount -eq 1)
{
$DeveloperPackagePath = $BundlePath
Write-Host ($UiStrings.BundleFound -f $DeveloperPackagePath.FullName)
}
elseif ($EncryptedBundleCount -eq 1)
{
$DeveloperPackagePath = $EncryptedBundlePath
Write-Host ($UiStrings.EncryptedBundleFound -f $DeveloperPackagePath.FullName)
}
elseif ($PackageCount -eq 1)
{
$DeveloperPackagePath = $PackagePath
Write-Host ($UiStrings.PackageFound -f $DeveloperPackagePath.FullName)
}
elseif ($EncryptedPackageCount -eq 1)
{
$DeveloperPackagePath = $EncryptedPackagePath
Write-Host ($UiStrings.EncryptedPackageFound -f $DeveloperPackagePath.FullName)
}
# The package must be signed
$PackageSignature = Get-AuthenticodeSignature $DeveloperPackagePath
$PackageCertificate = $PackageSignature.SignerCertificate
if (!$PackageCertificate)
{
PrintMessageAndExit $UiStrings.ErrorPackageUnsigned $ErrorCodes.PackageUnsigned
}
# Test if the package signature is trusted. If not, the corresponding certificate
# needs to be present in the current directory and needs to be installed.
$NeedInstallCertificate = ($PackageSignature.Status -ne "Valid")
if ($NeedInstallCertificate)
{
# List all .cer files in the script directory
$DeveloperCertificatePath = Get-ChildItem (Join-Path $ScriptDir "*.cer") | Where-Object { $_.Mode -NotMatch "d" }
$DeveloperCertificateCount = ($DeveloperCertificatePath | Measure-Object).Count
# There must be exactly 1 certificate
if ($DeveloperCertificateCount -lt 1)
{
PrintMessageAndExit $UiStrings.ErrorNoCertificateFound $ErrorCodes.NoCertificateFound
}
elseif ($DeveloperCertificateCount -gt 1)
{
PrintMessageAndExit $UiStrings.ErrorManyCertificatesFound $ErrorCodes.ManyCertificatesFound
}
Write-Host ($UiStrings.CertificateFound -f $DeveloperCertificatePath.FullName)
# The .cer file must have the format of a valid certificate
ValidateCertificateFormat $DeveloperCertificatePath
# The package signature must match the certificate file
if ($PackageCertificate -ne (Get-PfxCertificate $DeveloperCertificatePath))
{
PrintMessageAndExit $UiStrings.ErrorCertificateMismatch $ErrorCodes.CertificateMismatch
}
}
$NeedDeveloperLicense = CheckIfNeedDeveloperLicense
# Relaunch the script elevated with the necessary parameters if needed
if ($NeedDeveloperLicense -or $NeedInstallCertificate)
{
Write-Host $UiStrings.ElevateActions
if ($NeedDeveloperLicense)
{
Write-Host $UiStrings.ElevateActionDevLicense
}
if ($NeedInstallCertificate)
{
Write-Host $UiStrings.ElevateActionCertificate
}
$IsAlreadyElevated = ([Security.Principal.WindowsIdentity]::GetCurrent().Groups.Value -contains "S-1-5-32-544")
if ($IsAlreadyElevated)
{
if ($Force -and $NeedDeveloperLicense)
{
PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense
}
if ($Force -and $NeedInstallCertificate)
{
Write-Warning $UiStrings.WarningInstallCert
}
}
else
{
if ($Force)
{
PrintMessageAndExit $UiStrings.ErrorForceElevate $ErrorCodes.ForceElevate
}
else
{
Write-Host $UiStrings.ElevateActionsContinue
Pause
}
}
LaunchElevated
}
InstallPackageWithDependencies
}
#
# Main script entry point
#
if ($GetDeveloperLicense -or $CertificatePath)
{
DoElevatedOperations
}
else
{
DoStandardOperations
PrintMessageAndExit $UiStrings.Success $ErrorCodes.Success
}
# SIG # Begin signature block
# MIImLQYJKoZIhvcNAQcCoIImHjCCJhoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAYh/586NhEPWiO
# +3D6/pj3+lXDRXkK9+wCdlGR7safL6CCC3YwggT+MIID5qADAgECAhMzAAAFVskg
# Kx90Ml0tAAAAAAVWMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTExWhcNMjQxMDE2MTk1MTExWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCW2kg89zWnssiDG9AFq/sxqkPT43V4MZ6vwu7C4+sly46QJA4UNxSRnGDz9u8f
# 18OR1/Ar9guQDqRthrOOktLaol49HZfv8l1DEeB/uguWS0qFIJe+cK6b7grVfl0S
# Z7U8yOXu67n52z+QJN+iUxcIk0KWcu/sJZ8KfewKxnNDMDIHHhUHvIjQWhvKxOLC
# /TwL0i4wTykXuQwbwIZuuGi7TYA82Q2LkYOLlwOTPOb0eowhcUI7CaXlU30IgoG4
# frY+mtZMZnTx0ga/a36GVNdq6NeBKzlGbLB02/WIP+c5ADDCXsheWpkizJt9aPhz
# Yuont+Nx0OhIH04lJFvCqjljAgMBAAGjggF9MIIBeTAfBgNVHSUEGDAWBgorBgEE
# AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUJt8FhQFwX7g5A/0elDxkjww82dow
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwODY1KzUwMTY1NTAfBgNVHSMEGDAW
# gBTm/F97uyIAWORyTrX0IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v
# Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0Ff
# MjAxMC0wNy0wNi5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEw
# LTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBCnZlo
# MxjHBVHJEP6d+0t7EDJfNB0h7j9iOX6LQiPMdQAV1xqA6Jgb/VEPSEVs076CAJn3
# KP5Jpr4DOuo12BE2CoCusZDHn+7aP2yxngMGGQcJKz4UfOzDMS9Yr2sl3R6fMP18
# T4Ce5t7IYFK36PI/HfvHO8AzB3T0KhVIifqsSwZ8mEukw/wi4duJYulYxV2lY2kM
# Hwv/OKvKAsrTd338HlnuR+z9NZvStNUi1a8sTwcEMrEP8lgtoxaZe0Ypu/Ohn4Pq
# TefEVWKQJLU2KFyLDkoamDde0ydAzzHYEqdBQMW0gxWyvJ9fjgF/C2PKQVu/0SMB
# hcwo04eFzf/w7pZ/MIIGcDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0B
# AQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAG
# A1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAw
# HhcNMTAwNzA2MjA0MDE3WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
# aWduaW5nIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
# 6Q5kUHlntcTj/QkATJ6UrPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9
# RJwI6GWTzixVhL99COMuK6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjW
# axeUOpPOJj/s5v40mFfVHV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkc
# vR3EVWJXcvhnuSUgNN5dpqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YAS
# NUwSpr5SW/Wm2uCLC0h31oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZ
# M4BqiU2jamZjeJPVMM+VHwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAw
# HQYDVR0OBBYEFOb8X3u7IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoA
# UwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY
# MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6
# Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1
# dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0
# dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3J0MIGdBgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9Bggr
# BgEFBQcCARYxaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k
# ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABp
# AGMAeQBfAFMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
# GnTvV08pe8QWhXi4UNMi/AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1
# b6/lf3mVd+UC1PHr2M1OHhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMh
# KeWloWmMIpPMdJjnoUdD8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJ
# N2FtB91TGcun1mHCv+KDqw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCq
# tq27ckdjF/qm1qKmhuyoEESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW
# 77Gcf/wiS0mKbhXjpn92W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14y
# jPs3hdHcdYWch8ZaV4XCv90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaX
# evfpUk30dwVPhcbYC/GO7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19x
# HkCvmGXJIuhCISWKHC1g2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQ
# HTiVmx5mMxMnORd4hzbOTsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlac
# vyRdUQKdannSF9PawZSOB3slcUSrBmrm1MbfI5qWdcUxghoNMIIaCQIBATCBlTB+
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9N
# aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEwAhMzAAAFVskgKx90Ml0tAAAA
# AAVWMA0GCWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA/
# 8sllbhmdgHazXDKfJje5ZPISyNOJfdmSfAvZZC8tJDBCBgorBgEEAYI3AgEMMTQw
# MqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tMA0GCSqGSIb3DQEBAQUABIIBADM25byC4DvYoSwRbJsIrfa7bN2nPmU1Vgs6
# Ib0OOmBbGTuQgw9PbQVHaWZfyHa3qBwOveKb6JSheEg6YpkcAHMoqeVAqYTuDJoo
# nPV5isL+EPA/YskdzmIDr7nCnXSDF/DoeItBOi2N1FExmYKM1sC9EDIclZvOPk5B
# 90QjfYZ65l9JUhjxaM0Mx3ZOXbqYmQKKYePywHVz/owQKUAcihyMcY9vt91EU49v
# x15JI2Z3TeVSrbmcPf+SMQmYkuSOVOmoUfVWGP7K/YdZ3VcVS0Nk9s4x+ZkUXNau
# cORRqHz8UcVXtKlVoM8GsJZ+mAOP712ejsxrVStoFRc14lX+wXKhgheXMIIXkwYK
# KwYBBAGCNwMDATGCF4Mwghd/BgkqhkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCG
# SAFlAwQCAQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQB
# hFkKAwEwMTANBglghkgBZQMEAgEFAAQguGaT2Sm0kGkP5Ssd3NQzrAH7yW9T5XvU
# bIa05mYU+VQCBmXOBfaZHBgTMjAyNDAyMjIyMjA3MzguMjgzWjAEgAIB9KCB0aSB
# zjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UE
# CxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNloIIR7TCCByAwggUIoAMCAQICEzMAAAHr4BhstbbvOO0A
# AQAAAeswDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTAwHhcNMjMxMjA2MTg0NTM0WhcNMjUwMzA1MTg0NTM0WjCByzELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt
# ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwRVoIdpW4Fd3iadNaKom
# hQbmGzXO4UippLbydeTawfwwW6FKMPFjzkz8W5+4HJiDhpsCZHfk8hceyjp868Z6
# Ad4br7/dX2blLoCLCk5wL4NgVP53ze2c5/SpNZqbidu0usVAx+KHRYl+dSAnCpeh
# BuHMSoHAwIp4oU/Ma6CVlQEy+6fG2358LHNaYoWZnLyLmBp29U2PbZ6XQoVq/RAE
# bgqN04kRozNi6eKYk9pQ+YZ3d1Whk3qTasmpKZAhldPnCvFbvx5CGXb8vs+RC96I
# 03RSy+byfSAKIFn91wLt3e0qRWmqHosdHtaueQA/eGcAz/os6i2nbAUd7c46tkX6
# wjS/k5ov42pUbaPyem4eHz4RxE5wwu/E9cn11EHRrZif7rSPwDcYux1fIAD84nfU
# 2IzD22KhvMucc/oCP0hco/mirRx1pisxFz7bV8wHHsSdRB+8G7olZN7BKzyvTC4N
# V2+oTORyFgNIxAGYShMneYR9lzIm82pG6drNhCUFmrEHOAzGhdRLENQs4ApQ2CGB
# uq1IbnXyO5PC/SighLn0WyuZXUWDQKnXa/8kiX7mb9z0t/r7Q+l+qtR+FDpowynY
# 6Ft6rOyUTGZh/X5BZDM2+mEs6+nl9S6GJtz6ztSXmuN0mM5Qd08/ODr7lUlezXIn
# VbTaomXllqVY32r0fiY/yTkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBR0ngWs1lXM
# buKk/TuY09gfqgHq4TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAg3TfL6D3fAvl
# VmT9/lvO3P0G3W1itLDrfWeJBDlp4Oypoflg9i5zyUySiBGsZ4jnLfcDICfMkMsE
# fFh4Azr28KnarC1GjODa3q7SOhSPa4Y4XmisTTZwWcx2Sw8JZC/bwhA3vUXNHRkl
# XeQYNwlpJ1d7r1WrteBeeREk1iATWkEvQqaNjqc93EYAGFX2ixRmwKzXEb0lr0lG
# 3iNiA6kcQuMQW0YjUPtah1wwj59IRrF3y/spw2Z3An7Mza5YGU9uF4Ib082DB3F4
# qC1WKP9h5MqMOnSO7lCyWysS1/MB4bIsK4lyAwp4y1bBtBOW0fNkIHLHhIcW1Nnd
# UVR3ELZFBO1vc8Wamev4z5mqI2YF0Dt9148Th2GFWvwV3CLrvEjMz44wAG7o8E2s
# KWsywb/fey0QdGTmzXJCWMkEKRE0n5Td+o1vs+0f5xsiakWdx7WdZV1tX+sxAgHj
# /vXcup5nAq1XDqm0B1+2a/Fj3IIRyQAA5ZuRMT4ecYtbTUZPouhdmvUqU3kJ2Vz+
# dMPiaE8SEkKu7wYo9p4rQLEi2lXjKqD4vjV5U1DWdjXbWxa+iIq/WSvbn2s9xcX7
# w2aN+ubyzqM5kDnv2fqbuL2Ocz5rTYlSHEJxcuyWTomVQyOWyHcEEWotqrhyiepb
# VHbItx4zZ4nrhO9n0+HlocbZpzeR2AgwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDUDCCAjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIj
# CgEBMAcGBSsOAwIaAxUAgAaJdbtcMMGIFLVKMDJ6mL27pd6ggYMwgYCkfjB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmBvmYw
# IhgPMjAyNDAyMjIxMjM2NTRaGA8yMDI0MDIyMzEyMzY1NFowdzA9BgorBgEEAYRZ
# CgQBMS8wLTAKAgUA6YG+ZgIBADAKAgEAAgIiPwIB/zAHAgEAAgITxjAKAgUA6YMP
# 5gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6Eg
# oQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAKDAuTknIW4P7wZkq7XQb/
# CL35KQ8ew+KqIBnTM1w1ISHNiRESDRGBBgF1Zq1O/1cKoPLxKEc4DsF1uXp1bqf2
# mIHsG7IWxGNlWRtHjoZ9mjPd2kUBSAZnabcrkEUdi47jDWtJLotPyoTokyHldRye
# 59Uf3Mzpv2gX09pW7i2nplT8d4Ceh1ojBY9x3bPD5ijbqMxqE/DAGbvlmiZak2/F
# Hzvuel+36K1LkfguwGbvGNlpM3B0KfHyJDJrsCcP8HJv6Dr2doVd36cUoIdO8Y/d
# 5haILtJwGmfoNqW47dkFApPixAZk4udTjDB07SD+vaTYcqqzn+veOfAx3koImRPY
# MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAHr4BhstbbvOO0AAQAAAeswDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ
# AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgKrL9Q5m8KwQA4rBRGjEM
# iT2gkxqlw3FcInKGsSsDYhAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDO
# t2u+X2kD4X/EgQ07ZNg0lICG3Ys17M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHrMCIEIB76
# 35TM3rzf5DJkkCnwCs1wXcg93wzBMjQyBBtOo2FqMA0GCSqGSIb3DQEBCwUABIIC
# AJAA7Al7emqQkdWuZjYtC6QBa9pgko2R4TFImGGzA1+4wc41j5PX8Xhv+edXrxRT
# w68B6OVzwkGRiT+wz8KbCi1q1TrYmsAvL8f871sBBJJOw3VBK+6XtDf/g2cqGERI
# kvfdVI1lACLrI61vsg9ZwvM82NyqG9WnlkPwEnGGJ+TzFp/fmYxyKMykAKaoSs74
# tfqxBE90q4cw6M+ENTvT+9IIH2vC/otV+80uAlmYT5TshsTb7sT3hVoc356s0lxm
# pyMVnbMdoX64oYxZt/rT5lN9gljElZj2uPmvoiz3ENV9Sqts5vYTqUpUChrzqKg+
# GrFhCeEDKo9T/ICuspNjO/jL/HZHZuN8Shpxsua9BurusHRbIcg5gPvLsRmoIKsR
# wgOl4VKlvpv2FE5YXBxqUUqMur6RDjS0zSc+M4rATeSLPWNcmSeM+2v9jDj7yHB6
# wRmvYYyVnpVEev1e3+JLpB33F2Y72DghUGecj5RYFP0rF6vP978Mp1E2Bae/qiVr
# FV/nyhdMZ1JEOg5m7SOuYRVJZAMkqUfd2bAgsznXowbwLLQb7hmQeYq5tiSFIfHc
# 0b+dhpVCSJ2asG/93uCWd6E9y4rmriI4IAgD4OtnnbccMZpQtjNL9u3Ijy9Oyobf
# aoEeG4DSn6KyDX4ocMfgwaSnp8CnNWKiW5lV9gD4jOom
# SIG # End signature block
|
combined_dataset/train/non-malicious/1427.ps1 | 1427.ps1 |
function Test-CUncPath
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$Path
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
([Uri]$Path).IsUnc
}
|
combined_dataset/train/non-malicious/sample_30_85.ps1 | sample_30_85.ps1 | ###########################################################
#
# 'GCArcService' module
#
###########################################################
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version Latest
Import-Module "$PSScriptRoot\ServiceHelper.psm1"
$script:GCInstallPath = "$PSScriptRoot\..\..\.."
$script:GCBinariesFolderName = "GC"
$script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName
$script:OperationRetryCount = 5
<#
.SYNOPSIS
Install Guest Configuration Arc Service.
.Example
Install-GCArcService
#>
Function Install-GCArcService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Install-GCArcService"
$ServiceType = "GCArc"
$gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config'
'{ "ServiceType": "GCArc" }' | Out-File $gcConfigPath -Encoding utf8
New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory
Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath)
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
# Install GC Service and verify it is installed correctly.
Install-ServiceInternal -ServiceType "GCArc"
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Enable and start Guest Configuration Arc Service.
.Example
Enable-GCArcService
#>
Function Enable-GCArcService {
[CmdletBinding()]
Param()
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Enable-GCArcService"
$ServiceType = "GCArc"
Start-ServiceInternal -ServiceType $ServiceType
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Uninstall Guest Configuration Arc Service.
.Example
Uninstall-GCArcService
#>
Function Uninstall-GCArcService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Uninstall-GCArcService"
$ServiceType = "GCArc"
# Unregister GC Service
Uninstall-ServiceInternal -ServiceType $ServiceType
$guestConfigDataPath = Get-GuestConfigDataPath
$configurationPath = Join-Path $guestConfigDataPath 'Configuration'
if ((Test-Path -Path $configurationPath) -and (-not (CheckServiceExists($global:GCServiceName))))
{
Write-Verbose "Removing GC user data from $configurationPath path ..."
Remove-Item $configurationPath -Recurse -Force
}
}
<#
.SYNOPSIS
Update Guest Configuration service.
.Example
Update-GCArcService
#>
Function Update-GCArcService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Update-GCArcService"
}
Export-ModuleMember -Function @(
'Install-GCArcService',
'Enable-GCArcService',
'Uninstall-GCArcService',
'Update-GCArcService'
)
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBiMG+twTeJCd4D
# inSASyoEH2LgmLtLl98tUNWujwJ94aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL59y+jhL9A0O3Idu+8nZayQ
# Zp3eKfjLNeUNRLnJaOGNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEArfyQHPzs77au0enSx/VethByLp4Pejw/40RLk/7rfMFKrzN9HdwZ1EXP
# +4qnas/UyKwW3bO6NjtQhO0mtPlsJ/08YX0aHbn8H/Ry3mLasA3tWVD549RSSwcc
# TCpsaMDGWP8VS0SfyL7I8Tmj36ZK9gIemO0puuda2thRX9UNcUXNBVnmFO3T9WLv
# Q5DuNodRWurpIQqLwSqJKnjnMys67VHd5I3KrtIW/olipf/1AX6qLFLFJcRD6+eA
# u6TvGVtB89kGtiVOtZtt0mZDluFV5lgs63dwSCAHYVKBJJALuQMkeOWE/u05wFpI
# EwtCBFpJR7e/i+92FBg/j2Laxo7j6KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB3EpLQfzyI+kJtuWloGU5+V+jfkBupO6aibcIeNsbrtgIGZc3/lJQo
# GBMyMDI0MDIyMDE4MTg0Ny45ODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X5sAjAiGA8yMDI0MDIyMDAwMDgz
# NFoYDzIwMjQwMjIxMDAwODM0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpfmwC
# AgEAMAcCAQACAh4kMAcCAQACAhOuMAoCBQDpf72CAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAEjBdhxc2Dy1IiI/abmk2E8Is2YgKjvpKrgHVxrmR6uToVLP
# +UTfGUj2Wdk6mOU9tYSo2+fynkECZN0DoKjTEGh4CrnkehLBVuWNgWLsCZc4U+fP
# nNmgZ2qAoDCCXREnJR9JIJm5UtNXteuMozC7q8xxg/dos4gse4eoUCHByHFAsQF2
# yQH4lw0AL5Ue8QK/wBmQWo0hdzZhEo/AGIWBJd5X4190yduqpmJpj4buYrRtrFQz
# bAVLlTIHmz8KofO3bdLsozBU9WK9+/+8a1AXn1SyEt5hLUX4UrzcmTMmM9UIFyLG
# wG1hDOrZI6UOtwP+SPLuYv5fTIvLKjn62cj88bgxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAJXAOKAh+UPGVlaA3+to3j+Nw+054+I3JPCxAB3vkYITCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeEX74F
# v0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg5strNsYbAJScKAE5aG3Lom5LvoS5
# tFxoBQ4e8fINHe0wDQYJKoZIhvcNAQELBQAEggIAXrAN9XD/DGRxxb8l7FSTw7S5
# xkaDtfM2I9wmtA/So3BiEIh64l4ZJ+CGmhX5ax0rvBsHGDdPj0Z3P5aie8kFRwGb
# JwsAPbYP+dWCl48EMq2A+/OkkcYaxh5Z/SDPfshChavZn+BWf21YzSldFUpNaFNG
# 7mEGNKupEJHNThFHAZWuQHYKEcM62fOsHcyDyjXzWevC/t33Hzqch45rKoAKiqUh
# 6RBzOydou5CEDny5xGqfIu9sTOV9j/BRNfZym53U1JkU4S51FRxY7PjdIyeDFdw3
# i5KzZ4/hFUbHrzKtdzLsmZgbGHrY50TOJpH81ls3nMj6BH0lKLxtcGN9p7BYbjup
# PuAuPvS+Le7Up3wgnbqlg6GEd2yFGo83hHElZKxfWYq7ydCTuR66my95qXcYUn5X
# ZTbt2/bYRoXrIqSZ4x2ENklQDNsdykB5s120Ds5AR0Dw4wQeX/DGMqi4+m26TC5B
# Vt8rxdiEmp1WSIcJxlLElqod5JFGDqF0zANOGMZ8fZ7zfQC4dB8yxXH+xoZQqM61
# OyLdDXnCX8iGCpsZm7cgYKXsO0jPFlZcp2U1yu2IXXGFRDV0v8c2+rsUpTUkTpYl
# B6uGLfYJKZriK7JnP5i4PHirjRc2iF83C2NqKVmk3F3F8XY3atcAZFSJRWue5XLD
# el/ohoyF5Se+wvkKei0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Email attachments_1.ps1 | Email attachments_1.ps1 | $file = "MYFILE.TXT"
$smtpServer = "MYSMTPSERVER.EMAIL.CO.UK"
$msg = new-object Net.Mail.MailMessage
$att = new-object Net.Mail.Attachment($file)
$smtp = new-object Net.Mail.SmtpClient($smtpServer)
$msg.From = "FROMME@EMAIL.CO.UK"
$msg.To.Add("TOME@EMAIL.CO.UK")
$msg.Subject = "MY SUBJECT"
$msg.Body = "MY TEXT FOR THE EMAIL"
$msg.Attachments.Add($att)
$smtp.Send($msg)
$att.Dispose()
|
combined_dataset/train/non-malicious/1352.ps1 | 1352.ps1 |
function Grant-CMsmqMessageQueuePermission
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[Switch]
$Private,
[Parameter(Mandatory=$true)]
[string]
$Username,
[Parameter(Mandatory=$true)]
[Messaging.MessageQueueAccessRights[]]
$AccessRights
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$queueArgs = @{ Name = $Name ; Private = $Private }
$queue = Get-CMsmqMessageQueue @queueArgs
if( -not $queue )
{
Write-Error "MSMQ queue '$Name' not found."
return
}
if( $PSCmdlet.ShouldProcess( ('MSMQ queue ''{0}''' -f $Name), ("granting '{0}' rights to '{1}'" -f $AccessRights,$Username) ) )
{
$queue.SetPermissions( $Username, $AccessRights )
}
}
Set-Alias -Name 'Grant-MsmqMessageQueuePermissions' -Value 'Grant-CMsmqMessageQueuePermission'
|
combined_dataset/train/non-malicious/New-XVM_14.ps1 | New-XVM_14.ps1 | #EXAMPLES
<#
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR01" -SwitchName "External(192.168.1.0/24)" -VhdType NoVHD
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR02" -SwitchName "External(192.168.1.0/24)" -VhdType ExistingVHD -VhdPath D:\\vhds\\WS2012-TESTSVR02.vhdx
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR03" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR04" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD -DiskType Dynamic
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR05" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD -DiskType Fixed -DiskSize 1GB
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR06" -SwitchName "External(192.168.1.0/24)" -VhdType Differencing -ParentVhdPath 'D:\\vhds\\Windows Server 2012 RC Base.vhdx'
New-XVM -ComputerName HYPERVSVR02 -Name "WS2012-TESTSVR07" -SwitchName "External(192.168.1.0/24)" -VhdType NewVHD -Configuration @{"MemoryStartupBytes"=1GB}
#>
Function New-XVM
{
[cmdletbinding()]
Param
(
[Parameter(Mandatory=$false,Position=1)]
[string]$ComputerName=$env:COMPUTERNAME,
[Parameter(Mandatory=$true,Position=2)]
[string]$Name,
[Parameter(Mandatory=$true,Position=3)]
[string]$SwitchName,
[Parameter(Mandatory=$true,Position=4)]
[ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")]
[string]$VhdType,
[Parameter(Mandatory=$false,Position=5)]
[hashtable]$Configuration
)
DynamicParam
{
Switch ($VhdType) {
"ExistingVHD" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $true
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("VhdPath",$vhdPath)
return $paramDictionary
}
"NewVHD" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $false
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("DiskType",$diskType)
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $false
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection)
$paramDictionary.Add("DiskSize",$diskSize)
return $paramDictionary
}
"Differencing" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $true
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("ParentVhdPath",$parentVhdPath)
return $paramDictionary
}
}
}
Begin
{
Try
{
$vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop
}
Catch
{
$PSCmdlet.ThrowTerminatingError($Error[0])
}
$defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath
}
Process
{
$validConfigNames = "MemoryStartupBytes","BootDevice"
$configParams = @()
Switch ($VhdType) {
"NoVHD" {
$vhdFilePath = $null
}
"ExistingVHD" {
$vhdFilePath = $vhdPath.Value
}
"NewVhd" {
if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"}
if (-not $diskSize.IsSet) {$diskSize.Value = 127GB}
$newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx"
Switch ($diskType.Value) {
"Fixed" {
$vhdFile = New-VHD -ComputerName $ComputerName -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop
}
"Dynamic" {
$vhdFile = New-VHD -ComputerName $ComputerName -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop
}
}
$vhdFilePath = $vhdFile.Path
}
"Differencing" {
$newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx"
$vhdFile = New-VHD -ComputerName $ComputerName -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop
$vhdFilePath = $vhdFile.Path
}
}
if ($vhdFilePath -ne $null) {
$command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$vhdFilePath'"
} else {
$command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD"
}
if ($Configuration -ne $null) {
foreach ($configName in $Configuration.Keys.GetEnumerator()) {
if ($validConfigNames -contains $configName) {
$configParams += "-$configName" + " " + $Configuration[$configName]
}
}
$configParams = $configParams -join " "
}
if ($configParams.Count -eq 0) {
$command += " -ErrorAction Stop"
} else {
$command += " $configParams -ErrorAction Stop"
}
Try
{
Invoke-Expression -Command $command
}
Catch
{
$PSCmdlet.WriteError($Error[0])
Remove-Item -Path $vhdFile.Path
}
}
End {}
}
|
combined_dataset/train/non-malicious/1867.ps1 | 1867.ps1 |
Describe "Out-Host Tests" -tag CI {
BeforeAll {
$th = New-TestHost
$rs = [runspacefactory]::Createrunspace($th)
$rs.open()
$ps = [powershell]::Create()
$ps.Runspace = $rs
$ps.Commands.Clear()
}
AfterEach {
$ps.Commands.Clear()
}
AfterAll {
$rs.Close()
$rs.Dispose()
$ps.Dispose()
}
It "Out-Host writes to host output" {
$stringToWrite = "thing to write"
$stringExpected = "::$($stringToWrite):NewLine"
$result = $ps.AddScript("Out-Host -inputobject '$stringToWrite'").Invoke()
$th.UI.Streams.ConsoleOutput.Count | Should -Be 1
$th.UI.Streams.ConsoleOutput[0] | Should -BeExactly $stringExpected
}
}
|
combined_dataset/train/non-malicious/sample_3_31.ps1 | sample_3_31.ps1 | ]Calculated table '%{oii_table/}' must have only one partition with source of type Calculated.ŎZa Direct Lake režim neophodan je Direct Lake izvor podataka. Tabele u Direct Lake režimu moraju biti tipa izvora podataka koji je SQL ili OneLake. Proverite i ispravite definicije izvora podataka za sledeće Direct Lake tabele%{oii_TableNames/}. Posetite stranicu https://go.microsoft.com/fwlink/?linkid=2215281 da biste saznali više.òDirect Lake preko OneLake zahteva važeći OneLake izvor podataka. Proverite i popravite definicije izvora podataka u Direct Lake tabeli %{oii_TableName/}. Posetite stranicu https://go.microsoft.com/fwlink/?linkid=2215281 da biste saznali više.ÈTabelom „%{oii_table/}“ upravlja smernica za osvežavanje, ali nema kolona sa podacima. Verifikujte i ispravite definiciju tabele ili dodavanjem kolone podataka ili uklanjanjem smernice za osvežavanje.çTabela „%{oii_table/}“ nema kolone sa podacima. Komanda MergePartitions nije podržana u takvom scenariju. Verifikujte i popravite definiciju tabele ili tako što ćete dodati kolonu sa podacima ili tako što ćete otpustiti ovu tabelu.ŁPonašanje „DirectQueryOnly“ nije podržano za OneLake izvor podataka. Ovaj semantički model funkcioniše u režimu „Direct Lake on OneLake“ i podržava „DirectLakeOnly“ i „Automatic“. Postavite DirectLake ponašanje na podržanu vrednost. Posetite stranicu https://go.microsoft.com/fwlink/?linkid=2215281 da biste saznali više.üTabela „%{oii_table/}“ nema kolone sa podacima. Nije moguće pokrenuti procesor kodiranja za ovu tabelu. Verifikujte i popravite definiciju tabele ili tako što ćete dodati kolonu sa podacima ili tako što ćete otpustiti/ponovo kreirati ovu tabelu iznova.¥Tabela „%{oii_table/}“ ima kolone sa podacima, ali nijedna kolona podataka nije uključena u aktivnost procesora kodiranja. Verifikujte i ispravite definiciju tabele.ʼnWe cannot process the binding information in the bindingInfoCollection because the type of an existing bindingInfo object cannot be altered. Please revert the type to the original value for the bindingInfo object associated with the resource path '%{oii_path/}'. See https://go.microsoft.com/fwlink/?linkid=2283740 to learn more.ĵNe možemo da obradimo informacije o povezivanju u bindingInfoCollection zato što više objekata bindingInfo ima istu putanju resursa „%{oii_path/}“. Uverite se da svaki objekat bindingInfo upućuje na jedinstvenu putanju resursa. Pogledajte https://go.microsoft.com/fwlink/?linkid=2283740 da biste saznali više.ĩNe možemo da obradimo informacije o povezivanju u bindingInfoCollection zato što više bindingInfo objekata ima isti ID veze „%{connectionId/}“. Uverite se da svaki bindingInfo objekat upućuje na jedinstveni ID veze. Pogledajte https://go.microsoft.com/fwlink/?linkid=2283740 da biste saznali više.ŇNe možemo da obradimo informacije o povezivanju u bindingInfoCollection zato što je ID veze „%{connectionId/}“ povezan sa putanjom resursa „%{oii_path/}“ nevažeći. Uverite se da svaki bindingInfo objekat upućuje na važeći ID veze u GUID formatu. Pogledajte https://go.microsoft.com/fwlink/?linkid=2283740 da biste saznali više.aKonverzija M upita u tabeli „%{oii_table/}“ u izvorni upit je prekinuta zbog previše otkazivanja. |
combined_dataset/train/non-malicious/sample_26_27.ps1 | sample_26_27.ps1 | <#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
function Invoke-EnvironmentValidator
{
<#
.SYNOPSIS
Wrapper command to Test Environment Readiness
.DESCRIPTION
Wrapper command to test environment readiness, run locally on HCI system.
.PARAMETER OperationType
Type of Operation.
.PARAMETER WaitForResult
Wait for action plan to complete.
#>
[CmdletBinding()]
Param(
[Parameter(Mandatory = $true, ParameterSetName = "AddNode")]
[Parameter(Mandatory = $true, ParameterSetName = 'All')]
[Parameter(Mandatory = $true, ParameterSetName = "Update")]
[ValidateSet('Deploy', 'Upgrade', 'AddNode', 'Update')]
[String]
$OperationType,
[Parameter(Mandatory = $true, ParameterSetName = "AddNode")]
[ValidateNotNullOrEmpty()]
[String]
$Name,
[Parameter(Mandatory = $true, ParameterSetName = "AddNode")]
[ValidateNotNullOrEmpty()]
[String]
$HostIpv4,
[Parameter(Mandatory = $false, ParameterSetName = "Update")]
[ValidateNotNullOrEmpty()]
[String]
$EnvironmentCheckerResultPath = "$($env:LocalRootFolderPath)\MasLogs\EnvironmentCheckerUpdateResult.json",
[Parameter(Mandatory = $false, ParameterSetName = 'All', HelpMessage = 'Wait for action plan to conclude. Shows progress if running on the ECE owning node.')]
[switch]$Wait
)
$ErrorActionPreference = 'Stop'
# Check if we are running Orchestrator as a service or lite
$Script:OrchestratorSvc = IsOrchestratorSvc
# Check if action plan is running
$RunningActionPlans = Get-AzStackHciEnvironmentCheckerActionPlan | Where-Object Status -In 'Running', 'Queued'
if ($RunningActionPlans)
{
throw "Environment Validator action plan in progress"
}
# Archive Log file
ArchiveLogFiles
$ActionType = switch ($OperationType)
{
'Deploy' { 'EnvironmentValidatorFull' }
'Upgrade' { 'EnvironmentValidatorUpgrade' }
'AddNode' { 'EnvironmentValidatorAddNode' }
'Update' { 'EnvironmentValidatorPreUpdate' }
Default {}
}
Write-Verbose "Starting Environment Validator for $OperationType"
# TODO check if Deploy, Upgrade or AddNode ops are running here?
$params = @{
RolePath = 'Cloud\Infrastructure\EnvironmentValidator'
ActionType = $ActionType
}
# Add needs a node name and IP, take these from the user
if ($ActionType -eq 'EnvironmentValidatorAddNode')
{
if ([string]::IsNullOrEmpty($Name) -or [string]::IsNullOrEmpty($HostIpv4))
{
throw "Parameters missing: Name and HostIpv4 must be supplied when OperationType is AddNode."
}
$params += @{
runtimeParameters = @{
NodeName = $Name
IpAddress = $HostIpv4
}
}
}
# Update needs a path to the result file, take this from the user
if ($ActionType -eq 'EnvironmentValidatorPreUpdate')
{
if ([string]::IsNullOrEmpty($EnvironmentCheckerResultPath))
{
throw "Parameters missing: EnvironmentCheckerResultPath must be supplied when OperationType is Update."
}
$params += @{
runtimeParameters = @{
EnvironmentCheckerResultPath = $EnvironmentCheckerResultPath
}
}
}
if ($Script:OrchestratorSvc)
{
$ActionPlanInstanceId = Invoke-ActionPlanInstance @params 4>$null
if (-not $wait) {
Write-Verbose "To check progress, open a powershell session to $(GetOrchestratorOwner) and call: 'Get-AzStackHciEnvironmentCheckerProgress -Path $($env:LocalRootFolderPath)\MasLogs\AzStackHciEnvironmentProgress.json'"
}
}
else
{
Invoke-EceAction @params
if (-not $wait) {
Write-Verbose "To check progress, call: 'Get-AzStackHciEnvironmentCheckerProgress -Path $($env:LocalRootFolderPath)\MasLogs\AzStackHciEnvironmentProgress.json'"
}
}
Start-Sleep -Seconds 5
for ($i = 0; $i -lt 30; $i++)
{
$ActionPlan = Get-AzStackHciEnvironmentCheckerActionPlan | Sort-Object LastModifiedDateTime -Descending | Select-Object -First 1
switch ($ActionPlan.Status)
{
{ $_ -in "Failed", "Cancelled" }
{
throw "$ActionType is $($actionPlan.Status). Please resume please review: `n $($actionPlan.ProgressAsXml)"
}
{ $_ -in "Waiting", "Pending" }
{
Write-Verbose "$ActionType is currently $($actionPlan.Status)"
}
{ $_ -eq "Running" }
{
Write-Verbose "$ActionType is currently $($actionPlan.Status)"
if ($Wait)
{
if ($ENV:COMPUTERNAME -eq (GetOrchestratorOwner))
{
Get-AzStackHciEnvironmentCheckerProgress | Format-Table Result, StartTime, EndTime, DurationSeconds, Name, Description -AutoSize
}
}
else
{
break outer
}
}
{ $_ -eq 'Completed' }
{
if ($ENV:COMPUTERNAME -eq (GetOrchestratorOwner))
{
Get-AzStackHciEnvironmentCheckerProgress | Format-Table Result, StartTime, EndTime, DurationSeconds, Name, Description -AutoSize
}
break outer
}
default
{
Write-Warning "$ActionType cannot be started due to unknown status of last run"
return
}
}
Start-Sleep -Seconds 30
}
Write-Verbose "$ActionType $($ActionPlanResult.Status) Action Plan ID: $($ActionPlanInstanceId.Guid)"
}
function Get-AzStackHciEnvironmentCheckerActionPlan
{
<#
.SYNOPSIS
Get all Environment Validator action plan instances
#>
[CmdletBinding()]
param ()
$validatorLookup = 'EnvironmentValidator*'
if (IsOrchestratorSvc)
{
Get-ActionPlanInstances | Where-Object { $_.ActionTypeName -like $validatorLookup }
}
else
{
Get-ActionProgress -ActionType $validatorLookup
}
}
function Get-AzStackHciEnvironmentCheckerProgress
{
<#
.SYNOPSIS
Intended for internal-use to retrieve multi-validator invocation progress using action plan
#>
[CmdletBinding()]
param (
[Parameter()]
[string]
$Path = "$($env:LocalRootFolderPath)\MasLogs\AzStackHciEnvironmentProgress.json"
)
Get-Content $Path -ErrorAction SilentlyContinue | ConvertFrom-Json
}
function ArchiveLogFiles
{
<#
.SYNOPSIS
INTERNAL USE ONLY - Archives any supporting files for environment checker.
#>
[CmdletBinding()]
param (
[Parameter()]
[string]
$Path = "$($env:LocalRootFolderPath)\MASLogs"
)
# Archive any logs
'AzStackHciEnvironmentChecker.log', 'AzStackHciEnvironmentProgress.json', 'AzStackHciEnvironmentReport.json', 'AzStackHciEnvironmentReport.xml' | ForEach-Object {
Get-ChildItem -Path $Path -Filter $PSITEM -ErrorAction SilentlyContinue | ForEach-Object {
Rename-Item -Path $PSITEM.FullName -NewName ($PSITEM.fullname -replace '(\.)', ('_{0}.' -f (Get-Date -Format yyyyMMdd-HHmmss)))
}
}
}
function IsOrchestratorSvc
{
[CmdletBinding()]
param ()
$orchestratorSvc = Get-Service | Where-Object {$_.Name -eq 'ECE Windows Service' -or $_.Name -eq 'Azure Stack HCI Orchestrator Service'}
if ($orchestratorSvc)
{
return $true
}
else
{
Import-Module C:\CloudDeployment\ECEngine\EnterpriseCloudEngine.psd1 -Force
return $false
}
}
function GetOrchestratorOwner
{
[CmdletBinding()]
param ()
try
{
Get-ClusterGroup | Where-Object {$_.Name -eq 'ECE Windows Service Cluster Group' -or $_.Name -eq 'Azure Stack HCI Orchestrator Service Cluster Group'} | Select-Object -expandProperty OwnerNode | Select-Object -ExpandProperty Name
}
catch
{
return $null
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBk2oxvuCmn6Gws
# tgkq3ELgsBX3FvXKva+UIFbOAaz5KKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAoMCHoeSxpGnPcWOdsAyn8N
# mEmikIKLjknCUIEAQDkUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAokvEmFRMDPNh74S3y4QB6VGARp7XMw6HPRYaEJqM9VlAfw4F809aFZSI
# eRAhXSQke8A5e8NwqPl7zmqPHD0qQH1H14Ew88c1F+3IVPQo83iHCVY7TkN9eTtG
# K8SA7TIVY6Nzb3BtYrrpNUMEOx+nZ1I1P6GX6B7/LuM+pcRK/4ZjeCXdp/+nN8IJ
# cuqEAr+GqIJ8MYOrABbSY1Of2bjiSJ8z85yONyTJjecim4CCAA0dXfpnj4rAkDiK
# I7DtHsbEJ3r2OuNUSjJIvx2lyq5Yx/EpeGZSZSpRKnA4vZiSoCeD0M//a3zCuxUW
# G54br0RgmeGxIVDOT0cRbs0h6F/3kKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDTPcAuL+fjg4AU1nR4S+ZFmOTa3GN1rp7MIpT3X8q6TQIGZbqeumbd
# GBMyMDI0MDIxMjE0MDg1OC4xNTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK
# AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI
# N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB
# v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt
# mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgfyxwZp+c+vX70BSPjKMOet7Uu1myB5NwFvo2RVKY9GgwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC
# Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l
# 63UJMA0GCSqGSIb3DQEBCwUABIICAEJWqJwa9lxf7rKfXKE513x7tifI2nZ5dbnQ
# KatG+4sEsckAW4lZeM+9MI3UooZd3/6czRMTT8sVooTyA6k5IqRXKjl/EfX5RuBu
# AKPSU/cLOgLNK7N053vF/Iub1nzQs9BdwtctWvg9zmY9zXLr6piupUGgUQQMxO5v
# MYL+JZSn29k6jtR4RPCKF8+8x1B9PyGA2WElAU6namVq43ljqJ8UbumIHj+vENsA
# /kPRMGsRDw5ftTajigJR9YPCtUYwv3afAOmnEihOhArPcEz3YGR+Uwr0jT90UFmd
# UZV/oyYLqHyp18q4J+bfSM389wheZek2kKwI5/hVxqqdShh/r3nooVu+ttgRsD7z
# z6iIdGgKPHRMu0+Vtjvy+cPvDcJMzmejEteSJXFz4S63+e+1wbnFpeVapVh3xHtt
# Bi9U0VUdgTiaDAWLlzxuVriqd6Gr+0xdFql1eQLzS8zaars4KX2CVwCBZKxEfmN0
# HJoJ15poDhvjV5r3OzG+h5NLyHRNEfCRquJtRXdchro76YQBbTxRkew/UN0r68ZO
# N//5mRZribDhpvq/2iqQG1T6ElbYcP8K54M37K5dh6rnc0rl+woPFQuQAD9NWPxQ
# bNchkQ0W6MDR2zDUZUl7gZH6QO28g4tzzikYYr1ghhtuvg47ckptHk6KturSP+RR
# lW8vwN/9
# SIG # End signature block
|
combined_dataset/train/non-malicious/578.ps1 | 578.ps1 |
function Submit-SPOCheckIn
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string]$targetPath
)
$targetPath = Join-SPOParts -Separator '/' -Parts $clientContext.Web.ServerRelativeUrl, $targetPath
$remotefile = $clientContext.Web.GetFileByServerRelativeUrl($targetPath)
$clientContext.Load($remotefile)
$clientContext.ExecuteQuery()
$remotefile.CheckIn("",[Microsoft.SharePoint.Client.CheckinType]::MajorCheckIn)
$clientContext.ExecuteQuery()
}
|
combined_dataset/train/non-malicious/3126.ps1 | 3126.ps1 |
function Send-WakeOnLan
{
[CmdletBinding()]
param(
[Parameter(
Position=0,
Mandatory=$true,
HelpMessage='MAC-Address of the remote computer which you want to wake up')]
[ValidateScript({
if($_ -match "^([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2})|([0-9A-Fa-f]{2}){6}$")
{
return $true
}
else
{
throw "Enter a valid MAC-Address (like 00:00:00:00:00:00)!"
}
})]
[String[]]$MACAddress,
[Parameter(
Position=1,
HelpMessage='Port which is used to send the MagicPacket (Default=7)')]
[ValidateRange(1,65535)]
[Int32]$Port=7,
[Parameter(
Position=2,
HelpMessage='Send MagicPacket over another Windows computer in a different subnet')]
[String]$UseComputer,
[Parameter(
Position=3,
HelpMessage='Credentials to authenticate agains a remote computer')]
[System.Management.Automation.PSCredential]
[System.Management.Automation.CredentialAttribute()]
$Credential
)
Begin{
}
Process{
[System.Management.Automation.ScriptBlock]$ScriptBlock = {
param(
$MACAddress,
$Port
)
foreach($MAC in $MACAddress)
{
$MACAddr = $MAC.Replace(':','').Replace('-','')
$MACAddrBytes = 0,2,4,6,8,10 | ForEach-Object { [System.Convert]::ToByte($MACAddr.Substring($_,2),16) }
$MagicPacket = (,[byte]255 * 6) + ($MACAddrBytes * 16)
try {
$UDPClient = New-Object System.Net.Sockets.UdpClient
$UDPClient.Connect(([System.Net.IPAddress]::Broadcast), $Port)
[void]$UDPClient.Send($MagicPacket, $MagicPacket.Length)
}
catch {
Write-Error -Message "$($_.Exception.Message)" -Category ConnectionError
}
}
}
$LocalAddress = @("127.0.0.1","localhost",".","$($env:COMPUTERNAME)")
if([String]::IsNullOrEmpty($UseComputer) -or ($LocalAddress -contains $UseComputer))
{
Invoke-Command -ScriptBlock $ScriptBlock -ArgumentList $MACAddress, $Port
}
else
{
if(-not(Test-Connection -ComputerName $UseComputer -Count 2 -Quiet))
{
Write-Error -Message "$UseComputer is not reachable!" -Category ConnectionError -ErrorAction Stop
}
try {
if($PSBoundParameters['Credential'] -is [PSCredential])
{
Invoke-Command -ComputerName $UseComputer -ScriptBlock $ScriptBlock -ArgumentList $MACAddress, $Port -Credential $Credential
}
else
{
Invoke-Command -ComputerName $UseComputer -ScriptBlock $ScriptBlock -ArgumentList $MACAddress, $Port
}
}
catch {
throw
}
}
}
End{
}
} |
combined_dataset/train/non-malicious/1405.ps1 | 1405.ps1 |
function Join-CIisVirtualPath
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true,Position=0)]
[string]
$Path,
[Parameter(Position=1)]
[string]
$ChildPath
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( $ChildPath )
{
$Path = Join-Path -Path $Path -ChildPath $ChildPath
}
$Path.Replace('\', '/').Trim('/')
}
|
combined_dataset/train/non-malicious/2260.ps1 | 2260.ps1 |
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")]
[ValidateNotNullOrEmpty()]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[string]$SiteServer
)
Begin {
try {
Write-Verbose -Message "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug -Message "SiteCode: $($SiteCode)"
}
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied" ; break
}
catch [System.Exception] {
Write-Warning -Message "Unable to determine SiteCode" ; break
}
}
Process {
$DeviceCollectionFolders = @("Application Management","Client Management","Compliance Management","Limiting Collections","Search Collections","Maintenance Windows","Mobile Device Management","Endpoint Protection","Power Management", "OS Deployment", "Software Updates")
foreach ($DeviceCollectionFolder in $DeviceCollectionFolders) {
try {
$Instance = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ObjectContainerNode").CreateInstance()
$Instance.ObjectType = 5000
$Instance.Name = $DeviceCollectionFolder
$Instance.ObjectTypeName = "SMS_Collection_Device"
$Instance.ParentContainerNodeID = 0
$Instance.SearchFolder = $false
$Instance.SourceSite = $SiteCode
$Instance.Put() | Out-Null
$ValidateFolderCreation = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_ObjectContainerNode -ComputerName $SiteServer -Filter "Name like '$($DeviceCollectionFolder)'" | Select-Object -ExpandProperty Name
if ($ValidateFolderCreation -match $DeviceCollectionFolder) {
Write-Output "INFO: Successfully created the '$($DeviceCollectionFolder)' device collection folder"
}
}
catch {
Write-Warning -Message $_.Exception.Message
}
}
}
|
combined_dataset/train/non-malicious/sample_8_56.ps1 | sample_8_56.ps1 | ConvertFrom-StringData @'
id_provisioningmode_activity=Checking Configuration Manager Client Issues
id_provisioningmode_status=Detecting if the Client is in Provisioning Mode
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAkkK7vPXwDu7Wn
# rb6N/Xm3RC1fII14QHYZDuOhjCsT0KCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBI7mNTxOsqb16SwOnOsE3nY
# gB5L1WzmaixJbiMr8RGPMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdqocj2LoYAfx1+j3rHoDsZvG7Z7J9EUPwt+bqBhilrRs8ow2DDO10TBJ
# wCYAMCNbN4KQVrypR2FOUrVQdswuuLmKp0o6JILhpZCIvM/KRE4IKzTv4yVeMEtm
# SM9ii230iSgqYA1pPtOsBmihSh0NHiu1EaBvaq/5T58JQoFF/quS7BgYJTQdrVn5
# qUNAYa03ycN8JuwoaX0I8ihtUxFhM2jwDdBJhhNqJRQm3D3dOKfC9MP4XDig+uk2
# V/X2yQ9CWd/DDujub8jxmHbI3QxmwCZWRusTM3oSQX/kJT5nuuWIri2QscIbzX79
# 3tVsq6522hm64saJURfb0RRxE9jSEqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCAqcTn9U1zAau2jaEevM1/q8D3obgwNKC/tOyDqXlm9AIGZus6esnw
# GBMyMDI0MTAyODExNDA0My41NzZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT
# j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt
# gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh
# 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY
# X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd
# F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI
# J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc
# QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry
# 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn
# Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5
# olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+
# Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ
# I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf
# hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI
# hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut
# Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8
# cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo
# riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt
# g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A
# W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm
# Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe
# bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w
# MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9
# YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK
# AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch
# wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL
# Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq
# gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu
# 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy
# dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo
# dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgb782aEWtMWAS
# SSCWBDrCW/1o5Wmw1cKMqAJw+xW7ddgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5
# MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB
# CwUABIICADilO/4LeqqLQgAVRA8PiyI09AnYENcGsJ6EhPzPTMPhrpbSckVmTG7p
# AjVBX8+/J/1qz66c8P1C2e3itAdUIpWsXvJXAC6jsVSaHDXyI8uBVt+4EO9CfWZm
# yzlH70kHOtpJ727zYQaqVVGdfQquseLE5fQA3rZEw2M+Pmpe1KIav0P1h+e459GI
# gdhGWUqiIm0Yjl0UWQL0BJ9QyFCW/2ZqkSKmhLOxj/HMgzE6XipCCWo/Aw2KyTTl
# VSDB+fPhMV+bcIFnC1bDP/W7ZX0TiVPgpI9OTAJ8ZdG/O7wvhMpmjvSpkP12if8E
# 3oBrjVqhlebayLCFvl0Xg1NE0crJxOF/kQ0E6YtHnBxZ6HooNHb5es9Xpz63hrGv
# eRpiua7PmORpnZtfJ0K9P8PxjeEgvZC+IPTQt5lHRgsjwGz9bYWJmr9b7nACnv7O
# s6SuRgwH2kLZPc6fEcx0iQFVgVDNi198Hddl9mskj9djY25+MHvFyhMPmGoEFOD/
# JLfHaUvgqLghKHkcuclksB3Z2kd2ei/o9LTrl24uR4JPCpVxnD4q10yLOMEOY2iu
# XurP3Aqe538fj5eNIw8pfeOMqL2a2Wbi7CfZynzn3O25hJ47CxjMFD+2xbppuwLT
# iyr0P1o0hbwil2u6kTP2REluWMQ0qPCAUGOLynmcmpTQGpv4/MNj
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_50_6.ps1 | sample_50_6.ps1 | Manifest-Version: 1.0
Archiver-Version: Plexus Archiver
Built-By: vsts
Created-By: Apache Maven
Build-Jdk: 11.0.21
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FlexFunctionDe
ployHandler.html
SHA-256-Digest: uXPJcuXmM2bAu8SOYO8Imh4iFQADjsP4QepoUGPpO34=
Name: jquery/jszip-utils/dist/jszip-utils.js
SHA-256-Digest: wG92XzvtRWQ2qIGbTUH7pm5TfYjJDE9G65XWBMlAhuM=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-tree.h
tml
SHA-256-Digest: Lvu1MkemvsQVWHYUcIddU2Kfzf8nffCMitLDUy22sdY=
Name: com/microsoft/azure/toolkit/lib/appservice/function/AzureFunctio
ns.html
SHA-256-Digest: 7RDKSQw4AB67EbZ8hIZ3UVwrvCPHdIFdOJylKXtxr7g=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding
Template.html
SHA-256-Digest: Qr+Td+I29JQ0KI+6CZHYVRpQUIZj/T8pBrXOY+eTQHY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt
ils.html
SHA-256-Digest: JAe5SGaOjevGLdLkIvYz2GrFtrZ3nJNG0XuuSHEi7Tc=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/Depl
oyUtils.html
SHA-256-Digest: nyg+T7XMKsHXK78QmeJ7J2kQpjf8rSiYt/+tZRNVXVk=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer
vicePlanDraft.html
SHA-256-Digest: C3IguFTesg1Zl+DpEEb85e4mmE3JLO6E/HHcC9VaU/c=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p
ackage-summary.html
SHA-256-Digest: 00+UuHUFIj0luzpBT+hbhQsuyZVoQ1Jk+IBeC6hhpk0=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AzureF
unctionsAdminClient.html
SHA-256-Digest: E6M/NmIZ1piPUmoZscSTLELuXlhlZW8bakqgpLQ9J3I=
Name: com/microsoft/azure/toolkit/lib/appservice/model/OperatingSystem
.html
SHA-256-Digest: AztXlGUcjodkL2PLPuJHm8Jg6Ewr7po7D4WFjdLW4wo=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nAnnotation.html
SHA-256-Digest: DrZxrphIULKvZAZportDKe6H4yEpwxDZFlAziqW0C3E=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat
eMetadata.html
SHA-256-Digest: /2hPtIAHn4niY65j0atU6QVOoscFpUUtITERbqJKlXM=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo
ymentBuildStatus.html
SHA-256-Digest: 2C7NDOlhtJz8Hu+MCaQW5gOOYjEXX28PTwtEZ5eWQ9k=
Name: com/microsoft/azure/toolkit/lib/appservice/config/RuntimeConfig.
html
SHA-256-Digest: coJZ8AbhsHSTXBfq+BI0TXKSXVQr6gBe6OB09XQXCTg=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
.html
SHA-256-Digest: GzTBT6LbiTjAAfj9iJxKeQxu8alTJBtLpS6ubPxNX0M=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u
se/BindingEnum.html
SHA-256-Digest: S5aNXgdES9qQ9wfbvml6PQLcwaBzmCB1xITQ2vFnbhA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c
lass-use/FunctionConfiguration.html
SHA-256-Digest: 6ELBJmxoUbIaYjAs02o8t+dssBxuTH5iWD/q95hCb2A=
Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy
WebAppTask.html
SHA-256-Digest: vHh/2UXaEvsDsVY8Br1FqukJROis0rXpOVguln+dZ5A=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p
ackage-use.html
SHA-256-Digest: POqa2AP+Yg7bj5iPV/fGHjDvRuOXOGSGhuK3QMTNZbk=
Name: com/microsoft/azure/toolkit/lib/appservice/config/package-tree.h
tml
SHA-256-Digest: a1irLhgb0eFLwgiKBMiYIk8Xj3MPa6N0YSfNmc/oVzk=
Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan
Config.html
SHA-256-Digest: e92K6Ii/JxL8+eC/CFkAT2gBJdo6mOlyHbH2cH0Wq2U=
Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/AppS
erviceConfig.html
SHA-256-Digest: Zix6d8Oiu3IT0XynHJD8evPHLgZur81ahr3LrcLZCew=
Name: com/microsoft/azure/toolkit/lib/appservice/model/Runtime.html
SHA-256-Digest: OB2yFsUnmZ8FYh2zdvgv7HiGwQVoJ6CpQcbvlKxAPsk=
Name: constant-values.html
SHA-256-Digest: yt1ywA8E+msXB7UW/CBrU8hSirJGZGMQ6rKaqBUJnqE=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-use.ht
ml
SHA-256-Digest: ldAxA95Zb3XRDCTFYeidbLcFs+/rhQEtB46jlNRuDDg=
Name: com/microsoft/azure/toolkit/lib/legacy/docker/class-use/IDockerC
redentialProvider.html
SHA-256-Digest: cQrn2BtrbuEU7kq1WGZdSH4wN8m8yfYDHDCsUSYKvH8=
Name: stylesheet.css
SHA-256-Digest: MeHJ1ecg/OtbZWphNSIpo8tFUFr2xHtJeNy+ynZcs4M=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppBase.htm
l
SHA-256-Digest: dldCsQCU04Ef6C2O6LNg9dpcxUWuFATekwbrxdTcdFA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package
-summary.html
SHA-256-Digest: xH6BwUuSQIn71b+fuD5sAIY1Q34pFkbo7GmKfenJ2LY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/BindingTemplate.html
SHA-256-Digest: f5vRKgrJPShhZrEApIWjJtYEfxR13LnUeOKtImAz4ig=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif
act/package-tree.html
SHA-256-Digest: pPEFSR5uCX+OcoXvwBcW00UcIYUadWJQuWr8w3hK6uA=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/IAnnota
table.html
SHA-256-Digest: HIGPI60kBB4biGuJ/OJHgTYzVuezR16OjJKCQUpN9PE=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/JavaV
ersion.html
SHA-256-Digest: UP8sOHPvjppUYNkPczIYWKtXpue7gS8NoXDyx4LYs30=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/MSFu
nctionDeployHandler.html
SHA-256-Digest: FEcyzUbPw7C0u/vhB6gUT3l/0wbzYctOMAUgP10G2WU=
Name: deprecated-list.html
SHA-256-Digest: UCFt3+iB6yY9j9hMuN8sxE5b1rvvKpmFvgeZ5seb3Mk=
Name: member-search-index.zip
SHA-256-Digest: l02VZ+S9inu2e+JshPOAVk9dXLFEQAu908uoL0XiYXg=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/
CommandUtils.html
SHA-256-Digest: lk4YOfsgDhRikUToEyIcMdentHg7Z9QNMzloOjNLlXA=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo
yOptions.html
SHA-256-Digest: dWWuKvM4wbMb/EqI+CuR3pey97GToQGX6JjnsXnoF3I=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IFunctionDeplo
yHandler.html
SHA-256-Digest: vpUG4fJs0BwIBKh6I0JhiA8DManMCEJW3H3TlsUgxOw=
Name: jquery/jszip-utils/dist/jszip-utils-ie.min.js
SHA-256-Digest: eUSRsihgsqkme2Mn4Zy0XLmZ0pDxZ/fIcgT/wv+H5Fc=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nTemplates.html
SHA-256-Digest: 7xQ9BWFTPVxpbiqygXpnbW5VAUcbUgWpPRNoLIMDwXQ=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/LogLe
vel.html
SHA-256-Digest: F4QgXSvQoY6QyFdiyYwgWqvCFON3xRFtT9LJm2iwIGg=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
.html
SHA-256-Digest: 484FSbV4625Ve9wjxhzxt/uUIkp/K5AWxip0V7PUTyA=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer
viceKuduClient.KuduService.html
SHA-256-Digest: hz2cD3po7P/fMBtnfAG5AeRvePDmZfE1SFSOGCKrslU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u
se/BindingSerializer.html
SHA-256-Digest: iBD6aRzufzaacIwYD9l9MtNDesTWjKaPFRMG6Qpnlbo=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u
se/Binding.html
SHA-256-Digest: Sqk+ovl/V/DZyP5rm42z6jA8Ho1WDQeW0PxRv/tdTBE=
Name: legal/ASSEMBLY_EXCEPTION
SHA-256-Digest: pE63tcr1U0xu9TayHttAtNa6v5G/l9nUVZaGhhiyxvs=
Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceAppBase.htm
l
SHA-256-Digest: E1fDXVDnRo6OkjmFKwveq/Dk/9zA6FqSIKFMWa5fS3M=
Name: com/microsoft/azure/toolkit/lib/appservice/model/LogLevel.html
SHA-256-Digest: liK+2yl3wxT52S1gfVsslvefKOG+vDnAf5IhIy2cTo0=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/ExtendedCustomBinding.html
SHA-256-Digest: L9B5ag4k8T6MQMdCVPDW/A10R6gK71fIFcX5wYNE2iU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nTemplate.Function.html
SHA-256-Digest: YVu8Kz8YDgHihWeGDgdEKdL11zgqf3BZknjN9rY0n+Q=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif
act/FTPUploader.html
SHA-256-Digest: Gy2YUFVaPRFpnFquxIlRte8YVUdpNXUf3MHpj5q2XPE=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Az
ureFunctions.html
SHA-256-Digest: sHu7pPPEmFTFK9iynmJSsvLlUgBv93c8aiOUTyXh9QM=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackagerBase.html
SHA-256-Digest: SqLoow85EBwUjTpnPn6CBad0+vTKTs6riTWjECC0fik=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package
-tree.html
SHA-256-Digest: paHaUosh8xxBQXtVVoxIbCC7HlaiZxRbfEX4ULaI8oE=
Name: legal/jszip.md
SHA-256-Digest: my3h+rowtA0qwC0oFKwpVdz9AWiRCnt6/1QnjJ7hE7E=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Extende
dCustomBinding.html
SHA-256-Digest: s6ObvtikjUjOa1O/EarctF/vawPpNoywmApzur1nHeE=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppDeploymentSlotDraft.html
SHA-256-Digest: E9JuxVLyiukC6enB/setux/YEIGUhJx5o7Ru3RTqRZg=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Opera
tingSystem.html
SHA-256-Digest: joJDRCK+RcpCmfVfBLRl4kqEKVS/tDvX0O5dxhQ6FxU=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient.KuduService.html
SHA-256-Digest: rNG1NVkmgvZZ+Rl+eu2wDcdn5Y0WXOuEsjCzOc/z04g=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppDeploymentSlotDraft.Config.html
SHA-256-Digest: j2itUFQQMbAzvlvxTJaPHkopwmS3/ILg6iaCvXN+3Xk=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/FunctionTemplate.Function.html
SHA-256-Digest: GGxP5PcSfstQAc8Pb76/zX4ZH8XFSSeAsr4lXpIaldc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Diagn
osticConfig.html
SHA-256-Digest: Y7cyqlM+303OHz4KOdcX+2blEqARKiVSKk/1uIdVQ4I=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package
-use.html
SHA-256-Digest: xtpThfHdu+EGRkuNqYPtVwYf+yikfw23cFVI36xdfnY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u
se/AnnotationHandler.html
SHA-256-Digest: /AlOhoOtTN/Q2jmdkZhluk9fQGhz+JZlquaij/UGNJA=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif
act/package-use.html
SHA-256-Digest: 7AA2JQ8oy16sHWPJrudRl1g1Vo6A1s/TFeQ1WVvKbDM=
Name: com/microsoft/azure/toolkit/lib/appservice/IDeploymentSlotModule
.html
SHA-256-Digest: fJ/CpFF2X6NjWXqM4AN4ALMVFyzPaSm02mIy2HTe+CQ=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/DeployUtils.ht
ml
SHA-256-Digest: 0aiXz7NXzJfASi76S6mHIWH5URbhccEw0Syw/7N/Ks0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
etry.html
SHA-256-Digest: RO0Yj6uBDlzwAqA51cVBA8fi4qanLK0M4sY86r470zk=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlan.h
tml
SHA-256-Digest: JM/MFB7HuqcUjDaBNe4MzEHnz64AIv5Cij0MgMyFfrM=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppModule.h
tml
SHA-256-Digest: nHLjP4Dkp8HMjgtl11AZv+7uJHtkhhVhazCXXGTF7R0=
Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/AppS
ervicePlanConfig.html
SHA-256-Digest: 2h0JQGQThtCgy0pO8++2HIB2cpvGgLZihbZenvGSKsk=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer
vicePlan.html
SHA-256-Digest: 9c5DJL9WscSpjiNHaObmWftrkGhmrFlP6Mnw6rPnltk=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromZipFunc
tionDeployHandler.html
SHA-256-Digest: RhJf+kyw1NRQFsIlB7AnXLgXu6QpkDpui9iXAQcpz7M=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-use.ht
ml
SHA-256-Digest: KLM/N/eL1upaNmo71qwCHLkeyh8244YEHykaYqi1N24=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/FTPF
unctionDeployHandler.html
SHA-256-Digest: 5zpIuvkigGADUlDMEXRqP8EViX9OT8ul3kP++lkB1rc=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer
viceKuduClient.CommandRequest.html
SHA-256-Digest: UV0jky4NCtffFWS5XPINl8+PHpF7BLPYWRJXqlLrjF4=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/MSFunctionDepl
oyHandler.html
SHA-256-Digest: 2kHcXwYj7RPDs6PlvB/GAx8LOjajByyNPaist4897cA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-tr
ee.html
SHA-256-Digest: bHxdyvjOCxk4+DWs6DOBq5ENux8HLOTKyL+Tlv2GwfU=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/Utils.html
SHA-256-Digest: fU6MQ4d5yrFSBIzeBIzLeKc0rABD5JC1Afj6Rrjf48o=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-summar
y.html
SHA-256-Digest: YjJ7rIRa98K8+BHs5QaLTlGGWIrUniImHBICpN8j1rE=
Name: legal/pako.md
SHA-256-Digest: QHDjcrsDi/NcHOhII877usg69zA1eUbcj+270rem5Vw=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-summar
y.html
SHA-256-Digest: jHY/RkUQS4LtuEIfjJrY8xV8ec8DI6lO214d/Csik4E=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Extende
dCustomBinding.html
SHA-256-Digest: it6KpISnI2xh/aNw/K9Z2U8Bb1s6qgkd86VZ69rcj/o=
Name: com/microsoft/azure/toolkit/lib/appservice/package-tree.html
SHA-256-Digest: zXF+P3ve2rzEsC8b0idkgOsJ4aDLoQByxCeKB+5aae4=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-use.ht
ml
SHA-256-Digest: IuXJjUNT5hoHaeBjNPa2+3RuFYmfMCFuxmQuSXuw1us=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Enum.html
SHA-256-Digest: +iKSFBPX2iOmXRK1oCh/Hdp0Vung8aggrUEkrDuIZM4=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/Utils
.html
SHA-256-Digest: N+cBdYrqjuFNEee/kEHSqEcHvexgcuWFQvqvvJKVr0Q=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer
vicePlanModule.html
SHA-256-Digest: FDPH9VOO2Nc+CsvuDw26U5xuk1Goa23Fhx4xv/U7W0k=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-tree.htm
l
SHA-256-Digest: CFIdw8INjRWunAlOxG4kcWI6UrnOtGAqx9zb73UvZlo=
Name: com/microsoft/azure/toolkit/lib/appservice/file/IFileClient.html
SHA-256-Digest: e46XQdCODNdztPWPCT0dl60Uk4SDCW/LAMkGNYu69Sw=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanMo
dule.html
SHA-256-Digest: /FGNvNT0dMwaBOODEmREDzUAWX49P/EKFaZ0cWxsGpc=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB
ase.html
SHA-256-Digest: zfKswlPxQyqagzmHwCHrOiic+ecYS1AeFFKk55RpSGA=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package
-summary.html
SHA-256-Digest: KiNziK8ofctlfWqWL3/01QRFxwPV0vN7Cb2comSqvLM=
Name: com/microsoft/azure/toolkit/lib/legacy/function/class-use/Consta
nts.html
SHA-256-Digest: +mUTM9zCTQwrIDGofesCWA4Pr+SXKXQrCYXMZwJUGJk=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Validat
orTemplate.html
SHA-256-Digest: awMAcltU9rIZoE3b09ZBIlDK5cK1M4wmhtu8H52k95I=
Name: com/microsoft/azure/toolkit/lib/appservice/model/package-tree.ht
ml
SHA-256-Digest: T74oYoYJabPYb88LKjRU3XzETbD6KwfzilhMS+TXwW4=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployType.html
SHA-256-Digest: lRhfvk/mUgLmfFtjKSt0mzAnUsluItlQCsDxmbOQl8I=
Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile.
html
SHA-256-Digest: 1z7IpbOmlijvhjSa8l7Ljhx1m6EEY6UWbezien3MFmc=
Name: com/microsoft/azure/toolkit/lib/appservice/file/IProcessClient.h
tml
SHA-256-Digest: k0jluxdd2kBq1bDsUzgzIA84ox9vjHO1PT6iH+5L+TA=
Name: index.html
SHA-256-Digest: s8N+ckdqEQeAFP86K9Dv4wwPiRf+t/E8uwwNBCZmdUo=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package
-tree.html
SHA-256-Digest: mI45vYpeMGqscALojrHh53yaMh60YZ7Ry70or+9Kqhk=
Name: com/microsoft/azure/toolkit/lib/appservice/model/JavaVersion.htm
l
SHA-256-Digest: h8eaPpfYRhwusefGpvCjp7L8KoPEtCnJeuBvZT9+NHU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/BindingConfiguration.html
SHA-256-Digest: G4+3MuwCkgYzim5gdEgPveQFtPe5SaBnCTaS5EEe3Mg=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nAnnotationClass.html
SHA-256-Digest: gtaNGL9t43Bc8Wh4QeYtHZ996OUv9tViGYo6NEEZ7yU=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/class-u
se/DefaultFunctionProject.html
SHA-256-Digest: ayrOKVnoAHeas8wNDeaDiJYIAmXYsIjUfxZzZYTCGl8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F
unctionExtensionVersion.html
SHA-256-Digest: RqydAIqCUfJUYVknaE/Y9yq9oC5z52qZqK0Tco8WnEQ=
Name: com/microsoft/azure/toolkit/lib/legacy/function/class-use/AzureS
torageHelper.html
SHA-256-Digest: ASSBG8dcXtVNjHFXxD51Bfj7vTMKxIrXBBAKGVhzed4=
Name: jquery-ui.overrides.css
SHA-256-Digest: B/EGl0kMvmDh9FP0poteQX0pfC8t1R88vnk+VMPFdk0=
Name: com/microsoft/azure/toolkit/lib/appservice/file/package-use.html
SHA-256-Digest: ekNnrTqsbvxQfPZpNoLeuvN7c51A9BlKQhBeAihmB/Q=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceUtils
.html
SHA-256-Digest: Fy51ycftmEuEaHN2svNFs9lwaQCG1wlSI2q0YST24jg=
Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployFunctionAp
pTask.html
SHA-256-Digest: xxc/JYA50su1xtxmKvK/imOStDIz6nn0KpFc5A49/uM=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo
yType.html
SHA-256-Digest: ELG30PJHgaglDv0umu+F1GiA34RjmyQfgrkXIpyERFY=
Name: com/microsoft/azure/toolkit/lib/appservice/model/ProcessInfo.htm
l
SHA-256-Digest: ubRhYKKn2HHfySajcsLNLPqNWrZ2uXqGcvaR6qG6aZw=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-use.ht
ml
SHA-256-Digest: JR7Zm5bYDisyPxmfAAFiiz3D/ZhgVjGt/Z7nZz+xBxk=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackager.AzureFunctionPackagerHolder.html
SHA-256-Digest: Y8POvBzwz4HFrM4d2DNFlNzRIlRGnIQsRR+bQRb/qvU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/FunctionTemplate.html
SHA-256-Digest: 1IOTuS/0Mkjy9LoWCyi4WtHVulWJBAvG0OR7Bwf/dGw=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppDeploymentSlot.html
SHA-256-Digest: gNDSl2yMD2XB+1VFyNbOaOZJ0niGUZ9wjnTpE9tcHBI=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u
se/FunctionCoreToolsHandlerImpl.html
SHA-256-Digest: muh0YCx0SWBKLydGS9lflInXqlpqc0sbjyf/8DjjB9g=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebContainer.ht
ml
SHA-256-Digest: WEVHdZRE87y0gsPQ6V5AculE/QRBEOP1OmXa8Bo7jaU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u
se/FunctionCoreToolsHandler.html
SHA-256-Digest: Q6/BFRxV/HDnei7te6Bk9n7uymQIhkiIntYHwTXasWY=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/ZIPF
unctionDeployHandler.html
SHA-256-Digest: l1x1Pz5WsPvjLLjTuA0z0APd7aClPSDRRAucm/cjqqo=
Name: jquery/jszip/dist/jszip.js
SHA-256-Digest: X43686CAFKYNlMe7xpaBSB7ecqYmMH5AIivzcaptUZI=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u
se/BindingEnum.Direction.html
SHA-256-Digest: u+jNewi55BHn5aBteaywzfZc/j9qyKaWyuPodzvgT6I=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Factory.html
SHA-256-Digest: nl7gWcrU3AHS9o1pKm0OCwq6Uqidizm6EHDqhLoXES4=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/IFileC
lient.html
SHA-256-Digest: IRXEj4dCmcxBUUWWI2N8/hMmdIU64rJx4f3HtfvnAZQ=
Name: jquery/jquery-ui.min.css
SHA-256-Digest: z9VsdYFOjdR0vVO2IrGRUmUMVZXPPIv616hwOYUQXoo=
Name: com/microsoft/azure/toolkit/lib/legacy/function/package-use.html
SHA-256-Digest: /++MLSCXdQ3gx7P7kGSowkfplBQrRe9MsDyyfzea1Rg=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppDeploymentSlot.html
SHA-256-Digest: 1ac2XQj1qOIAl418upYaws+flAAuZbBYpQs5EXaz3G8=
Name: search.js
SHA-256-Digest: lr7xMOs5czMoN8+3p4987/vvCh+p+1wJxNc3R4l87DY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c
lass-use/Retry.html
SHA-256-Digest: bztSCzfKLQLNvtlWX6rexWbPe7NUNjpV9ir0SB9awLY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding
sTemplate.html
SHA-256-Digest: 7dnTKDZJNnHbIyDGu1RVWos1WlXC/TA7Mg89TGd27yA=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Runti
me.html
SHA-256-Digest: p+XbF7DLBAuU3INkmaSCM48tPDYrG5Kvvn4aYjxsDNo=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/FunctionSettingTemplate.SettingEnum.html
SHA-256-Digest: m9PLctkHj3ewyucHw3r8OXuVL8vTXjoNOL4GwsJNtpY=
Name: com/microsoft/azure/toolkit/lib/appservice/task/StreamingLogTask
.html
SHA-256-Digest: 5qqWVgzv52VfwCKtWFXW//2E2lVxtz1IZW1voY1RHog=
Name: index-all.html
SHA-256-Digest: yf6LqlMlLhmGTi67JVRC0ihPae5TbXZbKAgvH6h+2a0=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppServiceSubscription.html
SHA-256-Digest: Bb5s2phMClPhTVlCxCD1phsVWXbd1G+FDFdXvz2Y568=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppServiceS
ubscription.html
SHA-256-Digest: mW5hmeOCLXpbD9jzsEWfn1OorzoiN33r9iatxyyncd0=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppDraft.html
SHA-256-Digest: uaNjCxSEj7zJ1RoxzVaToAOB2HfNRAVbVHSmX/niam4=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionApp.html
SHA-256-Digest: sPIItbHTqRHAwUlNo/jwNgASIR9gvH1j/Cjmaj4bdz8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package
-summary.html
SHA-256-Digest: N2HPdAO6jYh70a8mB20/qB1XDUbnbEbVe50ZlHi+6XY=
Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile.
Type.html
SHA-256-Digest: bRZeGolAApGFy2tWiLuBHz3yc67cib+sU/dEQd+Ob/E=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package
-summary.html
SHA-256-Digest: zGtrE3miR/blyR4FToJyKq7bpiiTgHOGz4QSmnKgJzE=
Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact.
html
SHA-256-Digest: A6Mb4vxmbIDEtb8ztLZuGlQVNxVfNwELjthvNJ9yCk4=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppModule.html
SHA-256-Digest: 0BrutdwMVgD+0oyhcI6OIWBZaunVvYHWAQ9OULzzs2Y=
Name: com/microsoft/azure/toolkit/lib/appservice/model/TunnelStatus.ht
ml
SHA-256-Digest: tEhkbvYQMkGUgVQBg3yQE9wyD9EM3ebbEoG4V3PfyYo=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/AzureWebApp.ht
ml
SHA-256-Digest: OzuUn5EcfUfnGXtz7SV95/dRBb5vjDYYNYH0vAUYD8o=
Name: com/microsoft/azure/toolkit/lib/appservice/file/package-summary.
html
SHA-256-Digest: QMIWqTumLIGQk5LvqBDncE1Yho07oSUkhnU2BHqd9rE=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-tree.h
tml
SHA-256-Digest: Ht55RSEudPU+dq3pRYZyAdK8NeOGRyC7fn8i5wQu0NE=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/AzureFunctionPackager.html
SHA-256-Digest: W+/aSpfjnwd+nAg54Mf5gOVFiaX2TCvycQSaSFa0yec=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio
nCoreToolsHandler.html
SHA-256-Digest: hIRWnE3YA7znjsEEO2jl1Bz8L7WKsAdBoTn5VwO6+6Y=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u
se/AnnotationHandlerImpl.html
SHA-256-Digest: uRHJ6qJY3A4vsFWmt5rVPi7rV+I2R4U3+8xrTV28vmQ=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/FunctionProject.html
SHA-256-Digest: B8+iDQq/XT/l/2ncv+YqYAVlKIh4yf9DXcMtAvkznpU=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppDeploymentSlotDraft.Config.html
SHA-256-Digest: p0Z2yw4ixwqrmL8vGbAiGub6l4nbJBepFDLe8daxQvw=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer
vicePlanDraft.Config.html
SHA-256-Digest: oMzfVAi4VbxQEZfmxLBQ0NtFsDtvXSZ7GGE+1wi92MY=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentType
.html
SHA-256-Digest: ycMab6asZtiaDdogAs8BT1nz9PPD+RX6/ZMtvXPjKL0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package
-use.html
SHA-256-Digest: djRec/p3OgYBiGTqdBpIwUsUW304kuo5l8GtWa4DLrY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/
FunctionUtils.html
SHA-256-Digest: r9YJUAN41rIkphrw24WgUCCO1qMoGQSxPY+NCk3Cz30=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command
HandlerImpl.html
SHA-256-Digest: ZUvrZn7cbe8KOqMl6s64TJ4d2pdmBJJ01iEFkepejxc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/FunctionDeployT
ype.html
SHA-256-Digest: Tc/DKHENjGr/uE55gR23fL+SP5PLmAzU7YZ2xcTR1KM=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/FlexC
onsumptionConfiguration.html
SHA-256-Digest: wb3VNbOvNn4/W/mm439ULWd06F4EPEa3yRXwvq4Fqz0=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlotModule.html
SHA-256-Digest: evn9MZ7AvHnhuuVBaSOdOPMrQjZ1znhAxxtVcL7xH1E=
Name: com/microsoft/azure/toolkit/lib/appservice/AzureAppService.html
SHA-256-Digest: LG44sorQ6xxQ4foLgAtvuRqIfQwrUPaZeO1ukqZdWxw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlotDraft.html
SHA-256-Digest: +ZOxoHoCv7AIMWeSKofK+tpylEqnZ4GGwVq3iU4U7T8=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package
-tree.html
SHA-256-Digest: 8JBcbHaaqTXrngK/8snMOVqzY7SdlgH4n4tHooXTVUA=
Name: jquery/jszip-utils/dist/jszip-utils.min.js
SHA-256-Digest: w4cGturSH1Y26pt5KXp5dsWfjB/5JCv2da7l3OOSzpg=
Name: com/microsoft/azure/toolkit/lib/appservice/file/package-tree.htm
l
SHA-256-Digest: 8QEY8J0v2nQqUoJc4d7nCmYsMbeHa7AdfqfdLWoW5EU=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi
le.html
SHA-256-Digest: 5wGqhT0Z+HgeEYGWI8wVlsBChaw+pedHepqXLwxZuos=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package
-use.html
SHA-256-Digest: tW+JbgrIcWIUNsV5rT5cf/8Mv4u+m6m3RNGJifesPac=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif
act/class-use/FTPUploader.html
SHA-256-Digest: PSWTLjy8P9JCvZWgKbKHC9r+PvVyq/MHtzWR/WA29i0=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi
g.html
SHA-256-Digest: nwbW/D4i68RnKkuis13RB3BVK+IMJBP/Z0B4tQGZHuo=
Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask
.TrackDeploymentStatusTask.html
SHA-256-Digest: lP0QGC6lKLem1dEOiy+UjewLQ1vi1cM8ax8FHohMVXc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity.htm
l
SHA-256-Digest: wLRnDwktCM92z0/B/iz8/xiT4Od/A6TMsMqXUD2iU3s=
Name: legal/LICENSE
SHA-256-Digest: S5q+vEM4BIp8LcGE6fgA3rNJNmvfKOsjwmd6d7TIdyY=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/IAnnotatable.html
SHA-256-Digest: DYU8edYBsMDP9UGo/2HdjPp/mVmxaoGLOhpXOrAVKQI=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/IOne
Deploy.html
SHA-256-Digest: MslN7xtxUE+Cm2M2XY1Ed7FlPVKU1MeXdf8A0ZswCxw=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionPackager.html
SHA-256-Digest: OI+fCc02zKKqCSejbxcvDsQIf4bzggE9d2RTDvMCJrw=
Name: com/microsoft/azure/toolkit/lib/appservice/class-use/IDeployment
SlotModule.html
SHA-256-Digest: iwL/0eimx7uEWl8zo1JdFdIlYpwxaCSBvWgoMxd5QLU=
Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateWe
bAppTask.html
SHA-256-Digest: LWQeoHOo+6d1nYMPMJbamt7wfGl0YNTQnzoDa2CcIik=
Name: legal/ADDITIONAL_LICENSE_INFO
SHA-256-Digest: ppvOJ1uno1cK9lecsPVWgs11/t/NSeDo6QIicMRHyRY=
Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/Runt
imeConfig.html
SHA-256-Digest: 243gxh0vKoK4G8D7NHWeUkdUaw1k2FEKD1RMeudeVMs=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/RunF
romZipFunctionDeployHandler.html
SHA-256-Digest: fHd4EPjP6Qbxr0QxRMLNFbtFMZIzru9u6jGx/swZfik=
Name: jquery/jszip/dist/jszip.min.js
SHA-256-Digest: yeSlK6wYruTz+Q0F+8pgP1sPW/HOjEXmC7TtOiyy7YY=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/AppSe
rviceFile.Type.html
SHA-256-Digest: 9bkplwd8Mp53P7SS+jILcy47PY4FehcO9lf9kcyUx6E=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer
viceKuduClient.html
SHA-256-Digest: 7rnuqQGgvpiaVBsbVCLkzbFFFOHOTwP38DI9qzlWTi4=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/ValidatorTemplate.html
SHA-256-Digest: KYDRadletTF6AbeMUoel/62XGfbTuRHT+W4pJvhbAxc=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio
nCoreToolsHandlerImpl.html
SHA-256-Digest: W0jPbzRAGWQczuctZb/q3RfXlYQF2UdA3AxT1cstHO4=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/Funct
ionCliResolver.html
SHA-256-Digest: rzNhQNQuFjW5JfRqwop7RE2bBfAsfQMNxYS4pN8bVE0=
Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/Func
tionAppConfig.html
SHA-256-Digest: X4GzN3bzRO5hnLw7nRitSwU36CyVezhcEJYIkjMobOk=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Publi
shingProfile.html
SHA-256-Digest: ogrA46ds7GL1CKk2v6SNBMZzhVtPsIcyBOPprccNfMg=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/FunctionCliReso
lver.html
SHA-256-Digest: Lc+77/VK61O6jl4S0O5GipSPqB5o5+SDc2GZZk1F+kI=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeploymentBuild
Status.html
SHA-256-Digest: KCPErnAjgZ77j3UsbZ+gWwXYMcfpPY0YpXGZg30w2EU=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppDeploymentSlotDraft.html
SHA-256-Digest: m7JRFiVkbUzl524EOg1QIZ53fyr3IwxJPNX6YH7s8D0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/BindingsTemplate.html
SHA-256-Digest: yrnZ5ADxDbcqpIagXboX+7LKrKArAY8gOam8nolVHi0=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/WebAp
pArtifact.html
SHA-256-Digest: uUBSoaby7wEL6CMl8WEEBaKLHPSPWo0xVpDq23iCKCg=
Name: package-search-index.js
SHA-256-Digest: Hg9mEcKSASfFOiJsHPGkYvcCjCXO5++EgcbDnua3eJA=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/IProce
ssClient.html
SHA-256-Digest: m0fUAIwP/AsQ1U101ppHT10fyazjZN429jao7T49Z9Y=
Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceA
ppBase.html
SHA-256-Digest: 1fsnAXQd2jH5Z7v917kfjBRIwalRxTQJzxZRRJnZ6Lg=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nTemplate.html
SHA-256-Digest: Ca6gPOynHIIHe1+ucYYfXNYyTUO4la/lkHXD54Iy424=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-su
mmary.html
SHA-256-Digest: J7FrUFe1FASIS9ohT705RRoLDQAqF+0k8ZIxAhkbKB0=
Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-tree.html
SHA-256-Digest: U0J65rQo+SKxMch7IRS0JyV7MIUHV+6128LX1cjYcAA=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-summar
y.html
SHA-256-Digest: AaTZ+/H8bmdrXCBx7f9QfmMmder5+uLExAWoc7uU6W8=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Error
Entity.html
SHA-256-Digest: wiivvOtob0u3KJ/EJsKSAgW9OHCkbCMC1o+JsxJ2TTk=
Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Create
OrUpdateFunctionAppTask.html
SHA-256-Digest: V5sv/VvHhTukJviCi79LG7nbeMbWjPlv+bdsFjfLkzc=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlot.html
SHA-256-Digest: 3f/o5E+TQ860jR81mFh6yxqeKOhNCak5vQbxjC4/Lps=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F
unctionConfiguration.html
SHA-256-Digest: gZxH3LqrsSRF+0yxC0dBToE2wVRTssGQZvc+2dGZ8Hc=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-use.htm
l
SHA-256-Digest: V5+ZIin88njHhihc6gQS065JR6bH5MbD0V/Zr91gzME=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Serializer.html
SHA-256-Digest: I259nXOpZGkgPiBsq6+rEWVH/5WUBqq4wFwuQzNewBo=
Name: com/microsoft/azure/toolkit/lib/legacy/function/AzureStorageHelp
er.html
SHA-256-Digest: liARORsC30esbbbAMlEBBnY2G0iR0VKVhIGpKzH6B84=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/
DateUtils.html
SHA-256-Digest: yE/enA4qyZAoGJHewcAEtOXsDHX1IB1qVQXRMT42gYI=
Name: member-search-index.js
SHA-256-Digest: pGrvfxRrXULPJB1lxCCbuL47NbWcde0SuZtNT5QyFt8=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/ZIPFunctionDep
loyHandler.html
SHA-256-Digest: KWljD4gppUJqTB5ThYUkGdB9A7VCJ7jYJiONubKTf1Y=
Name: resources/glass.png
SHA-256-Digest: YNXwWfEcX2H3f2EqLILSqJ628lsZ1oxRrj4dROrXwco=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Docke
rConfiguration.html
SHA-256-Digest: xK7eA0q4QrqnA3DEIoEYQM2XpqCZs0hYO64RaL+PS8k=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppDraft.Config.html
SHA-256-Digest: oJLAnOXIRS8IJs9kR3RPh7MR7EmrxI/BL2WZdUYghJA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command
Handler.html
SHA-256-Digest: M+Tva97u+GQ98lMvWOkl8FOsKY3JNxIxCMVYBFuCFFo=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-tree.ht
ml
SHA-256-Digest: 2rENZP3nPwzSfa1/cRLB9qAEo8pG+mJeVtEUr5Skixw=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/AppSe
rviceConfigUtils.html
SHA-256-Digest: SwzbC6GG1HXksvTWpJzM0suLAPcmLb0sFw4kKVrlGqo=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/AzureFunctionsAnnotationConstants.html
SHA-256-Digest: sHA3Lc3/O1XCIs5Cc4h3/NohwnXyLYiY6qh+BKumDZ0=
Name: com/microsoft/azure/toolkit/lib/legacy/function/package-summary.
html
SHA-256-Digest: rSF5b+z8F3UFje7VfYu3QWTaZmD4BZLEQqzDkMA5OHg=
Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy
WebAppTask.TrackDeploymentStatusTask.html
SHA-256-Digest: eQnrGJuBC/XQtyvy183K8Lc/5lS2kKVgOJ+M42d5/9k=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/Flex
FunctionDeployHandler.html
SHA-256-Digest: sjhHG+2KGlQS6/wNG+nZ22GqrDWf7R1gPVtPehQZvbI=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppBase.html
SHA-256-Digest: oQboPGBVf+yvEf/ij6yptK7OnWC3wKhgbbtfxMT5vEI=
Name: allpackages-index.html
SHA-256-Digest: TJ1HZNQ4i5udqmgLpyXCISat6MyyRFSJN+UsbB5w2aQ=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionApp.
html
SHA-256-Digest: ZtUcbNL6Mx+3GoUmonOnFq1OPqaiBgAFyXyMYrV2Ecc=
Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceR
esourceModule.html
SHA-256-Digest: 9nLOg0Vzd+HvK0GcW6GFrp3dVpzz3xwmT9j6NxwAg3E=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu
nctionsAnnotationConstants.html
SHA-256-Digest: 6ABfo9JRPS9AnueJsiK4NPICjHfvBDiEpqamHjhyB48=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u
se/CommandHandlerImpl.html
SHA-256-Digest: XuNiVrM+Aqc6oQM1P1ZiThj/jqsDRsNva1xzwFlHMJg=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppModule.html
SHA-256-Digest: Wznj1BBnTVUdDtSnl7raAvMO6vs2m0FirFlFL+YF5wQ=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/CommandUti
ls.html
SHA-256-Digest: LaE/w8oy+bS36rhGgJrFwS8Pb0cmGxRQMuAjgbMFdg4=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions.h
tml
SHA-256-Digest: +y+SHgOXkG2F+WwPga1oko7H1VnY5Jkcc099M6kAZ8M=
Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AzureAppSer
vice.html
SHA-256-Digest: X/WEDuMNedN9etmQciM3vi7Oxp+dcuPFS9uHjGw7FiE=
Name: allclasses.html
SHA-256-Digest: KVnJOHwhTgkxCYtYL+PbhstqEiUoct3r0Mi+pn01bCE=
Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateFu
nctionAppTask.html
SHA-256-Digest: P7MuKPK66UYUgDnEZCzevUbZ0qwdqpIE/elWqhyXtRg=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlot.html
SHA-256-Digest: r/hEY7UcbxeVX0Yquatb4bUno3BI6U3GmIiGwHGtVoA=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.Co
nfig.html
SHA-256-Digest: GB+0UZeuG5489ZGgoBWiFV0K0sj3ErY7HYxy4PDOaA0=
Name: com/microsoft/azure/toolkit/lib/appservice/task/package-tree.htm
l
SHA-256-Digest: QlLfe0wgc/yjyEyKlg7eqmJwkAmV0KbRj9oMx43KF+g=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.ht
ml
SHA-256-Digest: 5bARRn68DAVPpZE2UuOvg80NUp4dTzODCYuipHmY88o=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-tree.h
tml
SHA-256-Digest: BqXmZ+jxqGwaIMPTkNwwLZjK/FsR5LdundHDtYjxcVc=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package
-use.html
SHA-256-Digest: FamPZzG5rDx248P9WgAhq5lIxtRuoCCL7znO9suuwQg=
Name: com/microsoft/azure/toolkit/lib/appservice/function/package-tree
.html
SHA-256-Digest: 2PFqB0lX8+9LbZaojTmGb6KInlneSDH2CqRSE1OfziY=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/RunF
romBlobFunctionDeployHandler.html
SHA-256-Digest: xMoe/L9szGpeCYHxqXo+w7xYTnnjPYS/+jlbNCeDvIE=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif
act/package-summary.html
SHA-256-Digest: iScnINaxyTA+/Vv2rkYHGTr3tEepxQqHToxNF2tradA=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd
minClient.FunctionsService.html
SHA-256-Digest: JJKIE8YqzVkweC9InII0u7MwylhAL2Pq4jN+f6gRaMg=
Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt
atus.html
SHA-256-Digest: hfEDo/Y8xESoQv3E4I6c7ZmkDmKWrhxKHPixXjLuC6E=
Name: com/microsoft/azure/toolkit/lib/appservice/package-summary.html
SHA-256-Digest: qJ+NR7XIFh3Kvi+K37mjseb2fzxmZYDCkUJ60RQYPNY=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/IFun
ctionDeployHandler.html
SHA-256-Digest: Tyhr3rZZ05McUOGhPKEqkW9yusSjxU0z9K1GJf8h72c=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/Azur
eWebApp.html
SHA-256-Digest: EUQxwD06lLecK6gB89SKs06R8oezGVOp7qYhxZr/CoY=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
eploymentSlotDraft.Config.html
SHA-256-Digest: kI41KFLZC8wQLHgFrkEyqql+uC/qd7MNdRqdTfYx/9c=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/AppSe
rviceUtils.html
SHA-256-Digest: cNMgnYPkho2fY4FpSeOGavpJKIrLniUIg8xJ32ZGZYY=
Name: com/microsoft/azure/toolkit/lib/appservice/function/package-use.
html
SHA-256-Digest: cPua6S6vmJaz56JpKNR19l/jbGh2v6C5yO7WsKeglXc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/CommandOutput.h
tml
SHA-256-Digest: v7P0wBUFMN4rP00WYrcFhcWp3i1Vjn5VkKoCDRa0apA=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppBase.html
SHA-256-Digest: xc9/N0DvE+0cRUnMBaxsPJHoYpBPMA9646qpJTn69Es=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-summary
.html
SHA-256-Digest: Hm4W6c8H/V7TbXU3LNFN0pM2kXpdDkVz5Ly2/8KCizE=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/FunctionAnnotationClass.html
SHA-256-Digest: kSit6P3pdl9qc1KF/kc/6s/ke31NsEq8dMX7LwoR56c=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p
ackage-tree.html
SHA-256-Digest: vPx9E64v2iuZjJs+/YpgStG6H78W0UJCs7Ufe66k2cU=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/FunctionAnnotation.html
SHA-256-Digest: EiwY9izXwRNg+UZbOji7K2368aOpe4qd+/UmPciW6+g=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package
-summary.html
SHA-256-Digest: jP0mzvzYLPfsQAlDpSFV0SthrX+z13UTr8U5b43nAJA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/TemplateResources.html
SHA-256-Digest: dFrtkxYR2zd/hKAC8ZvPdrU+EOfmGUa8b+94kN893WA=
Name: com/microsoft/azure/toolkit/lib/appservice/task/package-use.html
SHA-256-Digest: OKKSZ7fO+JhTSZzxJKm0uQWJrlvsSU8qQq4WyBMQ2uY=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package
-tree.html
SHA-256-Digest: i3GLp5LdteucTU57kz6vxXkOEAlORzDa7zoORBpuQ7k=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nSettingTemplate.SettingEnum.html
SHA-256-Digest: wK83rOQoe+V+upKU4tifIw0oE0nf4jevIXh5xyRsHBU=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
raft.Config.html
SHA-256-Digest: FiXknxl4YBhDPG/TjbNSfyDQQAfIOy9pzoMJgk/pp/8=
Name: jquery/jquery-ui.min.js
SHA-256-Digest: psCQRJnx7+7wVkG9KP18c3heYPac6caZ2vZa+LNyBwM=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio
nSettingTemplate.html
SHA-256-Digest: sOT0iomT6YBTiAwVEHAB69jwhIh3WaXF2xxxQ4lsUJs=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c
lass-use/RuntimeConfiguration.html
SHA-256-Digest: 32N2jOu8eknHp0Bif1hmLhdBpVIiTpm/pRHTZvcGAQU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-us
e.html
SHA-256-Digest: Xf8HWMYuQtc46uAu9RbV9/5Nic/xx0ZMXjiSiqnzbd8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/FunctionSettingTemplate.html
SHA-256-Digest: WzDHwZhV4eWqZj31Rty8JvAYDaSN8xuslYLpRgiq0Ro=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Prici
ngTier.html
SHA-256-Digest: CYvVhocEjucxE+IbN2Cp8S7kuy1NreOpC/5NW/wThOk=
Name: jquery/jquery-3.6.1.min.js
SHA-256-Digest: o88AwQnZB+VDvE9tvIXrMQaPlFFSUTR+nldQm1LuPXQ=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/class-use/Func
tionEntity.html
SHA-256-Digest: xFJZy3iuXQ//Ath/3ySiLq9wMM8pcXLgMbvBKhMIA+Q=
Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceS
erviceSubscription.html
SHA-256-Digest: oDn7n4feONL0nQ9a774afRyylz1iXwhxEMfBHDMA7U8=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/AzureFunctionPackager.AzureFunctionPackagerHolder.html
SHA-256-Digest: pUtfCt6T7NR6nW8KvK3OqO4R+XP74I4Csk8kTp401XA=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FTPFunctionDep
loyHandler.html
SHA-256-Digest: rAAVS7LQiLfLGA5Tq6JaOKhN1P6/w9samq+bsIjbQJ4=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u
se/BindingFactory.html
SHA-256-Digest: l7QfTpuUQ3XIs4dkY9vwbtounE28iQvFOr3MYsGc5Ok=
Name: overview-summary.html
SHA-256-Digest: kz3lgBHnkUTUtKWL3/LOT40u6tigqY4jzhGs8Eu8v+M=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppDeploymentSlotModule.html
SHA-256-Digest: cUH3Twj9r2P1ueQ2B5vBVL5XG8Q3bIFeEYcxKNu57fE=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/WebCo
ntainer.html
SHA-256-Digest: 20mTvk9szlnO37z88WCjiCBtj2KwORE88OrvwdUfDbs=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppDeploymentSlotModule.html
SHA-256-Digest: vd8RgQoNexCUHVYlUKejxCarDDfNW7fsJRR6HWj3sRs=
Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura
tion.html
SHA-256-Digest: QM9KkZkdCMaJWjh2al8fh//q9hUjpoo9x0PRkc7w96A=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/class-use/Func
tionEntity.BindingEntity.html
SHA-256-Digest: P/OEJ18yiXLZR2BzV/D9vpMkUpkCaLdIKy4EeNaLlOw=
Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-use.html
SHA-256-Digest: IVqyrG2Y6ztLA/K+qAIxcn3PZ+Ws94zyU5PxXtHUM5c=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R
untimeConfiguration.html
SHA-256-Digest: nIyTzH9rD2Cdq0HjkwYAd2OGkJU/5Ui80UdRQt0X3GQ=
Name: com/microsoft/azure/toolkit/lib/legacy/function/Constants.html
SHA-256-Digest: fDDx9L05UYz4v7sqbi2Mr3AJFfALfkUYTq1IcCT0nXM=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-use.html
SHA-256-Digest: OnP/T7xJ3AZY5onEcHayRnnB0HsZSsuP3/2kF2RoEIg=
Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/DateUtils.
html
SHA-256-Digest: QbjdoDjBv0UOjeyJ0/kbjwoiTamYJ/WsG5MkqikPuR8=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebApp.html
SHA-256-Digest: Xl0zFJhjA0MI5UsdzjEA7VtRoFht5ZfoWCHA7XszNDE=
Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-summary.ht
ml
SHA-256-Digest: 40XNQPzujlz4czpcSCgqmvFsFp/FLEakfptNPEW5np8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u
se/CommandHandler.html
SHA-256-Digest: RyiL+hjmr8pK94c67vJt6jupQP4veEZtsX2iYPWAzz0=
Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity
.BindingEntity.html
SHA-256-Digest: 6qGXeIVD6mZmwNVW5xE3Ee1PcIG9psR6AMuTos8qFUQ=
Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceResourceMod
ule.html
SHA-256-Digest: pnooaL7RIhmMkd2uzW2YWUgSIl3XFyyz19BNsTaZx34=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr
aft.html
SHA-256-Digest: tnLAjuVLmms81Vqu7q6r3nvTIl/IiKJJJhFb/yliRto=
Name: allclasses-index.html
SHA-256-Digest: ATIMubhFAEGVtTMH2xF5zwhV6kakGd38Y+Qcymh90iI=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IOneDeploy.htm
l
SHA-256-Digest: PRugqRjzWeIPhTFkdDkk7dnaBUKJb0Zh/0V8PPnEYjA=
Name: com/microsoft/azure/toolkit/lib/appservice/model/package-use.htm
l
SHA-256-Digest: cn/9Llre+9RrAUrgO7H795qhyqRtxV3/HjZWGOShwv8=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
ppDraft.Config.html
SHA-256-Digest: q21qMJIonmzAu7v/QcIgpNeICE6KEspXhCsN9Xoh2IA=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/AppServiceUtil
s.html
SHA-256-Digest: RN1D70hXszJBElFskDy9tBISrVYTP+Gn1nLs2Fma8BU=
Name: legal/jqueryUI.md
SHA-256-Digest: uwoOievYJN9xRRa/ZLkQHGIIHks3bwD5KaWMCVVb8RE=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u
se/ExtendedCustomBinding.html
SHA-256-Digest: 5WLmLtzX+WARmvlF4LzvQVP4t5I896U4SVYKG68OA1g=
Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding
Enum.Direction.html
SHA-256-Digest: dx3ZO7B1B6l6dec+OkIz4OxsJuMcpA8oQS8chUdl1J0=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient.CommandRequest.html
SHA-256-Digest: DjmiG7ESFQ/P697LEZctpuze9hfCJCpxRxSKcefPd7g=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat
ionHandlerImpl.html
SHA-256-Digest: aUA0EEo0SOn3cZwXDYGRHArpx5GBXMy25fgnQjtLZrg=
Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Stream
ingLogTask.html
SHA-256-Digest: SRIW/4OXSvy1VE78ZgkKDSujHNCtRZUTxas0SF3sdR8=
Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c
lass-use/FunctionExtensionVersion.html
SHA-256-Digest: 4udaEjGWgVNSx8bNtJ5pQdtmBCccQMMWknpFfjUkXKI=
Name: com/microsoft/azure/toolkit/lib/appservice/package-use.html
SHA-256-Digest: 1ZcY7TXSVzumS+Fob0KWn02sSTc0APqXJoFgn/1cX38=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Depl
oymentType.html
SHA-256-Digest: Fde5kZXX0+S8TFPGpyAR+ciuD3WbTzesZNDiZQ7y+2Y=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package
-use.html
SHA-256-Digest: ncLBYThh0NS+z+/v5nv/cGM54RX/epQgRdV+2KpxYd0=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlotModule.html
SHA-256-Digest: hAHb3nFqfOJg6rLivDvGOJcM/n6hSd7I6waz89MNQsk=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/KuduD
eploymentResult.html
SHA-256-Digest: DIrdUMu9oJD9zuyOE25cVCSxwMysXrhGcwdV2w/5f3I=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/TemplateMetadata.html
SHA-256-Digest: CBkioSx3PojnguaXN9z0C3Ibn7h7XiKu8lesaIVBJMs=
Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR
esult.html
SHA-256-Digest: Lcd+tlUwv3ERDMhbEUo3B7LMRpTr7gV9BmLEiI3v8sU=
Name: script.js
SHA-256-Digest: IHTktkz6w6F2GKad5HiS6BAjuXyvd+M8TbkEjfrBoJs=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Dock
erImageType.html
SHA-256-Digest: jvJLs3joaSAoS+OeVocu7002CQZTnjvHabSfEEkbfto=
Name: com/microsoft/azure/toolkit/lib/appservice/model/package-summary
.html
SHA-256-Digest: iBGvMaU/osyCzgFImXqSuKJ1sakSMWszwYqoJ7qm1yA=
Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default
FunctionProject.html
SHA-256-Digest: 4L6amkmP0ZUivuP1xu8fxveLnYDLKEoiTh/NZqbDmoQ=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/AzureFunctionPackagerBase.html
SHA-256-Digest: uU8zPDgCFbB8R4idEE6xIExsdiFisqF4v+G3IsWS/G8=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionsSer
viceSubscription.html
SHA-256-Digest: 0j2kWfidfDSFg1aVihPywiWijlQWw85JfKpnrp3Z0ug=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding
Configuration.html
SHA-256-Digest: ZuvK3DMiRz4grwFIvmdG0pKHbtf1XkYR+PnM7UAvrgU=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package
-tree.html
SHA-256-Digest: t2lxn58vHQs4KI2+F5ADIMiOppkIKP9sbp+8YDABfbc=
Name: resources/x.png
SHA-256-Digest: An8O0oMpY0vmRZMuGrfDIb8nuM+vmu0w8sv17kR4lSs=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/CsmDe
ploymentStatus.html
SHA-256-Digest: nMQx+EBDxebUZsw0/t8txXdKw+J0anNR+qQ4jtn8LZc=
Name: com/microsoft/azure/toolkit/lib/legacy/docker/IDockerCredentialP
rovider.html
SHA-256-Digest: mHZeGRDlM3ybIqGNdFvN12hUSsNOXt1pDLb9OtaaTew=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppM
odule.html
SHA-256-Digest: /qRVPIhAgZKKYRQIHeuxJiMdo9p5+mhBJsQp2fXhm58=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Tunne
lStatus.html
SHA-256-Digest: UcxyW12GIEyueIT51RvQNNMUXGeq3V+qxdPdx8zlOBI=
Name: serialized-form.html
SHA-256-Digest: yr3sXiu8sxY5rikeHnQPAO+PsfnF/+zpyojkqMkGYyc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/AppSe
rviceFile.html
SHA-256-Digest: 1qCf9vlW5VywN419/Ngw+cCBsyYRNbZMeeJqu6Bqn4k=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nMethod.html
SHA-256-Digest: gq8O4UY66DLFTCAd2T6w6Hdk1QwNiMPa3MC7lx3UqC4=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl
ient.html
SHA-256-Digest: 7s9n0dH47atUVi8IkaIkeph5ZdXl9aQqt4NmQjFrHAE=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Proce
ssInfo.html
SHA-256-Digest: K6Hsjn75aKV7GLmVH1jyzQmTPnorm58Y6HqpwSH3zX8=
Name: legal/jquery.md
SHA-256-Digest: BxaUNoLGJP0vSbOnGKLtTWOG6HL+dB8cdZVzriRQnT4=
Name: help-doc.html
SHA-256-Digest: MQNeaNtN0RfDcebgtTu6i6rB5yo8btk+GbhwkarPEWE=
Name: jquery/external/jquery/jquery.js
SHA-256-Digest: QWo7LDvxbWT2tbbQ97B53yJnYU3WhH/C8ycbRAkjPDc=
Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption
Configuration.html
SHA-256-Digest: R3bXTP+PhjrGNMZ1MoJ+1F22lEi3r6EWtm+qPNKfvXk=
Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceConfi
gUtils.html
SHA-256-Digest: HHTcGl9c4KEpZohxTDtq8FrzZF99Tlt2sPsn36ctbcU=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionsServiceSubscription.html
SHA-256-Digest: dnO/eDOtvjpxIYq+MzimoqIaq045o5l0FuVGzmDmILM=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlotDraft.Config.html
SHA-256-Digest: HKQmNrytPguuiFyJuv00re15GfGQwTSorrR5v+uGcrk=
Name: com/microsoft/azure/toolkit/lib/appservice/task/package-summary.
html
SHA-256-Digest: KU71nEd9a6M/h+9p5yseGAXpi0bTzwLx3VGO3xocsyU=
Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy
FunctionAppTask.html
SHA-256-Digest: +418BcgBsSQq/AiaeRcwhXOVwnSEdP44cfG93oYxanM=
Name: com/microsoft/azure/toolkit/lib/appservice/function/package-summ
ary.html
SHA-256-Digest: FzF9Qb0fkCYxADpv5250EfQXq5820qmfipaeSs1L05k=
Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD
raft.html
SHA-256-Digest: glaYlOwq9Z+QUNox2FWxTt99cx25QLa6P+7ufYWZV3M=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentSlot
Setting.html
SHA-256-Digest: 0O4AaQSnnb8xj8lTFyL7BC+vT6lQ05sDiLPrapmO+CY=
Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd
minClient.html
SHA-256-Digest: fD0PqFrHjWzFcXCrEZgsZ9TkIapCNw17lwFlCzeCjGc=
Name: type-search-index.zip
SHA-256-Digest: IBG/0sqKLv1yRcEzh9p41ZFk7jI8nz11gPJsCbtHfVQ=
Name: element-list
SHA-256-Digest: h7C+CF7VrplHJ0Sb/KCfrBLjrCAZWil+FVn+YU290pg=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/AppS
erviceUtils.html
SHA-256-Digest: VXnIl5zgTpdiMKc9GvUlWwZNnTrykvd8RlssceByGIA=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u
se/FunctionTemplates.html
SHA-256-Digest: TItpoOGccXl2cZrCYlMohjo+w69U8UD3phihM59bQb0=
Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AzureF
unctionsAdminClient.FunctionsService.html
SHA-256-Digest: FjHY4b0QaDSGeLDm1Tb7PAsBUNyDHD3L2h5CrzgxZIg=
Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServiceConf
ig.html
SHA-256-Digest: vO+pEz5NybR039Le/PJD/lpfXrd69/bCQHQfwpZIj3A=
Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat
eResources.html
SHA-256-Digest: 9b2ifPN47Vcbs45+GhT1Zl8ld2l5qG6T8VQIARNQLmU=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-summary.
html
SHA-256-Digest: zwyvTca7U/ysaaDIr0SgeQHMU7sk3X1wxNGXJq4w8nA=
Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr
aft.Config.html
SHA-256-Digest: YK1NkAdTqAr8qVtXseNaeaoDSNFB6KGvidYltVNKh/w=
Name: overview-tree.html
SHA-256-Digest: VM20v89uXRAk1F2WEEEPY//MEYPm/BLG/DhjJU1puBg=
Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromBlobFun
ctionDeployHandler.html
SHA-256-Digest: XkVdyKbQrqCUXkPYzteMBl3dQBxZd36AYIoTYHVBLto=
Name: com/microsoft/azure/toolkit/lib/appservice/config/package-summar
y.html
SHA-256-Digest: G+QMYs28ULfxAiL0TT9jeMDK633xSwR6UUTYTtplb2k=
Name: com/microsoft/azure/toolkit/lib/legacy/function/package-tree.htm
l
SHA-256-Digest: xMBv9ZPFG6oRqNqfJvDeAOe12xkS22pdMyVWw2sg4Bk=
Name: com/microsoft/azure/toolkit/lib/appservice/config/FunctionAppCon
fig.html
SHA-256-Digest: 0icn5ZG2mY/MNipyXhZuGhDYFlpDvRgmYVAUpkAM5gY=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Funct
ionDeployType.html
SHA-256-Digest: o7Tnce9ewdqQTqUYgnehRvw03B14IanogxXIOu8YPBY=
Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu
nctionAppDraft.html
SHA-256-Digest: pEg1gRNonF8R7PL11LpiiTlh0YVmjk6QMCLi+5SrojQ=
Name: com/microsoft/azure/toolkit/lib/appservice/config/package-use.ht
ml
SHA-256-Digest: 2DG/CAsx0fNcYtI/mF2h0YV7uL3B4fZTWW8GGs+51h0=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio
nProject.html
SHA-256-Digest: D0VK1Xlgy0XGCwggEvDbt1VDH6s3gI+ehOWvkVFfO90=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme
ntSlotDraft.html
SHA-256-Digest: /PAFBhPvZSD42Ttdf1xJCvR+lZRdHbkwlpR8A1hbZJc=
Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA
pp.html
SHA-256-Digest: OvCDXLndFCFwNshe7QI9Do2x+1ATTQot6F4Yc2REAo0=
Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask
.html
SHA-256-Digest: TrMBqwZoclZh+6m6DKaTI7QxXa9KZ2g9CDRMFf5q/UE=
Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat
ionHandler.html
SHA-256-Digest: 5vx5PgPk5kbe2FFX20lQNvTDVIIP2jVS+vbvSCe7NdQ=
Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Create
OrUpdateWebAppTask.html
SHA-256-Digest: ntw86HZrlwW5+BUyx2DAPYSX4uElHd6Q8e9T/utYPHg=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Depl
oymentSlotSetting.html
SHA-256-Digest: YPhloIugkJApY+pL4zeHdrjQL20/OnXdMBDWpILr4Kw=
Name: jquery/jszip-utils/dist/jszip-utils-ie.js
SHA-256-Digest: DOhExMICw1LjIQph/AkQA5pwcIRTsNtvKdTalJbycR4=
Name: package-search-index.zip
SHA-256-Digest: it5YuGRCgCok2H1/B2z7EGJSZaXyENqLfegDdMTJZ2M=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-summar
y.html
SHA-256-Digest: dWVEbLJdObk6Vx6Knlux8qJRPYAHLXTnKHhE5LLcGbA=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DockerImageTyp
e.html
SHA-256-Digest: 6b8cvqotKvIJLSBp/tN4Zsu880L38SRNJgC0MICFYGo=
Name: com/microsoft/azure/toolkit/lib/appservice/model/PricingTier.htm
l
SHA-256-Digest: SKEpdibs5kWTxNwE6Ev0xFEcO35ZVfVdUPQGBuiNTlg=
Name: type-search-index.js
SHA-256-Digest: YUl7zPJtCk3LmX2vY1Ex3OAhJtbe0dCJkF1JiX4LkTk=
Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u
se/FunctionMethod.html
SHA-256-Digest: i4zu3c8YF0w3bCDHZ/ZeYSiBdhnNupJYPHFGuE9R+vw=
Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-tree.h
tml
SHA-256-Digest: 9vkdtfs0ZhFUMT3NCAjpzkwQ0tLRljj9LAoWdH8BouI=
Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Comma
ndOutput.html
SHA-256-Digest: wFVGVz2GY2eP1DIdkeO/cCpYqBH9SAhaXoJtnDDWbbA=
Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceServiceSubs
cription.html
SHA-256-Digest: V0b84HeozWQPW8gH3Wb7rpsspI2AFKJSx7fToB4MiCQ=
|
combined_dataset/train/non-malicious/3611.ps1 | 3611.ps1 |
function Get-BandwidthScheduleName
{
return getAssetName
}
function Test-GetNonExistingBandwidthSchedule
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$bwname = Get-BandwidthScheduleName
Assert-ThrowsContains { Get-AzDataBoxEdgeBandwidthSchedule -ResourceGroupName $rgname -DeviceName $dfname -Name $bwname } "not find"
}
function Test-CreateBandwidthSchedule
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$bwname = Get-BandwidthScheduleName
$bwRateInMbps = 45
$bwStartTime = "11:00:00"
$bwStopTime = "13:00:00"
$bwDaysOfWeek = "Sunday,Saturday"
try
{
$expected = New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -Bandwidth $bwRateInMbps
Assert-AreEqual $expected.Name $bwname
}
finally
{
Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname
}
}
function Test-UpdateBandwidthSchedule
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$bwname = Get-BandwidthScheduleName
$bwRateInMbps = 45
$bwStartTime = "14:00:00"
$bwStopTime = "15:00:00"
$bwDaysOfWeek = "Sunday,Saturday"
$bwNewRateInMbps = 95
try
{
New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -Bandwidth $bwRateInMbps
$expected = Set-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -Bandwidth $bwNewRateInMbps
Assert-AreEqual $expected.BandwidthSchedule.RateInMbps $bwNewRateInMbps
}
finally
{
Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname
}
}
function Test-CreateUnlimitedBandwidthSchedule
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$bwname = Get-BandwidthScheduleName
$bwStartTime = "17:00:00"
$bwStopTime = "19:00:00"
$bwDaysOfWeek = "Sunday,Saturday"
$bwUnlimitedRateInMbps = 0
try
{
$expected = New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -UnlimitedBandwidth $true
Assert-AreEqual $expected.BandwidthSchedule.RateInMbps $bwUnlimitedRateInMbps
}
finally
{
Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname
}
}
function Test-RemoveBandwidthSchedule
{
$rgname = Get-DeviceResourceGroupName
$dfname = Get-DeviceName
$bwname = Get-BandwidthScheduleName
$bwRateInMbps = 45
$bwStartTime = "11:00:00"
$bwStopTime = "13:00:00"
$bwDaysOfWeek = "Sunday,Saturday"
try
{
$expected = New-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname -DaysOfWeek $bwDaysOfWeek -StartTime $bwStartTime -StopTime $bwStopTime -Bandwidth $bwRateInMbps
Assert-AreEqual $expected.Name $bwname
Remove-AzDataBoxEdgeBandwidthSchedule $rgname $dfname $bwname
}
finally
{
Assert-ThrowsContains { Get-AzDataBoxEdgeBandwidthSchedule -ResourceGroupName $rgname -DeviceName $dfname -Name $bwname } "not find"
}
}
|
combined_dataset/train/non-malicious/sample_37_71.ps1 | sample_37_71.ps1 | #
# Module manifest for module 'OCI.PSModules.Mysql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Mysql.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ad8c5447-7619-4d20-8318-cfb7688ec98d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Mysql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mysql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlBackup',
'Get-OCIMysqlBackupsList', 'Get-OCIMysqlChannel',
'Get-OCIMysqlChannelsList', 'Get-OCIMysqlConfiguration',
'Get-OCIMysqlConfigurationsList', 'Get-OCIMysqlDbSystem',
'Get-OCIMysqlDbSystemsList', 'Get-OCIMysqlHeatWaveCluster',
'Get-OCIMysqlHeatWaveClusterMemoryEstimate', 'Get-OCIMysqlReplica',
'Get-OCIMysqlReplicasList', 'Get-OCIMysqlShapesList',
'Get-OCIMysqlVersionsList', 'Get-OCIMysqlWorkRequest',
'Get-OCIMysqlWorkRequestErrorsList',
'Get-OCIMysqlWorkRequestLogsList', 'Get-OCIMysqlWorkRequestsList',
'Invoke-OCIMysqlResumeChannel', 'Move-OCIMysqlBackupCompartment',
'New-OCIMysqlBackup', 'New-OCIMysqlChannel',
'New-OCIMysqlConfiguration', 'New-OCIMysqlDbSystem',
'New-OCIMysqlHeatWaveClusterMemoryEstimate', 'New-OCIMysqlReplica',
'Remove-OCIMysqlBackup', 'Remove-OCIMysqlChannel',
'Remove-OCIMysqlConfiguration', 'Remove-OCIMysqlDbSystem',
'Remove-OCIMysqlHeatWaveCluster', 'Remove-OCIMysqlReplica',
'Reset-OCIMysqlChannel', 'Restart-OCIMysqlDbSystem',
'Restart-OCIMysqlHeatWaveCluster', 'Start-OCIMysqlDbSystem',
'Start-OCIMysqlHeatWaveCluster', 'Stop-OCIMysqlDbSystem',
'Stop-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlBackup',
'Update-OCIMysqlChannel', 'Update-OCIMysqlConfiguration',
'Update-OCIMysqlDbSystem', 'Update-OCIMysqlHeatWaveCluster',
'Update-OCIMysqlReplica'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mysql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_25_14.ps1 | sample_25_14.ps1 | ConvertFrom-StringData -StringData @'
AdapterNotFound = 找不到指定适配器:{0}
InvalidParams = 无效的参数集。请参阅 cmdlet 帮助以查看有效的参数集。
InvalidParamsAdapterAndName = 您无法指定名称和适配器参数。
InvalidParamsConfigAndModule = 您无法指定 Module 和 Configuration 参数。
InvalidModule = {0}:{1} 不是有效的模块名称。请使用以下命令查看有效模块 "Get-IntelEthernetLogConfig -Name "{0}""
InvalidSetting = {0}:{1} 不是有效的设置名称。请使用以下命令查看有效设置:"Get-IntelEthernetSetting -Name "{0}""
InvalidObject = {0} : 不是有效对象。请参阅 cmdlet 帮助,查看有效对象类型。
InvalidSettingValueGeneric = 此设置不能修改,因为指定的值对此设备或设置无效。
InvalidParamsAdapterOrName = 您必须指定名称或适配器参数。
InvalidParamsConfigOrModule = 您必须指定 Module 或 Configuration 参数。
InvalidLevel = {0}:{1} 不是有效的级别名称。请使用以下命令查看每个模块的有效级别 "Get-IntelEthernetLogConfig -Name "{0}" -Module "{2}" | fl"
InvalidLevelWildcard = 级别必须与一个日志级别匹配,但通配符字符串可以匹配超过一个。
InvalidDriverLevel = 您只能将驱动程序模块的“级别”设置为“标准”或“详细”。
InvalidSubModule = {0}:{1} 不是有效的子模块值。请阅读此 cmdlet 的完整帮助,以查看支持的子模块值列表。
InvalidCluster = {0} : {1} 不是有效的集群名称。请查阅此 cmdlet 的完整帮助来查看支持的 -Cluster 名称。
FailedToReadCluster = 读取集群 {0} 错误。
LogmanRunning = 记录已运行 {0}。
LogmanFileExists = 文件已存在 {0}。请指定 -Force 覆盖文件或 -Append 添加到已有文件,或选择不同的文件名。
PathIncorrect = 指定的路径不存在或您没有访问它的权限。请指定有效的路径。
NoLogsStarted = 没有开始 {0} 的日志。
OperationFailed = {0}:此设备上 {1} 操作失败。请重试。
NoCmdletSupport = {0}:此设备不支持此 cmdlet 或没有支持它的驱动程序。
NoConfigurationSupport = {0}:此设备不支持 Configuration 参数。
FolderFileNameExits = 已有文件夹的名称与您指定的文件名相同。请指定其它名称。
InvalidConfigurationName = {0}:{1} 不是有效的配置名称。请查阅此 cmdlet 的完整帮助来查看支持的 -Configuration 名称。
GenericFailure = {0}:此设备上 {2} 的 {1} 操作失败。请重试。
NotSupported = 不支持
NotAvailable = 不可用
Unknown = 未知
MiniHelpNotFound = 无法找到该设置的帮助内容。
IdentifyPortDisabledOrLowPower = 无法执行此命令,因为该设备已被禁用,或者处于低功耗状态。
InvalidSettingValue = {0}: {1} 不是 {2} 的有效值。请使用以下命令确定有效值:"Get-IntelEthernetSetting -Name "{0}" -RegistryKeyword "{2}" | fl"
WritingDebugDump = 写入调试转储
RegisterCountersSuccess = {0}:已成功注册计数器组。
RegisterCountersFailure = {0}:注册计数器组失败。
UnregisterCountersSuccess = {0}:已成功注销计数器组。
UnregisterCountersFailure = {0}:注销计数器组失败。
InvalidSystemConfigFailure = 此 cmdlet 不支持当前系统配置。
ProfileXmlError = 从 PerformanceProfiles.xml 获取配置文件设置失败。请下载最新安装包,然后重试。
NoProfileSupport = {0}: 当前环境不支持指定的配置文件。请参阅 cmdlet 帮助。
TestSuccess = {0}:已成功运行测试。
TestFailure = {0}:运行测试失败。
TestResultPass = 通过
TestResultFail = 失败
AdapterStartFail = {0}:启动设备失败。
NotStarted = 未开始
InProgress = 正在进行
Done = 完成
MultiplePeers = 多个对等点
Backplane = 背板
QSFP = QSFP
QSFPDirectAttach = QSFP+ 直接连接
SFP = SFP
SFPDirectAttach = SFP+ 直接连接
SFP28DirectAttach = SFP28 直接连接
Copper = 铜质
CX4Copper = CX4 铜质
CopperT = 铜质-T
CopperTX = 铜质-TX
SGMII = SGMII
Fiber = 光纤
SRFiber = SR 光纤
LRFiber = LR 光纤
KXBackplane = KX/KX4 背板
XAUI = XAUI
AOCACC = AOC/ACC
BackplaneKR = 背板-KR
BackplaneKR1 = 背板-KR1
BackplaneKR2 = 背板-KR2
BackplaneKR2PAM4 = 背板-KR2-PAM4
BackplaneKR4 = 背板-KR4
BackplaneKR4PAM4 = 背板-KR4-PAM4
BackplaneKRPAM4 = 背板-KR-PAM4
BackplaneKRS = 背板-KR-S
BackplaneKX = 背板-KX
ChiptoChip = 芯片到芯片
DirectAttach = 直接连接
DirectAttachCP2 = 直接连接-CP2
DirectAttachCR = 直接连接-CR
DirectAttachCR1 = 直接连接-CR1
DirectAttachCR2 = 直接连接-CR2
DirectAttachCR4 = 直接连接-CR4
DirectAttachCRPAM4 = 直接连接-CR-PAM4
DirectAttachCRS = 直接连接-CR-S
FiberDR = 光纤-DR
FiberFR = 光纤-FR
FiberLR = 光纤-LR
FiberLR4 = 光纤-LR4
FiberLX = 光纤-LX
FiberSR = 光纤-SR
FiberSR2 = 光纤-SR2
FiberSR4 = 光纤-SR4
FiberSX = 光纤-SX
FiberX = 光纤-X
FullDuplex = 全双工
NotNegotiated = 未协商
Disabled = 禁用
Active = 活动
LinkUp = 链接畅通
LinkUpNotMax = 链接 - 此设备未以其能实现的最大速度链接
LinkDown = 链路断开
NotPresent = 不存在
NegLaneSpeed25 = 2.5 GT/秒
NegLaneSpeed50 = 5.0 GT/秒
NegLaneSpeed80 = 8.0 GT/秒
ISA = ISA
EISA = EISA
PCMCIA = PCMCIA
CardBus = CardBus
PCI = PCI
PCIX = PCI-X
PCIExpress = PCI Express
IOSF = IOSF
Normal = 正常
OverheatedStopped = 过热,适配器被停止
OverheatedReduced = 过热,链接速度减慢
PortA = A
PortB = B
PortC = C
PortD = D
Profile = 配置文件
CustomSettings = 自定义设置
StandardServer = Standard Server
WebServer = Web Server
StorageServer = Storage Server
VirtServer = Virtualization Server (Hyper-V*)
LowLatency = Low Latency
StorageVirt = Storage + Virtualization
Register = 注册
EEPROM = EEPROM
MacLoopback = MAC 循环
Interrupt = 中断
FIFO = FIFO
RunningTests = 正在运行测试...可能需要几分钟时间。请勿中断。
TestProgress = 正在运行测试第 {0} 部分,共 {1} 部分 - {2}
'@
|
combined_dataset/train/non-malicious/_1.168.1.1.ps1 | _1.168.1.1.ps1 | function Set-IPAddress {
param( [string]$networkinterface =$(read-host "Enter the name of the NIC (ie Local Area Connection)"),
[string]$ip = $(read-host "Enter an IP Address (ie 10.10.10.10)"),
[string]$mask = $(read-host "Enter the subnet mask (ie 255.255.255.0)"),
[string]$gateway = $(read-host "Enter the current name of the NIC you want to rename"),
[string]$dns1 = $(read-host "Enter the first DNS Server (ie 10.2.0.28)"),
[string]$dns2,
[string]$registerDns = "TRUE"
)
$dns = $dns1
if($dns2){$dns ="$dns1,$dns2"}
$index = (gwmi Win32_NetworkAdapter | where {$_.netconnectionid -eq $networkinterface}).InterfaceIndex
$NetInterface = Get-WmiObject Win32_NetworkAdapterConfiguration | where {$_.InterfaceIndex -eq $index}
$NetInterface.EnableStatic($ip, $subnetmask)
$NetInterface.SetGateways($gateway)
$NetInterface.SetDNSServerSearchOrder($dns)
$NetInterface.SetDynamicDNSRegistration($registerDns)
}
|
combined_dataset/train/non-malicious/sample_37_81.ps1 | sample_37_81.ps1 | @{
GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
NestedModules="Microsoft.PowerShell.Commands.Management.dll"
HelpInfoURI = 'https://aka.ms/powershell73-help'
FunctionsToExport = @()
AliasesToExport = @("gcb", "gtz", "scb")
CmdletsToExport=@("Add-Content",
"Clear-Content",
"Clear-ItemProperty",
"Join-Path",
"Convert-Path",
"Copy-ItemProperty",
"Get-ChildItem",
"Get-Clipboard",
"Set-Clipboard",
"Get-Content",
"Get-ItemProperty",
"Get-ItemPropertyValue",
"Move-ItemProperty",
"Get-Location",
"Set-Location",
"Push-Location",
"Pop-Location",
"New-PSDrive",
"Remove-PSDrive",
"Get-PSDrive",
"Get-Item",
"New-Item",
"Set-Item",
"Remove-Item",
"Move-Item",
"Rename-Item",
"Copy-Item",
"Clear-Item",
"Invoke-Item",
"Get-PSProvider",
"New-ItemProperty",
"Split-Path",
"Test-Path",
"Get-Process",
"Stop-Process",
"Wait-Process",
"Debug-Process",
"Start-Process",
"Test-Connection",
"Remove-ItemProperty",
"Rename-ItemProperty",
"Resolve-Path",
"Set-Content",
"Set-ItemProperty",
"Get-TimeZone",
"Stop-Computer",
"Restart-Computer")
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7VSKADi66xWJM
# 6HEA1fH30eG2InNZKlDJZkesFZvWeqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5sRkkqFV4tm2L8Ww9Nazk
# vwEuj6sw3rJoUClckmtaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASw9qPBr2D26c4DJUtEgR1sKtpXKZoemG32esSLn4w3MduZQq0+6+T9xw
# VErPr8+5fxrk4TSYNMEaOVNHNZ4DG2PbXpKoZvxTG8ohL/gZxPKzaa7wCMswzCXH
# bURyCt+ndFxHrpVQL2Mj1nTf0eyCIzcta7/Y/Nz4gkvC88t8SfTbTqt4e0CqbGuw
# R5vkBVdKTVJ6ufdCBCr5IP31ggm6NxcJVBB0xvMK5HZmY2Uw4KSSaL2ATExO/dpe
# 9+28PKGF5UMjMpFA2OBL6w2Q9yG6XaxWEgdTqlDtplOpkeROOcZ/FHpmatbhUWBE
# 6yGSzrMO83nn2TDas9ByOueXZIyMzKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAA0Xk9ogon3tGAm/+JwVPrmpcx7kI3uReVzIdjAxqClQIGZfxw4esg
# GBMyMDI0MDQwOTIzMDkxOS4zMjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOm/UNswIhgPMjAyNDA0MDkxMzMwMDNaGA8yMDI0MDQxMDEzMzAwM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6b9Q2wIBADAHAgEAAgIafjAHAgEAAgIRMzAKAgUA
# 6cCiWwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF1TLo09RllJVBPdJAmY
# hDxMj4u4iKFfvBfxZ5CdZ0cZT2ecwVvGjvsitRLgMp24VNJjfO0krTY2lI5tIGv9
# 5MgYhVcaaSiQ3zq7UZfYXNKkHbFk/zmz3ds/Tb1uKnxjFxxyOMsKsC2rwCXgTIYp
# crItCpqbnJClYmSe6q/zgV6bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg7C61CMM3eBvuTubgeGVcCQjzpNVvJ/8eRiiet/KMCzIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIGp7S/NCvSBFp5jvm90RMPGYMAgx20Oc3b9Hsk0n2AWM
# MA0GCSqGSIb3DQEBCwUABIICAGJVc5OirAoizuLVrA731Te3fhPexJ2MGQgIizsA
# XhuynJp4BwkhL3pjIxLaOLTBwFIrHzTL6CBvkWXhyKr4d3CUElC1CfLwsUN3MjA/
# wXK3/TYwlElODIym98si/z45TXhK6ExJ5/k5TwfIEi8wX1DeQ0nj7AnFZRgCKcS1
# C5rStZxsC33sbXOdIGlHskbCgfLj/Db5nFPHCJk7F/SDBYoOEPzEvwgwYCRGF3Ah
# TSyKaeJK3LNAMUlwU+Pu3ZJk8C5OmvYPmBwpgtHkvvR2fw42uINw27sFs8zSDVJ9
# /4VtFsveL3PsS7w11hpczjD4HzqpxQRVmePBko2q8BvjlLRhdPbR0GC6bo60SY2M
# r/vfY2zicsIuxHrD2yBlF8+7PQyEBTljTHJK2SkoRoUwFBfhu3vWRZMkWNRJlGrp
# 3/S9E3681zaigjmtP3E9E6Y/P9jp5jXYaUUsLeygx5CpDB/wUiZ1szHPcb7R746N
# 5AZdKNpD4Z27f8V/t7RkDbsUbbyzaHzJC48Q5dU9ev/UAqvyLUwOsv/K1cag+OTE
# w3owb5218TeZADkK84KzvZDBGK8NQwp/hq5V7VcQWoEsHM+WOHLUTJT1Q3bQLtWn
# BKBFfUO145lwAmjQoX9KGAlNIj1JKIVawf+vkyeL7x34njpA8rLdjgMN5pkdDEI9
# Wmnz
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_31_52.ps1 | sample_31_52.ps1 | #!powershell
# Copyright: (c) 2018, Wojciech Sciesinski <wojciech[at]sciesinski[dot]net>
# Copyright: (c) 2017, Daniele Lazzari <lazzari@mailup.com>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
#Requires -Module Ansible.ModuleUtils.Legacy
# win_psmodule (Windows PowerShell modules Additions/Removals/Updates)
$params = Parse-Args -arguments $args -supports_check_mode $true
$check_mode = Get-AnsibleParam -obj $params -name "_ansible_check_mode" -type "bool" -default $false
$name = Get-AnsibleParam -obj $params -name "name" -type "str" -failifempty $true
$required_version = Get-AnsibleParam -obj $params -name "required_version" -type "str"
$minimum_version = Get-AnsibleParam -obj $params -name "minimum_version" -type "str"
$maximum_version = Get-AnsibleParam -obj $params -name "maximum_version" -type "str"
$repo = Get-AnsibleParam -obj $params -name "repository" -type "str"
$repo_user = Get-AnsibleParam -obj $params -name "username" -type "str"
$repo_pass = Get-AnsibleParam -obj $params -name "password" -type "str"
$state = Get-AnsibleParam -obj $params -name "state" -type "str" -default "present" -validateset "present", "absent", "latest"
$allow_clobber = Get-AnsibleParam -obj $params -name "allow_clobber" -type "bool" -default $false
$skip_publisher_check = Get-AnsibleParam -obj $params -name "skip_publisher_check" -type "bool" -default $false
$allow_prerelease = Get-AnsibleParam -obj $params -name "allow_prerelease" -type "bool" -default $false
$accept_license = Get-AnsibleParam -obj $params -name "accept_license" -type "bool" -default $false
$force = Get-AnsibleParam -obj $params -name "force" -type "bool" -default $false
$result = @{changed = $false
output = ""
nuget_changed = $false
repository_changed = $false
}
# Enable TLS1.1/TLS1.2 if they're available but disabled (eg. .NET 4.5)
$security_protocols = [System.Net.ServicePointManager]::SecurityProtocol -bor [System.Net.SecurityProtocolType]::SystemDefault
if ([System.Net.SecurityProtocolType].GetMember("Tls11").Count -gt 0) {
$security_protocols = $security_protocols -bor [System.Net.SecurityProtocolType]::Tls11
}
if ([System.Net.SecurityProtocolType].GetMember("Tls12").Count -gt 0) {
$security_protocols = $security_protocols -bor [System.Net.SecurityProtocolType]::Tls12
}
[System.Net.ServicePointManager]::SecurityProtocol = $security_protocols
Function Install-NugetProvider {
Param(
[Bool]$CheckMode
)
$PackageProvider = Get-PackageProvider -ListAvailable | Where-Object { ($_.name -eq 'Nuget') -and ($_.version -ge "2.8.5.201") }
if (-not($PackageProvider)) {
try {
Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force -WhatIf:$CheckMode | Out-Null
$result.changed = $true
$result.nuget_changed = $true
}
catch [ System.Exception ] {
$ErrorMessage = "Problems adding package provider: $($_.Exception.Message)"
Fail-Json $result $ErrorMessage
}
}
}
Function Install-PrereqModule {
Param(
[Switch]$TestInstallationOnly,
[bool]$AllowClobber,
[Bool]$CheckMode,
[bool]$AcceptLicense,
[string]$Repository
)
# Those are minimum required versions of modules.
$PrereqModules = @{
PackageManagement = '1.1.7'
PowerShellGet = '1.6.0'
}
$ExistingPrereqModule = Get-Module -Name @($PrereqModules.Keys) -ListAvailable |
Where-Object { $_.Version -ge $PreReqModules[$_.Name] } |
Select-Object -ExpandProperty Name -Unique
$toInstall = $PrereqModules.Keys |
Where-Object { $_ -notin $ExistingPrereqModule } |
Select-Object @{N = 'Name'; E = { $_ } }, @{N = 'Version'; E = { $PrereqModules[$_] } }
if ($TestInstallationOnly) {
-not [bool]$toInstall
}
elseif ($toInstall) {
$result.changed = $true
if ($CheckMode) {
$result.output = "Skipped check mode run on win_psmodule as the pre-reqs need upgrading"
Exit-Json $result
}
# Need to run this in another process as importing PackageManagement at
# the older version is irreversible (you cannot load the same dll at
# different versions). Start-Job runs in a new process so it can safely
# use the older version to install our pre-reqs.
# https://github.com/ansible-collections/community.windows/issues/487
$job = Start-Job -ScriptBlock {
$ErrorActionPreference = 'Stop'
$Repository = $using:Repository
foreach ($info in $using:ToInstall) {
$install_params = @{
Name = $info.Name
MinimumVersion = $info.Version
Force = $true
}
$installCmd = Get-Command -Name Install-Module
if ($installCmd.Parameters.ContainsKey('SkipPublisherCheck')) {
$install_params.SkipPublisherCheck = $true
}
if ($installCmd.Parameters.ContainsKey('AllowClobber')) {
$install_params.AllowClobber = $using:AllowClobber
}
if ($installCmd.Parameters.ContainsKey('AcceptLicense')) {
$install_params.AcceptLicense = $using:AcceptLicense
}
if ($Repository) {
$install_params.Repository = $Repository
}
Install-Module @install_params > $null
}
}
try {
$null = $job | Receive-Job -AutoRemoveJob -Wait -ErrorAction Stop
}
catch {
$ErrorMessage = "Problems adding a prerequisite module PackageManagement or PowerShellGet: $($_.Exception.Message)"
$result.exception = ($_ | Out-String) + "`r`n" + $_.ScriptStackTrace
Fail-Json $result $ErrorMessage
}
}
}
Function Get-PsModule {
Param(
[Parameter(Mandatory = $true)]
[String]$Name,
[String]$RequiredVersion,
[String]$MinimumVersion,
[String]$MaximumVersion
)
$ExistingModule = @{
Exists = $false
Version = ""
}
$ExistingModules = Get-Module -ListAvailable | Where-Object { ($_.name -eq $Name) }
$ExistingModulesCount = $($ExistingModules | Measure-Object).Count
if ( $ExistingModulesCount -gt 0 ) {
$ExistingModules | Add-Member -MemberType ScriptProperty -Name FullVersion -Value {
if ( $null -ne ( $this.PrivateData ) ) {
[String]"$($this.Version)-$(($this | Select-Object -ExpandProperty PrivateData).PSData.Prerelease)".TrimEnd('-')
}
else {
[String]"$($this.Version)"
}
}
if ( -not ($RequiredVersion -or
$MinimumVersion -or
$MaximumVersion) ) {
$ReturnedModule = $ExistingModules | Select-Object -First 1
}
elseif ( $RequiredVersion ) {
$ReturnedModule = $ExistingModules | Where-Object -FilterScript { $_.FullVersion -eq $RequiredVersion }
}
elseif ( $MinimumVersion -and $MaximumVersion ) {
$ReturnedModule = $ExistingModules |
Where-Object -FilterScript { $MinimumVersion -le $_.Version -and $MaximumVersion -ge $_.Version } |
Select-Object -First 1
}
elseif ( $MinimumVersion ) {
$ReturnedModule = $ExistingModules | Where-Object -FilterScript { $MinimumVersion -le $_.Version } | Select-Object -First 1
}
elseif ( $MaximumVersion ) {
$ReturnedModule = $ExistingModules | Where-Object -FilterScript { $MaximumVersion -ge $_.Version } | Select-Object -First 1
}
}
$ReturnedModuleCount = ($ReturnedModule | Measure-Object).Count
if ( $ReturnedModuleCount -eq 1 ) {
$ExistingModule.Exists = $true
$ExistingModule.Version = $ReturnedModule.FullVersion
}
$ExistingModule
}
Function Add-DefinedParameter {
Param (
[Parameter(Mandatory = $true)]
[Hashtable]$Hashtable,
[Parameter(Mandatory = $true)]
[String[]]$ParametersNames
)
ForEach ($ParameterName in $ParametersNames) {
$ParameterVariable = Get-Variable -Name $ParameterName -ErrorAction SilentlyContinue
if ( $ParameterVariable.Value -and $Hashtable.Keys -notcontains $ParameterName ) {
$Hashtable.Add($ParameterName, $ParameterVariable.Value)
}
}
$Hashtable
}
Function Install-PsModule {
Param(
[Parameter(Mandatory = $true)]
[String]$Name,
[String]$RequiredVersion,
[String]$MinimumVersion,
[String]$MaximumVersion,
[String]$Repository,
[System.Management.Automation.PSCredential]$Credential = [System.Management.Automation.PSCredential]::Empty,
[Bool]$AllowClobber,
[Bool]$SkipPublisherCheck,
[Bool]$AllowPrerelease,
[Bool]$CheckMode,
[Bool]$AcceptLicense,
[Bool]$Force
)
$getParams = @{
Name = $Name
RequiredVersion = $RequiredVersion
MinimumVersion = $MinimumVersion
MaximumVersion = $MaximumVersion
}
$ExistingModuleBefore = Get-PsModule @getParams
if ( -not $ExistingModuleBefore.Exists ) {
try {
# Install NuGet provider if needed.
Install-NugetProvider -CheckMode $CheckMode
$ht = @{
Name = $Name
}
[String[]]$ParametersNames = @("RequiredVersion", "MinimumVersion", "MaximumVersion", "AllowPrerelease",
"Repository", "Credential")
$ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames
# When module require License Acceptance, or repository is Untrusted.
# `-Force` is mandatory to skip interactive prompt
$psgetModuleInfo = Find-Module @ht
if (($psgetModuleInfo.AdditionalMetadata.requireLicenseAcceptance -eq "True") -or
((Get-PSRepository -Name $psgetModuleInfo.Repository).InstallationPolicy -eq "Untrusted")) {
$ht["Force"] = $true
}
else {
$ht["Force"] = $Force
}
$ht = $ht + @{
WhatIf = $CheckMode
AcceptLicense = $AcceptLicense
}
[String[]]$ParametersNames = @("AllowClobber", "SkipPublisherCheck")
$ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames
Install-Module @ht -ErrorVariable ErrorDetails | Out-Null
$result.changed = $true
$result.output = "Module $($Name) installed"
}
catch [ System.Exception ] {
$ErrorMessage = "Problems installing $($Name) module: $($_.Exception.Message)"
Fail-Json $result $ErrorMessage
}
}
else {
$result.output = "Module $($Name) already present"
}
}
Function Remove-PsModule {
Param(
[Parameter(Mandatory = $true)]
[String]$Name,
[String]$RequiredVersion,
[String]$MinimumVersion,
[String]$MaximumVersion,
[Bool]$CheckMode
)
# If module is present, uninstalls it.
if (Get-Module -ListAvailable | Where-Object { $_.name -eq $Name }) {
try {
$ht = @{
Name = $Name
Confirm = $false
Force = $true
}
$ExistingModuleBefore = Get-PsModule -Name $Name -RequiredVersion $RequiredVersion -MinimumVersion $MinimumVersion -MaximumVersion $MaximumVersion
[String[]]$ParametersNames = @("RequiredVersion", "MinimumVersion", "MaximumVersion")
$ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames
if ( -not ( $RequiredVersion -or $MinimumVersion -or $MaximumVersion ) ) {
$ht.Add("AllVersions", $true)
}
if ( $ExistingModuleBefore.Exists) {
# The Force parameter overwrite the WhatIf parameter
if ( -not $CheckMode ) {
Uninstall-Module @ht -ErrorVariable ErrorDetails | Out-Null
}
$result.changed = $true
$result.output = "Module $($Name) removed"
}
}
catch [ System.Exception ] {
$ErrorMessage = "Problems uninstalling $($Name) module: $($_.Exception.Message)"
Fail-Json $result $ErrorMessage
}
}
else {
$result.output = "Module $($Name) removed"
}
}
Function Find-LatestPsModule {
Param(
[Parameter(Mandatory = $true)]
[String]$Name,
[String]$Repository,
[System.Management.Automation.PSCredential]$Credential = [System.Management.Automation.PSCredential]::Empty,
[Bool]$AllowPrerelease,
[Bool]$CheckMode
)
try {
$ht = @{
Name = $Name
}
[String[]]$ParametersNames = @("AllowPrerelease", "Repository", "Credential")
$ht = Add-DefinedParameter -Hashtable $ht -ParametersNames $ParametersNames
$LatestModule = Find-Module @ht
$LatestModuleVersion = $LatestModule.Version
}
catch [ System.Exception ] {
$ErrorMessage = "Cant find the module $($Name): $($_.Exception.Message)"
Fail-Json $result $ErrorMessage
}
$LatestModuleVersion
}
# Check PowerShell version, fail if < 5.0 and required modules are not installed
$PsVersion = $PSVersionTable.PSVersion
if ($PsVersion.Major -lt 5 ) {
$PrereqModulesInstalled = Install-PrereqModule -TestInstallationOnly
if ( -not $PrereqModulesInstalled ) {
$ErrorMessage = -join @(
"Modules PowerShellGet and PackageManagement in versions 1.6.0 and 1.1.7 respectively "
"have to be installed before using the win_psmodule."
)
Fail-Json $result $ErrorMessage
}
}
if ( $required_version -and ( $minimum_version -or $maximum_version ) ) {
$ErrorMessage = "Parameters required_version and minimum/maximum_version are mutually exclusive."
Fail-Json $result $ErrorMessage
}
if ( $allow_prerelease -and ( $minimum_version -or $maximum_version ) ) {
$ErrorMessage = "Parameters minimum_version, maximum_version can't be used with the parameter allow_prerelease."
Fail-Json $result $ErrorMessage
}
if ( $allow_prerelease -and $state -eq "absent" ) {
$ErrorMessage = "The parameter allow_prerelease can't be used with state set to 'absent'."
Fail-Json $result $ErrorMessage
}
if ( ($state -eq "latest") -and
( $required_version -or $minimum_version -or $maximum_version ) ) {
$ErrorMessage = "When the parameter state is equal to 'latest' you can't use any of required_version, minimum_version, maximum_version."
Fail-Json $result $ErrorMessage
}
if ( $repo ) {
$RepositoryExists = Get-PSRepository -Name $repo -ErrorAction SilentlyContinue
if ( $null -eq $RepositoryExists) {
$ErrorMessage = "The repository $repo doesn't exist."
Fail-Json $result $ErrorMessage
}
}
if ($repo_user -and $repo_pass ) {
$repo_credential = New-Object -TypeName PSCredential ($repo_user, ($repo_pass | ConvertTo-SecureString -AsPlainText -Force))
}
if ( ($allow_clobber -or $allow_prerelease -or $skip_publisher_check -or
$required_version -or $minimum_version -or $maximum_version -or $accept_license) ) {
# Update the PowerShellGet and PackageManagement modules.
# It's required to support AllowClobber, AllowPrerelease parameters.
# This must occur before PackageManagement or PowerShellGet is imported in
# the current process.
Install-PrereqModule -AllowClobber $allow_clobber -CheckMode $check_mode -AcceptLicense $accept_license -Repository $repo
}
Import-Module -Name PackageManagement, PowerShellGet -Force
if ($state -eq "present") {
if ($name) {
$ht = @{
Name = $name
RequiredVersion = $required_version
MinimumVersion = $minimum_version
MaximumVersion = $maximum_version
Repository = $repo
AllowClobber = $allow_clobber
SkipPublisherCheck = $skip_publisher_check
AllowPrerelease = $allow_prerelease
CheckMode = $check_mode
Credential = $repo_credential
AcceptLicense = $accept_license
Force = $force
}
Install-PsModule @ht
}
}
elseif ($state -eq "absent") {
if ($name) {
$ht = @{
Name = $Name
CheckMode = $check_mode
RequiredVersion = $required_version
MinimumVersion = $minimum_version
MaximumVersion = $maximum_version
}
Remove-PsModule @ht
}
}
elseif ( $state -eq "latest") {
$ht = @{
Name = $Name
AllowPrerelease = $allow_prerelease
Repository = $repo
CheckMode = $check_mode
Credential = $repo_credential
}
$LatestVersion = Find-LatestPsModule @ht
$ExistingModule = Get-PsModule $Name
if ( ($LatestVersion.Version -ne $ExistingModule.Version) -or $force ) {
$ht = @{
Name = $Name
RequiredVersion = $LatestVersion
Repository = $repo
AllowClobber = $allow_clobber
SkipPublisherCheck = $skip_publisher_check
AllowPrerelease = $allow_prerelease
CheckMode = $check_mode
Credential = $repo_credential
AcceptLicense = $accept_license
Force = $force
}
Install-PsModule @ht
}
}
Exit-Json $result
|
combined_dataset/train/non-malicious/1840.ps1 | 1840.ps1 |
Describe "CredSSP cmdlet tests" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$powershell = Join-Path $PSHOME "pwsh"
$notEnglish = $false
$IsToBeSkipped = !$IsWindows;
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
if ( $IsToBeSkipped )
{
$PSDefaultParameterValues["it:skip"] = $true
}
else
{
if ([System.Globalization.CultureInfo]::CurrentCulture.Name -ne "en-US")
{
$notEnglish = $true
}
}
}
AfterAll {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
BeforeEach {
if ( ! $IsToBeSkipped )
{
$errtxt = "$testdrive/error.txt"
Remove-Item $errtxt -Force -ErrorAction SilentlyContinue
$donefile = "$testdrive/done"
Remove-Item $donefile -Force -ErrorAction SilentlyContinue
}
}
It "Error returned if invalid parameters: <description>" -TestCases @(
@{params=@{Role="Client"};Description="Client role, no DelegateComputer"},
@{params=@{Role="Server";DelegateComputer="."};Description="Server role w/ DelegateComputer"}
) {
param ($params)
{ Enable-WSManCredSSP @params } | Should -Throw -ErrorId "System.InvalidOperationException,Microsoft.WSMan.Management.EnableWSManCredSSPCommand"
}
It "Enable-WSManCredSSP works: <description>" -Skip:($NotEnglish -or $IsToBeSkipped) -TestCases @(
@{params=@{Role="Client";DelegateComputer="*"};description="client"},
@{params=@{Role="Server"};description="server"}
) {
param ($params)
$c = Enable-WSManCredSSP @params -Force
$c.CredSSP | Should -Be $true
$c = Get-WSManCredSSP
if ($params.Role -eq "Client")
{
$c[0] | Should -Match "The machine is configured to allow delegating fresh credentials to the following target\(s\):wsman/\*"
}
else
{
$c[1] | Should -Match "This computer is configured to receive credentials from a remote client computer"
}
}
It "Disable-WSManCredSSP works: <role>" -Skip:($NotEnglish -or $IsToBeSkipped) -TestCases @(
@{Role="Client"},
@{Role="Server"}
) {
param ($role)
Disable-WSManCredSSP -Role $role | Should -BeNullOrEmpty
$c = Get-WSManCredSSP
if ($role -eq "Client")
{
$c[0] | Should -Match "The machine is not configured to allow delegating fresh credentials."
}
else
{
$c[1] | Should -Match "This computer is not configured to receive credentials from a remote client computer"
}
}
It "Call cmdlet as API" {
$credssp = [Microsoft.WSMan.Management.EnableWSManCredSSPCommand]::new()
$credssp.Role = "Client"
$credssp.Role | Should -BeExactly "Client"
$credssp.DelegateComputer = "foo", "bar"
$credssp.DelegateComputer -join ',' | Should -Be "foo,bar"
$credssp.Force = $true
$credssp.Force | Should -Be $true
$credssp = [Microsoft.WSMan.Management.DisableWSManCredSSPCommand]::new()
$credssp.Role = "Server"
$credssp.Role | Should -BeExactly "Server"
}
}
Describe "CredSSP cmdlet error cases tests" -Tags 'Feature' {
It "Error returned if runas non-admin: <cmdline>" -Skip:(!$IsWindows) -TestCases @(
@{cmdline = "Enable-WSManCredSSP -Role Server -Force"; cmd = "EnableWSManCredSSPCommand"},
@{cmdline = "Disable-WSManCredSSP -Role Server"; cmd = "DisableWSManCredSSPCommand"},
@{cmdline = "Get-WSManCredSSP"; cmd = "GetWSmanCredSSPCommand"}
) {
param ($cmdline, $cmd)
$scriptBlock = [scriptblock]::Create($cmdline)
$scriptBlock | should -Throw -ErrorId "System.InvalidOperationException,Microsoft.WSMan.Management.$cmd"
}
}
|
combined_dataset/train/non-malicious/SyntaxHighlighter Brush_2.ps1 | SyntaxHighlighter Brush_2.ps1 | /**
* PowerShell 2.0 Brush for highlighter 2.0
*
* SyntaxHighlighter http://alexgorbatchev.com/wiki/SyntaxHighlighter
*
* @version
* 2.1.0 (April 07 2009)
*
* @copyright
* Copyright (C) 2008-2009 Joel Bennett http://HuddledMasses.org/
*
* @license
* This file is for SyntaxHighlighter.
*
* SyntaxHighlighter is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 2 of the License, or
* (at your option) any later version.
*
* SyntaxHighlighter is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with SyntaxHighlighter. If not, see <http://www.gnu.org/licenses/>.
*/
SyntaxHighlighter.brushes.PowerShell = function()
{
var keywords ='while validateset validaterange validatepattern validatelength validatecount ' +
'until trap switch return ref process param parameter in if global: '+
'function foreach for finally filter end elseif else dynamicparam do default ' +
'continue cmdletbinding break begin alias \\\\? % #script #private #local #global '+
'mandatory parametersetname position valuefrompipeline ' +
'valuefrompipelinebypropertyname valuefromremainingarguments helpmessage ';
var operators ='and as band bnot bor bxor casesensitive ccontains ceq cge cgt cle ' +
'clike clt cmatch cne cnotcontains cnotlike cnotmatch contains ' +
'creplace eq exact f file ge gt icontains ieq ige igt ile ilike ilt ' +
'imatch ine inotcontains inotlike inotmatch ireplace is isnot le like ' +
'lt match ne not notcontains notlike notmatch or regex replace wildcard';
var verbs = 'write where wait use update unregister undo trace test tee take suspend ' +
'stop start split sort skip show set send select scroll resume restore ' +
'restart resolve resize reset rename remove register receive read push ' +
'pop ping out new move measure limit join invoke import group get format ' +
'foreach export expand exit enter enable disconnect disable debug cxnew ' +
'copy convertto convertfrom convert connect complete compare clear ' +
'checkpoint aggregate add';
this.regexList = [
{ regex: SyntaxHighlighter.regexLib.singleLinePerlComments, css: 'comments' }, // one line comments
{ regex: new RegExp('@"\\\\n[\\\\s\\\\S]*?\\\\n"@', 'gm'), css: 'string' }, // double quoted here-strings
{ regex: new RegExp("@'\\\\n[\\\\s\\\\S]*?\\\\n'@", 'gm'), css: 'string' }, // single quoted here-strings
{ regex: new RegExp('"(?:\\\\$\\\\([^\\\\)]*\\\\)|[^"]|`"|"")*[^`]"','g'), css: 'string' }, // double quoted strings
{ regex: new RegExp("'(?:[^']|'')*'", 'g'), css: 'string' }, // single quoted strings
{ regex: new RegExp('[\\\\$|@|@@](?:(?:global|script|private|env):)?[A-Z0-9_]+', 'gi'), css: 'variable' }, // $variables
{ regex: new RegExp('(?:'+verbs.replace(/ /g, '\\\\b|\\\\b')+')-[a-zA-Z_][a-zA-Z0-9_]*', 'gmi'), css: 'functions' }, // functions and cmdlets
{ regex: new RegExp(this.getKeywords(keywords), 'gmi'), css: 'keyword' }, // keywords
{ regex: new RegExp(this.getKeywords(operators.replace(/ /g,' -')), 'gmi'), css: 'value bold' }, // operators
{ regex: new RegExp('\\\\s+-[a-zA-Z_][a-zA-Z0-9_]*', 'gmi'), css: 'color1' }, // parameters
{ regex: new RegExp('\\\\[[A-Z_\\\\[][A-Z0-9_. `,\\\\[\\\\]]*\\\\]', 'gi'), css: 'constants' } // .Net [Type]s
];
}
SyntaxHighlighter.brushes.PowerShell.prototype = new SyntaxHighlighter.Highlighter();
SyntaxHighlighter.brushes.PowerShell.aliases = ['monad', 'msh', 'powershell', 'PowerShell', 'Powershell', 'posh'];
|
combined_dataset/train/non-malicious/Invoke-ElevatedCommand.p.ps1 | Invoke-ElevatedCommand.p.ps1 | ##############################################################################\n##\n## Invoke-ElevatedCommand\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nRuns the provided script block under an elevated instance of PowerShell as\nthrough it were a member of a regular pipeline.\n\n.EXAMPLE\n\nPS >Get-Process | Invoke-ElevatedCommand.ps1 {\n $input | Where-Object { $_.Handles -gt 500 } } | Sort Handles\n\n#>\n\nparam(\n ## The script block to invoke elevated\n [Parameter(Mandatory = $true)]\n [ScriptBlock] $Scriptblock,\n\n ## Any input to give the elevated process\n [Parameter(ValueFromPipeline = $true)]\n $InputObject,\n\n ## Switch to enable the user profile\n [switch] $EnableProfile\n)\n\nbegin\n{\n Set-StrictMode -Version Latest\n $inputItems = New-Object System.Collections.ArrayList\n}\n\nprocess\n{\n $null = $inputItems.Add($inputObject)\n}\n\nend\n{\n ## Create some temporary files for streaming input and output\n $outputFile = [IO.Path]::GetTempFileName()\n $inputFile = [IO.Path]::GetTempFileName()\n\n ## Stream the input into the input file\n $inputItems.ToArray() | Export-CliXml -Depth 1 $inputFile\n\n ## Start creating the command line for the elevated PowerShell session\n $commandLine = ""\n if(-not $EnableProfile) { $commandLine += "-NoProfile " }\n\n ## Convert the command into an encoded command for PowerShell\n $commandString = "Set-Location '$($pwd.Path)'; " +\n "`$output = Import-CliXml '$inputFile' | " +\n "& {" + $scriptblock.ToString() + "} 2>&1; " +\n "Export-CliXml -Depth 1 -In `$output '$outputFile'"\n\n $commandBytes = [System.Text.Encoding]::Unicode.GetBytes($commandString)\n $encodedCommand = [Convert]::ToBase64String($commandBytes)\n $commandLine += "-EncodedCommand $encodedCommand"\n\n ## Start the new PowerShell process\n $process = Start-Process -FilePath (Get-Command powershell).Definition `\n -ArgumentList $commandLine -Verb RunAs `\n -WindowStyle Hidden `\n -Passthru\n $process.WaitForExit()\n\n ## Return the output to the user\n if((Get-Item $outputFile).Length -gt 0)\n {\n Import-CliXml $outputFile\n }\n\n ## Clean up\n Remove-Item $outputFile\n Remove-Item $inputFile\n}
|
combined_dataset/train/non-malicious/sample_66_59.ps1 | sample_66_59.ps1 | #
# Module manifest for module 'OCI.PSModules.Servicecatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Servicecatalog.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a52480f0-e7d7-4302-871e-ae7f3a42fc02'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Servicecatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicecatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIServicecatalog', 'Get-OCIServicecatalogApplicationsList',
'Get-OCIServicecatalogAssociation',
'Get-OCIServicecatalogAssociationsList',
'Get-OCIServicecatalogPrivateApplication',
'Get-OCIServicecatalogPrivateApplicationActionDownloadLogo',
'Get-OCIServicecatalogPrivateApplicationPackage',
'Get-OCIServicecatalogPrivateApplicationPackageActionDownloadConfig',
'Get-OCIServicecatalogPrivateApplicationPackagesList',
'Get-OCIServicecatalogPrivateApplicationsList',
'Get-OCIServicecatalogsList', 'Get-OCIServicecatalogWorkRequest',
'Get-OCIServicecatalogWorkRequestErrorsList',
'Get-OCIServicecatalogWorkRequestLogsList',
'Get-OCIServicecatalogWorkRequestsList',
'Invoke-OCIServicecatalogBulkReplaceServiceCatalogAssociations',
'Move-OCIServicecatalogCompartment',
'Move-OCIServicecatalogPrivateApplicationCompartment',
'New-OCIServicecatalog', 'New-OCIServicecatalogAssociation',
'New-OCIServicecatalogPrivateApplication',
'Remove-OCIServicecatalog', 'Remove-OCIServicecatalogAssociation',
'Remove-OCIServicecatalogPrivateApplication',
'Update-OCIServicecatalog',
'Update-OCIServicecatalogPrivateApplication'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicecatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_52_70.ps1 | sample_52_70.ps1 | ConvertFrom-StringData @'
FailoverClustersModuleRequired=A szükséges PowerShell-modul (FailoverClusters) nem található. A telepítéshez használja a Szerepkörök és szolgáltatások eszközt: Távoli kiszolgálófelügyelet eszközei | Szolgáltatásfelügyeleti eszközök | Feladatátvételi fürtszolgáltatás eszközei | Windows PowerShellhez készült Feladatátvevő fürt modul.
'@
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBkYDeREhmDjoCZ
# vHLtyAGeyDOnXhq6VQN0KsUtbcqfwaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAeL
# odDGZM7DI4T56SjEj4kX86bF0YG9TJlf3GtdDW4fMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAPy2q0zr4hqLU7NJJKAPcXsLgOW6s7I7ayNuE
# SnOwOMDF+1OoDvvViBH5lPrvTrZRhCfwcH1VQvlwwqKRekje6K8WJCqILFJQg2Vo
# HGa7E9o6doTnKha8EO3rdsPiAH4BsSwsRvfRlsiiyVA5aTwvCAglMut+lXemMyt9
# yiyGsloICj2vMXicy5jDguap452ADBG5wtHAlxuwDZPt8Myj/Qcm6SOvKE3XXBUn
# WcjRzQpekhjV0mT4kGGgYxoWiEwmP93C1RI8wOwwln9gKAtGv1NuYDkHeOtD7GlX
# IySl1IGlqA6yoD/2Hw1rtgwKudTMsGp17S8K5q6K/vQwFqceLqGCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC3pZu4aWjJUUHwhCQWRoD5pHzJqZ8bc2SL
# A229A+xGTwIGZa6UAEQkGBMyMDI0MDEyMjIxMzE1Ny42NTRaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHj372b
# mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k
# DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N
# EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35
# fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/
# jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB
# P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q
# Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs
# bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c
# Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo
# jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ
# 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb
# udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1
# 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0
# sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX
# JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL
# iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ
# 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms
# CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es
# DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq
# zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub
# 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy
# 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE
# 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOlZEnwwIhgPMjAyNDAxMjMwMDEyNDRaGA8yMDI0MDEy
# NDAwMTI0NFowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6VkSfAIBADAGAgEAAgEM
# MAcCAQACAhFgMAoCBQDpWmP8AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# uFdz42Rko9M3ivrv/uG3QvBrIXgucD09zUgAh5KiQvvTyJhIM6Ky1mxQUGa0HyFw
# HfBFnXeb4rzDjWWpQLXjdDMDU9SYh54v43gTXWsr6WQ3XDfxOY9cs749jpwQ4qiV
# 39UMOpCiwLQZJk+vL3LlOd/6HO9LSfAvYUbiofCpaPUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB
# 4zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBEREP6goX0IMoJzPzaATUmkNu7FtuypItTn/ZIep4v
# 3zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4
# MlxBt2Crw12PTHIy5iYqMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwIgQgFu6r6baMtOeWRTRsHtoLRxH0
# nvqB5p6LBtBECvyAHE4wDQYJKoZIhvcNAQELBQAEggIACDaHIWOJ0VAybUJl6xWc
# +Noir4d95+Hm5zDyu1dfKdpk+Myt2flx/zZ/OFoTV+MQTkjmKnlhYl1kwQc4CUoq
# 39oI/E0v0cTw7zvEl6ljX5Mvv4dw9GgKr9H1bmnSewBk31kukuCxDd1uNYBUMUZU
# QeRcMZYXrjAlq0dSe34xDRhoNKbRLkwbtRxDaYIwh9Af/3HR7Lnpd0c+0o9gBO24
# IGDGBab29mPtS3BhWEKgcrwmcBniYnstYeLXdf08H1q9G27jwuuCe8TrJ7oOMz/+
# cXr3Aj5S+6MMvvKHCu5EdzU2UqevtNWI7tLIH2bKLGiEmfJVhmUujRciDJP42Bo1
# sw/QtuXoEvdEQeBk80mJB2BFUCKYoChh18q/vJbOsmYxJ9NUmtAHmbULzze5bm8B
# Llp2S9xyjlPtT5eqFZe1rsvcfa3iOds28CUKxJhyZq+k/D7Q/SELoSo1e1H/eyFN
# GM0wCU92yDqCUNPr/36MG8KAgbPbSi+kE8xzzfQaKOYVbD+uzUZB9kIG+B5MLoK5
# wazCCTWDQxWPQOMm+KeXfAzIooSRSBa4csAo72zNZGuDqP0Xw6N8NX0ZkHICq1E4
# bTFrlg8HH5wC26z38de8QUjmdafTGCFgb5O9Uc866uHcE/G1NqhuvORopI3VksIL
# zDYDXM+bZPrQMztgnrwP4Jw=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Set-ADUserRandomPassword.ps1 | Set-ADUserRandomPassword.ps1 | ###########################################################################"
#
# NAME: Set-ADUserRandomPassword.ps1
#
# AUTHOR: Jan Egil Ring
# EMAIL: jan.egil.ring@powershell.no
#
# COMMENT: This script are used to set a random password for Active Directory users in a specified Organizational Unit. It stores the results in a csv-file.
# The background for this script is a school domain needing to set random passwords for new users, and exporting the passwords to a csv-# # file to let the teachers disribute the first-time passwords.
#
# You have a royalty-free right to use, modify, reproduce, and
# distribute this script file in any way you find useful, provided that
# you agree that the creator, owner above has no warranty, obligations,
# or liability for such use.
#
# VERSION HISTORY:
# 1.0 22.08.2009 - Initial release
#
###########################################################################"
#Requires: Quest.ActiveRoles.ADManagement
#Creating system.random object used to generate random numbers
$random = New-Object System.Random
#Creating an array to store user information in
$CSV = @()
#Get users
Get-QADUser -SearchRoot "domain.local/MyUserOU" -SizeLimit 0 | ForEach-Object {
#Generate a random password for each user
$password = "pwd"+($random.Next(1000,9999))
#Set the password for each user
Set-QADUser $_ -UserPassword $password
#Select what user information we want to export to the csv-file and storing it in a variable
$exportdata = Get-QADUser $_ | Select-Object name,samaccountname,company,department
#Add the password as a member to $exportdata
Add-Member -InputObject $exportdata -MemberType NoteProperty -Name Password -Value $password
#Add the user information to the $CSV array
$CSV += $exportdata
}
#Exporting all users to the csv-file
$CSV | Export-Csv -Path "C:\\export\\passwordlist.csv" -Encoding unicode -NoTypeInformation
|
combined_dataset/train/non-malicious/3535.ps1 | 3535.ps1 |
$location = "southeastasia"
$resourceGroupName = "pstestFSRG1bca8f8e"
$vaultName = "PSTestFSRSV1bca8f8e"
$fileShareFriendlyName = "pstestfs1bca8f8e"
$fileShareName = "AzureFileShare;pstestfs1bca8f8e"
$saName = "pstestsa1bca8f8e"
$skuName="Standard_LRS"
$policyName = "AFSBackupPolicy"
function Test-AzureFSContainer
{
try
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName
$item = Enable-Protection $vault $fileShareFriendlyName $saName
$containers = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureStorage `
-Status Registered;
Assert-True { $containers.FriendlyName -contains $saName }
$containers = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureStorage `
-Status Registered `
-FriendlyName $saName;
Assert-True { $containers.FriendlyName -contains $saName }
$containers = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureStorage `
-Status Registered `
-ResourceGroupName $resourceGroupName;
Assert-True { $containers.FriendlyName -contains $saName }
$containers = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureStorage `
-Status Registered `
-FriendlyName $saName `
-ResourceGroupName $resourceGroupName;
Assert-True { $containers.FriendlyName -contains $saName }
}
finally
{
Cleanup-Vault $vault $item $containers
}
}
function Test-AzureFSUnregisterContainer
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName
$item = Enable-Protection $vault $fileShareFriendlyName $saName
$container = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureStorage `
-Status Registered `
-FriendlyName $saName
Disable-AzRecoveryServicesBackupProtection `
-VaultId $vault.ID `
-Item $item `
-RemoveRecoveryPoints `
-Force;
Unregister-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-Container $container
$container = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureStorage `
-Status Registered `
-FriendlyName $saName
Assert-Null $container
} |
combined_dataset/train/non-malicious/VHDFunctions_1.psm1.ps1 | VHDFunctions_1.psm1.ps1 | <#
Name: VHDFunctions.psm1
Author: Rich Kusak (rkusak@cbcag.edu)
Created: 2009-10-23
LastEdit: 2009-11-03 08:57
Included Functions:
Dismount-VHD
Initialize-VHD
Mount-VHD
New-VHD
Set-VHDBootConfiguration
Test-VHD
#>
<#
.SYNOPSIS
Dismount a VHD file from the system.
.DESCRIPTION
This function wraps the consistancy of PowerShell around the Diskpart utility.
A Diskpart script is created to automate the dismount (detach) of a VHD file from the system.
Optionally, the VHD file can be deleted following detachment.
.PARAMETER Path
Specifies the full path to the VHD file.
.PARAMETER Remove
Removes (deletes) the VHD file after dismounting it.
.PARAMETER NoConfirm
Supresses the delete confirmation prompt.
.PARAMETER DiskpartScript
Specifies the path location of the Diskpart script file.
Default location is $env:SystemDrive
This file is deleted at the conclusion of the script.
.PARAMETER Rescan
Instructs Diskpart to rescan the system for available storage resources.
.EXAMPLE
Dismount-VHD -Path C:\\test.vhd
Dismounts the specified VHD file.
.EXAMPLE
Dismount-VHD -Path C:\\test.vhd -Remove
Dismounts the specified VHD file and then deletes it.
.NOTES
Name: Dismount-VHD.ps1
Author: Rich Kusak
Created: 2009-10-22
LastEdit: 2009-10-26 11:35
#Requires -Version 2.0
#>
function Dismount-VHD {
[CmdletBinding()]
param (
[Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)]
[string]$Path,
[switch]$Remove,
[switch]$NoConfirm,
[string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt",
[switch]$Rescan
)
begin {
function InvokeDiskpart {
Diskpart.exe /s $DiskpartScript
}
function RemoveVHD {
switch ($NoConfirm) {
$false {
## Prompt for confirmation to delete the VHD file ##
"" ; Write-Warning "Are you sure you want to delete the file ""$Path""?"
$Prompt = Read-Host "Type ""YES"" to continue or anything else to break"
if ($Prompt -ceq 'YES') {
Remove-Item -Path $Path -Force
"" ; Write-Host "VHD ""$Path"" deleted!" ; ""
} else {
"" ; Write-Host "Script terminated without deleting the VHD file." ; ""
}
}
$true {
## Confirmation prompt suppressed ##
Remove-Item -Path $Path -Force
"" ; Write-Host "VHD ""$Path"" deleted!" ; ""
}
}
}
## Validate Operating System Version ##
if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."}
}
process{
## DiskPart Script Content ## Here-String statement purposefully not indented ##
@"
$(if ($Rescan) {'Rescan'})
Select VDisk File="$Path"`nDetach VDisk
Exit
"@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force
InvokeDiskpart
}
end {
if ($Remove) {RemoveVHD}
Remove-Item -Path $DiskpartScript -Force ; ""
}
}
Export-ModuleMember -Function Dismount-VHD
<#
.SYNOPSIS
Initialize a VHD by preparing it for use.
.DESCRIPTION
This function wraps the consistancy of PowerShell around the Diskpart utility.
A Diskpart script is created to automate initializing a VHD.
The script creates a partition, assigns a drive letter, and formats a mounted VHD.
.PARAMETER Path
Specifies the full path to the VHD file.
.PARAMETER Drive
A drive letter to assign to the mounted VHD.
If not specified the system will auto assign the next available drive letter.
.PARAMETER Label
A volume label to assign to the mounted VHD.
.PARAMETER DiskpartScript
Specifies the path location of the Diskpart script file.
Default location is $env:SystemDrive
This file is deleted at the conclusion of the script.
.PARAMETER Rescan
Instructs Diskpart to rescan the system for available storage resources.
.EXAMPLE
Initialize-VHD C:\\test.vhd X: TestVHD
Initializes the VHD at path C:\\test.vhd assign it to drive letter X: and give it the volume label "TestVHD".
.NOTES
Name: Initialize-VHD
Author: Rich Kusak
Created: 2009-10-22
LastEdit: 2009-10-26 15:11
#Requires -Version 2.0
#>
function Initialize-VHD {
[CmdletBinding()]
param (
[Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)]
[string]$Path,
[Parameter(Position=1,Mandatory=$false,ValueFromPipeline=$false)]
[string]$Drive,
[Parameter(Position=2,Mandatory=$false,ValueFromPipeline=$false)]
[string]$Label,
[Parameter(Position=3,Mandatory=$false,ValueFromPipeline=$false)]
[string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt",
[switch]$NoConfirm,
[switch]$Rescan
)
begin {
function InvokeDiskpart {
Diskpart.exe /s $DiskpartScript
}
## Validate Operating System Version ##
if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."}
## Validate -Drive parameter ##
if ($Drive) {
$Reserved = @('A:','B:','C:')
$Reserved += (Get-WmiObject win32_LogicalDisk -Property DeviceID | ForEach-Object {$_.DeviceID})
switch ($Drive) {
{($_ -notmatch "^[a-z]$") -and ($_ -notmatch "^[a-z]:$")} {throw "The drive letter ""$_"" is invalid."}
{$_ -notmatch ":"} {$Drive += ":"}
{$Reserved -contains $Drive} {throw "The drive letter ""$_"" is reserved."}
}
}
if (!$NoConfirm) {
"" ; Write-Warning "The VHD ""$Path"" is about to initialized. Any existing data will be destroyed!`nAre you sure you want to continue?" ; ""
$Prompt = Read-Host "Type ""YES"" to continue or anything else to break"
if ($Prompt -cne 'YES') {Write-Host "Function terminated by user."; "" ; break}
}
}
process {
## Diskpart Script Content ## Here-String statement purposefully not indented ##
@"
$(if ($Rescan) {'Rescan'})
Select VDisk File="$Path"
Clean
Create Partition Primary
Format Quick FS=NTFS $(if ($Label) {"Label=""$Label"""})
$(if ($Drive) {"Assign Letter=$Drive"} else {'Assign'})
Detail VDisk
Exit
"@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force
}
end {
InvokeDiskpart
Remove-Item -Path $DiskpartScript -Force ; ""
Write-Host "The VHD ""$Path"" has been successfully initialized." ; ""
}
}
Export-ModuleMember -Function Initialize-VHD
<#
.SYNOPSIS
Mount a VHD to the system.
.DESCRIPTION
This function wraps the consistancy of PowerShell around the Diskpart utility.
A Diskpart script is created to automate mounting (attach) a VHD file to the system.
.PARAMETER Path
Specifies the full path to the VHD file.
.PARAMETER DiskpartScript
Specifies the path location of the Diskpart script file.
Default location is $env:SystemDrive
This file is deleted at the conclusion of the script.
.PARAMETER Rescan
Instructs Diskpart to rescan the system for available storage resources.
.NOTES
Name: Mount-VHD.ps1
Author: Rich Kusak
Created: 2009-10-22
LastEdit: 2009-10-26 09:25
#Requires -Version 2.0
#>
function Mount-VHD {
[CmdletBinding()]
param (
[Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)]
[string]$Path,
[string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt",
[switch]$Rescan
)
begin {
function InvokeDiskpart {
Diskpart.exe /s $DiskpartScript
}
## Validate Operating System Version ##
if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."}
}
process{
## Diskpart Script Content ## Here-String statement purposefully not indented ##
@"
$(if ($Rescan) {'Rescan'})
Select VDisk File="$Path"`nAttach VDisk
Exit
"@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force
InvokeDiskpart
}
end {
Remove-Item -Path $DiskpartScript -Force ; ""
Write-Host "The VHD ""$Path"" has been successfully mounted." ; ""
}
}
Export-ModuleMember -Function Mount-VHD
<#
.SYNOPSIS
Create a new VHD file.
.DESCRIPTION
This function wraps the consistancy of PowerShell around the Diskpart utility.
A Diskpart script is created to automate the creation of the VHD.
Optionally, the VHD can be mounted immediately following the creation process.
.PARAMETER Path
Specifies the full path to the VHD file.
.PARAMETER Maximum
The maximum space allocated for the VHD to use.
.PARAMETER Fixed
Creates a fixed disk VHD file. By default a dynamically expanding VHD file is created.
.PARAMETER Mount
Mount (attach) the VHD to the system making it available to Windows.
.PARAMETER Prepare
Prepares the VHD for use by partitioning and mounting (attach) the VHD to the system making it available to Windows.
.PARAMETER NoConfirm
Supresses the maximum validation warning confirmation prompt.
.PARAMETER DiskpartScript
Specifies the path location of the Diskpart script file.
Default location is $env:SystemDrive
This file is deleted at the conclusion of the script.
.PARAMETER Rescan
Instructs Diskpart to rescan the system for available storage resources.
.NOTES
Name: New-VHD
Author: Rich Kusak
Created: 2009-05-27
LastEdit: 2009-10-26 10:06
#Requires -Version 2.0
#>
function New-VHD {
[CmdletBinding()]
param (
[Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)]
[string]$Path,
[Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$false)]
[int]$Maximum,
[switch]$Fixed,
[switch]$Mount,
[switch]$NoConfirm,
[string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt",
[switch]$Rescan
)
begin {
function InvokeDiskpart {
Diskpart.exe /s $DiskpartScript
}
function TestMaximum {
## Validates the -Maximum parameter against the specified disk's available space ##
$Drive = Split-Path $Path -Qualifier
$LogicalDisk = Get-WmiObject win32_LogicalDisk -Filter "DeviceID = '$Drive'"
$FreeSpace = [math]::Truncate(($LogicalDisk.FreeSpace)/1MB)
$Percent = [math]::Round(($Maximum/$FreeSpace)*100,0)
switch ($Maximum) {
{$_ -gt 2088960} {throw "The -Maximum parameter value ""$Maximum"" exceeds the allowable VHD size."}
{$_ -ge $FreeSpace -and $Fixed} {throw "The -Maximum parameter value ""$Maximum"" exceeds available disk space."}
{$_ -ge $FreeSpace} {
"" ; Write-Warning "The VHD maximum size exceeds available disk space."
if (!$NoConfirm) {
Write-Host "Are you sure you want to continue?"
$Prompt = Read-Host "Type ""YES"" to continue or anything else to break"
if ($Prompt -cne 'YES') {
"" ; Write-Host "Script terminiated by user." ; ""
return
}
}
}
{$Percent -ge 80} {
"" ; Write-Warning "The VHD maximum size is $Percent% of the available disk space."
if (!$NoConfirm) {
Write-Host "Are you sure you want to continue?"
$Prompt = Read-Host "Type ""YES"" to continue or anything else to break"
if ($Prompt -cne 'YES') {
"" ; Write-Host "Script terminiated by user." ; ""
return
}
}
}
}
## Validate Operating System Version ##
if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."}
}
}
process {
TestMaximum
## Diskpart Script Content ## Here-String statement purposefully not indented ##
@"
$(if ($Rescan) {'Rescan'})
Create VDisk File="$Path" Maximum=$Maximum $(if ($Fixed) {'Type=Fixed'} else {'Type=Expandable'})
$(if ($Mount) {"Select VDisk File=""$Path""`nAttach VDisk"})
Exit
"@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force
InvokeDiskpart
}
end {
Remove-Item -Path $DiskpartScript -Force ; ""
Write-Host "A new VHD has been created at ""$Path""." ; ""
if ($Mount) {Write-Host "The VHD has been successfully mounted." ; ""}
}
}
Export-ModuleMember -Function New-VHD
<#
.SYNOPSIS
Set the system boot configuration to boot from a VHD.
.DESCRIPTION
This function wraps the consistancy of PowerShell around the BCDEdit tool.
The Boot Configuration DataStore Editor (BCDEdit) is used to set the necessary
boot configuration entry to optionally boot to a VHD during startup.
.PARAMETER Path
Specifies the full path to the VHD file.
.PARAMETER Description
Description for the boot configuration entry.
.EXAMPLE
Set-VHDBootConfiguration
.NOTES
Name: Set-VHDBootConfiguration
Author: Rich Kusak
Created: 2009-10-22
LastEdit: 2009-10-26 10:14
#Requires -Version 2.0
#>
function Set-VHDBootConfiguration {
[CmdletBinding()]
param (
[Parameter(Position=0,Mandatory=$true)]
[string]$Path,
[Parameter(Position=1,Mandatory=$true)]
[string]$Description
)
begin {
if (!(Test-Path -Path $Path -Include "*.vhd")) {throw "The path ""$Path"" is invalid or does not contain a VHD file."}
$Drive = Split-Path -Path $Path -Qualifier
$UnQualifiedPath = Split-Path -Path $Path -NoQualifier
}
process {
## Use BCDEdit to set the VHD boot configuration entry ##
$Copy = bcdedit /copy '{current}' /d $Description
$CLSID = $Copy | ForEach-Object {$_.Remove(0,37).Replace(".","")}
bcdedit /set $CLSID device vhd=[$Drive]""$UnQualifiedPath""
bcdedit /set $CLSID osdevice vhd=[$Drive]""$UnQualifiedPath""
bcdedit /set $CLSID detecthal on
New-Object PSObject | Add-Member -MemberType NoteProperty -Name 'Identifier' -Value $CLSID -PassThru |
}
end {
Write-Host "The VHD ""$Path"" has been prepared for boot operation." ; ""
}
}
Export-ModuleMember -Function Set-VHDBootConfiguration
<#
.SYNOPSIS
Test a VHD.
.DESCRIPTION
This script wraps the consistancy of PowerShell around the Diskpart utility.
A Diskpart script is created to return the details of the VHD (VDisk).
.PARAMETER Path
Specifies the full path to the VHD file.
.PARAMETER DiskpartScript
Specifies the path location of the Diskpart script file.
Default location is $env:SystemDrive
This file is deleted at the conclusion of the script.
.PARAMETER Rescan
Instructs Diskpart to rescan the system for available storage resources.
.NOTES
Name: Test-VHD.ps1
Author: Rich Kusak
Created: 2009-10-23
LastEdit: 2009-11-03 08:55
#Requires -Version 2.0
#>
function Test-VHD {
[CmdletBinding()]
param (
[Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)]
[string]$Path,
[Parameter(Position=1,Mandatory=$false,ValueFromPipeline=$false)]
[string]$DiskpartScript = "$env:SystemDrive\\DiskpartScript.txt",
[switch]$Rescan
)
begin {
function InvokeDiskpart {
Diskpart.exe /s $DiskpartScript
}
## Validate Operating System Version ##
if (Get-WmiObject win32_OperatingSystem -Filter "Version < '6.1'") {throw "The script operation requires at least Windows 7 or Windows Server 2008 R2."}
## Validate the -Path parameter ##
if (!(Test-Path -Path $Path -Include "*.vhd")) {throw "The path ""$Path"" is not valid or does not contain a VHD file."}
}
process {
@"
Select VDisk File="$Path"
Detail VDisk
"@ | Out-File -FilePath $DiskpartScript -Encoding ASCII -Force
InvokeDiskpart
}
end {
Remove-Item -Path $DiskpartScript -Force ; ""
}
}
Export-ModuleMember -Function Test-VHD
|
combined_dataset/train/non-malicious/sample_39_58.ps1 | sample_39_58.ps1 | #
# Module manifest for module 'OCI.PSModules.Streaming'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Streaming.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Streaming Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIStreamingConnectHarness',
'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup',
'Get-OCIStreamingMessages', 'Get-OCIStreamingStream',
'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList',
'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit',
'Invoke-OCIStreamingConsumerHeartbeat',
'Move-OCIStreamingConnectHarnessCompartment',
'Move-OCIStreamingStreamCompartment',
'Move-OCIStreamingStreamPoolCompartment',
'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor',
'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream',
'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness',
'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool',
'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup',
'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool',
'Write-OCIStreamingMessages'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_10_90.ps1 | sample_10_90.ps1 | ConvertFrom-StringData @'
id_pagedpoold2dsymevent_sd=This Windows Server 2003 may run out of paged pool due to a version of symevent.sys.
id_kerneltagtokekb982010_sd=This machine have high usage of kernel memory pool tag Toke possibly caused by the DisableWindowsUpdateAccess user policy.
id_kerneltagrxm4setikb2647452_sd=Paged pool leak detected in either the RxM4 or SeTI pool tags possibly due to frequently mapping and disconnecting a network drive
id_kerneltagsslckb2585542_sd=This Windows Server 2008 ksecdd driver leaks SslC paged pool
id_mpio2k3check_st=A MPIO.SYS with version older than 1.23 was detected and this may cause pool memory leak
id_baspnppleakcheck_st=Non paged pool memory leak detected due to Broadcom Advanced Server Program driver
id_aladdindevicedriverscheck_st=Memory leak and Event ID 333 or 2019 due to Aladdin Knowledge Systems Device Drivers
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCAoLaAUl4STC9E
# wzV+jBj3U4whvESfs4lXwx8H52ivCaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ1+d5yDNgAZKoVZfh4Apfvw
# mjLb7ltxI6GdLTMTvv/dMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAFQ+tdHqRtaqt5YmROkDp58ivPrYxNGR4mZEzg9N6gV8uGeQ44MHAFz+i
# kxmtLC+Yv4q0Dve6YpTpcCT90d8hcg0MxNP8/LDFuiG2n1V562GJ7zH2KC+aVfku
# sHsYzervWWBymn1Crrp/dOH9+jEfSkrVWRQSm/cI4Nhub25QRmB8HI5lrTKOD0Cj
# vK+/4O9DvIDwrpj+Rb0MyvyhxM4aWhyfN9+L1ZubtYg5HfmqRnfK7t96iSe4CyT5
# LG/EW8WzPNTzNsXTkNM14GsI9fPdF6VIbODdb8aRcJstdQMPl9vcOhxZYydIBVAc
# 78AA05Kx8oCki8ffWBP36Ri1MLcPQqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCFGIe00fl9WiDkK389ADzm+OOz/PHNP0i8FB1J8ROEjwIGZxp9zsoX
# GBMyMDI0MTAyODExNDA0Mi41NDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw
# N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP
# AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0
# ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA
# AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4
# fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6
# IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR
# AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB
# 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCw8ACvTjcii+17sely4Y0ktn2DmOf/EWrOfK+pH52y
# fzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+
# RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a
# AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAcN5dBX01U2ZX/NXoTvnk
# A65TUBywOSsD0YMFLTMaKrqWXK7oKC1fAjICvm0cMbUZ26OPuwJJ7Tgsyj06n49M
# L+r++Oox8aaY4n3SUXSTx4yW4y1J9LTOu42npcB8IqZPado0iUVlkrkZNIuSUorU
# 5rK39i6Eg/kRu0VMrRKb30qw1bZsIywaL+jbcPhF1SMf/mJZQYuI2pEzGPQmhqoT
# fnYDDk8st4NlgHDhGGfmglRZ141WTdImUTD9iC0T2XNFmURuE4aVvqaeE5P9LfKy
# k6+rmVQz6to2S0vfpWMf7++2U/uR519W228o26qSQ07bozh9fEGsq/jbKEgOapDL
# VyTFGxtkRydnHn6/+YlNg/DwkFnct3xizsx1J8mUXnO/ExKRkLPiViHd4Tlmp+eV
# /gvlASz56SLjCPlwnwgOU+exUjgpG78g950WWGTyLudaTAWLHFy4YtRaKgTfGNCP
# zyC77MUGldDUbToBTyOipqCtjhihCPlp5QH0izrG9iEC8V9I96wWStXIF83FeCMr
# nUHHQACaXNRPUGVgDE2gfozCmVJgDWd6tOz2ryZjm54tOIilk6OsnebWaHCxDPgT
# G4BclD35T59MO45QKoC9C3UKDmWv/5QojR1wvlcANTs2FzJy271sGkosFUk2wDB/
# wANNaysRw7kx/x6wbM3WuVw=
# SIG # End signature block
|
combined_dataset/train/non-malicious/556.ps1 | 556.ps1 |
function Add-SPOPrincipalToGroup
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string]$username,
[Parameter(Mandatory=$true, Position=1)]
[string]$groupname
)
process
{
Write-Host "Adding principal with username $username to group $groupname" -foregroundcolor black -backgroundcolor yellow
$principal = Get-SPOPrincipal -username $username
$group = Get-SPOGroup -name $groupname
$userExists = $group.Users.GetById($principal.Id)
$clientContext.Load($userExists)
try
{
$clientContext.ExecuteQuery()
Write-Host "Principal already added to the group" -foregroundcolor black -backgroundcolor yellow
}
catch
{
$addedPrincipal = $group.Users.AddUser($principal)
$clientContext.Load($addedPrincipal)
$clientContext.ExecuteQuery()
Write-Host "Succesfully added principal to the group" -foregroundcolor black -backgroundcolor green
}
}
}
|
combined_dataset/train/non-malicious/sample_4_15.ps1 | sample_4_15.ps1 | #
# Module manifest for module 'OCI.PSModules.Aidocument'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aidocument.dll'
# Version number of this module.
ModuleVersion = '93.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aidocument Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIAidocumentModelLock', 'Add-OCIAidocumentProjectLock',
'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList',
'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject',
'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest',
'Get-OCIAidocumentWorkRequestErrorsList',
'Get-OCIAidocumentWorkRequestLogsList',
'Get-OCIAidocumentWorkRequestsList',
'Invoke-OCIAidocumentAnalyzeDocument',
'Invoke-OCIAidocumentPatchModel',
'Move-OCIAidocumentModelCompartment',
'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel',
'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject',
'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentModelLock',
'Remove-OCIAidocumentProject', 'Remove-OCIAidocumentProjectLock',
'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest',
'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3622.ps1 | 3622.ps1 |
function Test-GetAzureLogAllParameters
{
$correlation = '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deba10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d/incidents/L3N1YnNjcmlwdGlvbnMvYTkzZmIwN2MtNmM5My00MGJlLWJmM2ItNGYwZGViYTEwZjRiL3Jlc291cmNlR3JvdXBzL0RlZmF1bHQtV2ViLUVhc3RVUy9wcm92aWRlcnMvbWljcm9zb2Z0Lmluc2lnaHRzL2FsZXJ0cnVsZXMvY2hlY2tydWxlMy00YjEzNTQwMS1hMzBjLTQyMjQtYWUyMS1mYTUzYTViZDI1M2QwNjM1NjA5MjE5ODU0NzQ1NDI0'
$rgname = 'Default-Web-EastUS'
$rname = '/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deba10f4b/resourceGroups/Default-Web-EastUS/providers/microsoft.insights/alertrules/checkrule3-4b135401-a30c-4224-ae21-fa53a5bd253d'
$rpname = 'microsoft.insights'
try
{
Write-Verbose " ****** Get ActivityLog records by corrrelationId "
$actual = Get-AzLog -CorrelationId $correlation -starttime 2015-03-02T18:00:00Z -endtime 2015-03-02T20:00:00Z -detailedOutput
Assert-AreEqual 2 $actual.Count
Write-Verbose " ****** Get ActivityLog records by resource group "
$actual = Get-AzLog -ResourceGroup $rgname -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z
Assert-AreEqual 2 $actual.Count
Write-Verbose " ****** Get ActivityLog records by resource Id"
$actual = Get-AzLog -ResourceId $rname -startTime 2015-03-03T15:42:50Z -endTime 2015-03-03T16:42:50Z
Assert-AreEqual 2 $actual.Count
Write-Verbose " ****** Get ActivityLog records by resource provider"
$actual = Get-AzLog -ResourceProvider $rpname -startTime 2015-03-03T15:42:50Z -endTime 2015-03-03T16:42:50Z
Assert-AreEqual 2 $actual.Count
Write-Verbose " ****** Get ActivityLog records by subscription Id"
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z
Assert-AreEqual 1 $actual.Count
}
finally
{
}
}
function Test-GetAzureSubscriptionIdLogMaxEvents
{
try
{
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z
Assert-AreEqual 7 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents -3
Assert-AreEqual 7 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 0
Assert-AreEqual 7 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 3
Assert-AreEqual 3 $actual.Count
}
}
finally
{
}
}
function Test-GetAzureSubscriptionIdLogPaged
{
try
{
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z
Assert-AreEqual 8 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 7
Assert-AreEqual 7 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 6
Assert-AreEqual 6 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 3
Assert-AreEqual 3 $actual.Count
}
{
$actual = Get-AzLog -starttime 2015-01-15T12:30:00Z -endtime 2015-01-15T20:30:00Z -MaxEvents 15
Assert-AreEqual 8 $actual.Count
}
}
finally
{
}
} |
combined_dataset/train/non-malicious/sample_20_69.ps1 | sample_20_69.ps1 | #
# Module manifest for module 'DscInstall'
#
# Generated by: Zia Jalali
#
# Generated on: 07/31/2017
#
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Heartbeat.psm1'
# Version number of this module.
ModuleVersion = '1.1'
# ID used to uniquely identify this module
GUID = '3740b029-0ed3-4ae6-bd82-883ab79c843b'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module is used to sent GCAgent heartbeat.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @('')
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module
FunctionsToExport = @('Send-Heartbeat','Test-AutomationDscRegistration','Test-ChangeTrackingEnabled')
# Cmdlets to export from this module
# CmdletsToExport = @('')
# Variables to export from this module
# VariablesToExport = '*'
# Aliases to export from this module
# AliasesToExport = @('')
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoOAYJKoZIhvcNAQcCoIIoKTCCKCUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBUINAHFnbW6Hcl
# JQEkuvQOXlkiQdLKkGiMcqRZFtayjKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5
# R+AeS+5FX2Y0Vji3cfWGWrVlu/I1PL1DdMvYwOwqMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEABQQ3Qoiom4V7+k/KISwM9vn7rO7Lw5lgqdpL
# TUULtoeZOC1gp0g2YiBR7AlgAnSn4S3TcxYvjG6fCpAtxSFfCRptsTyfF5jA+FuZ
# bmWMRktCPFRwhojBjttjGc1ObFnEnq6UPPlwPTNuOIEO8ufUZKuoa4WTvxF2y+Kx
# rGuW6MwFZ0eeZzG2gn+fzgrEaoHamLsa96nqgy5ogXo4dcx2c/w4XbE30RdDSJBX
# zuMA0fS7V0z5/afeKb/RCfYxd68PdA7cj5FFThnYYAmA/XZmJMapDIw4DkojRURS
# /UfbRQ19JVpYcS4febL/U66iKLim/Wk6X1I0WCT83wHsr1djeKGCF5MwghePBgor
# BgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDUo7f6f6uY5fHWpNBSPDxPLd0xpcJhzrfE
# kb1+5q21IQIGZc3/lJGeGBIyMDI0MDIyMDE4MTg0MS4xNFowBIACAfSggdGkgc4w
# gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
# HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg
# VFNTIEVTTjo5MjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB5y6PL5MLTxvpAAEA
# AAHnMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIzMTIwNjE4NDUxOVoXDTI1MDMwNTE4NDUxOVowgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5MjAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMJXny/gi5Drn1c8zUO1pYy/
# 38dFQLmR2IQXz1gE/r9GfuSOoyRnkRJ6Z/kSWLgIu1BVJ59GkXWPtLkssqKwxY4Z
# FotxpVsZN9yYjW8xEnW3MzAI0igKr+/LxYfxB1XUH8Bvmwr5D3Ii/MbDjtN9c8Tx
# GWtq7Ar976dafAy3TrRqQRmIknPVWHUuFJgpqI/1nbcRmYYRMJaKCQpty4CeG+Hf
# Ksxrz24F9p4dBkQcZCp2yQzjwQFxZJZ2mJJIGIDHKEdSRuSeX08/O0H9JTHNFmNT
# NYeD1t/WapnRwiIBYLQSMrs42GVB8pJEdUsos0+mXf/5QvheNzRi92pzzyA4tSv/
# zhP3/Ermvza6W9GnYDz9qv1wbhbvrnS4poDFECaAviEqAhfn/RogCxvKok5ro4gZ
# IX1r4N9eXUulA80pHv3axwXu2MPlarAi6J9L1hSIcy9EuOMqTRJIJX+alcLQGg+S
# Tlqx/GuslsKwl48dI4RuWknNGbNo/o4xfBFytvtNcVA6xOQq6qRa+9gg+9XMLrxQ
# z4yyQs+V3V6p044wrtJtt/a0ZJl/f6I7BZAxxZcH2DDmArcAhgrTxaQkm7LM+p+K
# 2C5t1EKZiv0JWw065b7AcNgaFyIkMXYuSuOQVSNRxdIgl31/ayxiK1n0K6sZXvgF
# Bx+vGO+TUvyO+03ua6UjAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUz/7gmICfNjh2
# kR/9mWuHUrvej1gwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAHSh8NuT6WVaLVwL
# qex+J7km2nT2jpvoBEKm+0M+rYoU/6GL5Q00/ssZyIq5ySpcKYFMUiF8F4ZLG+Tr
# JyiR1CvfzXmkQ5phZOce9DT7yErLzqvUXit8G7igcHlxPLTxPiiGsb85gb8H+A2f
# PQ6Xq/u7+oSPPjzNdnpmXEobJnAqYplZoF3YNgTDMql0uQHGzoDp6dZlHSNj6rkV
# 1tXjmCEZMqBKvkQIA6csPieMnB+MirSZFlbANlChe0lJpUdK7aUdAvdgcQWKS6dt
# RMl818EMsvsa/6xOZGINmTLk4DGgsbaBpN+6IVt+mZJ89yCXkI5TN8xCfOkp9fr4
# WQjRBA2+4+lawNTyxH66eLZWYOjuuaomuibiKGBU10tox81Sq8EvlmJIrXOZoQsE
# n1r5g6MTmmZJqtbmwZufuJWQXZb0lAg4fq0ZYsUlLkezfrNqGSgeHyIP3rct4aNm
# qQW6wppRbvbIyP/LFN4YQM6givfmTBfGvVS77OS6vbL4W41jShmOmnOn3kBbWV6E
# /TFo76gFXVd+9oK6v8Hk9UCnbHOuiwwRRwDCkmmKj5Vh8i58aPuZ5dwZBhYDxSav
# wroC6j4mWPwh4VLqVK8qGpCmZ0HMAwao85Aq3U7DdlfF6Eru8CKKbdmIAuUzQrnj
# qTSxmvF1k+CmbPs7zD2Acu7JkBB7MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj
# YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUw
# LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVALNyBOcZqxLB792u75w97U0X+/BDoIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpfmwCMCIY
# DzIwMjQwMjIwMDAwODM0WhgPMjAyNDAyMjEwMDA4MzRaMHQwOgYKKwYBBAGEWQoE
# ATEsMCowCgIFAOl+bAICAQAwBwIBAAICHiQwBwIBAAICE64wCgIFAOl/vYICAQAw
# NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC
# AQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEASMF2HFzYPLUiIj9puaTYTwizZiAq
# O+kquAdXGuZHq5OhUs/5RN8ZSPZZ2TqY5T21hKjb5/KeQQJk3QOgqNMQaHgKueR6
# EsFW5Y2BYuwJlzhT58+c2aBnaoCgMIJdESclH0kgmblS01e164yjMLurzHGD92iz
# iCx7h6hQIcHIcUCxAXbJAfiXDQAvlR7xAr/AGZBajSF3NmESj8AYhYEl3lfjX3TJ
# 26qmYmmPhu5itG2sVDNsBUuVMgebPwqh87dt0uyjMFT1Yr37/7xrUBefVLIS3mEt
# RfhSvNyZMyYz1QgXIsbAbWEM6tkjpQ63A/5I8u5i/l9Mi8sqOfrZyPzxuDGCBA0w
# ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5y6P
# L5MLTxvpAAEAAAHnMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL
# KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEINW9tgbobHcwESueUOeUxvDWU37f
# KcZk7xq3aT9v8WHQMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg5TZdDXZq
# hv0N4MVcz1QUd4RfvgW/QAG9AwbuoLnWc60wgZgwgYCkfjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB5zAiBCDmy2s2xhsA
# lJwoATlobcuibku+hLm0XGgFDh7x8g0d7TANBgkqhkiG9w0BAQsFAASCAgAcD5qh
# 2JSAAU3FKyxU5oJ9Md5PGrPaCY5BX3VpJfT7zhIp8gH9m9YHnTtfwgFPqQTmHMtI
# Ma1502odswYosuhCVDlYrR7kxT/wN650nqzxWGl+qGpdB4eFyAhLPLKZ0P4hMARP
# VD9iyDtHr1G5pHwAIWovqMBgpxpOXOPsVHD8jSQjB3NJEJHvdd/0R5lfoLCVDyaN
# D2OxUB7i7woKNUoMAnd0u8FIwG/J7F8LIx0jgVY9OC8JsQgrKuO0kXVW7a6WUsJo
# WPRUyzaXeBNWOZ7OBobyF0I+vBJyIxW56z+mTkJ0UpAuMDyU0sfHxWfvCytw25U1
# OnczChztjwCLJJ6BFNrit/FNxJoVE1TikfbjCAuTydKbVZqszpvAHTA9yaHbthYe
# j1QQ40XXo/CdasoHwvTxITGM+GTjUcbablT7zNmfIF+RAkauCcthkyo/pFSryyaD
# UnCz+XnpL/5XIK1dAp1wv2RoGy3wSKXh4BJqG2GLRx65GLlV4daFfvPue4uvyiFM
# 2uwuCpFAZQYsk7SXsS5A37Btjo2J5Ytjl25pkNAycOlY4gZNjB2J7jcbyEZOc3nH
# dCiZ8rPb9yjkyTs6odAaWnUDNdMFSaOyd7d0zZkKBJibkmv9OmzzTuWGyMj/OltE
# 6JstNRtNaUbCiDOjjV0Mkim/6AUHa2dle4iDTw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_5_26.ps1 | sample_5_26.ps1 | ConvertFrom-StringData @'
id_ctsnps=Network Policy Server (NPS)
id_ctsnpsdescription=Collects information about Network Policy Server (NPS) [RADIUS/IAS].
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCyj/dbKsENrkLU
# fhRtbHpyROqit768vPACKs2jr/gVB6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFm+7pUjkEbH9AseyBlVYExo
# pl5wNMFxI7lRCava2htDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAIdrnHzRUxxXWVVHfzW3FzhJGQKlFKVHYZYGf90MJeECUEjM8bDxQrc4H
# eHLRuGqgdcbJdrEUfzHud09yfLJdIW0HmjsKsR2rCgXaflUwvMnCpdl+DeAf6zNm
# F8KinQwYjFdaHgsfigL72nSWp8ec9nUDSlLQUQYPji/Kprlf4dPzMmXLz+N6Y4Z4
# D1fL+xzhsmBs2DrGlTHHLFlwKrr0oLmF+WIQkRRXyMLFD+H7m3Y2t/q8sVtRwciP
# o3tZVVFV2MrLBB6kFPx0QfJUYGM6E8yBWjzsqGqtp+qtPKUprD/LphEuDDEvbYMk
# +U6Nl2qD3kX80HORQe0yyPZfD7rni6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAHfccqtqJpm7QD4rABvjZ/ddsgq4JaA2HqWrp3e9SEoAIGZxqGn6w9
# GBMyMDI0MTAyODExNDA0Mi43NzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz
# CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd
# seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x
# Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+
# TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ
# sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9
# f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP
# aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja
# VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn
# WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9
# 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw
# qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema
# ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo
# ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5
# EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+
# xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7
# ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH
# u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ
# 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1
# 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN
# ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh
# y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0
# SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu
# HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAiGA8yMDI0MTAyODA1Mzk0
# NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaIg
# AgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1geDvTCg+AfBgsP5eubV4p
# W8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB3NRfg/awbJSa7tZm4sDy
# cdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF4G0KdCndtoLOLZfqFPkL
# DzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2x/Thsl/+cvbZ4a/Eqb8p
# D8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsWwKHlydHqbGF6reb09z9d
# EdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAtRYBYDLpXqoYQ1/GwLvxSIGrDZD8CzCjHaNo6scJO4jCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsS
# DrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0a877pzs9GGBhooAWbWEx
# ml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIAOseTm2ltJDGUz7uu1IWp+yLB
# WXX2ZzIQsAsHy5LFge8xdjMdJRS9ua27q+KL7b2IUYlQG6ByJO/2pvr2YBXmW/LC
# ih1nYahGDfx8H8/hdA+Ju4pqQqTH6ypzXE/QTxTRZa3nFNNNNZBTzjRkQ8ws/+YU
# Nyi4cqqRl8ih+FOS/x6X7JoC7tCSgwuRI9IHfoPUt+meJjRCVb4pc8C+SLgNTRbV
# waeG30lZocSzrPwhbiraLi6cghDNKvq+X0E//fSiJhgIdMGdJBdBN3tskJpmlBza
# sbhy4kwCP/dEFvA0t6f4nMQQi4vKc7zgPb7pjbFXj7W0TEOOyuisbu39rwcmX9ee
# lqg6S5boymy2F5bazT4RqdiQ6py8HC1Oa5bHo9m6smeMBRK6RhzY2K8UHikrT4mQ
# QidgebSW7y/Y0T5z33npdPpKEW8J5XDPO82aTV4ty/xm79OJKduw35zB+A4Nu0OQ
# 2NsDhKdkgQwRQqhmIU2FNNg5ue1FsLq/1pl6k2fJki9gV1AJTVFXp7zcTl0BEwJ/
# d+HxO1E7c5gHZqGgkMDf8a8JStscKPHVl8DBJgKReDZZq26tvPe1I4frBVB+Wxis
# H9Fet+09Lo0vYxBmsZX6SIqQs34xlmhLCN5LKp3nOFdPgiV5afjhNSwsYRePgKa4
# k0p/3qkxAuDkZyxIlxI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_3_44.ps1 | sample_3_44.ps1 | #************************************************
# TS_SurfacePro3DetectFirmwareVersions.ps1
# Version 1.0.09.19.14: Created and tested SurfacePro3 scripts from Sep12-19
# Date: 2014
# Author: bbenson
# Description: SurfacePro3DetectFirmwareVersions
#
# Rule GUID: 34F6567E-7B92-4C37-B1CA-5DE6E66D4881
#
# Files:
# TS_SurfacePro3DetectFirmwareVersions.ps1
# RC_SurfacePro3DetectFirmwareVersions.xml
# Include.xml
#
# Output files:
# none
#
# Called from: Networking and Setup Diagnostics
#************************************************
Import-LocalizedData -BindingVariable RegKeyCheck
Write-DiagProgress -Activity $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersions -Status $RegKeyCheck.ID_SurfacePro3DetectFirmwareVersionsDesc
$RootCauseDetected = $false
$HasIssue = $false
$RootCauseName = "RC_SurfacePro3DetectFirmwareVersions"
#$PublicContent Title: "Surface Pro 3, Surface Pro 2, and Surface Pro firmware and driver packs"
$PublicContent = "http://www.microsoft.com/en-us/download/details.aspx?id=38826"
#InternalContent Title: "2961421 - Surface: How to check firmware versions"
$InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2961421"
$Verbosity = "Error"
$Visibility = "4"
$SupportTopicsID = "8041"
$InformationCollected = new-object PSObject
#********************
#Functions
#********************
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
$sku = $((Get-CimInstance win32_operatingsystem).OperatingSystemSKU)
Function isOSVersionAffected
{
if ($bn -eq 9600)
{
return $true
}
else
{
return $false
}
}
Function isSurfacePro3
{
# Check for: "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\BIOS"; SystemSKU = Surface_Pro_3
$regkeyBIOS = "HKLM:\HARDWARE\DESCRIPTION\System\BIOS"
If (test-path $regkeyBIOS)
{
$regvalueSystemSKUReg = Get-ItemProperty -path $regkeyBIOS -name "SystemSKU" -ErrorAction SilentlyContinue
$regvalueSystemSKU = $regvalueSystemSKUReg.SystemSKU
if ($regvalueSystemSKU -eq "Surface_Pro_3")
{
return $true
}
else
{
return $false
}
}
}
#********************
#Detection Logic and Alert Evaluation
#********************
if ((isOSVersionAffected) -and (isSurfacePro3))
{
# Using this method to detect the firmware version:
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}" Filename = "SamFirmware.3.9.350.0.cap"
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}" Filename = "ECFirmware.38.6.50.0.cap"
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}" Filename = "UEFI.3.10.250.0.cap"
# Check for "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}" Filename = "TouchFirmware.426.27.66.0.cap"
#
# This method shows the correct driver if the driver is rolled back, but this is not needed since firmware cannot be rolled back.
# HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\UEFI\RES_{GUID}\0\Device Parameters
#
$regkeySamFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{512B1F42-CCD2-403B-8118-2F54353A1226}"
If (test-path $regkeySamFirmware)
{
$regvalueSamFirmwareFilename = Get-ItemProperty -path $regkeySamFirmware -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueSamFirmwareFilename)
{
$regvalueSamFirmwareFilename = $regvalueSamFirmwareFilename.Filename
$regvalueSamFirmwareFileNameLatest = "SamFirmware.3.9.350.0.cap"
}
$regvalueSamFirmwareVersion = Get-ItemProperty -path $regkeySamFirmware -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueSamFirmwareVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro System Aggregator Firmware" -value " "
$regvalueSamFirmwareVersion = $regvalueSamFirmwareVersion.Version
if ($regvalueSamFirmwareVersion -lt 50922320) # Hex 0x03090350
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Installed Version" -value $regvalueSamFirmwareFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Recommended Version" -value $regvalueSamFirmwareFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "SamFirmware Version: No Action Needed" -value $regvalueSamFirmwareFileName
}
}
}
$regkeyECFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{52D9DA80-3D55-47E4-A9ED-D538A9B88146}"
If (test-path $regkeyECFirmware)
{
$regvalueECFirmwareFileName = Get-ItemProperty -path $regkeyECFirmware -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueECFirmwareFileName)
{
$regvalueECFirmwareFileName = $regvalueECFirmwareFileName.Filename
$regvalueECFirmwareFileNameLatest = "ECFirmware.38.6.50.0"
}
$regvalueECFirmwareVersion = Get-ItemProperty -path $regkeyECFirmware -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueECFirmwareVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Embedded Controller Firmware" -value " "
$regvalueECFirmwareVersion = $regvalueECFirmwareVersion.Version
if ($regvalueECFirmwareVersion -lt 3671632) # Hex 0x00380650
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Installed Version" -value $regvalueECFirmwareFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Recommended Version" -value $regvalueECFirmwareFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "ECFirmware Version: No Action Needed" -value $regvalueECFirmwareFileName
}
}
}
$regkeyUEFI = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{5A2D987B-CB39-42FE-A4CF-D5D0ABAE3A08}"
If (test-path $regkeyUEFI)
{
$regvalueUEFIFileName = Get-ItemProperty -path $regkeyUEFI -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueUEFIFileName)
{
$regvalueUEFIFileName = $regvalueUEFIFileName.Filename
$regvalueUEFIFileNameLatest = "UEFI.3.10.250.0.cap"
}
$regvalueUEFIVersion = Get-ItemProperty -path $regkeyUEFI -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueUEFIVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro UEFI" -value " "
$regvalueUEFIVersion = $regvalueUEFIVersion.Version
if ($regvalueUEFIVersion -lt 50987258) # Hex 0x030a00fa
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Installed Version" -value $regvalueUEFIFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Recommended Version" -value $regvalueUEFIFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "UEFI Version: No Action Needed" -value $regvalueUEFIFileName
}
}
}
$regkeyTouchFirmware = "HKLM:\SYSTEM\CurrentControlSet\Control\FirmwareResources\{E5FFF56F-D160-4365-9E21-22B06F6746DD}"
If (test-path $regkeyTouchFirmware)
{
$regvalueTouchFirmwareFileName = Get-ItemProperty -path $regkeyTouchFirmware -name "Filename" -ErrorAction SilentlyContinue
if ($null -ne $regvalueTouchFirmwareFileName)
{
$regvalueTouchFirmwareFileName = $regvalueTouchFirmwareFileName.Filename
$regvalueTouchFirmwareFileNameLatest = "TouchFirmware.426.27.66.0"
}
$regvalueTouchFirmwareVersion = Get-ItemProperty -path $regkeyTouchFirmware -name "Version" -ErrorAction SilentlyContinue
if ($null -ne $regvalueTouchFirmwareVersion)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Surface Pro Touch Controller Firmware" -value " "
$regvalueTouchFirmwareVersion = $regvalueTouchFirmwareVersion.Version
if ($regvalueTouchFirmwareVersion -lt 27925314) # Hex 0x01aa1b42
{
$RootCauseDetected = $true
add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Installed Version:" -value $regvalueTouchFirmwareFileName
add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Recommended Version" -value $regvalueTouchFirmwareFileNameLatest
}
else
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "TouchFirmware Version: No Action Needed" -value $regvalueTouchFirmwareFileName
}
}
}
if ($RootCauseDetected -eq $true)
{
"[info] RootCauseDetected: Completing RootCause" | WriteTo-StdOut
# Completing the Root Cause
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InternalContentURL $InternalContent -Verbosity $Verbosity -InformationCollected $InformationCollected -Visibility $Visibility -SupportTopicsID $SupportTopicsID -MessageVersion 1
}
else
{
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB10HRFrv8HjhoX
# gsRZ5WnZzTq8vDo3ZWsTdcl0N9SmHKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFzW
# iMZmK36RHn34ITp+dpSCjzKsm6UyyzflaB7FrpOGMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAiMIJtLQjS/0BIq5AMQVvgGSufD6p29eTtyj5
# nRxyuY6sd7fbmPfqSD9SJ8UDGBeawEjmqQm4bKjkYOGL1UwSUE3bD/K6Ha6ZJcB8
# sA3ZX9pDsqHnG0EG6KziBeMLFsCaw+sn4kcY2JsmIp6bdH5JkIBUz1uzl3qGGKGh
# i4VvOpzK2TyQGHa0foj8n66/yx62Z6kS+P4gMwA679272DVjVVnoNy3VK/1l2vjT
# 47881DXeMwHhfytwxQEXJFf7x+HQjmIKwytBhz6EmHSJjsO52hi724dgrcOpVsWb
# N7S+INy1JLhS6DTzIGOPvbogGhwzazzGZi2gdeVMi4PwyCnBoKGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCnlDISA3V/ssXwt4PRuitDHhoNLozWEyQm
# Ds7o9T+wQQIGZwfbtoTeGBMyMDI0MTAxNzAwMjMyMS41NThaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB
# AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4
# Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J
# b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi
# fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl
# VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd
# WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys
# CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw
# gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc
# wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU
# olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x
# wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g
# MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0
# SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl
# 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY
# BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6
# RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv
# bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes
# bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs
# DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT
# GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P
# Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud
# AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh
# 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF
# fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpCpTAi
# GA8yMDI0MTAxNjEzNDgyMVoYDzIwMjQxMDE3MTM0ODIxWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqukKlAgEAMAcCAQACAiN6MAcCAQACAhLtMAoCBQDqu5QlAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALueh93AsDBR/6jYYP7JNJhCnD+7
# lN7vdzsTZ56si44qRlK4A+3ofSQkHtD52C+GP3RfAlzafJZ7KuJ5BDtn9CyMKzbR
# IYVMIEoqc0I9LeqIfi+/IG92a2fwejvWwH/qkEKCW/rH/Ha3uRJfH0Ei0iBuGwPn
# k8UAMjijQ3qKeViG5PHEijdeoJRYuteeUnE0OJ7kVZwESbahv/lDsUyuuT19nLcR
# tAkabXvSz9iDtIJB1pNNv2VXBamRajj8j6h8gE3YowAKFVX/RLi0oTiDz0tDDvmy
# wVNRQm5Ce2n9jw9A0AMkL/pjoxSbdVE4v40oKzFNlZOLGLpht2YxA0tvs50xggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz
# RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDTuL5Ly0WJb3ReHKiloZDvAl0t
# Vi+RjZqxPh1BnmqaGDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h
# S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg2p7xTclT
# wP12eNS3owWPsEw4nI7JxJ5YVVxDQJJRrKgwDQYJKoZIhvcNAQELBQAEggIATWCz
# ptLrQ8aFcoXTkAqgFRehJTbpnrDtQqHEyjh3LjrLHEpY03I6RQIaNyifvsmcwcF+
# mjk0+4TH0gk4TvtJmrL7EEEJJ+97cx8GDBO9pronksmcwv+BlVb2GUvSOXkPZR03
# gRSNuvWuS7ztcYS5YogMZRB+96TAgB9PVoo7Bm22WuS/b4rlruhrzc04lemkVG0G
# LZ+IY0zzosdiQqRc//iSFUNoHKqA8BP3KJAZZORr73q2ShVUUyoHcQgP8WaRlfbP
# Oy+EUte5QsYQ1MeReKM6GwJz0eKGWv+od8OxjULtwx9UVoi/kkscvF8IjdBUgdln
# 6v33iqo1UxJP1YXG2+s/wnKHmIhbJ7EmtD0c5al5kZACpW1dwsao0n9g4CKIKznz
# aKBwFAl4BXM/xBECoutk6Igsym6OJnviU9zVjS1AaUgvXb9EyDpjSlwPqSWyG9t7
# s3qxwBFEHw+6fCSpcYC2MFemltpz1KzEffuaTv1tEDz15AvsyxpK8DlcmYiZqo5f
# cXCpOvqH/pWgJDqtTPI12XrHTQIGc0BQL0mEUFaXHrqQEy7aevBJoCI99Kwap3GS
# 5zmIf+vRgLDyIPXsMtEWFMeJynaCcu5D2wDcFdNmsVuBFSHLnCNV9J2s/l8e4w6Q
# mMGexaE6YuWodBBYJ8i6KXoNz0r8aFFLO7Y/4vg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_52_40.ps1 | sample_52_40.ps1 | #
# Module manifest for module 'OCI.PSModules.Dataintegration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataintegration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataintegrationApplication',
'Get-OCIDataintegrationApplicationDetailedDescription',
'Get-OCIDataintegrationApplicationsList',
'Get-OCIDataintegrationCompositeState',
'Get-OCIDataintegrationConnection',
'Get-OCIDataintegrationConnectionsList',
'Get-OCIDataintegrationConnectionValidation',
'Get-OCIDataintegrationConnectionValidationsList',
'Get-OCIDataintegrationCopyObjectRequest',
'Get-OCIDataintegrationCopyObjectRequestsList',
'Get-OCIDataintegrationCountStatistic',
'Get-OCIDataintegrationDataAsset',
'Get-OCIDataintegrationDataAssetsList',
'Get-OCIDataintegrationDataEntitiesList',
'Get-OCIDataintegrationDataEntity',
'Get-OCIDataintegrationDataFlow',
'Get-OCIDataintegrationDataFlowsList',
'Get-OCIDataintegrationDataFlowValidation',
'Get-OCIDataintegrationDataFlowValidationsList',
'Get-OCIDataintegrationDependentObject',
'Get-OCIDataintegrationDependentObjectsList',
'Get-OCIDataintegrationDisApplication',
'Get-OCIDataintegrationDisApplicationDetailedDescription',
'Get-OCIDataintegrationDisApplicationsList',
'Get-OCIDataintegrationDisApplicationTaskRunLineagesList',
'Get-OCIDataintegrationExportRequest',
'Get-OCIDataintegrationExportRequestsList',
'Get-OCIDataintegrationExternalPublication',
'Get-OCIDataintegrationExternalPublicationsList',
'Get-OCIDataintegrationExternalPublicationValidation',
'Get-OCIDataintegrationExternalPublicationValidationsList',
'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList',
'Get-OCIDataintegrationFunctionLibrariesList',
'Get-OCIDataintegrationFunctionLibrary',
'Get-OCIDataintegrationImportRequest',
'Get-OCIDataintegrationImportRequestsList',
'Get-OCIDataintegrationPatch',
'Get-OCIDataintegrationPatchChangesList',
'Get-OCIDataintegrationPatchesList',
'Get-OCIDataintegrationPipeline',
'Get-OCIDataintegrationPipelinesList',
'Get-OCIDataintegrationPipelineValidation',
'Get-OCIDataintegrationPipelineValidationsList',
'Get-OCIDataintegrationProject',
'Get-OCIDataintegrationProjectsList',
'Get-OCIDataintegrationPublishedObject',
'Get-OCIDataintegrationPublishedObjectsList',
'Get-OCIDataintegrationReference',
'Get-OCIDataintegrationReferencesList',
'Get-OCIDataintegrationRuntimeOperator',
'Get-OCIDataintegrationRuntimeOperatorsList',
'Get-OCIDataintegrationRuntimePipeline',
'Get-OCIDataintegrationRuntimePipelinesList',
'Get-OCIDataintegrationSchedule',
'Get-OCIDataintegrationSchedulesList',
'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList',
'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun',
'Get-OCIDataintegrationTaskRunLineagesList',
'Get-OCIDataintegrationTaskRunLogsList',
'Get-OCIDataintegrationTaskRunsList',
'Get-OCIDataintegrationTaskSchedule',
'Get-OCIDataintegrationTaskSchedulesList',
'Get-OCIDataintegrationTasksList',
'Get-OCIDataintegrationTaskValidation',
'Get-OCIDataintegrationTaskValidationsList',
'Get-OCIDataintegrationTemplate',
'Get-OCIDataintegrationTemplatesList',
'Get-OCIDataintegrationUserDefinedFunction',
'Get-OCIDataintegrationUserDefinedFunctionsList',
'Get-OCIDataintegrationUserDefinedFunctionValidation',
'Get-OCIDataintegrationUserDefinedFunctionValidationsList',
'Get-OCIDataintegrationWorkRequest',
'Get-OCIDataintegrationWorkRequestErrorsList',
'Get-OCIDataintegrationWorkRequestLogsList',
'Get-OCIDataintegrationWorkRequestsList',
'Get-OCIDataintegrationWorkspace',
'Get-OCIDataintegrationWorkspacesList',
'Move-OCIDataintegrationCompartment',
'Move-OCIDataintegrationDisApplicationCompartment',
'New-OCIDataintegrationApplication',
'New-OCIDataintegrationApplicationDetailedDescription',
'New-OCIDataintegrationConnection',
'New-OCIDataintegrationConnectionValidation',
'New-OCIDataintegrationCopyObjectRequest',
'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow',
'New-OCIDataintegrationDataFlowValidation',
'New-OCIDataintegrationDisApplication',
'New-OCIDataintegrationDisApplicationDetailedDescription',
'New-OCIDataintegrationEntityShape',
'New-OCIDataintegrationExportRequest',
'New-OCIDataintegrationExternalPublication',
'New-OCIDataintegrationExternalPublicationValidation',
'New-OCIDataintegrationFolder',
'New-OCIDataintegrationFunctionLibrary',
'New-OCIDataintegrationImportRequest',
'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline',
'New-OCIDataintegrationPipelineValidation',
'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule',
'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun',
'New-OCIDataintegrationTaskSchedule',
'New-OCIDataintegrationTaskValidation',
'New-OCIDataintegrationUserDefinedFunction',
'New-OCIDataintegrationUserDefinedFunctionValidation',
'New-OCIDataintegrationWorkspace',
'Remove-OCIDataintegrationApplication',
'Remove-OCIDataintegrationApplicationDetailedDescription',
'Remove-OCIDataintegrationConnection',
'Remove-OCIDataintegrationConnectionValidation',
'Remove-OCIDataintegrationCopyObjectRequest',
'Remove-OCIDataintegrationDataAsset',
'Remove-OCIDataintegrationDataFlow',
'Remove-OCIDataintegrationDataFlowValidation',
'Remove-OCIDataintegrationDisApplication',
'Remove-OCIDataintegrationDisApplicationDetailedDescription',
'Remove-OCIDataintegrationExportRequest',
'Remove-OCIDataintegrationExternalPublication',
'Remove-OCIDataintegrationExternalPublicationValidation',
'Remove-OCIDataintegrationFolder',
'Remove-OCIDataintegrationFunctionLibrary',
'Remove-OCIDataintegrationImportRequest',
'Remove-OCIDataintegrationPatch',
'Remove-OCIDataintegrationPipeline',
'Remove-OCIDataintegrationPipelineValidation',
'Remove-OCIDataintegrationProject',
'Remove-OCIDataintegrationSchedule',
'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun',
'Remove-OCIDataintegrationTaskSchedule',
'Remove-OCIDataintegrationTaskValidation',
'Remove-OCIDataintegrationUserDefinedFunction',
'Remove-OCIDataintegrationUserDefinedFunctionValidation',
'Remove-OCIDataintegrationWorkspace',
'Start-OCIDataintegrationWorkspace',
'Stop-OCIDataintegrationWorkspace',
'Update-OCIDataintegrationApplication',
'Update-OCIDataintegrationApplicationDetailedDescription',
'Update-OCIDataintegrationConnection',
'Update-OCIDataintegrationCopyObjectRequest',
'Update-OCIDataintegrationDataAsset',
'Update-OCIDataintegrationDataFlow',
'Update-OCIDataintegrationDisApplication',
'Update-OCIDataintegrationDisApplicationDetailedDescription',
'Update-OCIDataintegrationExportRequest',
'Update-OCIDataintegrationExternalPublication',
'Update-OCIDataintegrationFolder',
'Update-OCIDataintegrationFunctionLibrary',
'Update-OCIDataintegrationImportRequest',
'Update-OCIDataintegrationPipeline',
'Update-OCIDataintegrationProject',
'Update-OCIDataintegrationReference',
'Update-OCIDataintegrationSchedule',
'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun',
'Update-OCIDataintegrationTaskSchedule',
'Update-OCIDataintegrationUserDefinedFunction',
'Update-OCIDataintegrationWorkspace'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_29_12.ps1 | sample_29_12.ps1 | #
# Module manifest for module 'OCI.PSModules.Resourcemanager'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '73e0f641-602c-4457-9e79-f05b84ced282'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Resourcemanager Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider',
'Get-OCIResourcemanagerConfigurationSourceProvidersList',
'Get-OCIResourcemanagerJob',
'Get-OCIResourcemanagerJobAssociatedResourcesList',
'Get-OCIResourcemanagerJobDetailedLogContent',
'Get-OCIResourcemanagerJobLogs',
'Get-OCIResourcemanagerJobLogsContent',
'Get-OCIResourcemanagerJobOutputsList',
'Get-OCIResourcemanagerJobsList',
'Get-OCIResourcemanagerJobTfConfig',
'Get-OCIResourcemanagerJobTfPlan',
'Get-OCIResourcemanagerJobTfState',
'Get-OCIResourcemanagerPrivateEndpoint',
'Get-OCIResourcemanagerPrivateEndpointsList',
'Get-OCIResourcemanagerReachableIp',
'Get-OCIResourcemanagerResourceDiscoveryServicesList',
'Get-OCIResourcemanagerStack',
'Get-OCIResourcemanagerStackAssociatedResourcesList',
'Get-OCIResourcemanagerStackResourceDriftDetailsList',
'Get-OCIResourcemanagerStacksList',
'Get-OCIResourcemanagerStackTfConfig',
'Get-OCIResourcemanagerStackTfState',
'Get-OCIResourcemanagerTemplate',
'Get-OCIResourcemanagerTemplateCategoriesList',
'Get-OCIResourcemanagerTemplateLogo',
'Get-OCIResourcemanagerTemplatesList',
'Get-OCIResourcemanagerTemplateTfConfig',
'Get-OCIResourcemanagerTerraformVersionsList',
'Get-OCIResourcemanagerWorkRequest',
'Get-OCIResourcemanagerWorkRequestErrorsList',
'Get-OCIResourcemanagerWorkRequestLogsList',
'Get-OCIResourcemanagerWorkRequestsList',
'Invoke-OCIResourcemanagerDetectStackDrift',
'Move-OCIResourcemanagerConfigurationSourceProviderCompartment',
'Move-OCIResourcemanagerPrivateEndpointCompartment',
'Move-OCIResourcemanagerStackCompartment',
'Move-OCIResourcemanagerTemplateCompartment',
'New-OCIResourcemanagerConfigurationSourceProvider',
'New-OCIResourcemanagerJob',
'New-OCIResourcemanagerPrivateEndpoint',
'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate',
'Remove-OCIResourcemanagerConfigurationSourceProvider',
'Remove-OCIResourcemanagerPrivateEndpoint',
'Remove-OCIResourcemanagerStack',
'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob',
'Update-OCIResourcemanagerConfigurationSourceProvider',
'Update-OCIResourcemanagerJob',
'Update-OCIResourcemanagerPrivateEndpoint',
'Update-OCIResourcemanagerStack',
'Update-OCIResourcemanagerTemplate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_55_18.ps1 | sample_55_18.ps1 | function PSConsoleHostReadLine
{
Microsoft.PowerShell.Core\Set-StrictMode -Off
[Microsoft.PowerShell.PSConsoleReadLine]::ReadLine($host.Runspace, $ExecutionContext)
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD/yRWgb1v9cAF2
# Fgsa5s1DKnPsG+9RpMttigLBfuGUKqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAt9WRKOrJpbVifN0+CNmTKO
# 6Uw1noM98dTqLXTOiQBqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEALx3TiQNsp+DXTqDmzrFVZrasYU1QQYl5rthDgHrxOjfq5v+SZ8pqADyq
# s/+q1kjL5OAnUuAo9nYXCr8kIGJ8GoVXC4rVaahNjuQfSvcVsbPIYXgIW1WubN4E
# CObN+03qwygkl7TP/bZMheBOrLagW/geh1QFPQlQMliQubNKA+MCHGltwz1pt4PM
# bwas5Uj8Rdt1CBrkihFgh1U7Gtfn9V7ONq3g1FKuxK9rXjI0KQNh69XVu8wLYHy6
# PJLWzXIETIw6DiJaySkV9Wfo6+Z9DCuHE/rDGbSLw+fD1BTph8pPIetHuPOQc6Yx
# jcTY3Pvs3LxP7ViNtJ3xthJs/Gkj56GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD0VJ/jqzHCYxkTO1Zn3fZoNDzBb10pWkIvOhji+U/1gAIGZmrksMRW
# GBMyMDI0MDcxMTIxMjQzNC40NzZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jpK4DAiGA8yMDI0MDcxMTEyMTMy
# MFoYDzIwMjQwNzEyMTIxMzIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqOkrg
# AgEAMAoCAQACAhPNAgH/MAcCAQACAhU8MAoCBQDqO5xgAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBACBnRqYczTDGn2DNLC92/HW4J7iO0wy6k6f086j0UWeY
# cKjyBzr8qONV7U7U+2YXsh7Iwoz3Mdwq72bsyspGY/Qbn/Qu/R6yGiuc8lJo/1sQ
# MnfhbsPFHYg5eSWXAzzjGoexPhP+QtCPUFq/9G1qDP7pNTdR8nNTjMi0an5N/8LJ
# YvVC3M5BFLYDKpeqMG2XVbLRNRfRYikBLYwQ2eRkj++VeR9gGF4rsx0RDzXXwuek
# CFq7VWJYez8+6WwtwE7UsxAqkKS4BNojp6wawVQJ8dVjDO+a2h3wfktFXSzSvOpW
# d/+3Nvt0jBGBxiHyu2EbTGbuIxIRexAnBNKNuc5g2q4xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCsRPNBFISZr2FMvLlMjcTU0PgsMreKCJdxR2Z3lk7r
# bTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgx8FBQVZ1ON/YKQ3E0c9NQYID
# RYVXpX6utybo891g/2EwDQYJKoZIhvcNAQELBQAEggIALyNjXSoD2fE8G7iT9lRR
# rvEeZ4Tbl8oxMvLRgNfySV+7m1XQm+5RzGdOjxWXMeDXhEri4Kckp20Yl+lBQnxP
# AJvhyny0EPkvZl9NYo1giVNf+mTJzDYItl2uQH7YNKZcSz9iZtuhL6BGwXbOq+Jw
# uefTzNc/7OP1/aI0UaNzWqJhdN/QWNa8mD/H1Tx7Xd8VXAhrsQA1GbW77ykOYrr4
# 7gZj0K8qjLE0GxRf/sx6rqQK3M8Va7Y7KI1xbybLg/PG4qtf0RznY9lgvRkfMupz
# dAqSNxat02/f6v/e89gQmxGxF74NGI14nUZq3t+4yZwlaQ28yd4lGCnjTCqrK0me
# RWe0iB0D4TmqPs0tltn4qBbPdjNriI1mr5UcAXNQ54dswoqrixDBelYcmXy6Buou
# OeT8NKTcRbx2gU8kTfpIiYY3Er9aKh0cGBv2JZos56ilJbDXMHD/IIiBcsWxMGwc
# QkPrwixI/1UgbgRaV5jjj1kIUex5aFG8rxPwS8pAs+j4CIYvEhQ03XLbl2iiDkic
# EP15KFyzpWeoKebE3F8jcmFi5fzc/Gh1o0/NDIFUW44WOOq4tGS6tYex44Et8fBO
# Ts8IOKsxKGGWasw7Gd4PuJFEuC13O0KS5+orYzlu+S3C1ZL7vvw75X9E/Dequ/z5
# CwTc4fv14hkWDihkatXyJDY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2690.ps1 | 2690.ps1 | function Register-ProcessModuleTrace
{
[CmdletBinding()] Param ()
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator'))
{
throw 'You must run this cmdlet from an elevated PowerShell session.'
}
$ModuleLoadedAction = {
$Event = $EventArgs.NewEvent
$ModuleInfo = @{
TimeCreated = [DateTime]::FromFileTime($Event.TIME_CREATED)
ProcessId = $Event.ProcessId
FileName = $Event.FileName
ImageBase = $Event.ImageBase
ImageSize = $Event.ImageSize
}
$ModuleObject = New-Object PSObject -Property $ModuleInfo
$ModuleObject.PSObject.TypeNames[0] = 'LOADED_MODULE'
$ModuleObject
}
Register-WmiEvent 'Win32_ModuleLoadTrace' -SourceIdentifier 'ModuleLoaded' -Action $ModuleLoadedAction
}
function Get-ProcessModuleTrace
{
$Events = Get-EventSubscriber -SourceIdentifier 'ModuleLoaded' -ErrorVariable NoEventRegistered -ErrorAction SilentlyContinue
if ($NoEventRegistered)
{
throw 'You must execute Register-ProcessModuleTrace before you can retrieve a loaded module list'
}
$Events.Action.Output
}
function Unregister-ProcessModuleTrace
{
Unregister-Event -SourceIdentifier 'ModuleLoaded'
}
|
combined_dataset/train/non-malicious/2811.ps1 | 2811.ps1 |
if (Get-Command logparser.exe) {
$lpquery = @"
SELECT
COUNT(ImagePath, LaunchString, Publisher) as ct,
ImagePath,
LaunchString
FROM
*autorunsc.tsv
WHERE
(ImagePath not like 'File not found%')
GROUP BY
ImagePath,
LaunchString
ORDER BY
ct ASC
"@
& logparser -stats:off -i:csv -dtlines:0 -fixedsep:on -rtp:-1 "$lpquery"
} else {
$ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName)
"${ScriptName} requires logparser.exe in the path."
}
|
combined_dataset/train/non-malicious/1612.ps1 | 1612.ps1 |
function Get-PrinterClients {
Param (
[string]$comp = $env:COMPUTERNAME
)
if (!$comp) { throw 'No comp.' }
$ping = New-Object System.Net.NetworkInformation.Ping
try {
$result = $ping.Send($comp)
} catch {
$result = $null
}
if ($result.Status -eq 'Success') {
$reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('Users', $comp)
[string[]]$users = $reg.GetSubKeyNames() | ? {$_ -match '-\d{5}$'}
foreach ($user in $users) {
try {
$printers = $reg.OpenSubKey("$user\printers\connections").GetSubKeyNames()
} catch {
$printers = '-'
}
if ($printers -ne '-') {
$printers = @($printers | % {$_.Substring(2).Replace(',', '\').ToUpper()} | select -Unique) -join '; '
}
[pscustomobject]@{
Computer = $comp
IP = $result.Address.ToString()
User = ([System.Security.Principal.SecurityIdentifier]($user)).Translate([System.Security.Principal.NTAccount]).Value
Printer = $printers
}
}
} else {
[pscustomobject]@{
Computer = $comp
IP = '-'
User = '-'
Printer = '-'
}
}
}
|
combined_dataset/train/non-malicious/Get-Parameter function.ps1 | Get-Parameter function.ps1 |
function Get-Parameters {
param([string]$CommandName, [switch]$IncludeCommon)
try {
$command = get-command $commandname
$parameters = (new-object System.Management.Automation.CommandMetaData $command, $includecommon).Parameters
$parameters.getenumerator() # unroll dictionary
} catch {
write-warning "Could not find command or obtain parameters for $commandname"
}
}
|
combined_dataset/train/non-malicious/2353.ps1 | 2353.ps1 |
$error.PSBase.Clear()
$aRegRoots = @('HKCU\Software','HKLM\System','HKLM\Software');
$aGpos = Get-Gpo -All;
$aUniqueSettings = @();
$aUniqueDups = @();
function findRegValues($sName,$sId,$sKeyPath,$aKeyPathHistory = $null) {
$aPath = Get-GPRegistryValue -GUID $sId -Key $sKeyPath -ErrorAction 'silentlycontinue'
$aKeyPathHistory = @();
foreach ($oKeyPath in $aPath) {
if ($oKeyPath) {
if (Test-Member $oKeyPath Value) {
if ($aKeyPathHistory -notcontains $oKeyPath.FullKeyPath) {
$o = New-Object System.Object;
$o | Add-Member -type NoteProperty -Name 'GUID' -Value $sId;
$o | Add-Member -type NoteProperty -Name 'Name' -Value $sName;
$o | Add-Member -type NoteProperty -Name 'Key' -Value $sKeyPath;
$o | Add-Member -type NoteProperty -Name 'Value' -Value $oKeyPath.Value;
if ($aUniqueSettings -notcontains "$sKeyPath|$($oKeyPath.Value)") {
$aUniqueSettings += "$sKeyPath|$($oKeyPath.Value)";
} elseif ($aUniqueDups -notcontains "$sKeyPath|$($oKeyPath.Value)") {
"$sName|$sKeyPath|$($oKeyPath.Value)";
$aUniqueDups += "$sKeyPath|$($oKeyPath.Value)";
}
}
} elseif (Test-Member $oKeyPath FullKeyPath) {
$aKeyPathHistory += $oKeyPath.FullKeyPath;
findRegValues $sName $sId $oKeyPath.FullKeyPath $aKeyPathHistory
}
}
}
}
$aRegValues = @();
foreach ($oGpo in $aGpos) {
$sGuid = $oGpo.Id;
$sName = $oGpo.DisplayName;
foreach ($sRegRoot in $aRegRoots) {
findRegValues $sName $sGuid $sRegRoot
}
} |
combined_dataset/train/non-malicious/sample_32_2.ps1 | sample_32_2.ps1 | #
# Module manifest for module 'OCI.PSModules.Streaming'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Streaming.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Streaming Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIStreamingConnectHarness',
'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup',
'Get-OCIStreamingMessages', 'Get-OCIStreamingStream',
'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList',
'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit',
'Invoke-OCIStreamingConsumerHeartbeat',
'Move-OCIStreamingConnectHarnessCompartment',
'Move-OCIStreamingStreamCompartment',
'Move-OCIStreamingStreamPoolCompartment',
'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor',
'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream',
'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness',
'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool',
'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup',
'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool',
'Write-OCIStreamingMessages'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3905.ps1 | 3905.ps1 |
function Test-JobScheduleCRUD
{
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
$jsId1 = "jobSchedule1"
$jsId2 = "jobSchedule2"
try
{
$jobSpec1 = New-Object Microsoft.Azure.Commands.Batch.Models.PSJobSpecification
$jobSpec1.PoolInformation = New-Object Microsoft.Azure.Commands.Batch.Models.PSPoolInformation
$jobSpec1.PoolInformation.PoolId = "testPool"
$schedule1 = New-Object Microsoft.Azure.Commands.Batch.Models.PSSchedule
New-AzBatchJobSchedule -Id $jsId1 -JobSpecification $jobSpec1 -Schedule $schedule1 -BatchContext $context
$jobSpec2 = New-Object Microsoft.Azure.Commands.Batch.Models.PSJobSpecification
$jobSpec2.PoolInformation = New-Object Microsoft.Azure.Commands.Batch.Models.PSPoolInformation
$jobSpec2.PoolInformation.PoolId = "testPool2"
$schedule2 = New-Object Microsoft.Azure.Commands.Batch.Models.PSSchedule
$schedule2.DoNotRunUntil = New-Object System.DateTime -ArgumentList @(2020, 01, 01, 12, 30, 0)
New-AzBatchJobSchedule -Id $jsId2 -JobSpecification $jobSpec2 -Schedule $schedule2 -BatchContext $context
$jobSchedules = Get-AzBatchJobSchedule -Filter "id eq '$jsId1' or id eq '$jsId2'" -BatchContext $context
$jobSchedule1 = $jobSchedules | Where-Object { $_.Id -eq $jsId1 }
$jobSchedule2 = $jobSchedules | Where-Object { $_.Id -eq $jsId2 }
Assert-NotNull $jobSchedule1
Assert-NotNull $jobSchedule2
$jobSchedule2.Schedule.DoNotRunUntil = $newDoNotRunUntil = New-Object System.DateTime -ArgumentList @(2025, 01, 01, 12, 30, 0)
$jobSchedule2 | Set-AzBatchJobSchedule -BatchContext $context
$updatedJobSchedule = Get-AzBatchJobSchedule -Id $jsId2 -BatchContext $context
Assert-AreEqual $newDoNotRunUntil $updatedJobSchedule.Schedule.DoNotRunUntil
}
finally
{
Remove-AzBatchJobSchedule -Id $jsId1 -Force -BatchContext $context
Remove-AzBatchJobSchedule -Id $jsId2 -Force -BatchContext $context
foreach ($js in Get-AzBatchJobSchedule -BatchContext $context)
{
Assert-True { ($js.Id -ne $jsId1 -and $js.Id -ne $jsId2) -or ($js.State.ToString().ToLower() -eq 'deleting') }
}
}
}
function Test-DisableEnableTerminateJobSchedule
{
param([string]$jobScheduleId)
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
Disable-AzBatchJobSchedule $jobScheduleId -BatchContext $context
$jobSchedule = Get-AzBatchJobSchedule $jobScheduleId -BatchContext $context
Assert-AreEqual 'Disabled' $jobSchedule.State
$jobSchedule | Enable-AzBatchJobSchedule -BatchContext $context
$jobSchedule = Get-AzBatchJobSchedule -Filter "id eq '$jobScheduleId'" -BatchContext $context
Assert-AreEqual 'Active' $jobSchedule.State
$jobSchedule | Stop-AzBatchJobSchedule -BatchContext $context
$jobSchedule = Get-AzBatchJobSchedule $jobScheduleId -BatchContext $context
Assert-True { ($jobSchedule.State.ToString().ToLower() -eq 'terminating') -or ($jobSchedule.State.ToString().ToLower() -eq 'completed') }
} |
combined_dataset/train/non-malicious/LibraryChart_4.ps1 | LibraryChart_4.ps1 | # ---------------------------------------------------------------------------
### <Script>
### <Author>
### Chad Miller
### </Author>
### <Description>
### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework
### Pipe output of Powershell command to Out-Chart function and specify chart type
### Chart will display in form or save to image file
### Real-time charts are supported by passing in a script block
### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell
### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx
### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5
### </Description>
### <Usage>
### . ./LibraryChart.ps1
### -------------------------- EXAMPLE 1 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS'
###
### This command will produce a default column chart
###
### -------------------------- EXAMPLE 2 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png'
### This command will output the chart to a file
###
### -------------------------- EXAMPLE 3 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie'
###
### This command will produce a pie chart
###
### -------------------------- EXAMPLE 4 --------------------------
### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line'
###
### This command will produce a real-time line chart
###
### </Usage>
### </Script>
# --------------------------------------------------------------------------
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization")
#######################
function New-Chart
{
param ([int]$width,[int]$height,[int]$left,[int]$top,$chartTitle)
# create chart object
$global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart
$global:Chart.Width = $width
$global:Chart.Height = $height
$global:Chart.Left = $left
$global:Chart.Top = $top
# create a chartarea to draw on and add to chart
$chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea
$global:chart.ChartAreas.Add($chartArea)
if ($chartTitle)
{ [void]$global:Chart.Title.Add($chartTitle) }
# change chart area colour
$global:Chart.BackColor = [System.Drawing.Color]::Transparent
} #New-Chart
#######################
function New-BarColumnChart
{
param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
$chart.ChartAreas[0].AxisX.Title = $xTitle
$chart.ChartAreas[0].AxisY.Title = $yTitle
[void]$global:Chart.Series.Add("Data")
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values)
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType
if ($asc)
{ $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") }
else
{ $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") }
$global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder"
$global:chart.Series["Data"].IsValueShownAsLabel = $true
$global:chart.Series["Data"]["LabelStyle"] = "Top"
} #New-BarColumnChart
#######################
function New-LineChart
{
param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
[void]$global:Chart.Series.Add("Data")
# $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values))
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values)
#$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time
#$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss"
#$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1
#$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line
#$global:chart.Series["Data"].IsValueShownAsLabel = $false
} #New-LineChart
#######################
function New-PieChart
{
param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
[void]$global:Chart.Series.Add("Data")
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values)
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie
$global:Chart.Series["Data"]["PieLabelStyle"] = "Outside"
$global:Chart.Series["Data"]["PieLineColor"] = "Black"
#$global:chart.Series["Data"].IsValueShownAsLabel = $true
#$global:chart.series["Data"].Label = "#PERCENT{P1}"
#$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend
#$global:Chart.Legends.Add($legend)
#$Legend.Name = "Default"
} #New-PieChart
#######################
function Remove-Points
{
param($name='Data',[int]$maxPoints=200)
while ( $global:chart.Series["$name"].Points.Count > $maxPoints )
{ $global:chart.Series["$name"].Points.RemoveAT(0) }
} #Add-Series
#######################
function Out-Form
{
param($interval,$scriptBlock,$xField,$yField)
# display the chart on a form
$global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor
[System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left
$Form = New-Object Windows.Forms.Form
$Form.Text = 'PowerCharts'
$Form.Width = 600
$Form.Height = 600
$Form.controls.add($global:Chart)
if ($scriptBlock -is [ScriptBlock])
{
if (!($xField -or $yField))
{ throw 'xField and yField required with scriptBlock parameter.' }
$timer = New-Object System.Windows.Forms.Timer
$timer.Interval = $interval
$timer.add_Tick({
$ht = &$scriptBlock | ConvertTo-HashTable $xField $yField
if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line')
{
Remove-Points
$ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) }
}
else
{ $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) }
$global:chart.ResetAutoValues()
$global:chart.Invalidate()
})
$timer.Enabled = $true
$timer.Start()
}
$Form.Add_Shown({$Form.Activate()})
$Form.ShowDialog()
} #Out-Form
#######################
function Out-ImageFile
{
param($fileName,$fileformat)
$global:Chart.SaveImage($fileName,$fileformat)
}
#######################
### ConvertTo-Hashtable function based on code by Jeffery Snover
### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx
#######################
function ConvertTo-Hashtable
{
param([string]$key, $value)
Begin
{
$hash = @{}
}
Process
{
$thisKey = $_.$Key
$hash.$thisKey = $_.$Value
}
End
{
Write-Output $hash
}
} #ConvertTo-Hashtable
#######################
function Out-Chart
{
param( $xField=$(throw 'Out-Chart:xField is required'),
$yField=$(throw 'Out-Chart:yField is required'),
$chartType='Column',$chartTitle,
[int]$width=500,
[int]$height=400,
[int]$left=40,
[int]$top=30,
$filename,
$fileformat='png',
[int]$interval=1000,
$scriptBlock,
[switch]$asc
)
Begin
{
$ht = @{}
}
Process
{
if ($_)
{
$thisKey = $_.$xField
$ht.$thisKey = $_.$yField
}
}
End
{
if ($scriptBlock)
{ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField }
switch ($chartType)
{
'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)}
'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)}
'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top }
'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top }
}
if ($filename)
{ Out-ImageFile $filename $fileformat }
elseif ($scriptBlock )
{ Out-Form $interval $scriptBlock $xField $yField }
else
{ Out-Form }
}
} #Out-Chart
|
combined_dataset/train/non-malicious/sample_21_49.ps1 | sample_21_49.ps1 | # PowerShell Scripting Best Practices
This document is intended as guidance for how all PowerShell scripts should be written for security, functionality, and consistency.
To help enforce these rules during your dev process, consider using [PSScriptAnalyzer](https://github.com/PowerShell/PSScriptAnalyzer). Each of the sections below contains the rule code for enabling the corresponding check in PSScriptAnalyzer where one exists. Additionally, the analyzer is built in as a linter in the [PowerShell VSCode extension](https://marketplace.visualstudio.com/items?itemName=ms-vscode.PowerShell). We have created a [settings file](/eng/common/PSScriptAnalyzer.psd1) to be used with this linter.
## Do not use Invoke-Expression or script blocks built with string concatenation
*PSScriptAnalyzer Rule: AvoidUsingInvokeExpression*
Invoke-Expression and non-parameterized script blocks are both vulnerable to injection.
### Invoke-Expression injection
Invoke-Expression executes a specified string, which is vulnerable to injection attacks. As an example:
```powershell
$function = "Write-Host"
$argument = "hello; Write-Host injected"
Invoke-Expression "$function $argument"
```
will return:
```console
hello
injected
```
While the following script:
```powershell
$function = "Write-Host"
$argument = "hello; Write-Host injected"
& $function $argument
```
will return:
```console
hello; Write-Host injected
```
as would be expected.
In general, this guidance can be summarized as **don't use Invoke-Expression**.
### Script-block injection
Similarly, the following script block is also vulnerable to injection.
```powershell
$UserInputVar = "hello; Write-Host injected"
$DynamicScript = "Write-Host $UserInputVar"
$ScriptBlock = [ScriptBlock]::Create($DynamicScript)
Invoke-Command $ScriptBlock
```
This returns:
```console
hello
injected
```
While this script:
```powershell
$UserInputVar = "hello; Write-Host injected"
[ScriptBlock]$ScriptBlock = {
Param($SafeUserInput)
Write-Host $SafeUserInput
}
Invoke-Command -ScriptBlock $ScriptBlock -ArgumentList @($UserInputVar)
```
correctly outputs:
```console
hello; Write-Host injected
```
In general, this guidance can be summarized as **don't use [ScriptBlock]::Create**.
## Prefix script and executable calls with &
When a script/executable is prefixed with an ampersand (`&`), the command which follows can be in quotation marks or include variables. This is not the case when the ampersand is not included. Thus, we recommend always including an ampersand.
## Check $LASTEXITCODE after calling
Relatedly, `$LASTEXITCODE` should always be checked after running an executable to ensure that the script fails (or at least responds appropriately) to the executable failing.
Combining this with the previous piece of advice, the way to call `git add .` from a script would be:
```powershell
& git add .
if ($LASTEXITCODE -ne 0) {
# behavior in case of error
}
```
To set it in a PowerShell script, e.g. to ensure a known value at the start of a script, reference the variable in the global scope.
```powershell
$global:LASTEXITCODE = 0
```
## Set StrictMode and ErrorActionPreference at the top of every file
Scripts should always include the following just below the parameter definition block:
```powershell
Set-StrictMode -Version 2.0
$ErrorActionPreference = "Stop"
```
This will ensure PowerShell uses the proper version and that encountered errors cause the script to fail.
## Do not use aliases in scripts
*PSScriptAnalyzer Rule: AvoidUsingCmdletAliases*
Cmdlet aliases (such as `ls` for `Get-ChildItem` and `echo` for `Write-Output`) are not universal across all machines and all installs of PowerShell. Furthermore, aliases can cause confusion as the cmdlets frequently behave entirely differently from the commands the aliases are named for, e.g. cmd's `dir` vs. `Get-ChildItem` or bash's `wget` and `curl` vs. `Invoke-WebRequest`. Always use the actual cmdlet name.
To determine what cmdlet an alias points to, simply run:
**Exceptions**: `%` and `?` are aliases for `ForEach-Object` and `Where-Object`, respectively. These aliases can be left in code and warnings related to them can be ignored.
```powershell
Get-Alias $alias
```
e.g.
```powershell
Get-Alias ls
```
returns:
```console
CommandType Name Version Source
----------- ---- ------- ------
Alias ls -> Get-ChildItem
```
## Use CIM cmdlets rather than WMI ones
*PSScriptAnalyzer Rule: AvoidUsingWMICmdlet*
PowerShell recommends avoiding all the WMI cmdlets (`Get-WmiObject`, `Remove-WmiObject`, `Invoke-WmiObject`, `Register-WmiEvent`, `Set-WmiInstance`) and instead using the CIM ones (respectively, `Get-CimInstance`, `Remove-CimInstance`, `Invoke-CimMethod`, `Register-CimIndicationEvent`, `Set-CimInstance`).
## Disable positional binding for your parameters
*PSScriptAnalyzer Rule: AvoidUsingPositionalParameters*
Positional parameters cause problems for code maintenance, as adding new parameters later down the line can break previous invocations. Instead, parameters should always be called explicitly. Setting:
```powershell
[CmdletBinding(PositionalBinding=$false)]
```
will force this behavior.
*Note: This rule will check for the usage of positional parameters rather than forcing binding to turn them off.*
<!-- Begin Generated Content: Doc Feedback -->
<sub>Was this helpful? [](https://helix.dot.net/f/p/5?p=Documentation%5CPolicy%5CPowershellBestPractices.md) [](https://helix.dot.net/f/n/5?p=Documentation%5CPolicy%5CPowershellBestPractices.md)</sub>
<!-- End Generated Content-->
|
combined_dataset/train/non-malicious/Function Run-Script.ps1 | Function Run-Script.ps1 | function Run-Script {
if ($psISE.CurrentFile.DisplayName.StartsWith("Untitled")) {
return
}
$script = $psISE.CurrentFile.DisplayName
$psISE.CurrentFile.Save()
$logfile = "$env:programfiles\\Sea Star Development\\" +
"Script Monitor Service\\ScriptMon.txt" #Change to suit.
if (!(Test-Path env:\\JobCount)) {
$env:JobCount = 1 #This will work across multi Tab sessions.
}
$number = $env:JobCount.PadLeft(4,'0')
$startTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss"
$tag = "$startTime [$script] start. --> PSE $($myInvocation.Line)"
if (Test-Path $logfile) {
$tag | Out-File $logfile -encoding 'Default' -Append
}
"$startTime [$script] started."
Write-EventLog -Logname Scripts -Source Monitor -EntryType Information -EventID 2 -Category 002 -Message "Script Job: $script (PSE$number) started."
Invoke-Command -Scriptblock { & "$pwd\\$script" }
$endTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss"
$tag = "$endTime [$script] ended. --> PSE $($myInvocation.Line)"
if (Test-Path $logfile) {
$tag | Out-File $logfile -encoding 'Default' -Append
}
"$endTime [$script] ended."
Write-Eventlog -Logname Scripts -Source Monitor -EntryType Information -EventID 1 -Category 001 -Message "Script Job: $script (PSE$number) ended."
$env:JobCount = [int]$env:JobCount+1
}
$psISE.CurrentPowerShellTab.AddOnsMenu.Submenus.Add("Run Script",{Run-Script}, "Alt+R") | Out-Null
|
combined_dataset/train/non-malicious/sample_59_4.ps1 | sample_59_4.ps1 | #
# Module manifest for module 'OCI.PSModules.Nosql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Nosql.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6350988d-a08e-4817-bfff-d79172f60809'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Nosql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Nosql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCINosqlIndex', 'Get-OCINosqlIndexesList', 'Get-OCINosqlRow',
'Get-OCINosqlTable', 'Get-OCINosqlTablesList',
'Get-OCINosqlTableUsageList', 'Get-OCINosqlWorkRequest',
'Get-OCINosqlWorkRequestErrorsList',
'Get-OCINosqlWorkRequestLogsList', 'Get-OCINosqlWorkRequestsList',
'Invoke-OCINosqlPrepareStatement', 'Invoke-OCINosqlQuery',
'Invoke-OCINosqlSummarizeStatement',
'Move-OCINosqlTableCompartment', 'New-OCINosqlIndex',
'New-OCINosqlReplica', 'New-OCINosqlTable', 'Remove-OCINosqlIndex',
'Remove-OCINosqlReplica', 'Remove-OCINosqlRow',
'Remove-OCINosqlTable', 'Remove-OCINosqlWorkRequest',
'Update-OCINosqlRow', 'Update-OCINosqlTable'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Nosql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-NetworkStatistics_1.ps1 | Get-NetworkStatistics_1.ps1 | function Get-NetworkStatistics
{
[OutputType('System.Management.Automation.PSObject')]
[CmdletBinding(DefaultParameterSetName='name')]
param(
[Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName='port')]
[System.String]$Port='*',
[Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName='name')]
[System.String]$ProcessName='*',
[Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName='address')]
[System.String]$Address='*',
[Parameter()]
[ValidateSet('*','tcp','udp')]
[System.String]$Protocol='*',
[Parameter()]
[ValidateSet('*','Closed','CloseWait','Closing','DeleteTcb','Established','FinWait1','FinWait2','LastAck','Listen','SynReceived','SynSent','TimeWait','Unknown')]
[System.String]$State='*'
)
begin
{
$properties = 'Protocol','LocalAddress','LocalPort'
$properties += 'RemoteAddress','RemotePort','State','ProcessName','PID'
}
process
{
netstat -ano | Select-String -Pattern '\\s+(TCP|UDP)' | ForEach-Object {
$item = $_.line.split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)
if($item[1] -notmatch '^\\[::')
{
if (($la = $item[1] -as [ipaddress]).AddressFamily -eq 'InterNetworkV6')
{
$localAddress = $la.IPAddressToString
$localPort = $item[1].split('\\]:')[-1]
}
else
{
$localAddress = $item[1].split(':')[0]
$localPort = $item[1].split(':')[-1]
}
if (($ra = $item[2] -as [ipaddress]).AddressFamily -eq 'InterNetworkV6')
{
$remoteAddress = $ra.IPAddressToString
$remotePort = $item[2].split('\\]:')[-1]
}
else
{
$remoteAddress = $item[2].split(':')[0]
$remotePort = $item[2].split(':')[-1]
}
$procId = $item[-1]
$procName = (Get-Process -Id $item[-1] -ErrorAction SilentlyContinue).Name
$proto = $item[0]
$status = if($item[0] -eq 'tcp') {$item[3]} else {$null}
$pso = New-Object -TypeName PSObject -Property @{
PID = $procId
ProcessName = $procName
Protocol = $proto
LocalAddress = $localAddress
LocalPort = $localPort
RemoteAddress =$remoteAddress
RemotePort = $remotePort
State = $status
} | Select-Object -Property $properties
if($PSCmdlet.ParameterSetName -eq 'port')
{
if($pso.RemotePort -like $Port -or $pso.LocalPort -like $Port)
{
if($pso.Protocol -like $Protocol -and $pso.State -like $State)
{
$pso
}
}
}
if($PSCmdlet.ParameterSetName -eq 'address')
{
if($pso.RemoteAddress -like $Address -or $pso.LocalAddress -like $Address)
{
if($pso.Protocol -like $Protocol -and $pso.State -like $State)
{
$pso
}
}
}
if($PSCmdlet.ParameterSetName -eq 'name')
{
if($pso.ProcessName -like $ProcessName)
{
if($pso.Protocol -like $Protocol -and $pso.State -like $State)
{
$pso
}
}
}
}
}
}
<#
.SYNOPSIS
Displays the current TCP/IP connections.
.DESCRIPTION
Displays active TCP connections and includes the process ID (PID) and Name for each connection.
If the port is not yet established, the port number is shown as an asterisk (*).
.PARAMETER ProcessName
Gets connections by the name of the process. The default value is '*'.
.PARAMETER Port
The port number of the local computer or remote computer. The default value is '*'.
.PARAMETER Address
Gets connections by the IP address of the connection, local or remote. Wildcard is supported. The default value is '*'.
.PARAMETER Protocol
The name of the protocol (TCP or UDP). The default value is '*' (all)
.PARAMETER State
Indicates the state of a TCP connection. The possible states are as follows:
Closed - The TCP connection is closed.
CloseWait - The local endpoint of the TCP connection is waiting for a connection termination request from the local user.
Closing - The local endpoint of the TCP connection is waiting for an acknowledgement of the connection termination request sent previously.
DeleteTcb - The transmission control buffer (TCB) for the TCP connection is being deleted.
Established - The TCP handshake is complete. The connection has been established and data can be sent.
FinWait1 - The local endpoint of the TCP connection is waiting for a connection termination request from the remote endpoint or for an acknowledgement of the connection termination request sent previously.
FinWait2 - The local endpoint of the TCP connection is waiting for a connection termination request from the remote endpoint.
LastAck - The local endpoint of the TCP connection is waiting for the final acknowledgement of the connection termination request sent previously.
Listen - The local endpoint of the TCP connection is listening for a connection request from any remote endpoint.
SynReceived - The local endpoint of the TCP connection has sent and received a connection request and is waiting for an acknowledgment.
SynSent - The local endpoint of the TCP connection has sent the remote endpoint a segment header with the synchronize (SYN) control bit set and is waiting for a matching connection request.
TimeWait - The local endpoint of the TCP connection is waiting for enough time to pass to ensure that the remote endpoint received the acknowledgement of its connection termination request.
Unknown - The TCP connection state is unknown.
Values are based on the TcpState Enumeration:
http://msdn.microsoft.com/en-us/library/system.net.networkinformation.tcpstate%28VS.85%29.aspx
.EXAMPLE
Get-NetworkStatistics
.EXAMPLE
Get-NetworkStatistics iexplore
.EXAMPLE
Get-NetworkStatistics -ProcessName md* -Protocol tcp
.EXAMPLE
Get-NetworkStatistics -Address 192* -State LISTENING
.EXAMPLE
Get-NetworkStatistics -State LISTENING -Protocol tcp
.OUTPUTS
System.Management.Automation.PSObject
.NOTES
Author: Shay Levy
Blog : http://PowerShay.com
#>
}
help Get-NetworkStatistics
|
combined_dataset/train/non-malicious/320.ps1 | 320.ps1 | function Register-PSFMessageTransform
{
[CmdletBinding(PositionalBinding = $false, HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Register-PSFMessageTransform')]
Param (
[Parameter(Mandatory = $true, ParameterSetName = "Target")]
[string]
$TargetType,
[Parameter(Mandatory = $true, ParameterSetName = "Exception")]
[string]
$ExceptionType,
[Parameter(Mandatory = $true)]
[ScriptBlock]
$ScriptBlock,
[Parameter(Mandatory = $true, ParameterSetName = "TargetFilter")]
[string]
$TargetTypeFilter,
[Parameter(Mandatory = $true, ParameterSetName = "ExceptionFilter")]
[string]
$ExceptionTypeFilter,
[Parameter(ParameterSetName = "TargetFilter")]
[Parameter(ParameterSetName = "ExceptionFilter")]
$FunctionNameFilter = "*",
[Parameter(ParameterSetName = "TargetFilter")]
[Parameter(ParameterSetName = "ExceptionFilter")]
$ModuleNameFilter = "*"
)
process
{
if ($TargetType) { [PSFramework.Message.MessageHost]::TargetTransforms[$TargetType.ToLower()] = $ScriptBlock }
if ($ExceptionType) { [PSFramework.Message.MessageHost]::ExceptionTransforms[$ExceptionType.ToLower()] = $ScriptBlock }
if ($TargetTypeFilter)
{
$condition = New-Object PSFramework.Message.TransformCondition($TargetTypeFilter, $ModuleNameFilter, $FunctionNameFilter, $ScriptBlock, "Target")
[PSFramework.Message.MessageHost]::TargetTransformList.Add($condition)
}
if ($ExceptionTypeFilter)
{
$condition = New-Object PSFramework.Message.TransformCondition($ExceptionTypeFilter, $ModuleNameFilter, $FunctionNameFilter, $ScriptBlock, "Exception")
[PSFramework.Message.MessageHost]::ExceptionTransformList.Add($condition)
}
}
} |
combined_dataset/train/non-malicious/sample_23_59.ps1 | sample_23_59.ps1 | [CmdletBinding()]
param (
[Parameter(Mandatory, ValueFromPipeline,ValueFromPipelineByPropertyName)]
[Alias("Fullname")]
[String]$FileName
)
return git log -n 1 --pretty=format:%H -- $filename
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBY5f7atEYJoP+P
# 1W8bv1kCXB/5O06VW6Kx8a57PSq6zKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHqdefsAKcUsqvI3yE8phrg6
# +vateu8qeo9iTj5QZ7RDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAngXTjHgt+bbZ/plDmnttdtRYn4S0o1OZH8lMwmuUYsAteqCePoApI+nd
# uvQkXcwRrTmYDbQQ2gu+txz3nEGYG+zUw8RUn6ZP2nlWyyyW7Un0imSWFardI2g3
# q2T1WhFR6V8T9KGGuF9wRSso8vnmKVIWpzEEVWZDUg2g5/myYzaVQRy4RmvCyOgD
# E1LD0w4XlIIObDSKE1vriSIyxRDL3g3vsWBzVjoc3p+Di5+ecv3jH3xCkX8j6hn0
# PUWioEp7x+B2zTrKm0UXyplVzLDsIFHT6+2mvmtjbi48WiyIzK3RC5U6tL/73wxJ
# Mi6h84CdoaUwMylSXi7SqP9xOeGub6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDWkqk9GdurjfGxLr5CYBAjOdkr5jPmrnOoMR/7Kjhx5AIGZc33zOcA
# GBMyMDI0MDIyMjE4NTc0Mi43ODdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6YGwKDAiGA8yMDI0MDIyMjExMzYw
# OFoYDzIwMjQwMjIzMTEzNjA4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpgbAo
# AgEAMAoCAQACAgfpAgH/MAcCAQACAhP0MAoCBQDpgwGoAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBACVgoHN2u3KVKNn7Th7hv+GE8f0uORP/w3FTlsQtK8jC
# 3uZt28h81kH8huCtviaVzgDg8v2kv3TCypfejz574GszBNgIhKtlKU6ISl4PQAMY
# iXs1uhadGqNnzC1YsqTVGj67h7kxWgVKOGMTQ6O/TuhfLdbNUH8uCxLSGa1w+C4r
# lq8FV+SZgfr4iz7eRURfmQAbj3RNju0ETAoUaiNNEYW2qoRiaMARApTmom1zITji
# 6LsQdz2zhrz0/Y9/9jTWo2Gr9JqEwEuGJ8o9p7ieevPEUd9z+ySj0rsJGjSb1DU7
# RX7Be3FSB69LPyDCMU7J0lHqy4hlKzaHhT8MgCfTPoUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB
# 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDrj9PyGA0/fnjWudLX0/ReFYuoj9HSIjfigjefLz1w
# NTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4
# riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgYo9pmXWo2BHY4PZcjTibHKUG
# eweMMf0J5uuyTrB7PlowDQYJKoZIhvcNAQELBQAEggIAm1+Byh12MrkgdPcW/oYj
# nvekQ9Mt6X2A5ZcXon1zVTQW6D46NY/2ymKx3Y4ucCkFuXls7955AjjPiTLdgCvv
# 8IP4MKY/H+YBRWhXOVJBlwY3VBGv97RZrB2ErAoleq/wn8v6GEfwr/rzNky7yT+A
# C3XusakJycVceTXEaqV3soCpqd5MZncWUeoGJLH7tS1tfJhjhUlrO17j9QnnBZW/
# zQDxU+HzdnDxO0YI7QMVEp2X/rqSLu+rV5KfkzsTQfJIdL4nN+FlxRCP8lZctjGb
# K6n/T6G1aTeFb+9Sxm7azs+y+0Fq5KgXutY7TvO5BiFxZ+weVFOvFhOr7v8PypYj
# wkuYt41AWH5nHPIoIExY+Q2cih+jFqGgpTElKK85u8V+5ANIvB8U43YB3w0NBeCC
# 10aVxpJ2JMyUipVtuOjURdI/9pu3Rsp3AqXuXAYaiJqNvK7XTmccHhudTeGy5Ap2
# xy9N4GUHJJOpyo6KwF9y59YIhzmqSCNCae1rTjFD8VEqTi3fj3G1dibfBllIyy6Q
# UOlShBnQYnUg9qDOWrvnyzjcu6r9eiAypH1KqBlSUg25f79AoojMaJ1dxwSXL39n
# APVBTBKToGJD2GT18rx3BJ8iqY62RqW4oimt/vaCzSxLb2XYftjvsHXHZRjt6x2v
# ugl6a2GtzlTBEbl0yHONVj0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4070.ps1 | 4070.ps1 |
Clear-Host
$Global:OS
$Global:RelativePath
$FileLoc = "C:\Program Files\Autodesk\Revit 2013\Program\"
$DLL_01 = "RS.Common.ClientServer.Proxy"
$DLL_02 = "DataStorageClient"
$DLL_03 = "DesktopMFC"
$DLL_04 = "FamilyDB"
$DLL_05 = "GeomUtil"
$DLL_06 = "Graphics"
$DLL_07 = "GrphOGS3"
$DLL_08 = "CommandServiceClient"
$DLL_09 = "RS.Common.ClientServer.Proxy"
Function GetRelativePath{
$Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\"
Write-Host $Global:RelativePath
}
Function GetOSArchitecture{
$Global:OS=Get-WMIObject win32_operatingsystem
}
GetRelativePath
GetOSArchitecture
If ($Global:OS.OSArchitecture -eq "64-bit"){
If ((Test-Path -Path $FileLoc$DLL_01".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_01".dll" -Destination $FileLoc$DLL_01".orig" -Force
Remove-Item -Path $FileLoc$DLL_01".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_01".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc$DLL_02".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_02".dll" -Destination $FileLoc$DLL_02".orig" -Force
Remove-Item -Path $FileLoc$DLL_02".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_02".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc$DLL_03".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_03".dll" -Destination $FileLoc$DLL_03".orig" -Force
Remove-Item -Path $FileLoc$DLL_03".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_03".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc$DLL_04".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_04".dll" -Destination $FileLoc$DLL_04".orig" -Force
Remove-Item -Path $FileLoc$DLL_04".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_04".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc$DLL_05".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_05".dll" -Destination $FileLoc$DLL_05".orig" -Force
Remove-Item -Path $FileLoc$DLL_05".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_05".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc$DLL_06".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_06".dll" -Destination $FileLoc$DLL_06".orig" -Force
Remove-Item -Path $FileLoc$DLL_06".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_06".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc$DLL_07".dll") -eq $true){
Copy-Item -Path $FileLoc$DLL_07".dll" -Destination $FileLoc$DLL_07".orig" -Force
Remove-Item -Path $FileLoc$DLL_07".dll" -Force
Copy-Item -Path $Global:RelativePath$DLL_07".dll" -Destination $FileLoc -Force
}
If ((Test-Path -Path $FileLoc"RevitServerToolCommand\"$DLL_08".dll") -eq $true){
Copy-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_08".dll" -Destination $FileLoc"RevitServerToolCommand\"$DLL_08".orig" -Force
Remove-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_08".dll" -Force
Copy-Item -Path $Global:RelativePath"RevitServerToolCommand\"$DLL_08".dll" -Destination $FileLoc"RevitServerToolCommand\" -Force
}
If ((Test-Path -Path $FileLoc"RevitServerToolCommand\"$DLL_09".dll") -eq $true){
Copy-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_09".dll" -Destination $FileLoc"RevitServerToolCommand\"$DLL_09".orig" -Force
Remove-Item -Path $FileLoc"RevitServerToolCommand\"$DLL_09".dll" -Force
Copy-Item -Path $Global:RelativePath"RevitServerToolCommand\"$DLL_09".dll" -Destination $FileLoc"RevitServerToolCommand\" -Force
}
}
Remove-Variable -Name DLL_01
Remove-Variable -Name DLL_02
Remove-Variable -Name DLL_03
Remove-Variable -Name DLL_04
Remove-Variable -Name DLL_05
Remove-Variable -Name DLL_06
Remove-Variable -Name DLL_07
Remove-Variable -Name DLL_08
Remove-Variable -Name DLL_09
Remove-Variable -Name FileLoc
Remove-Variable -Name OS
Remove-Variable -Name RelativePath
|
combined_dataset/train/non-malicious/Copy-History.ps1 | Copy-History.ps1 | ##############################################################################\n##\n## Copy-History\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nCopy selected commands from the history buffer into the clipboard as a script.\n\n.EXAMPLE\n\nCopy-History\nCopies the entire contents of the history buffer into the clipboard.\n\n.EXAMPLE\n\nCopy-History -5\nCopies the last five commands into the clipboard.\n\n.EXAMPLE\n\nCopy-History 2,5,8,4\nCopies commands 2,5,8, and 4.\n\n.EXAMPLE\n\nCopy-History (1..10+5+6)\nCopies commands 1 through 10, then 5, then 6, using PowerShell's array\nslicing syntax.\n\n#>\n\nparam(\n ## The range of history IDs to copy\n [int[]] $Range\n)\n\nSet-StrictMode -Version Latest\n\n$history = @()\n\n## If they haven't specified a range, assume it's everything\nif((-not $range) -or ($range.Count -eq 0))\n{\n $history = @(Get-History -Count ([Int16]::MaxValue))\n}\n## If it's a negative number, copy only that many\nelseif(($range.Count -eq 1) -and ($range[0] -lt 0))\n{\n $count = [Math]::Abs($range[0])\n $history = (Get-History -Count $count)\n}\n## Otherwise, go through each history ID in the given range\n## and add it to our history list.\nelse\n{\n foreach($commandId in $range)\n {\n if($commandId -eq -1) { $history += Get-History -Count 1 }\n else { $history += Get-History -Id $commandId }\n }\n}\n\n## Finally, export the history to the clipboard.\n$history | Foreach-Object { $_.CommandLine } | clip.exe
|
combined_dataset/train/non-malicious/Send-MailMessage.ps1 | Send-MailMessage.ps1 | ##############################################################################\n##\n## Send-MailMessage\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n## Illustrate the techniques used to send an email in PowerShell.\n## In version two, use the Send-MailMessage cmdlet.\n##\n## Example:\n##\n## PS >$body = @"\n## >> Hi from another satisfied customer of The PowerShell Cookbook!\n## >> "@\n## >>\n## PS >$to = "guide_feedback@leeholmes.com"\n## PS >$subject = "Thanks for all of the scripts."\n## PS >$mailHost = "mail.leeholmes.com"\n## PS >Send-MailMessage $to $subject $body $mailHost\n##\n##############################################################################\n\nparam(\n ## The recipient of the mail message\n [string[]] $To = $(throw "Please specify the destination mail address"),\n\n ## The subjecty of the message\n [string] $Subject = "<No Subject>",\n\n ## The body of the message\n [string] $Body = $(throw "Please specify the message content"),\n\n ## The SMTP host that will transmit the message\n [string] $SmtpHost = $(throw "Please specify a mail server."),\n\n ## The sender of the message\n [string] $From = "$($env:UserName)@example.com"\n)\n\n## Create the mail message\n$email = New-Object System.Net.Mail.MailMessage\n\n## Populate its fields\nforeach($mailTo in $to)\n{\n $email.To.Add($mailTo)\n}\n\n$email.From = $from\n$email.Subject = $subject\n$email.Body = $body\n\n## Send the mail\n$client = New-Object System.Net.Mail.SmtpClient $smtpHost\n$client.UseDefaultCredentials = $true\n$client.Send($email)
|
combined_dataset/train/non-malicious/sample_23_62.ps1 | sample_23_62.ps1 | #
# Module manifest for module 'OCI.PSModules.Loganalytics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loganalytics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation',
'Add-OCILoganalyticsSourceEventTypes',
'Confirm-OCILoganalyticsAssociationParameters',
'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile',
'Confirm-OCILoganalyticsLabelCondition',
'Confirm-OCILoganalyticsSource',
'Confirm-OCILoganalyticsSourceExtendedFieldDetails',
'Confirm-OCILoganalyticsSourceMapping',
'Disable-OCILoganalyticsArchiving',
'Disable-OCILoganalyticsAutoAssociation',
'Disable-OCILoganalyticsIngestTimeRule',
'Disable-OCILoganalyticsSourceEventTypes',
'Enable-OCILoganalyticsArchiving',
'Enable-OCILoganalyticsAutoAssociation',
'Enable-OCILoganalyticsIngestTimeRule',
'Enable-OCILoganalyticsSourceEventTypes',
'Export-OCILoganalyticsCustomContent',
'Export-OCILoganalyticsQueryResult',
'Get-OCILoganalyticsAssociableEntitiesList',
'Get-OCILoganalyticsAssociatedEntitiesList',
'Get-OCILoganalyticsAssociationSummary',
'Get-OCILoganalyticsAutoAssociationsList',
'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory',
'Get-OCILoganalyticsColumnNames',
'Get-OCILoganalyticsConfigWorkRequest',
'Get-OCILoganalyticsConfigWorkRequestsList',
'Get-OCILoganalyticsEffectivePropertiesList',
'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList',
'Get-OCILoganalyticsEmBridgeSummary',
'Get-OCILoganalyticsEncryptionKeyInfoList',
'Get-OCILoganalyticsEntitiesList',
'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity',
'Get-OCILoganalyticsEntityAssociationsList',
'Get-OCILoganalyticsEntitySourceAssociationsList',
'Get-OCILoganalyticsEntityTopologyList',
'Get-OCILoganalyticsEntityType',
'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField',
'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary',
'Get-OCILoganalyticsIngestTimeRule',
'Get-OCILoganalyticsIngestTimeRulesList',
'Get-OCILoganalyticsLabel',
'Get-OCILoganalyticsLabelPrioritiesList',
'Get-OCILoganalyticsLabelsList',
'Get-OCILoganalyticsLabelSourceDetailsList',
'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup',
'Get-OCILoganalyticsLogGroupsList',
'Get-OCILoganalyticsLogGroupsSummary',
'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList',
'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList',
'Get-OCILoganalyticsLookupSummary',
'Get-OCILoganalyticsMetaSourceTypesList',
'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList',
'Get-OCILoganalyticsObjectCollectionRule',
'Get-OCILoganalyticsObjectCollectionRulesList',
'Get-OCILoganalyticsOverlappingRecallsList',
'Get-OCILoganalyticsParser',
'Get-OCILoganalyticsParserFunctionsList',
'Get-OCILoganalyticsParserMetaPluginsList',
'Get-OCILoganalyticsParsersList',
'Get-OCILoganalyticsParserSummary',
'Get-OCILoganalyticsPreferences',
'Get-OCILoganalyticsPropertiesMetadataList',
'Get-OCILoganalyticsQueryResult',
'Get-OCILoganalyticsQueryWorkRequest',
'Get-OCILoganalyticsQueryWorkRequestsList',
'Get-OCILoganalyticsRecallCount',
'Get-OCILoganalyticsRecalledDataList',
'Get-OCILoganalyticsRecalledDataSize',
'Get-OCILoganalyticsResourceCategoriesList',
'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary',
'Get-OCILoganalyticsScheduledTask',
'Get-OCILoganalyticsScheduledTasksList',
'Get-OCILoganalyticsSource',
'Get-OCILoganalyticsSourceAssociationsList',
'Get-OCILoganalyticsSourceEventTypesList',
'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList',
'Get-OCILoganalyticsSourceLabelOperatorsList',
'Get-OCILoganalyticsSourceMetaFunctionsList',
'Get-OCILoganalyticsSourcePatternsList',
'Get-OCILoganalyticsSourcesList',
'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage',
'Get-OCILoganalyticsStorageUsage',
'Get-OCILoganalyticsStorageWorkRequest',
'Get-OCILoganalyticsStorageWorkRequestErrorsList',
'Get-OCILoganalyticsStorageWorkRequestsList',
'Get-OCILoganalyticsSupportedCharEncodingsList',
'Get-OCILoganalyticsSupportedTimezonesList',
'Get-OCILoganalyticsUnprocessedDataBucket',
'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList',
'Get-OCILoganalyticsUploadsList',
'Get-OCILoganalyticsUploadWarningsList',
'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest',
'Get-OCILoganalyticsWorkRequestErrorsList',
'Get-OCILoganalyticsWorkRequestLogsList',
'Get-OCILoganalyticsWorkRequestsList',
'Import-OCILoganalyticsCustomContent',
'Invoke-OCILoganalyticsAppendLookupData',
'Invoke-OCILoganalyticsAssignEncryptionKey',
'Invoke-OCILoganalyticsBatchGetBasicInfo',
'Invoke-OCILoganalyticsClean',
'Invoke-OCILoganalyticsCompareContent',
'Invoke-OCILoganalyticsEstimatePurgeDataSize',
'Invoke-OCILoganalyticsEstimateRecallDataSize',
'Invoke-OCILoganalyticsEstimateReleaseDataSize',
'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths',
'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths',
'Invoke-OCILoganalyticsFilter',
'Invoke-OCILoganalyticsOffboardNamespace',
'Invoke-OCILoganalyticsOnboardNamespace',
'Invoke-OCILoganalyticsParseQuery',
'Invoke-OCILoganalyticsPauseScheduledTask',
'Invoke-OCILoganalyticsPurgeStorageData',
'Invoke-OCILoganalyticsQuery',
'Invoke-OCILoganalyticsRecallArchivedData',
'Invoke-OCILoganalyticsReleaseRecalledData',
'Invoke-OCILoganalyticsResumeScheduledTask',
'Invoke-OCILoganalyticsRun',
'Invoke-OCILoganalyticsSetUnprocessedDataBucket',
'Invoke-OCILoganalyticsSuggest',
'Invoke-OCILoganalyticsSuppressWarning',
'Invoke-OCILoganalyticsTestParser',
'Invoke-OCILoganalyticsUnsuppressWarning',
'Invoke-OCILoganalyticsUpsertAssociations',
'Invoke-OCILoganalyticsUpsertField',
'Invoke-OCILoganalyticsUpsertLabel',
'Invoke-OCILoganalyticsUpsertParser',
'Invoke-OCILoganalyticsUpsertSource',
'Invoke-OCILoganalyticsVerify',
'Move-OCILoganalyticsEmBridgeCompartment',
'Move-OCILoganalyticsEntityCompartment',
'Move-OCILoganalyticsIngestTimeRuleCompartment',
'Move-OCILoganalyticsLogGroupCompartment',
'Move-OCILoganalyticsObjectCollectionRuleCompartment',
'Move-OCILoganalyticsScheduledTaskCompartment',
'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity',
'New-OCILoganalyticsEntityType',
'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup',
'New-OCILoganalyticsObjectCollectionRule',
'New-OCILoganalyticsScheduledTask',
'Register-OCILoganalyticsLookup',
'Remove-OCILoganalyticsAssociations',
'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity',
'Remove-OCILoganalyticsEntityAssociations',
'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField',
'Remove-OCILoganalyticsIngestTimeRule',
'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup',
'Remove-OCILoganalyticsLookup',
'Remove-OCILoganalyticsObjectCollectionRule',
'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences',
'Remove-OCILoganalyticsResourceCategories',
'Remove-OCILoganalyticsScheduledTask',
'Remove-OCILoganalyticsSource',
'Remove-OCILoganalyticsSourceEventTypes',
'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile',
'Remove-OCILoganalyticsUploadWarning',
'Stop-OCILoganalyticsQueryWorkRequest',
'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity',
'Update-OCILoganalyticsEntityType',
'Update-OCILoganalyticsIngestTimeRule',
'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup',
'Update-OCILoganalyticsLookupData',
'Update-OCILoganalyticsObjectCollectionRule',
'Update-OCILoganalyticsPreferences',
'Update-OCILoganalyticsResourceCategories',
'Update-OCILoganalyticsScheduledTask',
'Update-OCILoganalyticsStorage',
'Write-OCILoganalyticsDiscoveryData',
'Write-OCILoganalyticsLogEventsFile',
'Write-OCILoganalyticsLogFile',
'Write-OCILoganalyticsQueryWorkRequestBackground'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Solarized (Dark) Theme.ps1 | Solarized (Dark) Theme.ps1 | <?xml version="1.0" encoding="utf-16"?>
<StorableColorTheme xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Keys>
<string>ErrorForegroundColor</string>
<string>ErrorBackgroundColor</string>
<string>WarningForegroundColor</string>
<string>WarningBackgroundColor</string>
<string>VerboseForegroundColor</string>
<string>VerboseBackgroundColor</string>
<string>DebugForegroundColor</string>
<string>DebugBackgroundColor</string>
<string>OutputPaneBackgroundColor</string>
<string>OutputPaneTextBackgroundColor</string>
<string>OutputPaneForegroundColor</string>
<string>CommandPaneBackgroundColor</string>
<string>ScriptPaneBackgroundColor</string>
<string>ScriptPaneForegroundColor</string>
<string>TokenColors\\Attribute</string>
<string>TokenColors\\Command</string>
<string>TokenColors\\CommandArgument</string>
<string>TokenColors\\CommandParameter</string>
<string>TokenColors\\Comment</string>
<string>TokenColors\\GroupEnd</string>
<string>TokenColors\\GroupStart</string>
<string>TokenColors\\Keyword</string>
<string>TokenColors\\LineContinuation</string>
<string>TokenColors\\LoopLabel</string>
<string>TokenColors\\Member</string>
<string>TokenColors\\NewLine</string>
<string>TokenColors\\Number</string>
<string>TokenColors\\Operator</string>
<string>TokenColors\\Position</string>
<string>TokenColors\\StatementSeparator</string>
<string>TokenColors\\String</string>
<string>TokenColors\\Type</string>
<string>TokenColors\\Unknown</string>
<string>TokenColors\\Variable</string>
<string>ConsoleTokenColors\\Attribute</string>
<string>ConsoleTokenColors\\Command</string>
<string>ConsoleTokenColors\\CommandArgument</string>
<string>ConsoleTokenColors\\CommandParameter</string>
<string>ConsoleTokenColors\\Comment</string>
<string>ConsoleTokenColors\\GroupEnd</string>
<string>ConsoleTokenColors\\GroupStart</string>
<string>ConsoleTokenColors\\Keyword</string>
<string>ConsoleTokenColors\\LineContinuation</string>
<string>ConsoleTokenColors\\LoopLabel</string>
<string>ConsoleTokenColors\\Member</string>
<string>ConsoleTokenColors\\NewLine</string>
<string>ConsoleTokenColors\\Number</string>
<string>ConsoleTokenColors\\Operator</string>
<string>ConsoleTokenColors\\Position</string>
<string>ConsoleTokenColors\\StatementSeparator</string>
<string>ConsoleTokenColors\\String</string>
<string>ConsoleTokenColors\\Type</string>
<string>ConsoleTokenColors\\Unknown</string>
<string>ConsoleTokenColors\\Variable</string>
<string>XmlTokenColors\\Comment</string>
<string>XmlTokenColors\\CommentDelimiter</string>
<string>XmlTokenColors\\ElementName</string>
<string>XmlTokenColors\\MarkupExtension</string>
<string>XmlTokenColors\\Attribute</string>
<string>XmlTokenColors\\Quote</string>
<string>XmlTokenColors\\QuotedString</string>
<string>XmlTokenColors\\Tag</string>
<string>XmlTokenColors\\Text</string>
<string>XmlTokenColors\\CharacterData</string>
</Keys>
<Values>
<Color>
<A>255</A>
<R>220</R>
<G>50</G>
<B>47</B>
<ScA>1</ScA>
<ScR>0.715693533</ScR>
<ScG>0.0318960324</ScG>
<ScB>0.02842604</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>203</R>
<G>75</G>
<B>22</B>
<ScA>1</ScA>
<ScR>0.5972018</ScR>
<ScG>0.0703601</ScG>
<ScB>0.008023193</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>38</R>
<G>139</G>
<B>210</B>
<ScA>1</ScA>
<ScR>0.0193823632</ScR>
<ScG>0.258182883</ScG>
<ScB>0.6444797</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>133</R>
<G>153</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0.23455061</ScR>
<ScG>0.3185468</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>131</R>
<G>148</G>
<B>150</B>
<ScA>1</ScA>
<ScR>0.2269659</ScR>
<ScG>0.2961383</ScG>
<ScB>0.304987341</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>43</G>
<B>54</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.024157634</ScG>
<ScB>0.0368894525</ScB>
</Color>
<Color>
<A>255</A>
<R>131</R>
<G>148</G>
<B>150</B>
<ScA>1</ScA>
<ScR>0.2269659</ScR>
<ScG>0.2961383</ScG>
<ScB>0.304987341</ScB>
</Color>
<Color>
<A>255</A>
<R>131</R>
<G>148</G>
<B>150</B>
<ScA>1</ScA>
<ScR>0.2269659</ScR>
<ScG>0.2961383</ScG>
<ScB>0.304987341</ScB>
</Color>
<Color>
<A>255</A>
<R>181</R>
<G>137</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0.462077022</ScR>
<ScG>0.2501583</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>108</R>
<G>113</G>
<B>196</B>
<ScA>1</ScA>
<ScR>0.149959788</ScR>
<ScG>0.1651322</ScG>
<ScB>0.55201143</ScB>
</Color>
<Color>
<A>255</A>
<R>133</R>
<G>153</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0.23455061</ScR>
<ScG>0.3185468</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>88</R>
<G>110</G>
<B>117</B>
<ScA>1</ScA>
<ScR>0.0975873545</ScR>
<ScG>0.155926466</ScG>
<ScB>0.177888423</ScB>
</Color>
<Color>
<A>255</A>
<R>220</R>
<G>50</G>
<B>47</B>
<ScA>1</ScA>
<ScR>0.715693533</ScR>
<ScG>0.0318960324</ScG>
<ScB>0.02842604</ScB>
</Color>
<Color>
<A>255</A>
<R>220</R>
<G>50</G>
<B>47</B>
<ScA>1</ScA>
<ScR>0.715693533</ScR>
<ScG>0.0318960324</ScG>
<ScB>0.02842604</ScB>
</Color>
<Color>
<A>255</A>
<R>147</R>
<G>161</G>
<B>161</B>
<ScA>1</ScA>
<ScR>0.291770667</ScR>
<ScG>0.356400162</ScG>
<ScB>0.356400162</ScB>
</Color>
<Color>
<A>255</A>
<R>147</R>
<G>161</G>
<B>161</B>
<ScA>1</ScA>
<ScR>0.291770667</ScR>
<ScG>0.356400162</ScG>
<ScB>0.356400162</ScB>
</Color>
<Color>
<A>255</A>
<R>224</R>
<G>255</G>
<B>255</B>
<ScA>1</ScA>
<ScR>0.745404243</ScR>
<ScG>1</ScG>
<ScB>1</ScB>
</Color>
<Color>
<A>255</A>
<R>131</R>
<G>148</G>
<B>150</B>
<ScA>1</ScA>
<ScR>0.2269659</ScR>
<ScG>0.2961383</ScG>
<ScB>0.304987341</ScB>
</Color>
<Color>
<A>255</A>
<R>255</R>
<G>255</G>
<B>255</B>
<ScA>1</ScA>
<ScR>1</ScR>
<ScG>1</ScG>
<ScB>1</ScB>
</Color>
<Color>
<A>255</A>
<R>220</R>
<G>50</G>
<B>47</B>
<ScA>1</ScA>
<ScR>0.715693533</ScR>
<ScG>0.0318960324</ScG>
<ScB>0.02842604</ScB>
</Color>
<Color>
<A>255</A>
<R>211</R>
<G>211</G>
<B>211</B>
<ScA>1</ScA>
<ScR>0.651405632</ScR>
<ScG>0.651405632</ScG>
<ScB>0.651405632</ScB>
</Color>
<Color>
<A>255</A>
<R>220</R>
<G>50</G>
<B>47</B>
<ScA>1</ScA>
<ScR>0.715693533</ScR>
<ScG>0.0318960324</ScG>
<ScB>0.02842604</ScB>
</Color>
<Color>
<A>255</A>
<R>147</R>
<G>161</G>
<B>161</B>
<ScA>1</ScA>
<ScR>0.291770667</ScR>
<ScG>0.356400162</ScG>
<ScB>0.356400162</ScB>
</Color>
<Color>
<A>255</A>
<R>42</R>
<G>161</G>
<B>152</B>
<ScA>1</ScA>
<ScR>0.0231533684</ScR>
<ScG>0.356400162</ScG>
<ScB>0.313988745</ScB>
</Color>
<Color>
<A>255</A>
<R>203</R>
<G>75</G>
<B>22</B>
<ScA>1</ScA>
<ScR>0.5972018</ScR>
<ScG>0.0703601</ScG>
<ScB>0.008023193</ScB>
</Color>
<Color>
<A>255</A>
<R>131</R>
<G>148</G>
<B>150</B>
<ScA>1</ScA>
<ScR>0.2269659</ScR>
<ScG>0.2961383</ScG>
<ScB>0.304987341</ScB>
</Color>
<Color>
<A>255</A>
<R>38</R>
<G>139</G>
<B>210</B>
<ScA>1</ScA>
<ScR>0.0193823632</ScR>
<ScG>0.258182883</ScG>
<ScB>0.6444797</ScB>
</Color>
<Color>
<A>255</A>
<R>176</R>
<G>196</G>
<B>222</B>
<ScA>1</ScA>
<ScR>0.434153676</ScR>
<ScG>0.55201143</ScG>
<ScB>0.730460763</ScB>
</Color>
<Color>
<A>255</A>
<R>224</R>
<G>255</G>
<B>255</B>
<ScA>1</ScA>
<ScR>0.745404243</ScR>
<ScG>1</ScG>
<ScB>1</ScB>
</Color>
<Color>
<A>255</A>
<R>238</R>
<G>130</G>
<B>238</B>
<ScA>1</ScA>
<ScR>0.8549926</ScR>
<ScG>0.223227978</ScG>
<ScB>0.8549926</ScB>
</Color>
<Color>
<A>255</A>
<R>255</R>
<G>228</G>
<B>181</B>
<ScA>1</ScA>
<ScR>1</ScR>
<ScG>0.7758222</ScG>
<ScB>0.462077022</ScB>
</Color>
<Color>
<A>255</A>
<R>152</R>
<G>251</G>
<B>152</B>
<ScA>1</ScA>
<ScR>0.313988745</ScR>
<ScG>0.9646863</ScG>
<ScB>0.313988745</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>224</R>
<G>255</G>
<B>255</B>
<ScA>1</ScA>
<ScR>0.745404243</ScR>
<ScG>1</ScG>
<ScB>1</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>224</R>
<G>255</G>
<B>255</B>
<ScA>1</ScA>
<ScR>0.745404243</ScR>
<ScG>1</ScG>
<ScB>1</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>255</R>
<G>228</G>
<B>196</B>
<ScA>1</ScA>
<ScR>1</ScR>
<ScG>0.7758222</ScG>
<ScB>0.55201143</ScB>
</Color>
<Color>
<A>255</A>
<R>211</R>
<G>211</G>
<B>211</B>
<ScA>1</ScA>
<ScR>0.651405632</ScR>
<ScG>0.651405632</ScG>
<ScB>0.651405632</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>219</R>
<G>112</G>
<B>147</B>
<ScA>1</ScA>
<ScR>0.7083758</ScR>
<ScG>0.162029386</ScG>
<ScB>0.291770667</ScB>
</Color>
<Color>
<A>255</A>
<R>143</R>
<G>188</G>
<B>143</B>
<ScA>1</ScA>
<ScR>0.274677336</ScR>
<ScG>0.5028865</ScG>
<ScB>0.274677336</ScB>
</Color>
<Color>
<A>255</A>
<R>245</R>
<G>245</G>
<B>245</B>
<ScA>1</ScA>
<ScR>0.913098633</ScR>
<ScG>0.913098633</ScG>
<ScB>0.913098633</ScB>
</Color>
<Color>
<A>255</A>
<R>255</R>
<G>69</G>
<B>0</B>
<ScA>1</ScA>
<ScR>1</ScR>
<ScG>0.0595112443</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>100</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.127437681</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>128</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0.215860531</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>139</R>
<G>0</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0.258182883</ScR>
<ScG>0</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>255</R>
<G>140</G>
<B>0</B>
<ScA>1</ScA>
<ScR>1</ScR>
<ScG>0.2622507</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>255</R>
<G>0</G>
<B>0</B>
<ScA>1</ScA>
<ScR>1</ScR>
<ScG>0</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>0</G>
<B>255</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0</ScG>
<ScB>1</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>0</G>
<B>139</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0</ScG>
<ScB>0.258182883</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>0</G>
<B>139</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0</ScG>
<ScB>0.258182883</ScB>
</Color>
<Color>
<A>255</A>
<R>0</R>
<G>0</G>
<B>0</B>
<ScA>1</ScA>
<ScR>0</ScR>
<ScG>0</ScG>
<ScB>0</ScB>
</Color>
<Color>
<A>255</A>
<R>128</R>
<G>128</G>
<B>128</B>
<ScA>1</ScA>
<ScR>0.215860531</ScR>
<ScG>0.215860531</ScG>
<ScB>0.215860531</ScB>
</Color>
</Values>
@@ <Name>Solarized (Dark)</Name>
<FontFamily>Consolas</FontFamily>
<FontSize>14</FontSize>
</StorableColorTheme>
|
combined_dataset/train/non-malicious/Split-Job.ps1 | Split-Job.ps1 | #requires -version 1.0
################################################################################
## Run commands in multiple concurrent pipelines
## by Arnoud Jansveld - www.jansveld.net/powershell
##
## Basic "drop in" usage examples:
## - Functions that accept pipelined input:
## Without Split-Job:
## Get-Content hosts.txt | MyFunction | Export-Csv results.csv
## With Split-Job:
## Get-Content hosts.txt | Split-Job {MyFunction} | Export-Csv results.csv
## - Functions that do not accept pipelined input (use foreach):
## Without Split-Job:
## Get-Content hosts.txt |% { .\\MyScript.ps1 -ComputerName $_ } | Export-Csv results.csv
## With Split-Job:
## Get-Content hosts.txt | Split-Job {%{ .\\MyScript.ps1 -ComputerName $_ }} | Export-Csv results.csv
##
## Example with an imported function:
## function Test-WebServer ($ComputerName) {
## $WebRequest = [System.Net.WebRequest]::Create("http://$ComputerName")
## $WebRequest.GetResponse()
## }
## Get-Content hosts.txt | Split-Job {%{Test-WebServer $_ }} -Function Test-WebServer | Export-Csv results.csv
##
## Version History
## 1.0 First version posted on poshcode.org
## Additional runspace error checking and cleanup
## 0.93 Improve error handling: errors originating in the Scriptblock now
## have more meaningful output
## Show additional info in the progress bar (thanks Stephen Mills)
## Add SnapIn parameter: imports (registered) PowerShell snapins
## Add Function parameter: imports functions
## Add SplitJobRunSpace variable; allows scripts to test if they are
## running in a runspace
## 0.92 Add UseProfile switch: imports the PS profile
## Add Variable parameter: imports variables
## Add Alias parameter: imports aliases
## Restart pipeline if it stops due to an error
## Set the current path in each runspace to that of the calling process
## 0.91 Revert to v 0.8 input syntax for the script block
## Add error handling for empty input queue
## 0.9 Add logic to distinguish between scriptblocks and cmdlets or scripts:
## if a ScriptBlock is specified, a foreach {} wrapper is added
## 0.8 Adds a progress bar
## 0.7 Stop adding runspaces if the queue is already empty
## 0.6 First version. Inspired by Gaurhoth's New-TaskPool script
################################################################################
function Split-Job {
param (
$Scriptblock = $(throw 'You must specify a command or script block!'),
[int]$MaxPipelines=10,
[switch]$UseProfile,
[string[]]$Variable,
[string[]]$Function = @(),
[string[]]$Alias = @(),
[string[]]$SnapIn
)
function Init ($InputQueue){
# Create the shared thread-safe queue and fill it with the input objects
$Queue = [Collections.Queue]::Synchronized([Collections.Queue]@($InputQueue))
$QueueLength = $Queue.Count
# Do not create more runspaces than input objects
if ($MaxPipelines -gt $QueueLength) {$MaxPipelines = $QueueLength}
# Create the script to be run by each runspace
$Script = "Set-Location '$PWD'; "
$Script += {
$SplitJobQueue = $($Input)
& {
trap {continue}
while ($SplitJobQueue.Count) {$SplitJobQueue.Dequeue()}
} |
}.ToString() + $Scriptblock
# Create an array to keep track of the set of pipelines
$Pipelines = New-Object System.Collections.ArrayList
# Collect the functions and aliases to import
$ImportItems = ($Function -replace '^','Function:') +
($Alias -replace '^','Alias:') |
Get-Item | select PSPath, Definition
$stopwatch = New-Object System.Diagnostics.Stopwatch
$stopwatch.Start()
}
function Add-Pipeline {
# This creates a new runspace and starts an asynchronous pipeline with our script.
# It will automatically start processing objects from the shared queue.
$Runspace = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspace($Host)
$Runspace.Open()
if (!$?) {throw "Could not open runspace!"}
$Runspace.SessionStateProxy.SetVariable('SplitJobRunSpace', $True)
function CreatePipeline {
param ($Data, $Scriptblock)
$Pipeline = $Runspace.CreatePipeline($Scriptblock)
if ($Data) {
$Null = $Pipeline.Input.Write($Data, $True)
$Pipeline.Input.Close()
}
$Null = $Pipeline.Invoke()
$Pipeline.Dispose()
}
# Optionally import profile, variables, functions and aliases from the main runspace
if ($UseProfile) {
CreatePipeline -Script "`$PROFILE = '$PROFILE'; . `$PROFILE"
}
if ($Variable) {
foreach ($var in (Get-Variable $Variable -Scope 2)) {
trap {continue}
$Runspace.SessionStateProxy.SetVariable($var.Name, $var.Value)
}
}
if ($ImportItems) {
CreatePipeline $ImportItems {
foreach ($item in $Input) {New-Item -Path $item.PSPath -Value $item.Definition}
}
}
if ($SnapIn) {
CreatePipeline (Get-PSSnapin $Snapin -Registered) {$Input | Add-PSSnapin}
}
$Pipeline = $Runspace.CreatePipeline($Script)
$Null = $Pipeline.Input.Write($Queue)
$Pipeline.Input.Close()
$Pipeline.InvokeAsync()
$Null = $Pipelines.Add($Pipeline)
}
function Remove-Pipeline ($Pipeline) {
# Remove a pipeline and runspace when it is done
$Runspace = $Pipeline.RunSpace
$Pipeline.Dispose()
$Runspace.Close()
$Runspace.Dispose()
$Pipelines.Remove($Pipeline)
}
# Main
# Initialize the queue from the pipeline
. Init $Input
# Start the pipelines
while ($Pipelines.Count -lt $MaxPipelines -and $Queue.Count) {Add-Pipeline}
# Loop through the runspaces and pass their output to the main pipeline
while ($Pipelines.Count) {
# Show progress
if (($stopwatch.ElapsedMilliseconds - $LastUpdate) -gt 1000) {
$Completed = $QueueLength - $Queue.Count - $Pipelines.count
$LastUpdate = $stopwatch.ElapsedMilliseconds
$SecondsRemaining = $(if ($Completed) {
(($Queue.Count + $Pipelines.Count)*$LastUpdate/1000/$Completed)
} else {-1})
Write-Progress 'Split-Job' ("Queues: $($Pipelines.Count) Total: $($QueueLength) " +
"Completed: $Completed Pending: $($Queue.Count)") `
-PercentComplete ([Math]::Max((100 - [Int]($Queue.Count + $Pipelines.Count)/$QueueLength*100),0)) `
-CurrentOperation "Next item: $(trap {continue}; if ($Queue.Count) {$Queue.Peek()})" `
-SecondsRemaining $SecondsRemaining
}
foreach ($Pipeline in @($Pipelines)) {
if ( -not $Pipeline.Output.EndOfPipeline -or -not $Pipeline.Error.EndOfPipeline ) {
$Pipeline.Output.NonBlockingRead()
$Pipeline.Error.NonBlockingRead() | Out-Default
} else {
# Pipeline has stopped; if there was an error show info and restart it
if ($Pipeline.PipelineStateInfo.State -eq 'Failed') {
$Pipeline.PipelineStateInfo.Reason.ErrorRecord |
Add-Member NoteProperty writeErrorStream $True -PassThru |
Out-Default
# Restart the runspace
if ($Queue.Count -lt $QueueLength) {Add-Pipeline}
}
Remove-Pipeline $Pipeline
}
}
Start-Sleep -Milliseconds 100
}
}
|
combined_dataset/train/non-malicious/sample_19_89.ps1 | sample_19_89.ps1 | ConvertFrom-StringData @'
id_systemservicediagnostic_sqlconnect=Connect to a Sql Server Instance
id_systemservicediagnostic_sqlconnectdesc=Trying to connect to Sql Server
id_axsqldataengine=Running SQL Query against Sql Server: %Server%
id_axsqldataenginedesc=Checking sql configuration : %DC_Name%
id_axsqlrulesengine=Running SQL Query against Sql Server: %Server%
id_axsqlrulesenginedesc=Checking for root cause : %RC_Name%
id_getnetbiosname=Confirming NetBIOS name
id_getnetbiosnamestatus=Testing NetBIOS name: %ComputerName% for connectivity
id_sqlrulesengine=Running SQL Query against Sql Server: %Server%
id_sqlrulesenginedesc=Checking for sql data for inconsistencies : %RC_Name%
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDta5/fYBH+BwUw
# NIxSXFGkUfrg7jADY4Pz+0vjuSIorqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH1rhX/Evf2NyjfEfQCCc1Rb
# GWIwdVJfB81TfKShSTr/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEALZDvfk/CdB9QZE2LhDHRmYFQb22IGjJAgL9uwlGs14KJ80rrYfYW2UAw
# mU5+ap1dh1Q6fV70xx8zVqeOgOv3qxT40L6LpNwpIyNKAI754WmVwT/PuQX5PDKX
# 9n9DSZgdSqJ5Rx4ajS85XHRNE5CQBUNibz+z2BRpPJTDjeQ5tc1XTvjFskATZRMG
# 6xr2agaPplzxaeAcjLkoJzkBKf4OmWLj8UFalgYOWcKgvLCQMaG/mrhqmDd45wX5
# CUNzp47CnezMe8P4PUN5EV6D1oSpdz4wDR4xb0Q8WdY/bI/1xH3qW0Sg/jGZnZqB
# JgcJ//3QORac2QtgjRd38J3Lw8+tS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAXBCAkK0iKmJxXsiWUeLNrj/mDjHl7Hqxhe6SCfG/ttgIGZxp9zsnj
# GBMyMDI0MTAyODExNDAzOC4wMTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw
# N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP
# AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0
# ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA
# AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4
# fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6
# IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR
# AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB
# 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDKK+u5YAQpeq/twN/PY1KxKo+wzSBSRFOOXgb7hCgw
# 0TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+
# RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a
# AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAecSn5cCfS3CzsQzr1o+F
# JW5HTBzuta+bJvHz4nhdS9ER0R6pq8h29e4LDKR2QkbN+UcjoIB9Xkjo+DpEwlTS
# P7vEpSjsjZ4LsxDi3KTeIHHxpUcRnZ5YWK7kxxoI3xDi9/HGmnXdaEBkfBrZ0hau
# Q/rfxpgJccB/B3BWWwCuQ7LLgiALadWhFTlcHJYXRFCF9MtcTk1AfyvdISHdVS/X
# JnMW5Ob3rCZuAj+MfJ8iYQ96L9EaVsA8rvFHzrrnN8NTTStBcEsujQzFl64nRvSZ
# F2VGf/lo46kNIDCG8HGVAFugIbzQb/JRelGuB1nWWy5Y5/t0MJA/5uQsE0LMSY1q
# GYd0wMdaJ1elT8XGRkim4VU4cFy7xn2lz1KFM2fUHx1FDaDeH5pUlAq1hY4nLNDJ
# 71Tuedyzmuu0IqFXqZgAE3lW5ruUjgjUeTa8WQL9y2xxUGAvX0f3gXDqC5smLQv1
# hB+Wo0SLhuD79Pe3zpQ3O5Bw2WLZqxcPxzdERH2yLlpsKJDA5MuNQoKlfH+zrfr7
# RvIMe2/CAmE3MVZ32rvwzj7W+pooLQ4rlVjLeaNW5ihEnBTCYoLlA1zjpvAYIvB3
# wEla09oFeYOap90/IWVmQYU3I66RxIGguvPxxYI58KhZomJtcuTkNXbHGa+O1nuZ
# XJ8XFXwCs2dor/bSFLTMBT4=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_16_84.ps1 | sample_16_84.ps1 |
Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.PortableUtilities.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1
function Test-ModuleUpdate
{
<#
.SYNOPSIS
Checks PSGallery for updated module.
.DESCRIPTION
Checks PSGallery for updated module and gives user 10 seconds
to cancel cmdlet and prints update instructions to screen
#>
param([switch]$PassThru)
try
{
if (-not $PassThru)
{
$thisVersion = (Get-PSCallStack | Where-Object Command -like 'Invoke-AzstackHci*Validation').InvocationInfo.MyCommand.Version
Log-Info ("Looking for module updates for AzStackHci.EnvironmentChecker greater than {0}" -f [system.string]$thisVersion)
$ModuleOnline = Find-Module -Name AzStackHci.EnvironmentChecker -Repository PSGallery -ErrorAction SilentlyContinue
if ([system.version]$($ModuleOnline.Version -replace ('-preview', '')) -gt $thisVersion)
{
Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $ModuleOnline.Name) -ConsoleOut
Start-Sleep -Seconds 10
}
else
{
Log-Info ($lTxt.CurrentVersion -f 'AzStackHci.EnvironmentChecker', [system.string]$thisVersion)
}
}
}
catch
{
Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error
}
}
function Test-Count
{
[CmdletBinding()]
param (
[CimInstance[]]
$CimData,
[int]
$minimum,
[string]
$ValidatorName,
[validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')]
[string]
$Severity
)
try
{
$className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
$serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
$instanceId = "Machine: $serverName, Class: $ClassName"
if ($CimData.Count -lt $minimum)
{
$status = 'FAILURE'
$detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum
Log-Info $detail -Type Warning
}
else
{
$detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum
$status = 'SUCCESS'
}
$params = @{
Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className
Title = 'Test {0} Count' -f $className
DisplayName = 'Test {0} Count {1}' -f $className, $serverName
Severity = $Severity
Description = 'Checking {0} count' -f $className
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = $instanceId
TargetResourceName = $instanceId
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = "$ClassName Count"
Resource = $CimData.count
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
catch
{
throw $_
}
}
function Test-InstanceCountByGroup
{
<#
.SYNOPSIS
Test if count matches across groups
#>
[CmdletBinding()]
param (
[CimInstance[]]
$CimData,
[string[]]
$GroupProperty,
[string]
$ValidatorName,
[validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')]
[string]
$Severity
)
try
{
$GroupValues = $cimData | Group-Object -Property $groupProperty | Select-Object -ExpandProperty Name
$nodeCount = @($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique).count
foreach ($GroupValue in $GroupValues)
{
foreach ($group in $GroupProperty)
{
$gData = $CimData | Where-Object $Group -eq $GroupValue
if ($gData.CimSystemProperties.SystemName.Count -eq 1)
{
$serverName = $gData.CimSystemProperties.SystemName
}
else
{
$serverName = 'AllServers'
}
$className = $gData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
$groupData = $gData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
$groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
# The count of InstanceCounts must equal the number of servers to ensure each server has at least 1 instance
# e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, but SVR3 could have 5 disks of type A.
# There should be only 1 unique InstanceCount from all values to ensure each server has the same instance count
# e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, SVR3 has 6 disks of type A.
$Status = if ($groupData.InstanceCount.Count -ne $nodeCount -or $groupDataCount.Count -gt 1 ) { 'FAILURE' } else { 'SUCCESS' }
$groupDataString = ($groupData | ForEach-Object { "{0}: {1} x {2}" -f $_.Name, $GroupValue, $_.InstanceCount }) -join ', '
$dtl = $lTxt.CountByGroup -f $className, $group, $groupDataString
if ($status -eq 'SUCCESS') {
Log-Info $dtl
}
else
{
Log-Info $dtl -Type Warning
}
$params = @{
Name = 'AzStackHci_{0}_Test_{1}_Instance_Count_ByGroup' -f $ValidatorName, $className
Title = 'Test {0} Properties' -f $className
DisplayName = 'Test {0} Properties {1}' -f $className, $ServerName
Severity = $Severity
Description = 'Checking all servers have same {0} instance count by group' -f $className
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue"
TargetResourceName = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue"
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $serverName
Resource = $ClassName
Detail = $dtl
Status = $Status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
}
catch
{
throw $_
}
}
function Test-GroupProperty
{
<#
.SYNOPSIS
Test if properties match across groups
#>
[CmdletBinding()]
param (
[CimInstance[]]
$CimData,
[string[]]
$GroupProperty,
[string[]]
$MatchProperty,
[string]
$ValidatorName,
[validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')]
[string]
$Severity
)
try
{
# Group by name and compare properties within each group
$className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
$ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
$groupedData = @($CimData | Group-Object -Property $groupProperty)
$returnResult = @()
if ($serverName.Count -gt 1)
{
$serverName = 'AllServers'
}
$returnResult += foreach ($group in $groupedData)
{
$instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name
$groupName = $group.Name
$detail = $null
if ($group.Count -gt 1)
{
foreach ($propertyName in $matchProperty)
{
# Using Select-Object -Unique to get unique values because Get-Unique doesn't work with null and empty values
if (($group.Group.$propertyName | Select-Object -Unique).Count -gt 1)
{
$status = 'FAILURE'
$detail = $lTxt.MismatchProp -f $className, $propertyName, ("'{0}'" -f ($group.Group.$propertyName -join "', '"))
Log-Info -Message $detail -Type Warning
}
else
{
$detail = $lTxt.MatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ')
$status = 'SUCCESS'
}
$params = @{
Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className
Title = 'Test {0} Grouped by {1} has consistent {2} property values' -f $className, $groupName, $propertyName
DisplayName = 'Test {0} Grouped by {1} has consistent {2} property values {3}' -f $className, $groupName, $propertyName, $ServerName
Severity = $Severity
Description = 'Checking {0} Grouped by {1} for consistent {2} property' -f $className, $groupName, $propertyName
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue, Property: $propertyName"
TargetResourceName = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue, Property: $propertyName"
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = "$serverName, $ClassName, $groupName, $propertName"
Resource = ($group.Group.$propertyName -join "', '")
Detail = $detail
Status = $Status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
}
$returnResult
}
catch
{
throw $_
}
}
function Test-InstanceCount
{
<#
.SYNOPSIS
Test if instance count matches across instances
#>
[CmdletBinding()]
param (
[Parameter()]
[CimInstance[]]
$CimData,
[Parameter()]
[string]
$ValidatorName,
[validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')]
[string]
$Severity,
[Parameter()]
[string]
$NamePostFix
)
if ($CimData.CimSystemProperties.SystemName.Count -eq 1)
{
$serverName = $CimData.CimSystemProperties.SystemName
}
else
{
$serverName = 'AllServers'
}
$className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
$InstanceId = "Machine: $ServerName, Class: $ClassName"
$groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
$groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
$status = if ($groupDataCount.Count -gt 1) { 'FAILURE' } else { 'SUCCESS' }
$groupDataString = ($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.InstanceCount }) -join ','
if ($NamePostFix)
{
$Name = 'AzStackHci_{0}_Test_{1}_{2}_Instance_Count' -f $ValidatorName, $className, $NamePostFix
$Description = 'Checking all servers have same {0} {1} instance count' -f $className, $NamePostFix
$dtl = $lTxt.InstanceCount -f $ClassName, "($NamePostFix) ", $groupDataString
}
else
{
$Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className
$Description = 'Checking all servers have same {0} instance count' -f $className
$dtl = $lTxt.InstanceCount -f $ClassName, $NamePostFix, $groupDataString
}
if ($Status -eq 'SUCCESS') {
Log-Info $dtl
}
else
{
Log-Info $dtl -Type Warning
}
$params = @{
Name = $Name
Title = 'Test {0} Properties' -f $className
DisplayName = 'Test {0} Properties {1}' -f $className, $serverName
Severity = $Severity
Description = $Description
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = $InstanceId
TargetResourceName = $InstanceId
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $serverName
Resource = $ClassName
Detail = $dtl
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
function Test-PropertySync
{
<#
.SYNOPSIS
Test if properties match across instances
#>
[CmdletBinding()]
param (
[Parameter()]
[CimInstance[]]
$CimData,
[Parameter()]
[string[]]
$MatchProperty,
[string]
$ValidatorName,
[validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')]
[string]
$Severity
)
try
{
$returnResult = @()
$className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
$serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
if ($serverName.Count -gt 1)
{
$serverName = 'AllServers'
$returnResult += Test-InstanceCount -CimData $CimData -Severity $Severity -ValidatorName $ValidatorName
}
$instanceId = "Machine: $ServerName, Class: $ClassName, Instance: All"
$returnResult += if ($CimData.Count -gt 1)
{
foreach ($propertyName in $matchProperty)
{
# Using Select-Object -Unique to get unique values because Get-Unique doesn't work with null and empty values
if (($CimData.$propertyName | Select-Object -Unique).Count -gt 1)
{
$status = 'FAILURE'
$detail = $lTxt.MismatchProp -f $className, $propertyName, ("'{0}'" -f ($CimData.$propertyName -join "', '"))
Log-Info -Message $detail -Type Warning
}
else
{
$detail = $lTxt.MatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',')
$status = 'SUCCESS'
}
$params = @{
Name = 'AzStackHci_{0}_Test_{1}_Property_{2}_Consistency' -f $ValidatorName, $className, $propertyName
Title = 'Test {0} Property {1}' -f $className, $propertyName
DisplayName = 'Test {0} Property {1} {2}' -f $className, $propertyName, $ServerName
Severity = $Severity
Description = 'Checking all {0} for consistent {1} property' -f $className, $propertyName
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = $InstanceId
TargetResourceName = $InstanceId
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = "$className`: $propertyName"
Resource = $CimData.$propertyName -join ','
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
return $returnResult
}
catch
{
throw $_
}
}
function Test-DesiredProperty
{
<#
.SYNOPSIS
Test if properties have required value
#>
[cmdletbinding()]
param (
[CimInstance[]]
$cimData,
[hashtable]
$desiredPropertyValue,
[string]
$InstanceIdStr,
[string]
$ValidatorName,
[validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')]
[string]
$Severity
)
try
{
# Test properties
$returnResult = @()
$returnResult += foreach ($instance in $cimData)
{
$serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique
$className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
$sb = ([scriptblock]::Create($InstanceIdStr))
$instanceId = Invoke-Command -ScriptBlock $sb
Log-Info -Message ($lTxt.Test -f $className, $instanceId)
foreach ($propertyName in $desiredPropertyValue.Keys)
{
$detail = $null
$passed = $false
$hint = $null
$diagProp = $null
$desiredPropertyValueCheck = $null
$desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable])
{
$desiredPropertyValue.$propertyName.Value
}
else
{
$desiredPropertyValue.$propertyName
}
$instancePropertyValue = $instance.$propertyName | Select-Object -First 1
if ($instancePropertyValue -notin $desiredPropertyValueCheck)
{
# Try to add additional diagnostic property
if ($desiredPropertyValue.$propertyName.DiagnosticProperty)
{
$diagProp = ' ({0}: {1})' -f $desiredPropertyValue.$propertyName.DiagnosticProperty, ($instance.$($desiredPropertyValue.$propertyName.DiagnosticProperty) | Select-Object -First 1)
}
$status = 'FAILURE'
$hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint }
$detail = $lTxt.UnexProp -f $className, $propertyName, $instancePropertyValue, ($desiredPropertyValueCheck -join ','), $hint, $diagProp
Log-Info -Message $detail -Type Warning
}
else
{
$status = 'SUCCESS'
$detail = $lTxt.Prop -f $className, $propertyName, $instancePropertyValue, ($desiredPropertyValueCheck -join ','), $hint
}
$params = @{
Name = 'AzStackHci_{0}_Test_{1}_Instance_Property_{2}' -f $ValidatorName, $className, $propertyName
Title = 'Test {0} Property {1}' -f $className, $propertyName
DisplayName = 'Test {0} Property {1} {2}' -f $className, $propertyName, $ServerName
Severity = $Severity
Description = 'Checking {0} for property {1} has desired value' -f $className, $propertyName
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = $InstanceId
TargetResourceName = $InstanceId
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = "$className`: $propertyName"
Resource = if ($hint) { "$($instancePropertyValue)$hint" } else { $instancePropertyValue }
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
return $returnResult
}
catch
{
throw $_
}
}
function Get-TestCount
{
param (
[Parameter()]
[string]
$ModuleName,
[Parameter()]
[string]
$CommandPrefix
)
try
{
$command = Get-Command -Name $CommandPrefix* -Module $ModuleName
if ($command)
{
return $command.Count
}
else
{
return 1
}
}
catch
{
return 1
}
}
function Test-CimData {
param (
$Data,
$ClassName
)
$systemNames = $Data.ComputerName | Sort-Object | Get-Unique
$testResult = foreach ($systemName in $systemNames)
{
$sData = $Data.CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName }
if ($sData.count -eq 0)
{
$params = @{
Name = 'AzStackHci_Hardware_Test_{0}' -f $className
Title = "Test $ClassName API"
DisplayName = "Test $ClassName API $systemName"
Severity = 'CRITICAL'
Description = "Checking $ClassName has CIM data"
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites'
TargetResourceID = "Machine: $systemName, Class: $ClassName"
TargetResourceName = "Machine: $systemName, Class: $ClassName"
TargetResourceType = $className
Timestamp = [datetime]::UtcNow
Status = 'FAILURE'
AdditionalData = @{
Source = $systemName
Resource = 'Null'
Detail = "Unable to retrieve data for $ClassName on $systemName"
Status = 'FAILURE'
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
New-AzStackHciResultObject @params
}
}
return $testResult
}
function Get-DeploymentData
{
[cmdletbinding()]
param ($Path)
try
{
$Json = Get-Content -Path $Path | ConvertFrom-Json
$DeploymentData = $json.ScaleUnits[0].DeploymentData
if ([string]::IsNullOrEmpty($DeploymentData))
{
Log-Info $lTxt.InvalidDeploymentData -Type Warning
return $null
}
return $DeploymentData
}
catch
{
throw $_
}
}
function Get-TestListByFunction
{
<#
.SYNOPSIS
Retrieve list of tests for a given validator
.DESCRIPTION
Tests should be prefixed with Test- and reside in a "helpers" module
#>
[CmdletBinding()]
param (
[Parameter()]
[string]
$prefix = 'Test-*',
[Parameter()]
[string]
$ModuleName
)
try
{
$script:envchktestList = Get-Command -Name $prefix -Module $ModuleName | Select-Object -ExpandProperty Name
Write-Debug -Message "Retrieving list of tests for $($validator.Command): $($script:envchktestList -join ',')" -verbose
return $script:envchktestList
}
catch
{
Write-Debug -Message "Failed to retrieve test list. Error $($_.exception)" -Verbose
}
}
function Select-TestList
{
<#
.SYNOPSIS
Filter Testlist by Include, Exclude and File based exclusions
.DESCRIPTION
Include replaces complete list, exclude is applied and file based exclusions are removed by regex.
#>
[CmdletBinding()]
param (
[Parameter()]
[string[]]
$TestList,
[Parameter()]
[string[]]
$Include,
[Parameter()]
[string[]]
$Exclude,
[Parameter()]
[string]
$FilePath = "$PsScriptRoot\ExcludeTests.txt"
)
try
{
$returnList = @($TestList)
if ($include)
{
$returnList = $Include
Log-Info "Setting tests to $($include -join ',')"
}
if ($exclude)
{
Log-Info "Removing tests $($exclude -join ',')"
$returnList = $returnList | Select-String -Pattern $exclude -NotMatch
}
if ($returnList.count -eq 0)
{
throw "No tests to perform after filtering"
}
if (Test-Path -Path $FilePath)
{
$fileExclusion = Get-Content -Path $FilePath
Log-Info "Reading exclusion file $FilePath" -ConsoleOut
Log-Info "Applying file exclusions: $($fileExclusion -join ',')" -ConsoleOut
$returnList = $returnList | Select-String -Pattern $fileExclusion -NotMatch
}
Log-Info "Test list: $($returnList -join ',')"
if ($returnList.Count -eq 0)
{
Log-Info -Message "No tests to run." -ConsoleOut -Type Warning
break noTestsBreak
}
return $returnList
}
catch
{
Log-Info "Failed to filter test list. Error: $($_.exception)" -Type Warning
}
}
function Set-TrustedHosts
{
[CmdletBinding()]
param (
[Parameter()]
[string[]]
$Nodes
)
$trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value
foreach ($node in $nodes)
{
if ('*' -notin $TrustedHosts -and ($node -notin $TrustedHosts.Split(',')))
{
Log-Info "Adding $node to TrustedHosts"
Set-Item WSMan:\localhost\Client\TrustedHosts -Value $node -Concatenate -Force
}
else
{
Log-Info "TrustedHosts already matches $node. Continuing."
}
}
}
function Get-IsProxyEnabled
{
$line1, $line2, $line3, $JsonLines = netsh winhttp show advproxy
$proxy = $JsonLines | ConvertFrom-Json
Log-Info "Proxy Enabled: $([bool]$proxy.Proxy)"
Log-Info "Proxy Output:"
Log-Info "$($proxy | Format-Table | Out-String)"
[bool]$proxy.Proxy
}
Export-ModuleMember -Function Get-DeploymentData
Export-ModuleMember -Function Get-IsProxyEnabled
Export-ModuleMember -Function Get-TestCount
Export-ModuleMember -Function Get-TestListByFunction
Export-ModuleMember -Function Select-TestList
Export-ModuleMember -Function Set-TrustedHosts
Export-ModuleMember -Function Test-Count
Export-ModuleMember -Function Test-DesiredProperty
Export-ModuleMember -Function Test-GroupProperty
Export-ModuleMember -Function Test-InstanceCount
Export-ModuleMember -Function Test-InstanceCountByGroup
Export-ModuleMember -Function Test-ModuleUpdate
Export-ModuleMember -Function Test-PropertySync
Export-ModuleMember -Function Test-CimData
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBxszN/uRP9VGCf
# XPshud2YHCM/38ebil+kQIkVogeaKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGtFXFdC6Dh86wKbh6jj4FwH
# niH/tZz6hpzE2OiJ3zo8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAtJZp0XjOxYPeHIZ18GLsCcOBlejkiEoWYaKVCCN9Bv8f6zpx3zOoSYPF
# nQaTY88cnqiXpX3gyrBFyLa5P9/s8MoaylbvmowUG7Io8n7STZatdxL/+TGCdpO9
# b+GSE95QOX6mMqv+ri+A17NMVyX2TiDWcWLSXMJqyQrMgati1OPo6K6VYPiX541C
# 3ed2bS8kvcTaL1EuJLyIubPy7HVV3ZunfEF4qdvjSt+KRJrKKV7j7hLKJ9/v/DD+
# P9xojl2KoBklLtiiZvySCuCIuJTunXBmNk7qsd5PRZOPlsX9/UW2oCAsG4xe9FLg
# VvXOFvf1wG4WjU4ay4bReGYN+Bf0UKGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAFyfFfji+davNI6GfDjDFXae3wHKRr/+pBxRh/qbtv3gIGZbwTH47L
# GBIyMDI0MDIxMjE0MDkxMi40OVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# Ee0wggcgMIIFCKADAgECAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy
# MloXDTI1MDMwNTE4NDUyMlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOFBd0TRbNcbvDN4L1IZ0fp5XB0aUXpiClTvB44UGSlb
# 3K4SYlIMTUAMHH/QNO5EFqmVIPwJHVCrJCbFEMP8J28PJ5kUBxnqXb6eUyyyZnIL
# xM+3UZNYBS3cZdRTqDQXS0isU0uCh8KM6+bcbSPjzZW60pLjBlPps1WcFWwKGvYC
# OZVsYM3/pCz8SpqQvlzCkZ6XW17tQ7Xd1TBo+M7LRaLWpg2ZHyLtPWW6PYl0V19m
# Ew/KrKr80Odm441JuPwUznEoGhqvXatqALz/UJdovU4xcHAZpGglNi2SyL2eO6rj
# AORwDCK0JnkG1DY2o9nSUuJAHs7XQGb3Okdaf3HX8eZ0CfiSgxYpQPAfmx3/MO7i
# +LzzsVbGbniSRY2+TwV5DtlnRDmCoYpbiDqt69XYh0DEGhtZ2iurC/OovvRZ2yAN
# T8/lzQvy9giyRQll50IYczaEciw1HLD0QWhKiUMz7IJ52TPr3vzuzycinnmJwt8O
# grDmFqTkboxYXp3vW1w3NX36/1FAoxrpTB/Kq6t513mypdYJe/76F6TgDXlbJshz
# q59PSKVrMphm8O+hqzCCM/RJ4tbua+ZzDQUQvMXX+5ZpcSUsc5ciWJ4oXaL9jNDp
# TnQr11uGcxoNwlKwbSFctFPL8tBuw4PSHDsW4rSebOi1LH/l+j2Dt8LOgWOTe0MT
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU+jlbyj3zSQx9FVBtrpPfgfB6UtowHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAJZ9wmbavBe0+LviSbo8oCSeL34Fai2r5C0M
# aB5PkXeujs+whQ0pGRTK24aojy2EvclytvTfHoM6mlgkQD6lvqjao+MV107VMuq9
# Jetib46AIsv7v7cWZGZ+RG7yse+mtpvQ7X3ANu6SA7wjk6LVF6AwmXy3mT9S0TRZ
# vfMCU4ecKMsZLM/8Ojem3CFeiSTTYi8PtJkQFs9ugZu3DgsIexPakVqSkY4GH4hJ
# QxcF/zfkK5U1913DGbIa81LPITISTmHVWHu2nA/vPusn4eyI/ix2oGOPoC+im5/i
# vFQB+sRtXpqPy3AWztZUc2IiCsc2dr/nmTKsAb1i3X0I++RTDFgrS5m8+XZYLf2d
# 9zSM5OOK8Luz8hSjMTi1/Lck2TJDVw229l+2JfePkO354s564YOO+Em9gwgSSmRX
# rxcs0fv5kF9hr4+Z9FhqgUUcIkoShFJnc9sMk8GISFn3K7Ex12gwxDX1OTJ+2i3o
# TPReFKbCNgGrf0O8EVaGXIMYGGtTca14NaJV31gZIHZafG4UzLl9sArqjw9bPxBE
# yKm1ccrccMGvbBZYRyuuBxO4dkglOp6k2hiXH1VEW+P+8JdoAVyaRbWeTtUT6jBp
# evlEmOvIOr25uTIOrWZ2sX+B5pEAtdw1lt81ciSFfNcDprwKJqZxBb8OCYsmmJVA
# 2uJlgIcgMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw
# ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIwk
# bi+DSO4w5WfYG4oAJS8/zQW6oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpdGieMCIYDzIwMjQwMjEyMDk1MTI2
# WhgPMjAyNDAyMTMwOTUxMjZaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl0aJ4C
# AQAwCgIBAAICAycCAf8wBwIBAAICE0UwCgIFAOl1uh4CAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAp+/l2FheQDp58+u0asxsyjcoAimX1jdXtozY1s4DQk2/
# JqExdIM75yVGWpx7azlccnay46basqOwcmIs0IAjgBjA8OqUg64ewuFsHcWTuHK1
# 0ZdDTC7celDqTs4kpOOwd6bg1rkDbM8q85Dmdj99ifSpw+ilCDu/v8UwD6ANU31w
# 1SiNnS0TnFitkmeQ9Ji+XRZTrDjwzKrbFR6p5LDbZl48JT69XKVyjcicocMuyrmw
# 2lg2aWWPD031ub4IEjrjDjyAqx48+0Zlvh0PuAvm8CbgW9k7yk0cFSXA8RzkC/Pz
# Yz8XiTpISbnNFqE/yknhZp56rbfpsK5KbBY4XB4nxTGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHo
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIHVHunnbxSu45pEKq24eKpY0WHtLaJnex9DaetjFRtJn
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7T
# F8lPYndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCBQR3531uywld80wg1/bwn8A/9g
# vTRfKFLBW0P7SDcXoTANBgkqhkiG9w0BAQsFAASCAgBbqYsNPzmhpvDlVp0rZ0eM
# cgnZUB8lyKj5De2SaoY9FVHy//0G0Mer1LAgK3OJmAFYfkDUwQgljJpLvmyxcmM9
# oSydd06Sk709odyBrgYp1i8oIDHt5Fzq825vtP5hkTBij/yH/0okeqvwaNLYvffc
# u93H7Cez7ggUYbatk0d9tzqyz2pIuJHjLU0F5bKNpfP2AC08v7jccGo5S5cnhpJP
# kLzr/do3lPCaIRpmc1z+0o9Sf2+qhROXBWewKshGlxHZKLu/qHYGs6mZBUQcG1Nj
# XHpbLN0csNaTHgZZqtpZz1Gdb7qkAR27/l/t5tIvJ9EKRhtoafHn2QifbNpW52e+
# aHG+abJTHdCGOnD0Nw8lDsnjn9AueeLn7HaPA1DL0z82WRBAHP8RYdOc1gXXcsJV
# bJN6igMofDJliYrQKQLkKbGbYDDLG+VoK3wOTWrjW2kJsZ+pefswUvMw4/mX+qRq
# WtpjPajV2+JLYWk8GUwWLRoZzW02W38LLIsIaXBi3a+IPte2fyciAk+12a5JxOu1
# AnJqc0ESoFW6mI8RzUT0pb1gjOZozCMUJzyuesjjuDaNkjj1OZmF43up17UcFZSa
# k4cYwvgJIqX/Nrb7nlhrK6Wf/4qWSdJvcoPxYIJBDi+NTQxZKTputksirv1qrh7E
# A9BGrwBFhJgPnknnrZgp7w==
# SIG # End signature block
|
combined_dataset/train/non-malicious/788.ps1 | 788.ps1 | 
function Register-EditorCommand {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$DisplayName,
[Parameter(
Mandatory=$true,
ParameterSetName="Function")]
[ValidateNotNullOrEmpty()]
[string]$Function,
[Parameter(
Mandatory=$true,
ParameterSetName="ScriptBlock")]
[ValidateNotNullOrEmpty()]
[ScriptBlock]$ScriptBlock,
[switch]$SuppressOutput
)
Process
{
$commandArgs = @($Name, $DisplayName, $SuppressOutput.IsPresent)
if ($ScriptBlock -ne $null)
{
Write-Verbose "Registering command '$Name' which executes a ScriptBlock"
$commandArgs += $ScriptBlock
}
else
{
Write-Verbose "Registering command '$Name' which executes a function"
$commandArgs += $Function
}
$editorCommand = New-Object Microsoft.PowerShell.EditorServices.Services.PowerShellContext.EditorCommand -ArgumentList $commandArgs
if ($psEditor.RegisterCommand($editorCommand))
{
Write-Verbose "Registered new command '$Name'"
}
else
{
Write-Verbose "Updated existing command '$Name'"
}
}
}
function Unregister-EditorCommand {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name
)
Process
{
Write-Verbose "Unregistering command '$Name'"
$psEditor.UnregisterCommand($Name);
}
}
function New-EditorFile {
[CmdletBinding()]
param(
[Parameter()]
[String[]]
[ValidateNotNullOrEmpty()]
$Path,
[Parameter(ValueFromPipeline=$true)]
$Value,
[Parameter()]
[switch]
$Force
)
begin {
$valueList = @()
}
process {
$valueList += $Value
}
end {
if ($Path) {
foreach ($fileName in $Path)
{
if (-not (Test-Path $fileName) -or $Force) {
New-Item -Path $fileName -ItemType File | Out-Null
if ($Path.Count -gt 1) {
$preview = $false
} else {
$preview = $true
}
if (!([System.IO.Path]::IsPathRooted($fileName))) {
$fileName = $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath($fileName)
}
$psEditor.Workspace.OpenFile($fileName, $preview)
$psEditor.GetEditorContext().CurrentFile.InsertText(($valueList | Out-String))
} else {
$PSCmdlet.WriteError( (
New-Object -TypeName System.Management.Automation.ErrorRecord -ArgumentList @(
[System.IO.IOException]"The file '$fileName' already exists.",
'NewEditorFileIOError',
[System.Management.Automation.ErrorCategory]::WriteError,
$fileName) ) )
}
}
} else {
$psEditor.Workspace.NewFile()
$psEditor.GetEditorContext().CurrentFile.InsertText(($valueList | Out-String))
}
}
}
function Open-EditorFile {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, ValueFromPipeline=$true)]
[ValidateNotNullOrEmpty()]
$Path
)
begin {
$Paths = @()
}
process {
$Paths += $Path
}
end {
if ($Paths.Count -gt 1) {
$preview = $false
} else {
$preview = $true
}
Get-ChildItem $Paths -File | ForEach-Object {
$psEditor.Workspace.OpenFile($_.FullName, $preview)
}
}
}
Set-Alias psedit Open-EditorFile -Scope Global
Export-ModuleMember -Function Open-EditorFile,New-EditorFile
|
combined_dataset/train/non-malicious/Queue Checker.ps1 | Queue Checker.ps1 | foreach
($ExchangServer in (Get-ExchangeServer | Where { $_.isHubTransportServer -eq $True}))
{Get-queue -Server $ExchangeServer}
|
combined_dataset/train/non-malicious/Script Listing.ps1 | Script Listing.ps1 | $pathToScripts = "C:\\Scripts\\*"
foreach($itm in get-childitem $pathToScripts -include *.ps1 -recurse)
{"{0,-25}{1,0}" -f ((" " + $itm.name) -replace ".ps1",""), ((get-content $itm | where {$_ -like "*Purpose:*"}) -replace "# Purpose: ","")}
|
combined_dataset/train/non-malicious/Twitbrain cheat.ps1 | Twitbrain cheat.ps1 | #Twitbrain Cheat PowerShell script
#Description: PowerShell script to beat everyone at the Twitter twitbrain game
# For more info follow @twitbrain at www.twitter.com
#Change the Twitter Username and Password in the script.
#Author: Stefan Stranger
#Website: http://tinyurl.com/sstranger
#Date: 03/07/2009
#Version: 0.1
#Function Publish-Tweet from James O'Neills blog (http://blogs.technet.com/jamesone/archive/2009/02/16/how-to-drive-twitter-or-other-web-tools-with-powershell.aspx)
[System.Reflection.Assembly]::LoadWithPartialName(”System.Web") | Out-Null
Function Publish-Tweet([string] $TweetText)
{
[System.Net.ServicePointManager]::Expect100Continue = $false
$request = [System.Net.WebRequest]::Create("http://twitter.com/statuses/update.xml")
$Username = "username"
$Password = "password"
$request.Credentials = new-object System.Net.NetworkCredential($Username, $Password)
$request.Method = "POST"
$request.ContentType = "application/x-www-form-urlencoded"
write-progress "Tweeting" "Posting status update" -cu $tweetText
$formdata = [System.Text.Encoding]::UTF8.GetBytes( "status=" + $tweetText )
$requestStream = $request.GetRequestStream()
$requestStream.Write($formdata, 0, $formdata.Length)
$requestStream.Close()
$response = $request.GetResponse()
write-host $response.statuscode
$reader = new-object System.IO.StreamReader($response.GetResponseStream())
$reader.ReadToEnd()
$reader.Close()
}
Function Waiting()
{
#Change $a if you want to wait longer or shorter
for ($a=15; $a -gt 1; $a--)
{
Write-Progress -Activity "Waiting for next poll" `
-SecondsRemaining $a -Status "Please wait."
Start-Sleep 1
}
}
Write-Host "You are going to cheat;-)"
$strResponse = Read-Host "Are you sure you want to continue? (Y/N)"
if ($strResponse -eq 'N')
{
Write-host "Maybe a good choice. It has to be a fair competition ;-)"
break
}
#infinite loop
#Quit script by using Ctrl-C
for (;;)
{
#Retrieve sum from Twitbrain website
Write-host "Get calculation from Twitbrain website"
$ws = New-Object net.WebClient
#Download Twitbrain website
$html = $ws.DownloadString("http://ajaxorized.com/twitbrain")
#Save website content to temporarily file.
$currentdir = [Environment]::CurrentDirectory=(Get-Location -PSProvider FileSystem).ProviderPath
$html | Set-Content "$currentdir\\Twitbrain.html"
$twitbrainpage = Get-Content "$currentdir\\Twitbrain.html" | out-string
#Search for calculation string in web page
$calc = [regex]::match($twitbrainpage,'(?<=\\<div class="challenge"\\>).+(?=\\</div>
<p class="challenge-answer">)',"singleline").value.trim()
#search/replace
$calc = $calc -replace "\\*times\\*","*"
$calc = $calc -replace "\\+plus\\+","+"
$calc = $calc -replace "\\-minus\\-","-"
#Do the math on the sum
$result = invoke-expression $calc
#Create tweet to post to twitter
$tweet = "@twitbrain " + $result
#Post to Twitter
#Check if result has not been posted earlier.
$oldresult = Get-Content "$currentdir\\oldresult.txt"
if ($result -eq $oldresult)
{
write-host "No new Twitbrain question is published yet"
}
else
{
Write-host "What is the result of the next question?"
Write-host $calc
Publish-Tweet $tweet
write-host "Tweet publised"
#Write old result to text file
$oldresult = $result
Write-host "Save oldresult to text file"
$oldresult > "$currentdir\\oldresult.txt"
}
#Wait 15 seconds
#Call Waiting Function
Waiting
}
|
combined_dataset/train/non-malicious/496.ps1 | 496.ps1 |
function Get-MSI{
$msiUtilSignature = @'
/// <summary>
/// The HRESULT error code for success.
/// </summary>
private const int ErrorSuccess = 0;
/// <summary>
/// The HRESULT error code that indicates there is more
/// data available to retrieve.
/// </summary>
private const int ErrorMoreData = 234;
/// <summary>
/// The HRESULT error code that indicates there is
/// no more data available.
/// </summary>
private const int ErrorNoMoreItems = 259;
/// <summary>
/// The expected length of a GUID.
/// </summary>
private const int GuidLength = 39;
/// <summary>
/// Gets an array of the installed MSI products.
/// </summary>
public Product[] Products
{
get { return new ProductEnumeratorWrapper(default(Product)).ToArray(); }
}
/**
* http://msdn.microsoft.com/en-us/library/aa370101(VS.85).aspx
*/
[DllImport(@"msi.dll", CharSet = CharSet.Auto)]
[return: MarshalAs(UnmanagedType.U4)]
private static extern int MsiEnumProducts(
[MarshalAs(UnmanagedType.U4)] int iProductIndex,
[Out] StringBuilder lpProductBuf);
/**
* http://msdn.microsoft.com/en-us/library/aa370130(VS.85).aspx
*/
[DllImport(@"msi.dll", CharSet = CharSet.Auto)]
[return: MarshalAs(UnmanagedType.U4)]
private static extern int MsiGetProductInfo(
string szProduct,
string szProperty,
[Out] StringBuilder lpValueBuf,
[MarshalAs(UnmanagedType.U4)] [In] [Out] ref int pcchValueBuf);
/// <summary>
/// An MSI product.
/// </summary>
public struct Product
{
/// <summary>
/// Gets or sets the product's unique GUID.
/// </summary>
public string ProductCode { get; internal set; }
/// <summary>
/// Gets the product's name.
/// </summary>
public string ProductName { get; internal set; }
/// <summary>
/// Gets the path to the product's local package.
/// </summary>
public FileInfo LocalPackage { get; internal set; }
/// <summary>
/// Gets the product's version.
/// </summary>
public string ProductVersion { get; internal set; }
/// <summary>
/// Gets the product's install date.
/// </summary>
public DateTime InstallDate { get; internal set; }
}
private class ProductEnumeratorWrapper : IEnumerable<Product>
{
private Product data;
public ProductEnumeratorWrapper(Product data)
{
this.data = data;
}
public IEnumerator<Product> GetEnumerator()
{
return new ProductEnumerator(this);
}
IEnumerator IEnumerable.GetEnumerator()
{
return GetEnumerator();
}
private class ProductEnumerator : IEnumerator<Product>
{
/// <summary>
/// A format provider used to format DateTime objects.
/// </summary>
private static readonly IFormatProvider DateTimeFormatProvider =
CultureInfo.CreateSpecificCulture("en-US");
/// <summary>
/// The enumerator's wrapper.
/// </summary>
private readonly ProductEnumeratorWrapper wrapper;
/// <summary>
/// The index.
/// </summary>
private int i;
public ProductEnumerator(ProductEnumeratorWrapper wrapper)
{
this.wrapper = wrapper;
}
public Product Current
{
get { return this.wrapper.data; }
}
object IEnumerator.Current
{
get { return this.wrapper.data; }
}
public bool MoveNext()
{
var buffer = new StringBuilder(GuidLength);
var hresult = MsiEnumProducts(this.i++, buffer);
this.wrapper.data.ProductCode = buffer.ToString();
switch (hresult)
{
case ErrorSuccess:
{
try
{
this.wrapper.data.InstallDate =
DateTime.ParseExact(
GetProperty(@"InstallDate"),
"yyyyMMdd",
DateTimeFormatProvider);
}
catch
{
this.wrapper.data.InstallDate = DateTime.MinValue;
}
try
{
this.wrapper.data.LocalPackage =
new FileInfo(GetProperty(@"LocalPackage"));
}
catch
{
this.wrapper.data.LocalPackage = null;
}
try
{
this.wrapper.data.ProductName =
GetProperty(@"InstalledProductName");
}
catch
{
this.wrapper.data.ProductName = null;
}
try
{
this.wrapper.data.ProductVersion =
GetProperty(@"VersionString");
}
catch
{
this.wrapper.data.ProductVersion = null;
}
return true;
}
case ErrorNoMoreItems:
{
return false;
}
default:
{
// throw new Win32Exception(hresult);
return true;
}
}
}
public void Reset()
{
this.i = 0;
}
public void Dispose()
{
// Do nothing
}
/// <summary>
/// Gets an MSI property.
/// </summary>
/// <param name="name">The name of the property to get.</param>
/// <returns>The property's value.</returns>
/// <remarks>
/// For more information on available properties please see:
/// http://msdn.microsoft.com/en-us/library/aa370130(VS.85).aspx
/// </remarks>
private string GetProperty(string name)
{
var size = 0;
var hresult =
MsiGetProductInfo(
this.wrapper.data.ProductCode, name, null, ref size);
if (hresult == ErrorSuccess || hresult == ErrorMoreData)
{
var buffer = new StringBuilder(++size);
hresult =
MsiGetProductInfo(
this.wrapper.data.ProductCode,
name,
buffer,
ref size);
if (hresult == ErrorSuccess)
{
return buffer.ToString();
}
}
throw new Win32Exception(hresult);
}
}
}
'@;
$msiUtilType = Add-Type `
-MemberDefinition $msiUtilSignature `
-Name "MsiUtil" `
-Namespace "Win32Native" `
-Language CSharpVersion3 `
-UsingNamespace System.Linq, `
System.IO, `
System.Collections, `
System.Collections.Generic, `
System.ComponentModel, `
System.Globalization, `
System.Text `
-PassThru;
$msiUtil = New-Object -TypeName "Win32Native.MsiUtil";
$msiUtil.Products
} |
combined_dataset/train/non-malicious/sample_49_97.ps1 | sample_49_97.ps1 | @{
GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
NestedModules="Microsoft.PowerShell.Commands.Management.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
FunctionsToExport = @()
AliasesToExport = @("gcb", "gin", "gtz", "scb", "stz")
CmdletsToExport=@("Add-Content",
"Clear-Content",
"Get-Clipboard",
"Set-Clipboard",
"Clear-ItemProperty",
"Join-Path",
"Convert-Path",
"Copy-ItemProperty",
"Get-ChildItem",
"Get-Content",
"Get-ItemProperty",
"Get-ItemPropertyValue",
"Move-ItemProperty",
"Get-Location",
"Set-Location",
"Push-Location",
"Pop-Location",
"New-PSDrive",
"Remove-PSDrive",
"Get-PSDrive",
"Get-Item",
"New-Item",
"Set-Item",
"Remove-Item",
"Move-Item",
"Rename-Item",
"Copy-Item",
"Clear-Item",
"Invoke-Item",
"Get-PSProvider",
"New-ItemProperty",
"Split-Path",
"Test-Path",
"Test-Connection",
"Get-Process",
"Stop-Process",
"Wait-Process",
"Debug-Process",
"Start-Process",
"Remove-ItemProperty",
"Rename-ItemProperty",
"Resolve-Path",
"Get-Service",
"Stop-Service",
"Start-Service",
"Suspend-Service",
"Resume-Service",
"Restart-Service",
"Set-Service",
"New-Service",
"Remove-Service",
"Set-Content",
"Set-ItemProperty",
"Restart-Computer",
"Stop-Computer",
"Rename-Computer",
"Get-ComputerInfo",
"Get-TimeZone",
"Set-TimeZone",
"Get-HotFix",
"Clear-RecycleBin")
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOkUHfBYP8n8JI
# rFMR/Pi6BPlAC/b/pz0LBmd3yrLJC6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG8CgBXFFJ/2vAtXu5Tg5Csn
# XsYj0AU0agFGmPJaSF8WMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAhTwmeh7FqR3IjpVHA5jOcGI+Fuly0MIyGP2pc8iTuUdXVGzGztPC31Tv
# RrO3IzkFD8VhiMUDNi4hb6gE3IhKotFyzJtlqWdyg2xqy7jvr+hHW+crDnhOKmsB
# zVoVZegu1of4bN3IIj5CKSGZct2hTDPpKSJzneudofpq7YK97iH5qkMLAug12YGv
# /0ZoJbys1ZR74+t2ObyvywPl9azGfskZhVcFpd4c03V9RQaN3j8t+W33U7oMbfWc
# PlUlyPuy5I5T2zTqbIalHFPdiGB4yBlGrfOMVb/O7MDUOiMaMOwIWgFQIaCoMvs7
# vvQfcH56BJFqZtr0oepjT2ZumcLxAaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA+3ajIHt8H5i2S1S94bYU4WUvSvP0HLGYqasUWRAH43QIGZbqfZ72O
# GBMyMDI0MDIxNDIxMDAyNy41NjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl3kJMwIhgPMjAyNDAyMTUwMzE4NDNaGA8yMDI0MDIxNjAzMTg0M1owdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6XeQkwIBADAKAgEAAgICsgIB/zAHAgEAAgISVDAK
# AgUA6XjiEwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABYIlfTD6DvNgZdf
# NbQtUqWNr0qC08R6BMCkSGgggx8ePLM7APkzZmeHhPYzrpniefTFS1U4/hVJm3kD
# YEAx7M6OQ9L5TcnXJ9DdefXYD7A4GvVOmGoajCpKAXU9gyxvsxRX4BnlXPJDjXEq
# 6U/sr3rAWmM2VjGeMma9CTy6czjpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgfydLoUwUShN2PXZyEs5IV40NZB2P6R756hNifQxaxGAwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC
# Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 2o7VyVoA0RGxAAEAAAHaMCIEIKaaEoOXEjjHeAD99MmoMlDVtIg/PdqddyY0aIfg
# 87njMA0GCSqGSIb3DQEBCwUABIICADhsHXEs5YWiX5KPDoEsBlhH30geHSCLmq+m
# HZwvQMPPIQygt0lC8CilfVmz4wGb9DBxMQ73poTZjV1Chgw7Z/me73Zz52eZAopc
# ueWFqVr6cpUImvRHn0vTDQPGiuT8K+FPABRpZtQqAUpKwYsdxRA89DLzru/fVem2
# uq+yM3z05aLGMn7pzVha+XxDuob+4VXzJQQrWzVLzeMQVA7bowlolexHTATzmSBr
# k5vUCZIt5q5ZIwcjgBNiQDNWxi/33uRuThFVKszQDUmaX0jpU6Qd7lIfqQZkZ6mM
# YzaMypt7rxv3iPqIKcH+8OHu9KZe/MnS9YsAmEwrNf87kXyUNFvpjswWDuM2Hrr0
# VHCd5NXASxKozhN9UecdQzqq7/9H3t94bRslN+P2h0z2oWoXdXHWL1byBFYAbD4P
# 9D2eVTAPWffAl0wiXDSWhgY2xvrGAr/QQIdOqNGkVEeRfXD5b3eBI3vash8vEv7Z
# X7Suw4RXBYVX+GlVqYREZ9uhM1qaXKmMQdTBWuTBuTY2M3ELo4Wj4ZmGdL0MDEbM
# 8Mbd8YT0I3P3kXvoNTGzrZb0XppHw/WmborjC58/Wi72q+ydgNTLXZX/+qZnS24t
# E3X/GhwT0IYLteDsIFRTOzCMS6mWikBo8gfYNlZ2+FYFUpFWaiiFrkHCD1X+nmX/
# maicCT7N
# SIG # End signature block
|
combined_dataset/train/non-malicious/1516.ps1 | 1516.ps1 |
function Assert-FileContains
{
[CmdletBinding()]
param(
[Parameter(Position=0)]
[string]
$Path,
[Parameter(Position=1)]
[string]
$Needle,
[Parameter(Position=2)]
$Message
)
Set-StrictMode -Version 'Latest'
Write-Debug -Message "Checking if '$Path' contains expected content."
$actualContents = Get-Content -Path $Path -Raw
if( $actualContents -eq $null )
{
Fail ('File ''{0}'' is empty and does not contain ''{1}''. {2}' -f $Path,$Needle,$Message)
return
}
Write-Debug -Message "Actual:`n$actualContents"
Write-Debug -Message "Expected:`n$Needle"
if( $actualContents -notmatch ([Text.RegularExpressions.Regex]::Escape($Needle)) )
{
Fail ("File '{0}' does not contain '{1}'. {2}" -f $Path,$Needle,$Message)
}
}
|
combined_dataset/train/non-malicious/Get-Sequence.ps1 | Get-Sequence.ps1 | ## Get-Sequence
## Optionless implementation of seq for PowerShell
############################################################################
## Most of the options don't apply because they convert the numbers to text
## which isn't something a PowerShell Seq wants to do :)
############################################################################
## Usage:
## seq $LAST
## seq $FIRST $LAST
## seq $FIRST $INTERVAL $LAST
############################################################################
function Get-Sequence{
switch($args.Count){
1 {[int]$first=0; [int]$inc=1; [int]$last=$args[0]}
2 {[int]$first=$args[0]; [int]$inc=1; [int]$last=$args[1]}
3 {[int]$first=$args[0]; [int]$inc=$args[1]; [int]$last=$args[2]}
}
if($inc-gt0){
while($first-le$last){$first;$first+=$inc}
} else {
while($first-ge$last){$first;$first+=$inc}
}
}
## Set the default alias
New-Alias seq Get-Sequence
############################################################################
############################################################################
## EXAMPLE SCRIPT:
## Original Bash Script using Gnome's Notify-Send for libnotify
# s=.o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0;n(){ for x in `seq $1 $2 $3`;do notify-send ${s:0:x}; done };while :;do n 1 2 39;n 39 -2 1;done
## PowerShell Script using Send-Notice for Growl
## BUT, if you don't have Growl and Send-Notice, just use this instead:
New-Alias Send-Notice Write-Progress
## And then you can: (note that in the sample there's no end case, you have to CTRL+C)
# $s=".o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0O0o.o0";function n{$ofs="";foreach($x in $(seq @args)){Send-Notice "Working" "$($s[0..$x])"}}while(1){n 1 2 39;n 39 -2 1}
|
combined_dataset/train/non-malicious/sample_57_23.ps1 | sample_57_23.ps1 | <#
.SYNOPSIS
Powershell script to collect data about Geneva Metrics (AKA MDM, AKA Geneva Hot Path) data publication.
.DESCRIPTION
This script performs several operations for troubleshooting issues related to MetricsExtension such as:
- Collection of metric traffic.
- Collectio of information about the environment such as OS, processes running.
- Collection of certificates.
- Collection of logs.
- Test connection to Frontends where we emit the metrics.
.EXAMPLE
./mdmDataCollection.ps1 -SkipAdminCheck -MetricCollectionDurationSec 60 -Table2CsvPath "C:/table2csv.exe"
.EXAMPLE
./mdmDataCollection.ps1 -SkipCollectionTsfLogs -SkipCollectionCertificates
.EXAMPLE
./mdmDataCollection.ps1 -LogicalDisks "C: D:"
.EXAMPLE
./mdmDataCollection.ps1 -MetricCollectionSizeMaxMB 100 -MetricCollectionDurationSec 60 -TimeOutSecondsSearchFiles -1
.EXAMPLE
./mdmDataCollection.ps1 -OutputDirectory "C:\dev"
#>
param (
# If this switch is specified, the output of all commands will be showed in the output.
[Parameter(Mandatory=$false)]
[switch]$DebugMdmDataCollection = $false,
# The arguments passed for the execution of table2csv.exe.
# Default value: "-tail 150000"
[Parameter(Mandatory=$false)]
[string]$Table2CsvParameters = "-tail 150000",
# It specifies the time we will be spent collecting the traffic of metrics in seconds.
# Default value: 190
[Parameter(Mandatory=$false)]
[int]$MetricCollectionDurationSec = 190,
# It specifies the maximum size in MB that will be stored from the collection of the metrics.
# Default value: 500
[Parameter(Mandatory=$false)]
[int]$MetricCollectionSizeMaxMB = 500,
# If this switch is specified, the check of admin permissions will be skipped
[Parameter(Mandatory=$false)]
[switch]$SkipAdminCheck = $false,
# It specifies the path for cpprestutil.exe
[Parameter(Mandatory=$false)]
[string]$CppRestUtilPathParam = $null,
# It specifies the path for table2csv.exe
[Parameter(Mandatory=$false)]
[string]$Table2CsvPathParam = $null,
# The script needs to search files in the environment, this operation can be really long if your disk is not indexed.
# This parameter allows you to set a TimeOut in the search. If you don't want to have TimeOut, pass the value -1.
# Default value: 3600
[Parameter(Mandatory=$false)]
[int]$TimeOutSecondsSearchFiles = 3600,
# It specifies the disks where we are going to search the files in the script.
# Example for only searching in C: and D:, "C: D:". Use a whitespace as separator.
[Parameter(Mandatory=$false)]
[string]$LogicalDisksParam = $null,
# If this switch is specified, the collection of tsf logs will be skipped.
[Parameter(Mandatory=$false)]
[switch]$SkipCollectionTsfLogs = $false,
# If this switch is specified, the collection of certificates will be skipped.
[Parameter(Mandatory=$false)]
[switch]$SkipCollectionCertificates = $false,
# It specifies in which directory the output is going to be stored.
[Parameter(Mandatory=$false)]
[string]$OutputDirectory = "..",
# This is only used for tests purposes, please don't use it
[Parameter(Mandatory=$false)]
[switch]$ImportFunctions = $false
)
$ScriptVersion = "1.14"
$MeFrontendUrls = @(
"global.prod.microsoftmetrics.com"
"global.metrics.nsatc.net"
"azglobal.metrics.nsatc.net"
)
$Ports = @(
"80"
"443"
)
$MeStamps = @(
"https://global.prod.microsoftmetrics.com"
"https://azglobal-red.prod.microsoftmetrics.com"
"https://azglobal-black.prod.microsoftmetrics.com"
"https://global.metrics.nsatc.net"
"https://azglobal-red.azglobal.metrics.nsatc.net"
"https://azglobal-black.azglobal.metrics.nsatc.net"
"https://global.metrics.azure.microsoft.scloud"
"https://global.metrics.azure.eaglex.ic.gov"
"https://13.90.249.229"
"https://40.77.24.27"
"https://[2a01:111:f100:2000::a83e:33d6]"
"https://[2603:1030:7::155]"
)
$StampPaths = @(
"/public/lb-probe"
"/public/monitoringAccount/MetricTeamInternalMetrics/acls"
)
$ExcludedEnvironmentVariables = @(
"_NT_SYMBOL_PATH"
)
$ExcludedTokenFiles = @(
"AuthToken-MSI.json",
"AuthToken-Application.json",
"AuthToken-GIG.json",
"AuthToken-HOBO.json",
"AuthToken-AMCS.json"
)
function Main
{
Set-UTF8-Encoding
Confirm-Admin-Permissions
$mdmDataCollectionOutput = Get-MdmDataCollectionOutput
$compressedDataOutput = Get-CompressedDataOutput $mdmDataCollectionOutput
Show-Starting-Message
Get-Logical-Disks
$logicalDisks = Get-Content -Path .\LogicalDisks.txt
$metricsExtensionPath = Get-File-Version "MetricsExtension.Native.exe" ".\MetricsExtensionProcesses.txt" "MetricsExtensionVersions.txt"
$cppRestUtil = Search-CppRestUtil $metricsExtensionPath
Test-ME-Stamps $mdmDataCollectionOutput $cppRestUtil
Get-Etw-Session-And-IfxMetrics-At-Start
Get-OS-And-Processes-Information
Get-Local-Time-Information
Get-Difference-Time-Server-And-Agent $cppRestUtil
Get-Certificates
Get-HTTP-Proxy-Configuration
Get-Environment-Variables
Get-Open-Sockets-And-Owning-Processes
Test-Frontend-Urls
Get-Application-Event-Logs
Get-Raw-And-Aggregated-Metrics
$commandLineArguments = Get-Command-Line-Arguments
Get-Cached-Config $commandLineArguments
Copy-Autopilot-Logs
Get-Autopilot-Ini
$monAgentHostPath = Get-File-Version "MonAgentHost.exe" ".\MonAgentHostProcesses.txt" "MonAgentHostVersions.txt"
Get-Tsf-Logs $logicalDisks $mdmDataCollectionOutput $monAgentHostPath
Get-Etw-Session-And-IfxMetrics-At-End
Compress-Output $compressedDataOutput $mdmDataCollectionOutput
Show-Ending-Message
}
function Set-UTF8-Encoding
{
[void](chcp 65001)
}
function Confirm-Admin-Permissions
{
if ($SkipAdminCheck) {
Write-Warning "Administrative permissions check skipped due to SkipAdminCheck being set."
}
elseif(-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole(
[Security.Principal.WindowsBuiltInRole] "Administrator"))
{
$errorMessage = "ERROR: This script has to be run with administrative permissions.`n"
$errorMessage += "If you believe you have received this message due to an error, you can`n"
$errorMessage += "skip this check by passing the command line parameter SkipAdminCheck."
Write-Error $errorMessage
break
}
}
function Get-MdmDataCollectionOutput
{
$folderSuffix = [DateTime]::UtcNow.ToString('yyyy_MM_dd_hh_mm_ss')
$randomNumber = Get-Random
$mdmDataCollectionOutput = "MdmDataCollectionOutput" + $folderSuffix + "_random_" + $randomNumber
[void](Remove-Directory-If-It-Exists $mdmDataCollectionOutput)
[void](mkdir $mdmDataCollectionOutput)
[void](Set-Location $mdmDataCollectionOutput)
return $mdmDataCollectionOutput
}
function Get-CompressedDataOutput([String]$mdmDataCollectionOutput)
{
$compressedDataOutput = $mdmDataCollectionOutput + ".zip"
return $compressedDataOutput
}
function Remove-Directory-If-It-Exists([String]$directory)
{
if (Test-Path -Path $directory)
{
Write-Output "File $directory already exists deleting it before proceeding..."
try
{
Invoke-Command "Remove-Item -LiteralPath $directory -Force -Recurse"
}
catch
{
Write-Error "Failed to delete the file ${directory}: $_. Aborting..."
}
}
}
function Show-Starting-Message
{
$date = Get-Date
Write-Output "Begin - MDM Data Collection Script - $date"
Write-Output "Script version $ScriptVersion"
Write-Output "Collecting general information..."
Write-Output "MdmDataCollection script version $ScriptVersion" > AboutCollectionScript.txt
}
function Get-Logical-Disks
{
Write-Output "Collecting information about logical disks"
if (-Not [string]::IsNullOrEmpty($LogicalDisksParam))
{
$LogicalDisksParam = $LogicalDisksParam.Replace(" ", "`n")
$LogicalDisksParam >> LogicalDisks.txt
}
else
{
$logicalDisks = Get-WmiObject -Class Win32_LogicalDisk
foreach ($logicalDisk in $logicalDisks)
{
$logicalDisk.DeviceID >> LogicalDisks.txt
}
}
}
function Get-File-Version([String]$processName, [String]$inputFile, [String]$outputFile)
{
Write-Host "Searching the process: $processName"
wmic PROCESS WHERE "(Name='${processName}')" GET ExecutablePath /FORMAT:list | findstr "=" > $inputFile
if ([String]::IsNullOrWhiteSpace((Get-content $inputFile)))
{
Write-Warning "The process $processName is not running"
"The process $processName is not running" > $outputFile
return
}
foreach ($process in Get-Content -Path $inputFile)
{
$executablePath = $process
$prefix = "ExecutablePath="
if ($executablePath.StartsWith($prefix))
{
$executablePath = $executablePath.Substring($prefix.Length)
}
if ([String]::IsNullOrEmpty($executablePath))
{
Write-Warning "The process $processName path is not valid or it is empty. Version can not be dumped."
"The process $processName path is not valid or it is empty. Version can not be dumped." > $outputFile
return
}
Write-Output "$executablePath" >> $outputFile
(Get-Item $executablePath).VersionInfo | format-list >> $outputFile
}
return $executablePath
}
function Search-CppRestUtil ([String]$metricsExtensionPath)
{
if ((-Not [string]::IsNullOrEmpty($CppRestUtilPathParam)) -and (Test-Path -Path $CppRestUtilPathParam))
{
return $CppRestUtilPathParam
}
if (Test-Path -Path "..\CppRestUtil\CppRestUtil.exe")
{
return "..\CppRestUtil\CppRestUtil.exe"
}
if ($metricsExtensionPath.Contains("MetricsExtension\MetricsExtension.Native.exe"))
{
# MetricsExtension NuGet setup
$possibleLocationCppRestUtil = $metricsExtensionPath.Replace("MetricsExtension\MetricsExtension.Native","CppRestUtil\CppRestUtil")
if (Test-Path -Path $possibleLocationCppRestUtil)
{
return $possibleLocationCppRestUtil
}
# Monitoring Agent setup
$possibleLocationCppRestUtil = $metricsExtensionPath.Replace("MetricsExtension.Native","CppRestUtil")
if (Test-Path -Path $possibleLocationCppRestUtil)
{
return $possibleLocationCppRestUtil
}
}
$warningMessage = "CppRestUtil was not found in the environment. Instead of CppRestUtil, internal Powershell tools will be used."
$warningMessage += "Check more information in the following link: https://eng.ms/docs/cloud-ai-platform/azure-edge-platform-aep/aep-health-standards/observability/mdm/geneva-metrics-mdm/docs/tsg/customer-side/actions/winhttp-escalation#powershell-way"
Write-Warning $warningMessage
return [string]::Empty
}
function Get-Etw-Session-And-IfxMetrics-At-Start
{
tasklist /M IfxMetrics.dll /FO CSV > ProcessLoadingIfxMetrics_At_Start.csv
logman NativeMetricsExtension_Provider -ets > MetricsExtensionEtwSessionAtStart.txt
logman -ets > EtwSessions.txt
}
function Get-OS-And-Processes-Information
{
Get-WmiObject -Class Win32_OperatingSystem | Select-Object Caption, SystemDrive, Version > OS.txt
Get-WmiObject -Class Win32_Process | Export-Csv -Path "AllProcesses.csv" -NoTypeInformation
}
function Get-Local-Time-Information
{
Write-Output "Collecting time from ME client and server"
Get-Date > DateTimeLocal.txt
Get-TimeZone > TimeZoneInfo.txt
}
function Get-Difference-Time-Server-And-Agent([String]$cppRestUtil)
{
if ([string]::IsNullOrEmpty($cppRestUtil))
{
Write-Warning "CppRestUtil.exe is not found. MdmDataCollection will not able to check if there is a difference of time between the server and the agent"
return
}
$serverDate = Invoke-Expression "& '$cppRestUtil' https://global.prod.microsoftmetrics.com/public/lb-probe" | findstr /C:"Date"
$serverDate > DateTimeServer.txt
$serverDate = $serverDate.TrimStart("Date: ")
$serverDate = Get-Date -Date "${serverDate}"
$serverDateUtc = $serverDate.ToUniversalTime()
$localDateUtc = [DateTime]::UtcNow
$deltaMinutes = ($localDateUtc - $serverDateUtc).TotalMinutes
if (($deltaMinutes -ge 1) -OR ($deltaMinutes -le -5))
{
"ERROR: There is a difference of ${deltaMinutes} minutes between ME client time and server time." > TimeDifferenceError.txt
Write-Error "ERROR: There is a difference of ${deltaMinutes} minutes between ME client time and server time."
}
}
function Get-Certificates
{
if ($SkipCollectionCertificates)
{
Write-Warning "SkipCollectionCertificates has been set, skipping the collection of certificates."
}
else
{
certutil -silent -v -gmt -store "My" > Certificates_On_LocalMachine_My.txt
certutil -user -v -gmt -silent -store "My" > Certificates_On_User_My.txt
}
}
function Get-HTTP-Proxy-Configuration
{
netsh winhttp dump > WinHttp_Config.txt
}
function Get-Environment-Variables
{
Get-ChildItem env: | Where-Object -Value $ExcludedEnvironmentVariables -NotIn -Property Name > EnvironmentVariables.txt
}
function Test-ME-Stamps([String]$mdmDataCollectionOutput, [String]$cppRestUtil)
{
Write-Output "Testing several MetricsExtension global endpoints"
foreach ($meStamp in $MeStamps)
{
foreach ($stampPath in $StampPaths)
{
Test-Connection-To-URL $cppRestUtil $meStamp$stampPath >> .\CppRestUtilResults.txt
}
}
}
function Get-Open-Sockets-And-Owning-Processes
{
Write-Output "Listing open sockets and owning processes"
netstat -abno > ListeningSockets.txt
}
function Test-Frontend-Urls
{
foreach ($meFrontendUrl in $MeFrontendUrls)
{
foreach ($port in $Ports)
{
$solvedDNS = Resolve-DnsName -Name $meFrontendUrl
Write-Output "Running IPv4 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt
Test-NetConnection $solvedDNS.IP4Address -port ${port} -InformationLevel "Detailed" 1>> GlobalStamp_TCPPing.txt 2>&1
Write-Output "Finished running IPv4 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt
Write-Output "Running IPv6 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt
Test-NetConnection $solvedDNS.IP6Address -port ${port} -InformationLevel "Detailed" 1>> GlobalStamp_TCPPing.txt 2>&1
Write-Output "Finished running IPv6 against ${meFrontendUrl}:${port}" 1>> GlobalStamp_TCPPing.txt
}
}
}
function Get-Application-Event-Logs
{
Write-Output "Collecting application event logs for Level Error and EventID 1000 happened within last one hour..."
Write-Output "Collecting application event logs for Level Error and EventID 1000 happened within last one hour..." > ApplicationErrorLog.txt
wevtutil qe Application /q:"*[System[Level=2 and EventID=1000 and TimeCreated[timediff(@SystemTime) <= 3600000]]]" /f:text /rd:true >> ApplicationErrorLog.txt
}
function Get-Raw-And-Aggregated-Metrics
{
Set-MdmInputOutputProviders-File
Write-Output "Collecting raw and aggregated metrics, please DO NOT press CTRL+C"
Invoke-Command "logman start MdmDataCollection -max ${MetricCollectionSizeMaxMB} -pf mdmInputOutputProviders.txt -o mdmRaw.etl -ets"
timeout ${MetricCollectionDurationSec} /nobreak
Invoke-Command "logman stop MdmDataCollection -ets"
Invoke-Command "Remove-Item mdmInputOutputProviders.txt"
logman -ets | findstr /i IfxViewerSession > IfxConsumerSessions.txt
foreach ($ifxConsumerSession in Get-Content -Path .\IfxConsumerSessions.txt)
{
Invoke-Command "logman stop $ifxConsumerSession -ets"
}
}
function Set-MdmInputOutputProviders-File
{
$content = @(
"{edc24920-e004-40f6-a8e1-0e6e48f39d84}"
"{2f23a2a9-0de7-4cb4-a778-fbdf5c1e7372}"
)
$pathMdmInputOutputProviders = (Get-Item -Path ".\" -Verbose).FullName | Join-Path -ChildPath 'mdmInputOutputProviders.txt'
[IO.File]::WriteAllLines($pathMdmInputOutputProviders, $content)
}
function Search-Files-Job([Object[]]$fileNames, [Object[]]$logicalDisks, [String]$outputFile, [String]$currentPath)
{
$searchFilesFunc = $(Get-Command Search-Files).Definition
$invokeCommandFunc = $(Get-Command Invoke-Command).Definition
$scriptBlock =
{
param($fileNames, $logicalDisks, $outputFile, $currentPath)
Set-Location $currentPath
Invoke-Expression "function Search-Files {$using:searchFilesFunc}"
Invoke-Expression "function Invoke-Command {$using:invokeCommandFunc}"
Search-Files -fileNames $fileNames -logicalDisks $logicalDisks -outputFile $outputFile
}
$job = Start-Job -ArgumentList $fileNames, $logicalDisks, $outputFile, $currentPath -ScriptBlock $scriptBlock
$job | Wait-Job -Timeout $TimeOutSecondsSearchFiles
if ($job.State -ne "Completed")
{
Write-Warning "$fileNames were searched but they took more than $TimeOutSecondsSearchFiles seconds, aborting this search..."
}
}
function Search-Files([Object[]]$fileNames, [Object[]]$logicalDisks, [String]$outputFile)
{
foreach($logicalDisk in $logicalDisks)
{
foreach($fileName in $fileNames)
{
try
{
Write-Output "cmd /c dir /s/b ${logicalDisk}\${fileName}"
cmd /c "dir /s/b ${logicalDisk}\${fileName} > lastDir.txt 2>>dirFailures.txt"
}
catch
{
"ERROR: cmd /c dir /s/b ${logicalDisk}\${fileName} failed: $_" >> dirFailures.txt
Write-Error "ERROR: cmd /c dir /s/b ${logicalDisk}\${fileName} failed: $_"
}
Invoke-Command "Get-Content .\lastDir.txt"
Get-Content .\lastDir.txt >> $outputFile
}
}
}
function Get-Command-Line-Arguments
{
$errorMessage = "CommandLineArguments from MetricsExtension.Native.exe were not found."
try
{
$commandLineArguments = (Get-WmiObject Win32_Process -Filter "Name='MetricsExtension.Native.exe'").CommandLine
if (-Not [string]::IsNullOrEmpty($commandLineArguments))
{
$commandLineArguments > CommandLineArgumentsME.txt
return $commandLineArguments
}
}
catch
{
$errorMessage += " Exception: $_"
Write-Error $errorMessage
}
$errorMessage > CommandLineArgumentsME.txt
return [string]::Empty
}
function Get-Cached-Config([String]$commandLineArguments)
{
$dataDirectories = Get-Data-Directories $commandLineArguments
$counter = 1
foreach ($dataDirectory in $dataDirectories)
{
if (Test-Path -Path $dataDirectory)
{
Invoke-Command "New-Item -ItemType Directory -Path .\MetricsExtensionCachedConfig_$counter"
Get-ChildItem -Path $dataDirectory -Recurse | Where-Object { $ExcludedTokenFiles -notcontains $_.Name } |
ForEach-Object { Invoke-Command "Copy-Item -Path $($_.FullName) -Destination '.\MetricsExtensionCachedConfig_$counter' -Force" }
$counter++
}
}
}
function Get-Data-Directories([String]$commandLineArguments)
{
# As there could be several ME processes running at the same time, we will collect the data directories of all of them
$dataDirectories = @()
# Try to use the -DataDirectory parameter
if (-Not [string]::IsNullOrEmpty($commandLineArguments))
{
$commandLineArgumentsArray = $commandLineArguments.Split(" ")
for ($i = 1; $i -lt $commandLineArgumentsArray.Count; $i++)
{
$arg = $commandLineArgumentsArray[$i]
if ($arg -eq "-DataDirectory")
{
$i++
$dataDirectory = $commandLineArgumentsArray[$i]
$dataDirectory = $dataDirectory.Replace('"', '')
if ($dataDirectory[-1] -ne '\')
{
$dataDirectory += '\'
}
$dataDirectories += $dataDirectory
}
}
}
# Try to get the path from env var MONITORING_DATA_DIR
if (Test-Path env:MONITORING_DATA_DIR)
{
$dataDirectories += $env:MONITORING_DATA_DIR + '\MetricsExtensionData\'
}
# Try to get the path from env var DiagnosticStore
if (Test-Path env:DiagnosticStore)
{
$dataDirectories += $env:DiagnosticStore + '\MetricsExtensionData\'
}
# Get the path from TEMP dir
$dataDirectories += $env:TEMP + '\MetricsExtensionData\'
return $dataDirectories
}
function Copy-Autopilot-Logs
{
if (Test-Path -Path D:\Data\logs\local)
{
Write-Output "Copying autopilot logs..."
Invoke-Command "mkdir .\GenevaMetricsExtensionLogs"
Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\GenevaMetricsExtension_*.log) -Destination GenevaMetricsExtensionLogs"
Invoke-Command "mkdir .\GenevaMetricsExtensionHostLogs"
Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\GenevaMetricsExtensionHost_*.log) -Destination GenevaMetricsExtensionHostLogs"
Invoke-Command "mkdir .\APPKIMetricsExtensionLogs"
Invoke-Command "Copy-Item -Path (Get-ChildItem D:\Data\logs\local\APPKI_MetricsExtension.Native_*.log) -Destination APPKIMetricsExtensionLogs"
}
else
{
Write-Warning "No autopilot logs were found. If this machine is not an Autopilot machine, this is not an issue."
}
}
function Get-Autopilot-Ini
{
if (Test-Path -Path D:\app\autopilot.ini)
{
Write-Output "Attempting to collect autopilot.ini..."
Write-Output "Attempting to collect autopilot.ini..." > CollectAutopilotLogs.txt
Invoke-Command "xcopy /C D:\app\autopilot.ini >> CollectAutopilotLogs.txt"
}
else
{
Write-Warning "D:\app\autopilot.ini was not found. If this machine is not an Autopilot machine, this is not an issue."
}
}
function Convert-Tsf-Logs-To-Csv([String]$table2csv)
{
$tsfCounter = 0
foreach ($tsfLog in Get-Content -Path .\TsfLogs.txt)
{
try
{
Write-Output "$table2csv $Table2CsvParameters $tsfLog"
Write-Output "Waiting for Table2Csv to complete..."
Write-Output "${table2csv} ${Table2CsvParameters} ${tsfLog}" >> Table2CsvLogs.txt
Invoke-Expression "& '${table2csv}' ${Table2CsvParameters} '${tsfLog}'" >> Table2CsvLogs.txt
}
catch
{
"ERROR: Command {$table2csv $Table2CsvParameters '$tsfLog'} Failed: $_" >> Table2CsvLogs.txt
Write-Error "ERROR: Command {$table2csv $Table2CsvParameters '$tsfLog'} Failed: $_"
}
$tsfCounter++
$csvFullPath = $tsfLog.Replace("tsf","csv")
$tsfLogFileName = Split-Path $tsfLog -Leaf
$csvLogFileName = $tsfLogFileName.Replace(".tsf", "_${tsfCounter}.csv")
try
{
Write-Output "Copy-Item '${csvFullPath}' ${csvLogFileName}"
Invoke-Command "Copy-Item '${csvFullPath}' .\${csvLogFileName} 2>> CsvCopyErrors.txt"
}
catch
{
"ERROR: Command {failed to copy ${csvFullPath} to .\${csvLogFileName}}: $_" >> CsvCopyErrors.txt
Write-Error "ERROR: Command {failed to copy ${csvFullPath} to .\${csvLogFileName}}: $_"
}
}
}
function Get-Etw-Session-And-IfxMetrics-At-End
{
tasklist /M IfxMetrics.dll /FO CSV > ProcessLoadingIfxMetrics_At_End.csv
logman NativeMetricsExtension_Provider -ets > MetricsExtensionEtwSessionAtEnd.txt
}
function Compress-Output([String]$compressedDataOutput, [String]$mdmDataCollectionOutput)
{
Write-Output "Compressing MDM Data Collection Output ..."
try
{
Invoke-Command "Compress-Archive -Force -Path .\* -DestinationPath '$OutputDirectory\$compressedDataOutput'"
Invoke-Command "Set-Location .."
Invoke-Command "Remove-Item -r -Force $mdmDataCollectionOutput"
Write-Output "Done -^> MDM Data ready at $OutputDirectory\$compressedDataOutput"
}
catch
{
Write-Error "ERROR: MDM Data Collection Output has not been compressed: $_"
}
}
function Show-Ending-Message
{
$date = Get-Date
Write-Output "End - MDM Data Collection Script - $date"
}
function Invoke-Command([String]$command)
{
$output = Invoke-Expression $command
if ($DebugMdmDataCollection)
{
Write-Output $output
}
}
function Test-Connection-To-URL([String]$cppRestUtil, [String]$url)
{
try
{
if ([String]::IsNullOrEmpty($cppRestUtil))
{
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = { $true }
Write-Output "(New-Object System.IO.StreamReader ((([System.Net.WebRequest]::Create($url)).GetResponse()).GetResponseStream())).ReadToEnd()"
(New-Object System.IO.StreamReader ((([System.Net.WebRequest]::Create($url)).GetResponse()).GetResponseStream())).ReadToEnd()
}
else
{
Write-Output "'$cppRestUtil' --json $url"
Invoke-Expression "& '$cppRestUtil' --json $url"
}
}
catch
{
"Request to $url failed."
}
Write-Output ""
}
function Search-Table2csv([String]$monAgentHostPath)
{
if ((-Not [string]::IsNullOrEmpty($Table2CsvPathParam)) -and (Test-Path -Path $Table2CsvPathParam))
{
return $Table2CsvPathParam
}
if (-Not [string]::IsNullOrEmpty($monAgentHostPath) -And $monAgentHostPath.Contains("MonAgentHost.exe"))
{
$table2CsvPath = $monAgentHostPath.Replace("MonAgentHost.exe","table2csv.exe")
if (Test-Path -Path $table2CsvPath)
{
return $table2CsvPath
}
}
return [string]::Empty
}
function Get-Tsf-Logs([Object[]]$logicalDisks, [String]$mdmDataCollectionOutput, [String]$monAgentHostPath)
{
if ($SkipCollectionTsfLogs)
{
Write-Warning "SkipCollectionTsfLogs has been set, skipping the collection of tsf logs."
}
else
{
$fileNames = @(
"MaMetricsExtensionEtw.tsf"
"MAEventTable.tsf"
"LocallyAggregatedMdmMetricsV1.tsf"
)
$table2csv = Search-Table2csv $monAgentHostPath
if ([string]::IsNullOrEmpty($table2csv))
{
$warningMessage = "table2csv.exe was not found. Tsf logs will not be collected."
$warningMessage += "Please take in account this scenario is useful only if you are using MonitoringAgent"
Write-Warning $warningMessage
}
else
{
Search-Files-Job $fileNames $logicalDisks "TsfLogs.txt" "$PSScriptRoot\$mdmDataCollectionOutput"
Convert-Tsf-Logs-To-Csv $table2csv
}
}
}
if (-Not $ImportFunctions)
{
Main
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAf453hMGvX6qs/
# kRLxVTV0iRZYxWyiZRNYWcZa7FihoqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJmDilnUdFVM/mSoBzBQARSq
# JdYmLn7LieFin/hMZCrWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAyXb3WLWzcs6ePF5IyLfF3chF6fLuns6MuSpKEuFcDpEbsKBFhFakY84l
# o67uv8QMBuGeNDw50Gou6B8v0kC7G+Y8q8M9b7lvAijdLK3sVF3TRd1nGqn30Xa3
# j4Rps23kbHRXACp6ihB5BeX7gHbN9KfdZEm+M+dq6M4oz+cuhXxmeM7+iFj1ugIc
# 5rA8xwQ0rZ74r6uEU96PJOu3GG9xJa8nWTt/AOU123PvNOcn1km2Bv6Dt9/VJUc6
# jXL6R6clFVQsdGKjQtsQR5nSStuyfD8NnAWIVv60BdZZFkA9nO4SA7BQAqWa1XFg
# NxYZTq1iUC6/vbqHBs+9jxV111wGg6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDknmjXLkuiJGGcgDAlXZ5ZadOzx8gBafNoyS8ic4bgfQIGZjOr2eQx
# GBMyMDI0MDUxNzA1NTcxNi4zNTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC
# QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp
# +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03
# vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH
# UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv
# vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k
# G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b
# BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs
# qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8
# xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk
# dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7
# 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk
# UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF
# yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM
# cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I
# ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H
# eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ
# 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN
# N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO
# zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov
# mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/
# e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8
# +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d
# /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7
# FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnxRrEwIhgPMjAyNDA1MTcxMTAwMDFaGA8yMDI0MDUxODExMDAwMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fFGsQIBADAHAgEAAgIQoTAHAgEAAgIRfzAKAgUA
# 6fKYMQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANXdzpf8/io4zOiKiTax
# XY8qzkXim67t/1ceRJi+CTWs1Nt8Wjb64X94T474eIQI8a9jT4HxCCHbUz311XWz
# lYHCInjrO9QlnEZ9iYJ5RyBZSpkMuDKv76ITEhBgy0hhiF5S2YorDgYyyACynN+u
# qfZ5Amkh6ADEXHQyQfOHyvw5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg0uJ5XvhiCTW3NtgmBKkjx8DeaOfrdgfjQeitult4DvYwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj
# ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X
# HZXUraobAAEAAAHdMCIEIMRyq4W5rYgLXwCWg5DNV5op7iq8OppDtdhxB6InIlBq
# MA0GCSqGSIb3DQEBCwUABIICAH+eeeQtaCybvBh15fKdrbLM7WupHBpIOK76VpP+
# W9HKYHZQSDWQhNM4i/RMQ4XldKdNOzaKn4gAiUM5C75zhkB1IyHvkH6jMPaP4YF8
# FQ+p6rSycdquvzp8JIU4id2WIq1QfrGhpP2sb01k5izKwLkKos71S5InZ8qwDKc7
# Ca4cF8jp1Pa8wSW+DIpea/LmDsy+eN7KA1piU6Saua2y4NduIbfTuyAcYu3Y0WE3
# DzUOP5j7r2YOw0VJfiCXowdMvUGxQAbZ4YrbQIbD3Fc2AEdHAG2OvXMGp5Y8h7+N
# yFDEiokAzDzElvHa9ELtEAVmO0Ey30CPfuL6wb/EOX+UFNv4+wm+koMtlWgSpQqT
# b89UYj74wvB/ljBNCj5XGYAWIFqzkcT4CBqMLBhgKw9b094uEkjt0TOHNUET6bQt
# hSLLepve2HTEnc3E4DxiJkp1Cr2g4cybCqiGGrbJ0YY22hdhTQhR0bS6zAEzsFiB
# 46ledm4Zf6AVENKJOMVTrpt9iGqHPDcctd1wn3O/A07DtBwuFht3voc1tZkQdPfQ
# mDw+1PlC7AFD/0H+2z1qBxEwQXkBY/13aSqjPCprKjP1iKaCXdITjW3Zeuum3pgu
# YyHRNCNzlZ8VJGWZ+VIij0/4fe4dyjSBHvgc2t+edgXua/X3I8WZ6nz7kxjttTYV
# Ol8s
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_30_84.ps1 | sample_30_84.ps1 | steps:
- task: NodeTool@0
inputs:
versionSource: fromFile
versionFilePath: .nvmrc
nodejsMirror: https://github.com/joaomoreno/node-mirror/releases/download
- task: SFP.build-tasks.esrpclient-tools-task.EsrpClientTool@2
displayName: "Use EsrpClient"
- task: AzureKeyVault@1
displayName: "Azure Key Vault: Get Secrets"
inputs:
azureSubscription: "vscode-builds-subscription"
KeyVaultName: vscode-build-secrets
SecretsFilter: "github-distro-mixin-password,esrp-aad-username,esrp-aad-password"
- task: AzureKeyVault@1
displayName: "Azure Key Vault: Get Secrets"
inputs:
azureSubscription: "vscode-builds-subscription"
KeyVaultName: vscode-build-packages
SecretsFilter: "vscode-esrp,c24324f7-e65f-4c45-8702-ed2d4c35df99"
# allow-any-unicode-next-line
- pwsh: Write-Host "##vso[build.addbuildtag]🚀"
displayName: Add build tag
- pwsh: node build/npm/setupBuildYarnrc
displayName: Prepare build dependencies
- pwsh: yarn
workingDirectory: build
displayName: Install build dependencies
- download: current
patterns: "**/artifacts_processed_*.txt"
displayName: Download all artifacts_processed text files
- task: AzureCLI@2
displayName: Fetch secrets
inputs:
azureSubscription: "vscode-builds-subscription"
scriptType: pscore
scriptLocation: inlineScript
addSpnToEnvironment: true
inlineScript: |
Write-Host "##vso[task.setvariable variable=AZURE_TENANT_ID]$env:tenantId"
Write-Host "##vso[task.setvariable variable=AZURE_CLIENT_ID]$env:servicePrincipalId"
Write-Host "##vso[task.setvariable variable=AZURE_CLIENT_SECRET;issecret=true]$env:servicePrincipalKey"
- pwsh: |
. build/azure-pipelines/win32/exec.ps1
if (Test-Path "$(Pipeline.Workspace)/artifacts_processed_*/artifacts_processed_*.txt") {
Write-Host "Artifacts already processed so a build must have already been created."
return
}
$VERSION = node -p "require('./package.json').version"
Write-Host "Creating build with version: $VERSION"
exec { node build/azure-pipelines/common/createBuild.js $VERSION }
env:
AZURE_TENANT_ID: "$(AZURE_TENANT_ID)"
AZURE_CLIENT_ID: "$(AZURE_CLIENT_ID)"
AZURE_CLIENT_SECRET: "$(AZURE_CLIENT_SECRET)"
displayName: Create build if it hasn't been created before
- pwsh: |
$ErrorActionPreference = "Stop"
$CertCollection = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2Collection
$AuthCertBytes = [System.Convert]::FromBase64String("$(vscode-esrp)")
$CertCollection.Import($AuthCertBytes, $null, [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable -bxor [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet)
$RequestSigningCertIndex = $CertCollection.Count
$RequestSigningCertBytes = [System.Convert]::FromBase64String("$(c24324f7-e65f-4c45-8702-ed2d4c35df99)")
$CertCollection.Import($RequestSigningCertBytes, $null, [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable -bxor [System.Security.Cryptography.X509Certificates.X509KeyStorageFlags]::PersistKeySet)
$CertStore = New-Object System.Security.Cryptography.X509Certificates.X509Store("My","LocalMachine")
$CertStore.Open("ReadWrite")
$CertStore.AddRange($CertCollection)
$CertStore.Close()
$AuthCertSubjectName = $CertCollection[0].Subject
$RequestSigningCertSubjectName = $CertCollection[$RequestSigningCertIndex].Subject
Write-Host "##vso[task.setvariable variable=RELEASE_AUTH_CERT_SUBJECT_NAME]$AuthCertSubjectName"
Write-Host "##vso[task.setvariable variable=RELEASE_REQUEST_SIGNING_CERT_SUBJECT_NAME]$RequestSigningCertSubjectName"
displayName: Import certificates
- pwsh: node build/azure-pipelines/common/publish.js
env:
GITHUB_TOKEN: "$(github-distro-mixin-password)"
AZURE_TENANT_ID: "$(AZURE_TENANT_ID)"
AZURE_CLIENT_ID: "$(AZURE_CLIENT_ID)"
AZURE_CLIENT_SECRET: "$(AZURE_CLIENT_SECRET)"
SYSTEM_ACCESSTOKEN: $(System.AccessToken)
RELEASE_TENANT_ID: "$(PRSS_RELEASE_TENANT_ID)"
RELEASE_CLIENT_ID: "$(PRSS_RELEASE_CLIENT_ID)"
RELEASE_AUTH_CERT_SUBJECT_NAME: "$(RELEASE_AUTH_CERT_SUBJECT_NAME)"
RELEASE_REQUEST_SIGNING_CERT_SUBJECT_NAME: "$(RELEASE_REQUEST_SIGNING_CERT_SUBJECT_NAME)"
PROVISION_TENANT_ID: "$(PRSS_PROVISION_TENANT_ID)"
PROVISION_AAD_USERNAME: "$(esrp-aad-username)"
PROVISION_AAD_PASSWORD: "$(esrp-aad-password)"
displayName: Process artifacts
retryCountOnTaskFailure: 3
- task: 1ES.PublishPipelineArtifact@1
inputs:
targetPath: $(Pipeline.Workspace)/artifacts_processed_$(System.StageAttempt)/artifacts_processed_$(System.StageAttempt).txt
artifactName: artifacts_processed_$(System.StageAttempt)
sbomEnabled: false
displayName: Publish the artifacts processed for this stage attempt
condition: always()
- pwsh: |
$ErrorActionPreference = 'Stop'
# Determine which stages we need to watch
$stages = @(
if ($env:VSCODE_BUILD_STAGE_WINDOWS -eq 'True') { 'Windows' }
if ($env:VSCODE_BUILD_STAGE_LINUX -eq 'True') { 'Linux' }
if ($env:VSCODE_BUILD_STAGE_LINUX_LEGACY_SERVER -eq 'True') { 'LinuxLegacyServer' }
if ($env:VSCODE_BUILD_STAGE_ALPINE -eq 'True') { 'Alpine' }
if ($env:VSCODE_BUILD_STAGE_MACOS -eq 'True') { 'macOS' }
if ($env:VSCODE_BUILD_STAGE_WEB -eq 'True') { 'Web' }
)
Write-Host "Stages to check: $stages"
# Get the timeline and see if it says the other stage completed
$timeline = Invoke-RestMethod "$($env:BUILDS_API_URL)timeline?api-version=6.0" -Headers @{
Authorization = "Bearer $env:SYSTEM_ACCESSTOKEN"
} -MaximumRetryCount 5 -RetryIntervalSec 1
$failedStages = @()
foreach ($stage in $stages) {
$didStageFail = $timeline.records | Where-Object {
$_.name -eq $stage -and $_.type -eq 'stage' -and $_.result -ne 'succeeded' -and $_.result -ne 'succeededWithIssues'
}
if($didStageFail) {
$failedStages += $stage
Write-Host "'$stage' failed!"
Write-Host $didStageFail
} else {
Write-Host "'$stage' did not fail."
}
}
if ($failedStages.Length) {
throw "Failed stages: $($failedStages -join ', '). This stage will now fail so that it is easier to retry failed jobs."
}
env:
SYSTEM_ACCESSTOKEN: $(System.AccessToken)
displayName: Determine if stage should succeed
|
combined_dataset/train/non-malicious/1603.ps1 | 1603.ps1 |
function Take-Ownership {
param (
[String]$Folder,
[switch]$Everyone,
[switch]$ThisItemOnly,
[switch]$File,
[switch]$Revoke
)
if ( !$file -and !($Folder.EndsWith('\')) ) {
$Folder += '\'
}
if ($Folder -match ' ') {
$Folder = '"' + $Folder + '"'
}
if ($Everyone) {
if ($Revoke) {
if (!$ThisItemOnly) {
SubInACL.exe /SUBDIRECTORIES $Folder /REVOKE=Everyone
}
SubInACL.exe /FILE $Folder /REVOKE=Everyone
} else {
SubInACL.exe /FILE $Folder /GRANT=Everyone=F
if (!$ThisItemOnly) {
SubInACL.exe /SUBDIRECTORIES $Folder /GRANT=Everyone=F
}
}
} else {
if ($Revoke) {
if (!$ThisItemOnly) {
SubInACL.exe /SUBDIRECTORIES $Folder /REVOKE=Administrators
}
SubInACL.exe /FILE $Folder /REVOKE=Administrators
} else {
SubInACL.exe /FILE $Folder /GRANT=Administrators=F
if (!$ThisItemOnly) {
SubInACL.exe /SUBDIRECTORIES $Folder /GRANT=Administrators=F
}
}
}
}
|
combined_dataset/train/non-malicious/Read-HostWithPrompt.ps1 | Read-HostWithPrompt.ps1 | #############################################################################\n##\n## Read-HostWithPrompt\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nRead user input, with choices restricted to the list of options you\nprovide.\n\n.EXAMPLE\n\nPS >$caption = "Please specify a task"\nPS >$message = "Specify a task to run"\nPS >$option = "&Clean Temporary Files","&Defragment Hard Drive"\nPS >$helptext = "Clean the temporary files from the computer",\n>> "Run the defragment task"\n>>\nPS >$default = 1\nPS >Read-HostWithPrompt $caption $message $option $helptext $default\n\nPlease specify a task\nSpecify a task to run\n[C] Clean Temporary Files [D] Defragment Hard Drive [?] Help\n(default is "D"):?\nC - Clean the temporary files from the computer\nD - Run the defragment task\n[C] Clean Temporary Files [D] Defragment Hard Drive [?] Help\n(default is "D"):C\n0\n\n#>\n\nparam(\n ## The caption for the prompt\n $Caption = $null,\n\n ## The message to display in the prompt\n $Message = $null,\n\n ## Options to provide in the prompt\n [Parameter(Mandatory = $true)]\n $Pption,\n\n ## Any help text to provide\n $HelpText = $null,\n\n ## The default choice\n $Default = 0\n)\n\nSet-StrictMode -Version Latest\n\n## Create the list of choices\n$choices = New-GenericObject `\n Collections.ObjectModel.Collection `\n Management.Automation.Host.ChoiceDescription\n\n## Go through each of the options, and add them to the choice collection\nfor($counter = 0; $counter -lt $option.Length; $counter++)\n{\n $choice = New-Object Management.Automation.Host.ChoiceDescription `\n $option[$counter]\n\n if($helpText -and $helpText[$counter])\n {\n $choice.HelpMessage = $helpText[$counter]\n }\n\n $choices.Add($choice)\n}\n\n## Prompt for the choice, returning the item the user selected\n$host.UI.PromptForChoice($caption, $message, $choices, $default)
|
combined_dataset/train/non-malicious/1617.ps1 | 1617.ps1 | f u n c t i o n g l o b a l : G e t - L o g g e d O n U s e r {
[ C m d l e t B i n d i n g ( ) ]
P a r a m
(
[ P a r a m e t e r ( M a n d a t o r y = $ t r u e ,
P o s i t i o n = 0 ,
V a l u e F r o m P i p e l i n e = $ t r u e ,
V a l u e F r o m P i p e l i n e B y P r o p e r t y N a m e = $ t r u e ) ]
[ S t r i n g [ ] ] $ C o m p u t e r N a m e
)
B e g i n
{
W r i t e - H o s t " ` n C h e c k i n g U s e r s . . . "
$ i = 0
}
P r o c e s s
{
$ C o m p u t e r N a m e | F o r e a c h - o b j e c t {
$ C o m p u t e r = $ _
t r y
{
$ p r o c e s s i n f o = @ ( G e t - W m i O b j e c t - c l a s s w i n 3 2 _ p r o c e s s - C o m p u t e r N a m e $ C o m p u t e r - E A " S t o p " )
i f ( $ p r o c e s s i n f o )
{
$ p r o c e s s i n f o | F o r e a c h - O b j e c t { $ _ . G e t O w n e r ( ) . U s e r } |
W h e r e - O b j e c t { $ _ - n e " N E T W O R K S E R V I C E " - a n d $ _ - n e " L O C A L S E R V I C E " - a n d $ _ - n e " S Y S T E M " } |
S o r t - O b j e c t - U n i q u e |
F o r E a c h - O b j e c t { N e w - O b j e c t p s o b j e c t - P r o p e r t y @ { C o m p u t e r = $ C o m p u t e r ; L o g g e d O n = $ _ } } |
S e l e c t - O b j e c t C o m p u t e r , L o g g e d O n
}
}
c a t c h
{
" C a n n o t f i n d a n y p r o c e s s e s r u n n i n g o n $ c o m p u t e r " | O u t - H o s t
}
}
}
E n d
{
}
}
|
combined_dataset/train/non-malicious/Set-Computername_3.ps1 | Set-Computername_3.ps1 | function Set-ComputerName {
param( [switch]$help,
[string]$originalPCName=$(read-host "Please specify the current name of the computer"),
[string]$computerName=$(read-host "Please specify the new name of the computer"))
$usage = "set-ComputerName -originalPCname CurrentName -computername AnewName"
if ($help) {Write-Host $usage;break}
@@ $computer = Get-WmiObject Win32_ComputerSystem -computername $originalPCName
$computer.Rename($computerName)
}
|
combined_dataset/train/non-malicious/sample_42_12.ps1 | sample_42_12.ps1 | # Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=是(&Y)
PromptNoString=否(&N)
BundleFound=找到下列資源存放區: {0}
PackageFound=找到封裝: {0}
EncryptedBundleFound=找到加密的套件組合: {0}
EncryptedPackageFound=找到加密的套件: {0}
CertificateFound=找到憑證: {0}
DependenciesFound=找到相依性封裝:
GettingDeveloperLicense=正在取得開發人員授權...
InstallingCertificate=正在安裝憑證...
InstallingPackage=\n正在安裝應用程式...
AcquireLicenseSuccessful=已成功取得開發人員授權。
InstallCertificateSuccessful=已成功安裝憑證。
Success=\n成功: 已成功安裝您的應用程式。
WarningInstallCert=\n您即將安裝數位憑證到您電腦的「受信任的人」憑證存放區。這會帶來嚴重的安全性風險,請務必在您信任這個數位憑證的建立者的情況下才執行這個動作。\n\n使用完這個應用程式之後,您應該手動移除相關的數位憑證。有關執行這個動作的指示,請參閱: http://go.microsoft.com/fwlink/?LinkId=243053\n\n您確定要繼續嗎?\n\n
ElevateActions=\n安裝這個應用程式之前,必須執行下列動作:
ElevateActionDevLicense=\t- 取得開發人員授權
ElevateActionCertificate=\t- 安裝簽署憑證
ElevateActionsContinue=必須有系統管理員認證才能繼續。請接受 UAC 提示,並在系統要求時提供您的系統管理員密碼。
ErrorForceElevate=您必須提供系統管理員認證才能繼續。請在不含 -Force 參數的情況下執行這個指令碼,或從更高權限的 PowerShell 視窗執行。
ErrorForceDeveloperLicense=必須透過使用者互動才能取得開發人員授權。請在不含 -Force 參數的情況下執行指令碼。
ErrorLaunchAdminFailed=錯誤: 無法以系統管理員身分啟動新處理序。
ErrorNoScriptPath=錯誤: 您必須從檔案啟動這個指令碼。
ErrorNoPackageFound=錯誤: 在指令碼目錄中找不到任何封裝或資源存放區。請確定您要安裝的封裝或資源存放區是放在與這個指令碼相同的目錄中。
ErrorManyPackagesFound=錯誤: 在指令碼目錄中找到多個封裝或資源存放區。請確定您只將要安裝的封裝或資源存放區放在與這個指令碼相同的目錄中。
ErrorPackageUnsigned=錯誤: 封裝或資源存放區未經數位簽署,或其簽章已損毀。
ErrorNoCertificateFound=錯誤: 在指令碼目錄中找不到任何憑證。請確定用來簽署要安裝之封裝或資源存放區的憑證是放在與這個指令碼相同的目錄中。
ErrorManyCertificatesFound=錯誤: 在指令碼目錄中找到多個憑證。請確定您只將用來簽署要安裝之封裝或資源存放區的憑證放在與這個指令碼相同的目錄中。
ErrorBadCertificate=錯誤: 檔案 "{0}" 不是有效的數位憑證。CertUtil 傳回錯誤碼 {1}。
ErrorExpiredCertificate=錯誤: 開發人員憑證 "{0}" 已過期。一個可能的原因是系統時鐘未設為正確的日期和時間。如果系統設定正確,請連絡應用程式擁有者,用有效的憑證重新建立封裝或資源存放區。
ErrorCertificateMismatch=錯誤: 這個憑證與用來簽署封裝或資源存放區的憑證不符。
ErrorCertIsCA=錯誤: 憑證不可以是憑證授權單位。
ErrorBannedKeyUsage=錯誤: 憑證不可以有下列金鑰使用方法: {0}。金鑰使用方法必須是未指定或等於 "DigitalSignature"。
ErrorBannedEKU=錯誤: 憑證不可以有下列擴充金鑰使用方法: {0}。只允許「程式碼簽署」和「永久簽署」EKU。
ErrorNoBasicConstraints=錯誤: 憑證遺漏基本限制延伸。
ErrorNoCodeSigningEku=錯誤: 憑證遺漏程式碼簽署的擴充金鑰使用方法。
ErrorInstallCertificateCancelled=錯誤: 已取消安裝憑證。
ErrorCertUtilInstallFailed=錯誤: 無法安裝憑證。CertUtil 傳回錯誤碼 {0}。
ErrorGetDeveloperLicenseFailed=錯誤: 無法取得開發人員授權。如需詳細資訊,請參閱 http://go.microsoft.com/fwlink/?LinkID=252740。
ErrorInstallCertificateFailed=錯誤: 無法安裝憑證。狀態: {0}。如需詳細資訊,請參閱 http://go.microsoft.com/fwlink/?LinkID=252740。
ErrorAddPackageFailed=錯誤: 無法安裝應用程式。
ErrorAddPackageFailedWithCert=錯誤: 無法安裝應用程式。為了確保安全性,請考慮解除安裝簽署憑證,直到您可以安裝應用程式為止。如需執行此動作的指示,請參閱:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/sample_11_7.ps1 | sample_11_7.ps1 | ConvertFrom-StringData @'
id_virtualization=Virtualization Information
id_virtualizationobtaining=Obtaining Information about Virtualization Environment
id_virtualizationoutput=Virtualization Information Output
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBS8q0KncuLXFV/
# PBEBqbmLcB1mcikGQvYIh0WwMWCVk6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICyyR/ZLIG+GmjOk5pxnXdt+
# cscjwSOENqHG+jlNwmBHMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEALkTV1uqkKEdDXhLugmTbPuKFgtofgd2Blr8DRowIW76p5VzZMWFJAC/E
# t74HBlB2pFK0Bt22bD9NmRjNJppIshKP9JicVN5ROM920QSFbz9tTy7XQlRfoVSm
# SpfLp8KVxImJkkxWifi2WT7g6TgQQr3Zm5a/Wa1NLvy8bwFmgcRxL/sjyP8KvZNo
# dkuBmDKZgmjxPtOobMlMLumfEy0oANCGhpQYuaj+ONRXlbfbhsdj6JMahUAnbW0Y
# 2qg0tyW0K8bgmlbn2eLNXkZ71kiQts7ZpGhSDKVXdMb3shWZMf0R8P+nZZRK2zHB
# TPAiQmbK8nslNbidaThOkx8Z27hq/qGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA1mRyEOi1+RYcS3SUgNoMBNtrZnfE0cwa5eCJQJVhEPwIGZutwxmXm
# GBMyMDI0MTAyODExNDA0Mi4zNTlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe
# CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq
# U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf
# Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp
# ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw
# UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF
# acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi
# vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8
# /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I
# vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM
# SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92
# BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo
# PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT
# FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A
# Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW
# /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy
# tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h
# 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ
# lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr
# 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU
# PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t
# iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ
# 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx
# f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK
# AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz
# tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0
# teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey
# h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ
# N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI
# Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl
# FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgKdfHqpXYT/O+
# 0Ti9IgpOMnD94M9j+K/qcyuHiJXKCHYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB
# MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB
# CwUABIICAIwKceh/eVtJasKzYK4RPWnzeN5q6JdIp6KIYDQRFUeEAY6JP6FDgjmb
# EUBTqT2TrBrWBDUfn+yzI0KK5JqbcoQikXUEtWtmZPJSOisjXabMxSjkGy7t+qdM
# OIgLISQX0zMO1LVSA0Ly/iDm99ijO/2To5CSckX74HpWMVGvgmBS5rYtsgJB3Xzt
# z0heJDUht3lAa/WWms6JbMVS3WC5XNTZcbaHmFuhdEpE8TGpEtpL9cjv8IHMuue2
# Ys2mRqGY/r+jMOsMvkERLtRLD3fMjnz00noQmbnZrtqjDmsNNcYDH4Cmqs+Y0Ju8
# y5RLAdyNds6tz2WX3ilZ6gxfYrT5kleUO6hwOMVipMS/e5sWvZivQbLmdscoGNfd
# oN+/dKWMjkGwp77MeYR9Dne5EBOv38yC3w6R2bcDtBRwVWpHB3q65Nn4NzVL2lof
# oiI6tng3DHcXW3mrDXzeZK+czSmgNjG4Tm4fSVVwoNYp7HxHQjkcx7rew9fV+g+R
# DhXulvK7XTJ7kkS6lZuqn0i5FpbeQgl2eErrjqDIahW2SNCgm6Eo7ZvTJt+tO+Np
# aHMZvBJ8HPAl3vK02PqphE72q4oR3xcmaWNLLM5K/BDbNZdFuc3oun92hfaUdp2t
# wvbAvIs3Y/+g4p0I1WqldOlXiYkHK+8KuImHPOtZtQEqrULj7y11
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_61_94.ps1 | sample_61_94.ps1 | # clickup-pretty-tasks README
ClickUp Pretty Tasks displays tasks description and status right in the code where they are mentioned.
## Features
- Decorate task links with task status + details

- Run commands:
- Get ClickUp Task Details by Internal ID
- Open ClickUp Task Details by Internal ID
- Get ClickUp Task Details by Custom ID
- Open ClickUp Task Details by Custom ID
## Configuration
Use command `ClickUp Pretty Tasks: Configure ClickUp` to configure clickup authorisation token and Team ID.
Follow the [official guide](https://clickup.com/api/developer-portal/authentication/) to obtain a Personal token:
### Getting personal token
- Link to get personal token: https://app.clickup.com/settings/apps (press `Generate` if you don't have it yet)
### Getting Team ID: Option 1
Go to any task of your clickup, look at the URL like `https://app.clickup.com/t/9999999999/XXX-1123`. Here `9999999999` is your Team ID.
### Getting Team ID: Option 2
You can get Team ID with `curl`:
```sh
curl -H "Authorization: YOUR_API_KEY" https://api.clickup.com/api/v2/team
```
Or using PowerShell:
```pwsh
Invoke-RestMethod -Uri "https://api.clickup.com/api/v2/team" -Method Get -Headers @{"Authorization"="YOUR_API_KEY"} | ConvertTo-Json
```
It should give you JSON with your teams for each of which you can see ID (`teams/id`:
```json
{
"teams": [
{
"id": "9999999999",
"name": "YOUR COMPANY",
...
}
]
}
```
|
combined_dataset/train/non-malicious/Get-NICSettings.ps1 | Get-NICSettings.ps1 | # Get-NICSettings by Hugo Peeters of www.peetersonline.nl
#########################################################
$serverName = Read-Host "Enter server name"
$NicConfig = Get-WmiObject -Class Win32_NetworkAdapterConfiguration -ComputerName $serverName
$myCol = @()
ForEach ($Nic in $NicConfig)
{
If ($Nic.IPAddress -ne $null)
{
$myObj = "" | Select-Object Description, DHCPEnabled, IPAddress, IPSubnet, DefaultIPGateway, DNSServers, WINSServers, NICModel, SpeedDuplex
$myObj.Description = $Nic.Description
$myObj.DHCPEnabled = $Nic.DHCPEnabled
$myObj.IPAddress = $Nic.IPAddress
$myObj.IPSubnet = $Nic.IPSubnet
$myObj.DefaultIPGateway = $Nic.DefaultIPGateway
$myObj.DNSServers = $Nic.DNSServerSearchOrder
$myObj.WINSServers = $Nic.WINSPrimaryServer,$Nic.WINSSecondaryServer
$registry = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $serverName)
$baseKey = $registry.OpenSubKey("SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}")
$subKeyNames = $baseKey.GetSubKeyNames()
ForEach ($subKeyName in $subKeyNames)
{
$subKey = $baseKey.OpenSubKey("$subKeyName")
$ID = $subKey.GetValue("NetCfgInstanceId")
If ($ID -eq $Nic.SettingId)
{
$componentID = $subKey.GetValue("ComponentID")
If ($componentID -match "ven_14e4")
{
$myObj.NICModel = "Broadcom"
$requestedMediaType = $subKey.GetValue("RequestedMediaType")
$enum = $subKey.OpenSubKey("Ndi\\Params\\RequestedMediaType\\Enum")
$myObj.SpeedDuplex = $enum.GetValue("$requestedMediaType")
}
ElseIf ($componentID -match "ven_8086")
{
$myObj.NICModel = "Intel"
$SD = $subKey.GetValue("SpeedDuplex")
$enum = $subKey.OpenSubKey("Ndi\\Params\\SpeedDuplex\\Enum")
$myObj.SpeedDuplex = $enum.GetValue("$SD")
}
ElseIf ($componentID -match "b06bdrv")
{
$myObj.NICModel = "HP"
$SD = $subKey.GetValue("req_medium")
$enum = $subKey.OpenSubKey("Ndi\\Params\\req_medium\\Enum")
$myObj.SpeedDuplex = $enum.GetValue("$SD")
}
Else
{
$myObj.NICModel = "unknown"
$myObj.SpeedDuplex = "unknown"
}
}
}
$myCol += $myObj
}
}
$myCol
|
combined_dataset/train/non-malicious/play-note(s)_1.ps1 | play-note(s)_1.ps1 | function Play-Note([string]$note,[int] $duration = 5)
{
if (!($note -match '(\\d+)')) { $note+='4' };[void]($note -match '([A-G#]{1,2})(\\d+)')
[console]::Beep((440 * [math]::Pow([math]::pow(2,(1/12)),
(([int] $matches[2]) - 4)* 12 + $( switch($matches[1])
{ 'A' { 0 } 'A#' { 1 } 'Bb' { 1 } 'B' { 2 } 'C' { 3 } 'C#' { 4 } 'Db' { 4 }
'D' { 5 } 'D#' { 6 } 'Eb' { 6 } 'E' { 7 } 'F' { 8 } 'F#' { 9 } 'Gb' { 9 }
'G' { 10 } 'G#' { 11 } 'Ab' { 11 }
}))),$duration * 100 )
}
function Speak-words ([string]$words,[bool]$pause = $true)
{ $flag = 1
if ($pause) {$flag = 2}
$voice = new-Object -com SAPI.spvoice
$voice.speak($words, [int] $flag) # 2 means wait until speaking is finished to continue
}
function Play-Notes
{
$defaultduration = 5;if($args[0] -is [int]) {$defaultduration = $args[0]}
for($i = 0;$i -lt $args.length;$i++)
{ $duration = $defaultduration
if ($i -lt $args.length-1) { if ($args[$i+1] -is [int]) {$duration = $args[$i+1] } }
if ($args[$i] -is [string]) {
if ($args[$i].startswith("!")) { speak-words $args[$i].replace('!','') } else
{ play-note $args[$i] $duration }
}
}
}
play-notes A B C 20 E 10 B 10
play-notes A B C 20 E 10 B 10
play-notes F5 2 E5 2 D5 2 C5 2 B5 2 A5 2 G 4 F5 2 E5 2 D5 2 C5 2 B5 2 A5 2 G 4
play-notes 2 F5 E5 D5 C5 B5 A5 G 4 F5 E5 D5 C5 B5 A5 G 4
play-notes 4 F5 E5 D5 C5 B5 A5 G F5 E5 D5 C5 B5 A5 G
play-notes "!here we go now" Db5 Db Eb Gb Ab "C#" 6 !YEAH
play-notes A "!$([datetime]::now)" C
|
combined_dataset/train/non-malicious/sample_57_76.ps1 | sample_57_76.ps1 | # ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
param (
[Parameter(Mandatory=$false)]
[switch] $KeepFabricData,
[Parameter(Mandatory=$false)]
[string] $LogPath,
[Parameter(Mandatory=$false)]
[string] $FabricDataRoot
)
function DeletePath([string] $pathToDelete)
{
if (([string]::IsNullOrEmpty($pathToDelete)) -or (!(Test-Path $pathToDelete)))
{
return
}
Write-Host "Deleting $pathToDelete"
Remove-Item $pathToDelete -Recurse -Force 2> $null
if (Test-Path $pathToDelete)
{
Write-Warning "$pathToDelete still exists. Delete manually."
}
}
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if (!$IsAdmin)
{
Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
# Get registry keys
$FabricRegKeyPath = "HKLM:\SOFTWARE\Microsoft\Service Fabric"
Get-ItemProperty -Path $FabricRegKeyPath -ErrorAction Ignore | Out-Null
if ($?)
{
$FabricRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricRoot").FabricRoot
$FabricCodePath = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricCodePath").FabricCodePath
$FabricDataRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricDataRoot").FabricDataRoot
$FabricBinRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricBinRoot").FabricBinRoot
}
else
{
Write-Host "Registry key is already removed."
}
$gacDirectories = @(
"$env:SystemRoot\Microsoft.NET\assembly\GAC_64\System.Fabric",
"$env:SystemRoot\Microsoft.NET\assembly\GAC_64\System.Fabric.Strings",
"$env:SystemRoot\Microsoft.NET\assembly\GAC_MSIL\System.Fabric.Management.ServiceModel",
"$env:SystemRoot\Microsoft.NET\assembly\GAC_MSIL\System.Fabric.Strings" )
# Stop services
Get-Service FabricHostSvc -ErrorAction Ignore | Out-Null
if ($?)
{
Write-Host "Stopping FabricHostSvc."
Stop-Service FabricHostSvc
}
else
{
Write-Host "FabricHostSvc is already removed."
}
Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null
if ($?)
{
Write-Host "Stopping FabricInstallerSvc."
Stop-Service FabricInstallerSvc
}
else
{
$FabricInstallerSvcAbsent = $true
Write-Host "FabricInstallerSvc is already removed."
}
# Try determine file locations if registry key deleted
if (!(Test-Path variable:FabricRoot) `
-or [string]::IsNullOrEmpty($FabricRoot) `
-or !(Test-Path $FabricRoot))
{
$AttemptedFabricRootPath = Join-Path $env:ProgramFiles "Microsoft Service Fabric"
if (Test-Path $AttemptedFabricRootPath)
{
Write-Host "FabricRoot autodetermined at '$AttemptedFabricRootPath'."
$FabricRoot = $AttemptedFabricRootPath
$AttemptedFabricCodePath = Join-Path $FabricRoot "bin\Fabric\Fabric.Code"
if (Test-Path $AttemptedFabricCodePath)
{
Write-Host "FabricCodePath autodetermined at '$AttemptedFabricCodePath'."
$FabricCodePath = $AttemptedFabricCodePath
}
else
{
Write-Host "FabricCodePath not present."
}
}
else
{
Write-Host "FabricRoot not present."
}
}
if ([string]::IsNullOrEmpty($LogPath))
{
$LogPath = Join-Path $env:TEMP -ChildPath "FabricSetupLog.Uninstall.log"
}
# Uninstall Fabric
if ((Test-Path variable:FabricCodePath) `
-and ![string]::IsNullOrEmpty($FabricCodePath))
{
$fabricSetupPath = Join-Path $FabricCodePath -ChildPath "FabricSetup.exe"
if (Test-Path $fabricSetupPath)
{
$arguments = "/operation:uninstall"
if ($KeepFabricData.IsPresent)
{
$arguments += " /deleteData:false";
}
Write-Host "FabricSetup uninstall running..."
$command = "`"$fabricSetupPath`" $arguments && exit 0 || exit 1"
$setupOutput = cmd.exe /c $command > "$LogPath"
if ($LASTEXITCODE -eq 1)
{
Write-Error "FabricSetup ran into an issue. Find log at $LogPath."
if ($setupOutput -is [System.Array])
{
$setupOutput = $setupOutput | Out-String
}
Write-Error $setupOutput
}
else
{
Write-Host "FabricSetup uninstall Completed. Find log at $LogPath."
}
}
else
{
Write-Host "FabricSetup.exe is no longer in FabricCodePath. Uninstall may have already run."
}
}
else
{
Write-Host "Fabric is already uninstalled."
}
if (!(Test-Path variable:FabricInstallerSvcAbsent) `
-or !$FabricInstallerSvcAbsent)
{
Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null
if ($?)
{
Write-Host "Deleting FabricInstallerSvc"
$service = Get-WmiObject -Class Win32_Service -Filter "Name='FabricInstallerSvc'"
$service.delete() | Out-Null
Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null
if ($?)
{
Write-Warning "FabricInstallerSvc is still present. May need to reboot to complete uninstallation."
}
}
else
{
Write-Host "FabricInstallerSvc is already removed."
}
}
# Delete cluster data & bits
if ((Test-Path variable:FabricDataRoot) `
-and (!$KeepFabricData.IsPresent))
{
DeletePath($FabricDataRoot)
}
if (Test-Path variable:FabricBinRoot) { DeletePath($FabricBinRoot) }
if (Test-Path variable:FabricRoot) { DeletePath($FabricRoot) }
foreach ($gacDirectory in $gacDirectories)
{
DeletePath($gacDirectory)
}
# SIG # Begin signature block
# MIInlgYJKoZIhvcNAQcCoIInhzCCJ4MCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGxr3nS3N8GQF+
# XH1ApgppgVuwoWyOxB+AQBJ52EpooaCCDXYwggX0MIID3KADAgECAhMzAAACURR2
# zMWFg24LAAAAAAJRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDBIpXR3b1IYAMunV9ZYBVYsaA7S64mqacKy/OJUf0Lr/LW/tWlJDzJH9nFAhs0
# zzSdQQcLhShOSTUxtlwZD9dnfIcx4pZgu0VHkqQw2dVc8Ob21GBo5sVrXgEAQxZo
# rlEuAl20KpSIFLUBwoZFGFSQNSMcqPudXOw+Mhvn6rXYv/pjXIjgBntn6p1f+0+C
# 2NXuFrIwjJIJd0erGefwMg//VqUTcRaj6SiCXSY6kjO1J9P8oaRQBHIOFEfLlXQ3
# a1ATlM7evCUvg3iBprpL+j1JMAUVv+87NRApprPyV75U/FKLlO2ioDbb69e3S725
# XQLW+/nJM4ihVQ0BHadh74/lAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUMLgM7NX5EnpPfK5uU6FPvn2g/Ekw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzQ2NzU5NjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIVJlff+Fp0ylEJhmvap
# NVv1bYLSWf58OqRRIDnXbHQ+FobsOwL83/ncPC3xl8ySR5uK/af4ZDy7DcDw0yEd
# mKbRLzHIfcztZVSrlsg0GKwZuaB2MEI1VizNCoZlN+HlFZa4DNm3J0LhTWrZjVR0
# M6V57cFW0GsV4NlqmtelT9JFEae7PomwgAV9xOScz8HzvbZeERcoSRp9eRsQwOw7
# 8XeCLeglqjUnz9gFM7RliCYP58Fgphtkht9LNEcErLOVW17m6/Dj75zg/IS+//6G
# FEK2oXnw5EIIWZraFHqSaee+NMgOw/R6bwB8qLv5ClOJEpGKA3XPJvS9YgOpF920
# Vu4Afqa5Rv5UJKrsxA7HOiuH4TwpkP3XQ801YLMp4LavXnvqNkX5lhFcITvb01GQ
# lcC5h+XfCv0L4hUum/QrFLavQXJ/vtirCnte5Bediqmjx3lswaTRbr/j+KX833A1
# l9NIJmdGFcVLXp1en3IWG/fjLIuP7BqPPaN7A1tzhWxL+xx9yw5vQiT1Yn14YGmw
# OzBYYLX0H9dKRLWMxMXGvo0PWEuXzYyrdDQExPf66Fq/EiRpZv2EYl2gbl9fxc3s
# qoIkyNlL1BCrvmzunkwt4cwvqWremUtqTJ2B53MbBHlf4RfvKz9NVuh5KHdr82AS
# MMjU4C8KNTqzgisqQdCy8unTMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGXYwghlyAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAJRFHbMxYWDbgsAAAAAAlEwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPafaxS0meyHyGv8CYqifvdv
# zTOFuUDbfJYMAs2IIO2QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAqxNQyy5XfVwZVY5EHlk/eTHIMo9aB30cyrtLG9U46SEpHobxules7pgM
# YdAhCNYV62C9/jZ4Jjx0/7iqopc+z4RoXfu8605epZSMIzN/JynVTQLr6x3zZM1w
# ZwDeEfO/8G5EDP0VJuFv3sWEji2x0ePcz7KR2iKM4mu9IMXJhTTEmEGthCa/e8Y4
# hRDJc/ucZMLq4K4yausfg1tD2Tt2eV32WSBgBzC/ofPUp3cNoO69YHFY7xlPtqL7
# zBeWqkDN0VZYZewQMASBSvTgxLOX5Ok1++lmbc/jsMXwJJ5okMAPIiih3o52JUxx
# Mf7iQ2EK0QZHaGYzM6l7xHD39Bc3aKGCFwAwghb8BgorBgEEAYI3AwMBMYIW7DCC
# FugGCSqGSIb3DQEHAqCCFtkwghbVAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCi7dP0TEmRTnFw/aGiQodxiInUOu0yTG/7KXsFBVW+OQIGYoKQ3GrV
# GBMyMDIyMDUyMzEyNTg1My4wMThaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0OUJDLUUz
# N0EtMjMzQzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EVcwggcMMIIE9KADAgECAhMzAAABlwPPWZxriXg/AAEAAAGXMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIxMTIwMjE5MDUx
# NFoXDTIzMDIyODE5MDUxNFowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjQ5QkMtRTM3QS0yMzNDMSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA7QBK6kpBTfPwnv3LKx1VnL9YkozUwKzyhDKij1E6WCV/
# EwWZfPCza6cOGxKT4pjvhLXJYuUQaGRInqPks2FJ29PpyhFmhGILm4Kfh0xWYg/O
# S5Xe5pNl4PdSjAxNsjHjiB9gx6U7J+adC39Ag5XzxORzsKT+f77FMTXg1jFus7Er
# ilOvWi+znMpN+lTMgioxzTC+u1ZmTCQTu219b2FUoTr0KmVJMQqQkd7M5sR09PbO
# p4cC3jQs+5zJ1OzxIjRlcUmLvldBE6aRaSu0x3BmADGt0mGY0MRsgznOydtJBLne
# rc+QK0kcxuO6rHA3z2Kr9fmpHsfNcN/eRPtZHOLrpH59AnirQA7puz6ka20TA+8M
# hZ19hb8msrRo9LmirjFxSbGfsH3ZNEbLj3lh7Vc+DEQhMH2K9XPiU5Jkt5/6bx6/
# 2/Od3aNvC6Dx3s5N3UsW54kKI1twU2CS5q1Hov5+ARyuZk0/DbsRus6D97fB1ZoQ
# lv/4trBcMVRz7MkOrHa8bP4WqbD0ebLYtiExvx4HuEnh+0p3veNjh3gP0+7DkiVw
# IYcfVclIhFFGsfnSiFexruu646uUla+VTUuG3bjqS7FhI3hh6THov/98XfHcWeNh
# vxA5K+fi+1BcSLgQKvq/HYj/w/Mkf3bu73OERisNaacaaOCR/TJ2H3fs1A7lIHEC
# AwEAAaOCATYwggEyMB0GA1UdDgQWBBRtzwHPKOswbpZVC9Gxvt1+vRUAYDAfBgNV
# HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
# aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
# CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
# L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
# HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC
# AQAESNhh0iTtMx57IXLfh4LuHbD1NG9MlLA1wYQHQBnR9U/rg3qt3Nx6e7+QuEKM
# EhKqdLf3g5RR4R/oZL5vEJVWUfISH/oSWdzqrShqcmT4Oxzc2CBs0UtnyopVDm4W
# 2Cumo3quykYPpBoGdeirvDdd153AwsJkIMgm/8sxJKbIBeT82tnrUngNmNo8u7l1
# uE0hsMAq1bivQ63fQInr+VqYJvYT0W/0PW7pA3qh4ocNjiX6Z8d9kjx8L7uBPI/H
# sxifCj/8mFRvpVBYOyqP7Y5di5ZAnjTDSHMZNUFPHt+nhFXUcHjXPRRHCMqqJg4D
# 63X6b0V0R87Q93ipwGIXBMzOMQNItJORekHtHlLi3bg6Lnpjs0aCo5/RlHCjNkSD
# g+xV7qYea37L/OKTNjqmH3pNAa3BvP/rDQiGEYvgAbVHEIQz7WMWSYsWeUPFZI36
# mCjgUY6V538CkQtDwM8BDiAcy+quO8epykiP0H32yqwDh852BeWm1etF+Pkw/t8X
# O3Q+diFu7Ggiqjdemj4VfpRsm2tTN9HnAewrrb0XwY8QE2tp0hRdN2b0UiSxMmB4
# hNyKKXVaDLOFCdiLnsfpD0rjOH8jbECZObaWWLn9eEvDr+QNQPvS4r47L9Aa8Lr1
# Hr47VwJ5E2gCEnvYwIRDzpJhMRi0KijYN43yT6XSGR4N9jCCB3EwggVZoAMCAQIC
# EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS
# b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX
# DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
# 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG
# Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP
# 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P
# XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361
# VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB
# Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9
# X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e
# wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw
# wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr
# 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
# FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
# BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n
# FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw
# PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j
# cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH
# hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF
# BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl
# ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
# ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
# j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu
# 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/
# GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D
# YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO
# xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO
# Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I
# 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0
# zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM
# mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT
# TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLOMIICNwIBATCB+KGB0KSBzTCByjEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj
# cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF
# U046NDlCQy1FMzdBLTIzM0MxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAGFA0rCNmEk0zU12DYNGMU3B1mPRoIGD
# MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF
# BQACBQDmNaDsMCIYDzIwMjIwNTIzMTM1ODA0WhgPMjAyMjA1MjQxMzU4MDRaMHcw
# PQYKKwYBBAGEWQoEATEvMC0wCgIFAOY1oOwCAQAwCgIBAAICAZsCAf8wBwIBAAIC
# EkIwCgIFAOY28mwCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAK
# MAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQBtDklvnad6
# q7xgrn7P5KhuWqzkiJ3SisJbkHWtGxw3pT8ScDwxN4fbiImPlPNNisRQDnSDVGvF
# y2KkYDnGsJManBoKx4snrnU7oEKcMfWRpqKjuq8xtBcdjWFW1mniAExNPyCI0azg
# opBAlAi+4ol0PkPnpelatXO5mci2dcF61zGCBA0wggQJAgEBMIGTMHwxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABlwPPWZxriXg/AAEAAAGXMA0GCWCG
# SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZI
# hvcNAQkEMSIEIMPvoj+9INaP2GOlSWMuaxbxEaBjx3Gz9zPLBbBqdpBVMIH6Bgsq
# hkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgW3vaGxCVejj+BAzFSfMxfHQ+bxxkqCw8
# LkMY/QZ4pr8wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT
# MwAAAZcDz1mca4l4PwABAAABlzAiBCDjwReENklOx/Uovtrdj8M0bmyas5fYdKQ+
# 2/gHS2UZGTANBgkqhkiG9w0BAQsFAASCAgCtzZJPrOp+2ps4B9FDGMbCEaqwh4Mb
# zW95pZhuq6MuxNvsXuASRbjpfUK9YvB2vSGGjTR5sFjbnd0tAK2ynoI1BW7pLgLj
# DXoBoW+iLeqyz6ggxAyrO7/mkxajSHy9hG8uIKGsD64/yOIFO3p0jJ7jYVIumIyp
# dmi7xLS6W6iQtCXDxQFAWrxGfFO8w2HG2Rxf2qP+t3Yn6Ml2hg6NfTYsXLk8/C9m
# OfbJxigT+xsAKVrdY1BmixMRcARVtpCc6hoSz67ip3tnfWOVzNVrSWuOJ44nle5H
# 7h156vYXD3lr9A8epV1RP6ROb1pW/ntF65/tdb6jozpq/gN4jPZkut2r99EL42HX
# qq4fCrd9TYQfncExxQMHhiqip/K3Frx7vxyoIcdDr20tgc/57wJLgp0EfFPNTDT7
# SP1VE5d7rps2/xnfUMv/Lz79Fmk64YO1NeIdGPU1MMuGaBBBJr681WgbVhn/RPpt
# WhnCKG9FVkILJZ1jiVTIL5WqL5bIhehCBUKi9cG17Rmlbj3FqbFQLHT9pdjBjAiu
# eTuR93I2UisKkXsI4wvzfGtREW65/8YXMGVh4f5IMlVxq15Om6e0OvVzhlFVF05N
# 46VLfmR19u0GAmo0/wx+c+dIWIhCbCFCbwN1jJOfbhvCR/NMBpLmbO8KBjMm1yQS
# HgYE6SXpQmTwDw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/3089.ps1 | 3089.ps1 | function Verify-AssertionFailed {
param (
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[ScriptBlock]$ScriptBlock
)
$assertionExceptionThrown = $false
$err = $null
try {
$null = & $ScriptBlock
}
catch [Exception] {
$assertionExceptionThrown = ($_.FullyQualifiedErrorId -eq 'PesterAssertionFailed')
$err = $_
$err
}
if (-not $assertionExceptionThrown) {
$result = if ($null -eq $err) {
"no assertion failure error was thrown!"
}
else {
"other error was thrown! $($err | Format-List -Force * | Out-String)"
}
throw [Exception]"Expected the script block { $ScriptBlock } to fail in Pester assertion, but $result"
}
}
|
combined_dataset/train/non-malicious/sample_0_7.ps1 | sample_0_7.ps1 | <#
.SYNOPSIS
Simplify data collection and diagnostics for troubleshooting Microsoft Remote Desktop (RDP/RDS/AVD/W365) related issues and a convenient method for submitting and following quick & easy action plans.
.DESCRIPTION
This script is designed to gather information to assist Microsoft Customer Support Services (CSS) in troubleshooting issues you may be experiencing with Microsoft Remote Desktop solutions.
The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses, PC names and user names.
The script will save the collected data in a subfolder and compress the results into a ZIP file.
Neither the folder nor the ZIP file are automatically sent to Microsoft.
You can send the ZIP file to Microsoft CSS using a secure file transfer tool. Please discuss this with your support professional and address any concerns you may have.
Find our privacy statement here: https://privacy.microsoft.com/en-US/privacystatement
Run 'Get-Help .\MSRD-Collect.ps1 -Full' for more details.
USAGE SUMMARY:
Run the script on Windows source or target machines as required by the scenario you're investigating.
The script has multiple module (.psm1) files located in a "Modules" folder. This folder, along with its underlying .psm1 files, must remain in the same folder as the main MSRD-Collect.ps1 file for the script to function correctly. Download the MSRD-Collect.zip package from the official public download location (https://aka.ms/MSRD-Collect) and extract all files from it, not just the MSRD-Collect.ps1.
The script will import the necessary module(s) dynamically when specific data is being invoked. Manual import of the modules is not required.
When launched without any command line parameters, the script will start in GUI mode where you can select one or more data collection or diagnostics scenarios.
If you prefer to run the script without a GUI or to automate data collection/diagnostics, use command line parameters.
Diagnostics will run regardless if other data collection scenarios have been selected.
For more information see the MSRD-Collect-ReadMe.txt file.
.NOTES
Author : Robert Klemencz (Microsoft CSS)
Requires : At least PowerShell version 5.1 and to be run elevated
Version : See: $global:msrdVersion
.LINK
Download: https://aka.ms/MSRD-Collect
Feedback: https://aka.ms/MSRD-Collect-Feedback
.PARAMETER Machine
Indicates the context/environment in which the machine is used. This is a mandatory parameter when not using the GUI.
Based on the provided value, only data specific to that context/environment will be collected.
Available values are:
isAVD : Azure Virtual Desktop
isRDS : Remote Desktop Services or direct (non-AVD/non-W365) RDP connection
isW365 : Windows 365 Cloud PC
.PARAMETER Role
Indicates the role of the machine in the given context/environment. This is a mandatory parameter when not using the GUI.
Based on the provided value, only data specific to that role will be collected.
Available values are:
isSource : Source machine from where you connect to other machines using a Remote Desktop client
isTarget : Target machine to which you connect to or a server with any RDS role installed
.PARAMETER Core
Collect general data for troubleshooting AVD/RDS/W365 issues. Diagnostics will run at the end.
.PARAMETER Profiles
Collect Core + specific data for troubleshooting 'User Profiles' issues. Diagnostics will run at the end.
.PARAMETER Activation
Collect Core + specific data for troubleshooting 'OS Licensing/Activation' issues. Diagnostics will run at the end.
.PARAMETER MSRA
Collect Core + specific data for troubleshooting 'Remote Assistance/Quick Assist/Remote Help' issues. Diagnostics will run at the end.
.PARAMETER SCard
Collect Core + specific data for troubleshooting 'Smart Card' issues. Diagnostics will run at the end.
.PARAMETER IME
Collect Core + specific data for troubleshooting 'Input Method' issues. Diagnostics will run at the end.
.PARAMETER Teams
Collect Core + specific data for troubleshooting 'Teams Media Optimization' issues. Diagnostics will run at the end. (AVD/W365 only)
.PARAMETER MSIXAA
[Deprecated, use 'AppAttach' instead] Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD ony)
.PARAMETER AppAttach
Collect Core + specific data for troubleshooting 'App Attach' issues. Diagnostics will run at the end. (AVD only)
.PARAMETER HCI
Collect Core + specific data for troubleshooting 'Azure Stack HCI' issues. Diagnostics will run at the end. (AVD only)
.PARAMETER DumpPID
Collect Core + a process dump based on the provided PID. Diagnostics will run at the end.
.PARAMETER NetTrace
Collect a network trace.
.PARAMETER DiagOnly
Skip collecting troubleshooting data (even if any other parameters are specificed) and only perform diagnostics.
.PARAMETER AcceptEula
Silently accept the Microsoft Diagnostic Tools End User License Agreement.
.PARAMETER AcceptNotice
Silently accept the Important Notice message displayed when the script is launched.
.PARAMETER OutputDir
Specify an existing directory where to store the collected files. By default, the script will store the collected data under "C:\MS_DATA".
.PARAMETER UserContext
Specify the username in whose context some of the data (e.g. RDClientAutoTrace, Teams settings) will be collected. By default, the script will use the admin's username who launched it.
.PARAMETER AzureEnv
Override the value returned by the automatic Azure environment detection and use the specified Azure environment for performing Azure endpoint checks during data collection/diagnostics. Available values are: "All", "AzureChinaCloud", "AzureGermanCloud", "AzurePublicCloud", "AzureUSGovernmentCloud", "N/A".
.PARAMETER SkipAutoUpdate
Skip the automatic update check on launch for the current instance of the script (can be used for both GUI and command line mode).
.PARAMETER LiteMode
The script will open with a "Lite Mode" UI, regardless of the Config\MSRDC-Config.json settings.
.PARAMETER AssistMode
The script will read out loud some of the key information and steps performed during data collection/diagnostics.
.PARAMETER SilentMode
Verbose output (detailed steps or encountered errors) will not be displayed during data collection.
.OUTPUTS
By default, all collected data are stored in a subfolder under C:\MS_DATA. You can change this location by using the "-OutputDir" command line parameter or from the "Advanced Mode" UI.
#>
param ([ValidateSet('isAVD', 'isRDS', 'isW365')][string]$Machine, [ValidateSet('isSource', 'isTarget')][string]$Role,
[switch]$Core, [switch]$Profiles, [switch]$Activation, [switch]$MSRA, [switch]$SCard, [switch]$IME, [switch]$Teams, [switch]$MSIXAA,
[switch]$AppAttach, [switch]$HCI, [int]$DumpPID, [switch]$DiagOnly, [switch]$NetTrace, [switch]$AcceptEula, [switch]$AcceptNotice,
[switch]$SkipAutoUpdate, [switch]$LiteMode, [switch]$AudioAssistMode, [switch]$SilentMode,
[ValidateScript({
if (Test-Path $_ -PathType Container) { $true } else { throw "Invalid folder path. '$_' does not exist or is not a valid folder." }
})][string]$OutputDir,
[ValidateScript({
$profilePath = Join-Path (Split-Path $env:USERPROFILE) $_
if (Test-Path -Path $profilePath -PathType Container) { $true } else { throw "Invalid username. A local profile folder for user '$_' does not exist or could not be accessed." }
})][string]$UserContext,
[ValidateSet('All', 'AzureChinaCloud', 'AzureGermanCloud', 'AzurePublicCloud', 'AzureUSGovernmentCloud', 'N/A')][string]$AzureEnv)
# Check if the current user is an administrator
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')) {
Write-Warning "This script needs to be run as Administrator"
Exit 1
}
# Check if the script is running in PowerShell ISE
if ($host.Name -eq "Windows PowerShell ISE Host") {
Write-Warning "Running MSRD-Collect in PowerShell ISE is not supported. Please run it from a regular elevated PowerShell console."
Exit 1
}
# Check PS Version
If($PSVersionTable.PSVersion.Major -le 4) {
Write-Warning "MSRD-Collect requires at least PowerShell version 5.1, but you are currently using PowerShell version $($PSVersionTable.PSVersion.Major).$($PSVersionTable.PSVersion.Minor).`nPlease update your PowerShell version to version 5.1 or higher!`nSee: https://learn.microsoft.com/en-us/powershell/scripting/install/installing-powershell-on-windows?view=powershell-5.1`n`n"
Exit 1
}
# Limiting scenarios for command line
if (($Role -eq "isSource") -and ($Profiles -or $Activation -or $IME -or $AppAttach -or $HCI)) {
Write-Warning "Machine role 'isSource' only supports the following scenarios: -Core, -MSRA, -SCard, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again."
Exit 1
}
if ($Role -eq "isTarget") {
if (($Machine -eq "isRDS") -and ($Teams -or $AppAttach -or $HCI)) {
Write-Warning "Machine type 'isRDS' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again."
Exit 1
} elseif (($Machine -eq "isW365") -and ($AppAttach -or $HCI)) {
Write-Warning "Machine type 'isW365' with machine role 'isTarget' only supports the following scenarios: -Core, -Profiles, -Activation, -MSRA, -SCard, -IME, -Teams, -DumpPID, -DiagOnly, -NetTrace. Adjust the command line and try again."
Exit 1
}
}
if ($DiagOnly) {
if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $NetTrace -or $DumpPID) {
Write-Warning "Scenario 'DiagOnly' has been specified together with other scenarios. All scenarios will be ignored and only Diagnostics will run."
}
}
# Deprecated / will be removed in a future version
if ($MSIXAA) {
Write-Warning "The command line parameter '-MSIXAA' is deprecated and has been replaced by '-AppAttach'. Run the script again using the '-AppAttach' command line parameter."
Exit 1
}
# Check if the required subfolders exist in the script folder
if (-not (Test-Path -Path "$PSScriptRoot\Modules" -PathType Container)) {
Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders."
Exit 1
}
if (-not (Test-Path -Path "$PSScriptRoot\Config" -PathType Container)) {
Write-Warning "The 'Config' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders."
Exit 1
}
if (-not (Test-Path -Path "$PSScriptRoot\Config\Localization" -PathType Container)) {
Write-Warning "The 'Config\Localization' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders."
Exit 1
}
### Global variables
$global:msrdCollecting = $False
$global:msrdConsoleColor = $host.ui.RawUI.ForegroundColor
$global:msrdDiagnosing = $False
$global:msrdFQDN = [System.Net.Dns]::GetHostByName($env:computerName).HostName
$global:msrdGUI = $false
$global:msrdLiveDiag = $false
$global:msrdOSVer = (Get-CimInstance Win32_OperatingSystem).Caption
$global:msrdProgress = 0
$global:msrdScriptpath = $PSScriptRoot
$global:msrdTSSinUse = $MyInvocation.PSCommandPath -like "*TSS_UEX.psm1"
$global:msrdVersion = "240927.0"
$global:msrdVersioncheck = $false
if ($PSSenderInfo) { $global:msrdCmdLine = "n/a" } else { $global:msrdCmdLine = $MyInvocation.Line } #for selfupdate restart
#warn if outdated version
$msrdcVer = $global:msrdVersion.SubString(0,6)
$dateMSRDCver = [datetime]::ParseExact($msrdcVer, "yyMMdd", $null)
$DiffDate = ((Get-Date) - $dateMSRDCver)
If($DiffDate.Days -gt 90){
Write-Warning "This version of MSRD-Collect is over 90 days old. A newer version may be available. Use the script's AutoUpdate functionality or manually download the latest version from: https://aka.ms/MSRD-Collect"
}
if (-not $global:msrdTSSinUse) {
#Unlock module files if valid
$fileNamesToUnblock = @(
"MSRDC-Activation.psm1", "MSRDC-Core.psm1", "MSRDC-Diagnostics.psm1", "MSRDC-FwFunctions.psm1", "MSRDC-FwGUI.psm1",
"MSRDC-FwGUILite.psm1", "MSRDC-FwHtml.psm1", "MSRDC-HCI.psm1", "MSRDC-IME.psm1", "MSRDC-AppAttach.psm1", "MSRDC-MSRA.psm1", "MSRDC-Profiles.psm1",
"MSRDC-SCard.psm1", "MSRDC-Teams.psm1", "MSRDC-Tracing.psm1", "MSRDC-WU.psm1"
)
if (Test-Path -Path "$global:msrdScriptpath\Modules") {
Get-ChildItem -Path $global:msrdScriptpath\Modules\MSRDC*.psm1 -Recurse | ForEach-Object {
if ($_.Name -in $fileNamesToUnblock) {
Try {
Unblock-File $_.FullName -Confirm:$false -ErrorAction Stop
} Catch {
Write-Warning "Failed to unblock file: $($_.FullName) - $($_.Exception.Message)"
}
}
}
} else {
Write-Warning "The 'Modules' folder is missing from the script folder. Make sure that you have extracted all the files from the original ZIP archive and that you launch MSRD-Collect.ps1 from within the folder that contains all the extracted files and subfolders."
Exit 1
}
}
if ($global:msrdTSSinUse) {
# Check if the included tools are available and valid
$global:msrdToolsFolder = "$global:ScriptFolder\BIN"
if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") {
$global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe"
} else {
$global:avdnettestpath = ""
}
if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") {
$global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe"
} else {
$global:msrdProcDumpExe = ""
}
if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") {
$global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe"
} else {
$global:msrdPsPingExe = ""
}
} else {
$global:msrdToolsFolder = "$global:msrdScriptpath\Tools"
if (Test-Path -Path "$global:msrdToolsFolder\avdnettest.exe") {
$global:avdnettestpath = "$global:msrdToolsFolder\avdnettest.exe"
} else {
$tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN"
if (Test-Path -Path "$tssToolsFolder\avdnettest.exe") {
$global:msrdToolsFolder = "$tssToolsFolder\"
$global:avdnettestpath = "$tssToolsFolder\avdnettest.exe"
} else {
$global:avdnettestpath = ""
}
}
$global:msrdToolsFolder = "$global:msrdScriptpath\Tools"
if (Test-Path -Path "$global:msrdToolsFolder\procdump.exe") {
$global:msrdProcDumpExe = "$global:msrdToolsFolder\procdump.exe"
} else {
$tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN"
if (Test-Path -Path "$tssToolsFolder\procdump.exe") {
$global:msrdToolsFolder = "$tssToolsFolder\"
$global:msrdProcDumpExe = "$tssToolsFolder\procdump.exe"
} else {
$global:msrdProcDumpExe = ""
}
}
$global:msrdToolsFolder = "$global:msrdScriptpath\Tools"
if (Test-Path -Path "$global:msrdToolsFolder\psping.exe") {
$global:msrdPsPingExe = "$global:msrdToolsFolder\psping.exe"
} else {
$tssToolsFolder = $global:msrdScriptpath -ireplace [regex]::Escape("\scripts\MSRD-Collect"), "\BIN"
if (Test-Path -Path "$tssToolsFolder\psping.exe") {
$global:msrdToolsFolder = "$tssToolsFolder\"
$global:msrdPsPingExe = "$tssToolsFolder\psping.exe"
} else {
$global:msrdPsPingExe = ""
}
}
}
# Azure Environment
if ($AzureEnv) {
$global:msrdAzureEnv = $AzureEnv
}
# Read config file
$global:msrdConfigFile = "$global:msrdScriptpath\Config\MSRDC-Config.json"
if (Test-Path -Path $global:msrdConfigFile) {
try {
$global:msrdConfig = Get-Content $global:msrdConfigFile | ConvertFrom-Json
} catch {
Write-Warning "Could not read the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting."
Exit 1
}
} else {
Write-Warning "Could not find the Config\MSRDC-Config.json file. Make sure that the file exists and that it is not corrupted. Exiting."
Exit 1
}
if ($global:msrdProcDumpExe -eq "") {
$global:msrdProcDumpVer = "1.0"
} else {
if ($global:msrdConfig.ProcDumpVersion -match "\d{2}\.\d{1}$") {
$global:msrdProcDumpVer = $global:msrdConfig.ProcDumpVersion
} else {
Write-Warning "Unsupported value found for 'ProcDumpVersion' in Config\MSRDC-Config.json. The value has to be of format XY.Z, where X, Y and Z are numbers (e.g. 11.0). Exiting."
Exit 1
}
}
if ($global:msrdPsPingExe -eq "") {
$global:msrdPsPingVer = "1.0"
} else {
if ($global:msrdConfig.PsPingVersion -match "\d{1}\.\d{2}$") {
$global:msrdPsPingVer = $global:msrdConfig.PsPingVersion
} else {
Write-Warning "Unsupported value found for 'PsPingVersion' in Config\MSRDC-Config.json. The value has to be of format X.YZ, where X, Y and Z are numbers (e.g. 2.12). Exiting."
Exit 1
}
}
if (@(0, 1) -notcontains $global:msrdConfig.ShowConsoleWindow) {
Write-Warning "Missing or unsupported value for 'ShowConsoleWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
if (@(0, 1) -notcontains $global:msrdConfig.MaximizeWindow) {
Write-Warning "Missing or unsupported value for 'MaximizeWindow' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
if (@("Prod","Insider") -notcontains $global:msrdConfig.DevLevel) {
Write-Warning "Missing or unsupported value for 'DevLevel' in Config\MSRDC-Config.json. Supported values are Prod or Insider. Exiting."
Exit 1
}
if (@("AR","CN","CS","DE","EN","ES","FR","HI","HU","NL","IT","JP","PT","RO","TR") -contains $global:msrdConfig.UILanguage) {
$global:msrdLangID = $global:msrdConfig.UILanguage
} else {
Write-Warning "Unsupported value found for 'UILanguage' in Config\MSRDC-Config.json. Supported values are AR, CN, CS, DE, EN, ES, FR, HI, HU, NL, IT, JP, PT, RO or TR. Exiting."
Exit 1
}
if (@(0, 1) -notcontains $global:msrdConfig.PlaySounds) {
Write-Warning "Missing or unsupported value for 'PlaySounds' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
if (@(10, 12, 14, 16) -contains $global:msrdConfig.PsBoxFont) {
$global:msrdPsBoxFont = $global:msrdConfig.PsBoxFont
} else {
Write-Warning "Unsupported value found for 'PsBoxFont' in Config\MSRDC-Config.json. Supported values are 10, 12, 14 or 16. Exiting."
Exit 1
}
if (-not $global:msrdTSSinUse) {
if ($LiteMode) {
$msrdGUILite = 1
} else {
if (@(0, 1) -contains $global:msrdConfig.UILiteMode) {
$msrdGUILite = $global:msrdConfig.UILiteMode
} else {
Write-Warning "Unsupported value found for 'UILiteMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
}
if ($AudioAssistMode) {
$global:msrdAudioAssistMode = 1
} else {
if (@(0, 1) -contains $global:msrdConfig.AudioAssistMode) {
$global:msrdAudioAssistMode = $global:msrdConfig.AudioAssistMode
} else {
Write-Warning "Unsupported value found for 'AudioAssistMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
}
}
# Silent mode init
if (-not $global:msrdTSSinUse) {
if ($global:msrdAudioAssistMode -eq 1) {
$global:msrdSilentMode = 0
} else {
if ($SilentMode) {
$global:msrdSilentMode = 1
} else {
if (@(0, 1) -contains $global:msrdConfig.SilentMode) {
$global:msrdSilentMode = $global:msrdConfig.SilentMode
} else {
Write-Warning "Unsupported value found for 'SilentMode' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
}
}
}
# Check if auto update check should be performed
if ($SkipAutoUpdate) {
$global:msrdConfig.AutomaticVersionCheck = 0
"SkipAutoUpdate switch specified, automatic update check on script launch will be skipped"
} else {
if (@(0, 1) -notcontains $global:msrdConfig.AutomaticVersionCheck) {
Write-Warning "Missing or unsupported value for 'AutomaticVersionCheck' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
if (@(0, 1) -notcontains $global:msrdConfig.ScriptSelfUpdate) {
Write-Warning "Missing or unsupported value for 'ScriptSelfUpdate' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
}
function msrdVerifyToolsSignature {
Param ($filepath)
try {
$signature = Get-AuthenticodeSignature -FilePath $filepath -ErrorAction SilentlyContinue
$cert = $signature.SignerCertificate
$issuer = $cert.Issuer
if ($signature.Status -ne "Valid") {
Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations."
Exit 1
}
if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) {
Write-Warning "'$filepath' does not have a valid signature. Stopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations."
Exit 1
}
} catch {
Write-Warning "Failed to verify the signature of '$filepath'. Reason: $($_.Exception.Message)`nStopping script execution. Make sure you download and unpack the full package of MSRD-Collect or TSS only from the official download locations."
Exit 1
}
}
# Localization init
$localizationFilePath = Join-Path $global:msrdScriptpath "Config\Localization\MSRDC-Fw$($global:msrdLangID).xml"
if (Test-Path -Path $localizationFilePath) {
try {
[xml] $global:msrdLangText = Get-Content -Path $localizationFilePath -Encoding UTF8 -ErrorAction Stop
# Create a hashtable to store the mappings
$global:msrdTextHashtable = @{}
# Populate the hashtable
foreach ($langNode in $global:msrdLangText.LangV1.lang) {
$textID = $langNode.id
$message = $langNode."#text"
if ($message -like "*&*") {
$message = $message.replace("&", "&")
}
$global:msrdTextHashtable[$textID] = $message
}
}
catch {
Write-Warning "Could not read the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file: $_. Make sure that the file exists and that it is not corrupted."
Exit 1
}
} else {
Write-Warning "Could not find the Config\Localization\MSRDC-Fw$($global:msrdLangID).xml file. Make sure that the file exists and that it is not corrupted."
Exit 1
}
# Output folder init
If ($OutputDir) {
$global:msrdLogRoot = $OutputDir
} else {
if ($global:msrdTSSinUse) { $global:msrdLogRoot = $global:LogFolder } else { $global:msrdLogRoot = "C:\MS_DATA" }
}
# User context init
if ($UserContext) { $global:msrdUserprof = $UserContext } else { $global:msrdUserprof = $env:USERNAME }
[void][System.Reflection.Assembly]::Load('System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a')
[void][System.Reflection.Assembly]::Load('System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089')
# Main functions init
Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwFunctions" -DisableNameChecking -Force -Scope Global
if (@(0, 1) -notcontains $global:msrdConfig.IsRestarting) {
Write-Warning "Missing or unsupported value for 'IsRestarting' in Config\MSRDC-Config.json. Supported values are 0 or 1. Exiting."
Exit 1
}
if ($global:msrdConfig.IsRestarting -eq 1) {
msrdUpdateConfigFile -configFile "Config\MSRDC-Config.json" -key "IsRestarting" -value 0
} else {
if ($global:avdnettestpath -ne "") { msrdVerifyToolsSignature $global:avdnettestpath }
if ($global:msrdProcDumpExe -ne "") { msrdVerifyToolsSignature $global:msrdProcDumpExe }
if ($global:msrdPsPingExe -ne "") { msrdVerifyToolsSignature $global:msrdPsPingExe }
}
# Check if the current account is domain vs local account
try {
# Get the current user's SID
$userSID = [System.Security.Principal.WindowsIdentity]::GetCurrent().User.Value
# Get the list of local users' SIDs
$localUserSIDs = Get-CimInstance -ClassName Win32_UserAccount -Filter "LocalAccount=True" | Select-Object -ExpandProperty SID
# Check if the user's SID matches any of the local user SIDs
$isLocalUser = $localUserSIDs -contains $userSID
if ($isLocalUser) {
$global:msrdAccountLevel = "Local Account"
Write-Warning "$(msrdGetLocalizedText "localAdminStart")`n"
} else {
$global:msrdAccountLevel = "Domain Account"
}
} catch {
$global:msrdAccountLevel = "Local Account"
Write-Warning "Failed to determine account type: $($_.Exception.InnerException.Message)Defaulting to 'Local Account'. If you need to collect Domain related information, make sure that the user running the script is a Domain User with Admin rights."
}
# EULA
function msrdShowEULAPopup($mode) {
$EULA = New-Object -TypeName System.Windows.Forms.Form
$richTextBox1 = New-Object System.Windows.Forms.RichTextBox
$btnAcknowledge = New-Object System.Windows.Forms.Button
$btnCancel = New-Object System.Windows.Forms.Button
$EULA.SuspendLayout()
$EULA.Name = "EULA"
$EULA.Text = "Microsoft Diagnostic Tools End User License Agreement"
$richTextBox1.Anchor = [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right
$richTextBox1.Location = New-Object System.Drawing.Point(12,12)
$richTextBox1.Name = "richTextBox1"
$richTextBox1.ScrollBars = [System.Windows.Forms.RichTextBoxScrollBars]::Vertical
$richTextBox1.Size = New-Object System.Drawing.Size(776, 397)
$richTextBox1.TabIndex = 0
$richTextBox1.ReadOnly=$True
$richTextBox1.Add_LinkClicked({Start-Process -FilePath $_.LinkText})
$richTextBox1.Rtf = @"
{\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fswiss\fprq2\fcharset0 Segoe UI;}{\f1\fnil\fcharset0 Calibri;}{\f2\fnil\fcharset0 Microsoft Sans Serif;}}
{\colortbl ;\red0\green0\blue255;}
{\*\generator Riched20 10.0.19041}{\*\mmathPr\mdispDef1\mwrapIndent1440 }\viewkind4\uc1
\pard\widctlpar\f0\fs19\lang1033 MICROSOFT SOFTWARE LICENSE TERMS\par
Microsoft Diagnostic Scripts and Utilities\par
\par
{\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15
0100090000035000000000002700000000000400000003010800050000000b0200000000050000
000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00
010001000000000001000100000000002800000001000000010000000100010000000000000000
000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300
00000000
}These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). IF YOU COMPLY WITH THESE LICENSE TERMS, YOU HAVE THE RIGHTS BELOW. BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS.\par
{\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15
0100090000035000000000002700000000000400000003010800050000000b0200000000050000
000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00
010001000000000001000100000000002800000001000000010000000100010000000000000000
000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300
00000000
}\par
\pard
{\pntext\f0 1.\tab}{\*\pn\pnlvlbody\pnf0\pnindent0\pnstart1\pndec{\pntxta.}}
\fi-360\li360 INSTALLATION AND USE RIGHTS. Subject to the terms and restrictions set forth in this license, Microsoft Corporation (\ldblquote Microsoft\rdblquote ) grants you (\ldblquote Customer\rdblquote or \ldblquote you\rdblquote ) a non-exclusive, non-assignable, fully paid-up license to use and reproduce the script or utility provided under this license (the "Software"), solely for Customer\rquote s internal business purposes, to help Microsoft troubleshoot issues with one or more Microsoft products, provided that such license to the Software does not include any rights to other Microsoft technologies (such as products or services). \ldblquote Use\rdblquote means to copy, install, execute, access, display, run or otherwise interact with the Software. \par
\pard\widctlpar\par
\pard\widctlpar\li360 You may not sublicense the Software or any use of it through distribution, network access, or otherwise. Microsoft reserves all other rights not expressly granted herein, whether by implication, estoppel or otherwise. You may not reverse engineer, decompile or disassemble the Software, or otherwise attempt to derive the source code for the Software, except and to the extent required by third party licensing terms governing use of certain open source components that may be included in the Software, or remove, minimize, block, or modify any notices of Microsoft or its suppliers in the Software. Neither you nor your representatives may use the Software provided hereunder: (i) in a way prohibited by law, regulation, governmental order or decree; (ii) to violate the rights of others; (iii) to try to gain unauthorized access to or disrupt any service, device, data, account or network; (iv) to distribute spam or malware; (v) in a way that could harm Microsoft\rquote s IT systems or impair anyone else\rquote s use of them; (vi) in any application or situation where use of the Software could lead to the death or serious bodily injury of any person, or to physical or environmental damage; or (vii) to assist, encourage or enable anyone to do any of the above.\par
\par
\pard\widctlpar\fi-360\li360 2.\tab DATA. Customer owns all rights to data that it may elect to share with Microsoft through using the Software. You can learn more about data collection and use in the help documentation and the privacy statement at {{\field{\*\fldinst{HYPERLINK https://aka.ms/privacy }}{\fldrslt{https://aka.ms/privacy\ul0\cf0}}}}\f0\fs19 . Your use of the Software operates as your consent to these practices.\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 3.\tab FEEDBACK. If you give feedback about the Software to Microsoft, you grant to Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose.\~ You will not provide any feedback that is subject to a license that would require Microsoft to license its software or documentation to third parties due to Microsoft including your feedback in such software or documentation. \par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 4.\tab EXPORT RESTRICTIONS. Customer must comply with all domestic and international export laws and regulations that apply to the Software, which include restrictions on destinations, end users, and end use. For further information on export restrictions, visit {{\field{\*\fldinst{HYPERLINK https://aka.ms/exporting }}{\fldrslt{https://aka.ms/exporting\ul0\cf0}}}}\f0\fs19 .\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360\qj 5.\tab REPRESENTATIONS AND WARRANTIES. Customer will comply with all applicable laws under this agreement, including in the delivery and use of all data. Customer or a designee agreeing to these terms on behalf of an entity represents and warrants that it (i) has the full power and authority to enter into and perform its obligations under this agreement, (ii) has full power and authority to bind its affiliates or organization to the terms of this agreement, and (iii) will secure the permission of the other party prior to providing any source code in a manner that would subject the other party\rquote s intellectual property to any other license terms or require the other party to distribute source code to any of its technologies.\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360\qj 6.\tab DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED \ldblquote AS IS,\rdblquote WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL MICROSOFT OR ITS LICENSORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\par
\pard\widctlpar\qj\par
\pard\widctlpar\fi-360\li360\qj 7.\tab LIMITATION ON AND EXCLUSION OF DAMAGES. IF YOU HAVE ANY BASIS FOR RECOVERING DAMAGES DESPITE THE PRECEDING DISCLAIMER OF WARRANTY, YOU CAN RECOVER FROM MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT, OR INCIDENTAL DAMAGES. This limitation applies to (i) anything related to the Software, services, content (including code) on third party Internet sites, or third party applications; and (ii) claims for breach of contract, warranty, guarantee, or condition; strict liability, negligence, or other tort; or any other claim; in each case to the extent permitted by applicable law. It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your state, province, or country may not allow the exclusion or limitation of incidental, consequential, or other damages.\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 8.\tab BINDING ARBITRATION AND CLASS ACTION WAIVER. This section applies if you live in (or, if a business, your principal place of business is in) the United States. If you and Microsoft have a dispute, you and Microsoft agree to try for 60 days to resolve it informally. If you and Microsoft can\rquote t, you and Microsoft agree to binding individual arbitration before the American Arbitration Association under the Federal Arbitration Act (\ldblquote FAA\rdblquote ), and not to sue in court in front of a judge or jury. Instead, a neutral arbitrator will decide. Class action lawsuits, class-wide arbitrations, private attorney-general actions, and any other proceeding where someone acts in a representative capacity are not allowed; nor is combining individual proceedings without the consent of all parties. The complete Arbitration Agreement contains more terms and is at {{\field{\*\fldinst{HYPERLINK https://aka.ms/arb-agreement-4 }}{\fldrslt{https://aka.ms/arb-agreement-4\ul0\cf0}}}}\f0\fs19 . You and Microsoft agree to these terms. \par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 9.\tab LAW AND VENUE. If U.S. federal jurisdiction exists, you and Microsoft consent to exclusive jurisdiction and venue in the federal court in King County, Washington for all disputes heard in court (excluding arbitration). If not, you and Microsoft consent to exclusive jurisdiction and venue in the Superior Court of King County, Washington for all disputes heard in court (excluding arbitration).\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 10.\tab ENTIRE AGREEMENT. This agreement, and any other terms Microsoft may provide for supplements, updates, or third-party applications, is the entire agreement for the software.\par
\pard\sa200\sl276\slmult1\f1\fs22\lang9\par
\pard\f2\fs17\lang2057\par
}
"@
$richTextBox1.BackColor = [System.Drawing.Color]::White
$btnAcknowledge.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right
$btnAcknowledge.Location = New-Object System.Drawing.Point(544, 415)
$btnAcknowledge.Name = "btnAcknowledge";
$btnAcknowledge.Size = New-Object System.Drawing.Size(119, 23)
$btnAcknowledge.TabIndex = 1
$btnAcknowledge.Text = "Accept"
$btnAcknowledge.UseVisualStyleBackColor = $True
$btnAcknowledge.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::Yes})
$btnCancel.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right
$btnCancel.Location = New-Object System.Drawing.Point(669, 415)
$btnCancel.Name = "btnCancel"
$btnCancel.Size = New-Object System.Drawing.Size(119, 23)
$btnCancel.TabIndex = 2
if($mode -ne 0)
{
$btnCancel.Text = "Close"
}
else
{
$btnCancel.Text = "Decline"
}
$btnCancel.UseVisualStyleBackColor = $True
$btnCancel.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::No})
$EULA.AutoScaleDimensions = New-Object System.Drawing.SizeF(6.0, 13.0)
$EULA.AutoScaleMode = [System.Windows.Forms.AutoScaleMode]::Font
$EULA.ClientSize = New-Object System.Drawing.Size(800, 450)
$EULA.Controls.Add($btnCancel)
$EULA.Controls.Add($richTextBox1)
if($mode -ne 0)
{
$EULA.AcceptButton=$btnCancel
}
else
{
$EULA.Controls.Add($btnAcknowledge)
$EULA.AcceptButton=$btnAcknowledge
$EULA.CancelButton=$btnCancel
}
$EULA.ResumeLayout($false)
$EULA.Size = New-Object System.Drawing.Size(800, 650)
Return ($EULA.ShowDialog())
}
function msrdShowEULAIfNeeded($toolName, $mode) {
$eulaRegPath = "HKCU:Software\Microsoft\CESDiagnosticTools"
$eulaAccepted = "No"
$eulaValue = $toolName + " EULA Accepted"
if(Test-Path $eulaRegPath)
{
$eulaRegKey = Get-Item $eulaRegPath
$eulaAccepted = $eulaRegKey.GetValue($eulaValue, "No")
}
else
{
$eulaRegKey = New-Item $eulaRegPath
}
if($mode -eq 2) # silent accept
{
$eulaAccepted = "Yes"
$ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force
}
else
{
if($eulaAccepted -eq "No")
{
$eulaAccepted = msrdShowEULAPopup($mode)
if($eulaAccepted -eq [System.Windows.Forms.DialogResult]::Yes)
{
$eulaAccepted = "Yes"
$ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force
}
}
}
return $eulaAccepted
}
function msrdCleanUpandExit {
if (($null -ne $global:msrdTempCommandErrorFile) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) {
Remove-Item -Path $global:msrdTempCommandErrorFile -Force -ErrorAction SilentlyContinue
}
if ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($false) | Out-Null }
if ($global:msrdForm) { $global:msrdForm.Close() }
Exit
}
# This function disable quick edit mode. If the mode is enabled, console output will hang when key input or strings are selected.
# So disable the quick edit mode during running script and re-enable it after script is finished.
$QuickEditCode=@"
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Runtime.InteropServices;
public static class msrdDisableConsoleQuickEdit
{
const uint ENABLE_QUICK_EDIT = 0x0040;
// STD_INPUT_HANDLE (DWORD): -10 is the standard input device.
const int STD_INPUT_HANDLE = -10;
[DllImport("kernel32.dll", SetLastError = true)]
static extern IntPtr GetStdHandle(int nStdHandle);
[DllImport("kernel32.dll")]
static extern bool GetConsoleMode(IntPtr hConsoleHandle, out uint lpMode);
[DllImport("kernel32.dll")]
static extern bool SetConsoleMode(IntPtr hConsoleHandle, uint dwMode);
public static bool SetQuickEdit(bool SetEnabled)
{
IntPtr consoleHandle = GetStdHandle(STD_INPUT_HANDLE);
// get current console mode
uint consoleMode;
if (!GetConsoleMode(consoleHandle, out consoleMode))
{
// ERROR: Unable to get console mode.
return false;
}
// Clear the quick edit bit in the mode flags
if (SetEnabled)
{
consoleMode &= ~ENABLE_QUICK_EDIT;
}
else
{
consoleMode |= ENABLE_QUICK_EDIT;
}
// set the new mode
if (!SetConsoleMode(consoleHandle, consoleMode))
{
// ERROR: Unable to set console mode
return false;
}
return true;
}
}
"@
Try {
Add-Type -TypeDefinition $QuickEditCode -Language CSharp -ErrorAction Stop | Out-Null
$global:fQuickEditCodeExist = $True
} Catch {
$global:fQuickEditCodeExist = $False
}
#region ##### MAIN #####
[System.Windows.Forms.Application]::EnableVisualStyles()
# Disabling quick edit mode as somethimes this causes the script stop working until enter key is pressed.
If ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($True) | Out-Null }
$notice = "========= Microsoft CSS Diagnostics Script =========`n
This Data Collection is for troubleshooting reported issues for the given scenarios.
Once you have started this script please wait until all data has been collected.`n`n
============= IMPORTANT NOTICE =============`n
This script is designed to collect information that will help Microsoft Customer Support Services (CSS) troubleshoot an issue you may be experiencing with Microsoft Remote Desktop solutions.`n
The collected data may contain Personally Identifiable Information (PII) and/or sensitive data, such as (but not limited to) IP addresses; PC names; and user names.`n
The script will save the collected data in a folder (default C:\MS_DATA) and also compress the results into a ZIP file.
This folder and its contents or the ZIP file are not automatically sent to Microsoft.`n
You can send the ZIP file to Microsoft CSS using a secure file transfer tool - Please discuss this with your support professional and also any concerns you may have.`n
Find our privacy statement at: https://privacy.microsoft.com/en-US/privacystatement`n
"
if (!($global:msrdTSSinUse)) {
if ($AcceptEula) {
"$(msrdGetLocalizedText "eulaSilentOK")"
$eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 2
} else {
$eulaAccepted = msrdShowEULAIfNeeded "MSRD-Collect" 0
if ($eulaAccepted -ne "Yes") {
"$(msrdGetLocalizedText "eulaNotOK")"
msrdCleanUpandExit
}
"$(msrdGetLocalizedText "eulaOK")"
}
if ($AcceptNotice) {
"$(msrdGetLocalizedText "noticeSilentOK")`n"
} else {
$wshell = New-Object -ComObject Wscript.Shell
$answer = $wshell.Popup("$notice",0,"Are you sure you want to continue?",4+32)
if ($answer -eq 7) {
Write-Warning "$(msrdGetLocalizedText "notApproved")`n"
msrdCleanUpandExit
}
"$(msrdGetLocalizedText "noticeOK")`n"
}
}
if ($Core -or $Profiles -or $Activation -or $AppAttach -or $MSRA -or $IME -or $HCI -or $Teams -or $SCard -or $DiagOnly -or $NetTrace -or $DumpPID) {
if ($Machine) {
if ($Role) {
switch($Machine) {
'isRDS' { $global:msrdRDS = $true; $global:msrdAVD = $false; $global:msrdW365 = $false }
'isAVD' { $global:msrdRDS = $false; $global:msrdAVD = $true; $global:msrdW365 = $false }
'isW365' { $global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $true }
}
switch($Role) {
'isSource' { $global:msrdSource = $true; $global:msrdTarget = $false }
'isTarget' { $global:msrdSource = $false; $global:msrdTarget = $true }
}
msrdInitFolders
msrdCheckAzVM -azEnvCmdLineInputValue $AzureEnv # checking for Azure Environment and deployment details if applicable
if ($global:avdnettestpath -eq "") { msrdLogMessage $LogLevel.Warning "$(msrdGetLocalizedText 'avdnettestNotFound')`n" } #if avdnettest.exe is missing
if (-not $global:msrdTSSinUse) {
if ($global:msrdConfig.DevLevel -eq "Insider") {
msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion (INSIDER Build - For Testing Purposes Only !)`n" -Color "Cyan"
} else {
msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "starting") - v$msrdVersion`n" -Color "Cyan"
}
if ($global:msrdConfig.AutomaticVersionCheck -eq 1) {
if ($global:msrdConfig.ScriptSelfUpdate -eq 1) {
msrdCheckVersion ($msrdVersion) -selfUpdate
} else {
msrdCheckVersion ($msrdVersion)
}
} else {
msrdLogMessage $LogLevel.Normal "INFO: Automatic update check on script launch is Disabled"
}
}
if ($UserContext) { msrdLogMessage $LogLevel.Info "INFO: UserContext switch has been specified with value: $UserContext`n" }
if ($PSSenderInfo) {
msrdLogMessage $LogLevel.Info "INFO: The script is running in a remote PowerShell session" -Color "Yellow"
msrdLogMessage $LogLevel.Info "INFO: ConnectedUser: $($PSSenderInfo.ConnectedUser)" -Color "Yellow"
msrdLogMessage $LogLevel.Info "INFO: RunAsUser: $($PSSenderInfo.RunAsUser)" -Color "Yellow"
}
msrdInitScript
$varsNO = @(,$false * 1)
msrdInitScenarioVars
$dumpProc = $false
$pidProc = ""
$global:onlyDiag = $false
$vCore = @(,$true * 12)
if ($Profiles) { $vProfiles = @(,$true * 5) }
if ($Activation) { $vActivation = @(,$true * 3) }
if ($MSRA) { $vMSRA = @(,$true * 7) }
if ($SCard) { $vSCard = @(,$true * 3) }
if ($IME) { $vIME = @(,$true * 3) }
if ($Teams) { $vTeams = @(,$true * 4) }
if ($AppAttach) { $vAppAttach = @(,$true * 1) }
if ($HCI) { $vHCI = @(,$true * 1) }
if ($DumpPID) { $pidProc = $DumpPID; $dumpProc = $true }
if ($DiagOnly) { $vCore = $varsNO; $global:onlyDiag = $true }
if (-not $DiagOnly) {
#data collection
$parameters = @{
varsCore = $vCore
varsProfiles = $vProfiles
varsActivation = $vActivation
varsMSRA = $vMSRA
varsSCard = $vSCard
varsIME = $vIME
varsTeams = $vTeams
varsMSIXAA = $vAppAttach
varsHCI = $vHCI
traceNet = $NetTrace
dumpProc = $dumpProc
pidProc = $pidProc
}
msrdCollectData @parameters
}
$varsSystem = @(,$true * 13)
$varsAVDRDS = @(,$true * 11)
$varsInfra = @(,$true * 10)
$varsAD = @(,$true * 2)
$varsNET = @(,$true * 8)
$varsLogSec = @(,$true * 3)
$varsIssues = @(,$true * 2)
$varsOther = @(,$true * 4)
#diagnostics
$parameters = @{
varsSystem = $varsSystem
varsAVDRDS = $varsAVDRDS
varsInfra = $varsInfra
varsAD = $varsAD
varsNET = $varsNET
varsLogSec = $varsLogSec
varsIssues = $varsIssues
varsOther = $varsOther
}
msrdCollectDataDiag @parameters
msrdArchiveData -varsCore $vCore
} else {
Write-Warning "Include the '-Role' parameter to indicate the role of the machine in the selected remote desktop solution, or run the script without any parameters (= GUI mode).`nSupported values for the '-Role' parameter: 'isSource', 'isTarget'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..."
Exit
}
} else {
Write-Warning "Include the '-Machine' parameter to indicate the type of environment from where data should be collected, or run the script without any parameters (= GUI mode).`nSupported values for the '-Machine' parameter: 'isAVD', 'isRDS', 'isW365'.`nSee MSRD-Collect-ReadMe.txt for more details.`nExiting..."
Exit
}
} else {
if (-not $global:msrdTSSinUse) {
$code = @"
using System;
using System.Runtime.InteropServices;
namespace System
{
public class IconExtractor
{
public static System.Drawing.Icon Extract(string file, int number, bool largeIcon)
{
IntPtr large;
IntPtr small;
ExtractIconEx(file, number, out large, out small, 1);
try
{
// Create a copy of the icon to avoid handle ownership issues
var extractedIcon = (System.Drawing.Icon)System.Drawing.Icon.FromHandle(largeIcon ? large : small).Clone();
// Release the handles obtained from ExtractIconEx
DestroyIcon(large);
DestroyIcon(small);
return extractedIcon;
}
catch
{
return null;
}
}
[DllImport("Shell32.dll", EntryPoint = "ExtractIconExW", CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
private static extern int ExtractIconEx(string sFile, int iIndex, out IntPtr piLargeVersion, out IntPtr piSmallVersion, int amountIcons);
[DllImport("user32.dll", CharSet = CharSet.Auto)]
private static extern bool DestroyIcon(IntPtr handle);
}
}
"@
if ($PSVersionTable.PSVersion.Major -eq 5) {
Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing
} else {
Add-Type -TypeDefinition $code -ReferencedAssemblies System.Drawing.Common,System.Drawing
}
Add-Type -AssemblyName System.Windows.Forms
$global:msrdRDS = $false; $global:msrdAVD = $false; $global:msrdW365 = $false
$global:msrdSource = $false; $global:msrdTarget = $false
#Load dlls into context of the current console session
Add-Type -Name Window -Namespace Console -MemberDefinition '
[DllImport("Kernel32.dll")]
public static extern IntPtr GetConsoleWindow();
[DllImport("user32.dll")]
public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow);
'
if ($msrdGUILite -eq 1) {
Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUILite" -DisableNameChecking -Force
msrdAVDCollectGUILite
} else {
Import-Module -Name "$PSScriptRoot\Modules\MSRDC-FwGUI" -DisableNameChecking -Force
msrdAVDCollectGUI
}
}
}
#endregion ##### MAIN #####
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvqUVrqWvbD8+y
# R67SmiOMgtmq14/fjT8TkOxO4kgwxKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIAI
# NdxzMqdzRM+29jesbvOZVU4baugOPkqM0ZslvlF5MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAgs2I88YzVjEvWKWiIRalOuzVS8T52SeLoqa5
# /QezLZy7XgZXxUmdGubMigwYxj6XbUMhTfmUGJTvgLHNjlevmOb+Z1ablPI1siLM
# qpb+F7d7p0vQpL4RkzaHqJV2Xzs6KlB3tF8wZu5heEBRByP023VPZ2MrIWnUW4hX
# D6pFz5HnuDE3LnWxFbQY3M9Lx77abG3LX7qsFl7OqZx2LkBvwzZpEhUHIJIP3mxf
# 88ago7+SwAyQKsKNjww8ASing6zranWvJt+ZsixRpTARhpCxQF4SM0VRt8WOLGVT
# +ycvrTcNDnlVNQtl4eLa22NAgtYNgLD/Oy5o1qRSI3RDR3hdZKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCWGh4P/Rv1Iu9tqi6xRWcoB6OF5pGpsb9p
# 0JAIbnvH7gIGZutwxlurGBMyMDI0MTAyODExMzcyMC44MTJaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF
# WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP
# AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF
# s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX
# ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL
# Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN
# gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m
# r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB
# BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp
# vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr
# OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI
# +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP
# Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri
# LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi
# mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV
# liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ
# dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L
# tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u
# EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US
# LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq
# 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu
# 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100
# DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0
# MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA
# AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b
# zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC
# K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga
# wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46
# vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW
# YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQghvctgGIJHoazCU/LeJhZ+uexznli1PUlbKwjSwAD/NQwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq
# Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC
# AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf
# HyoaMA0GCSqGSIb3DQEBCwUABIICAIdZC7yNE32Daw7Sna+otV1SQi/TcMLAzm5z
# JeZcx2aUh8kRn2rHc+U97le6PIAHAriJzw1p3KCEgtWduCIaVINFMXC9og93D4c+
# Klp17xSKgh/aOskPgQc4MRxpi4bpUHIyIUM+w9ZNZwZZZLJpbr2hsWiIPaQcEf+O
# FHjnlur2X/L+S/P8lHLtwuCOpQpDy2aQIgQzo+xUP429nuXOIl1xHts+G5k4r2NU
# QX+961/5i8tuEYtW1Z/eRlzHQlZ3F2pFTQ487pfsm8Wx95IcF19TdrvqL3tEEa3K
# fmAC/WJfYhdWQH8/Z0fuuUkfMtmXweozme2fbOKoUfc06s5QKt9IvQDOgoFRKLeH
# OOD9b5XcRtIbDXn+XJ9O4cPG16oZ1vDUWqmxddBT5F5qxUvqRhfjjE/SP68FAyxM
# c8atLNW/NfHL7YSY/fCFlleEwze4jU9hJqaUPcA0TTsHLmRbaXlR/YMNX8O6Innz
# +wclepB3AlSSBQ2kLuMKsD9HV2d/su486ldX9rK+3zCLQH2Eal27cODrwYedDVvF
# qVvpNgrZXnUq+b63TbGcSqyr/hVSssQxc0IHgQaaltcXlbQlK0FiHr9MmQDD9p5a
# 6d4sNQETnZe2ru57frqZSwPy4w8uuFb+/XG2Yd+Nx7/3Hpzfeuc1C1Fi54T4wsts
# IEpGSzH+
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_52_22.ps1 | sample_52_22.ps1 | #
# Module manifest for module 'OCI.PSModules.Aianomalydetection'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aianomalydetection.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a3b1179d-3494-46fe-b212-09c2eaebfa09'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aianomalydetection Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aianomalydetection.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAianomalydetectionAiPrivateEndpoint',
'Get-OCIAianomalydetectionAiPrivateEndpointsList',
'Get-OCIAianomalydetectionDataAsset',
'Get-OCIAianomalydetectionDataAssetsList',
'Get-OCIAianomalydetectionDetectAnomalyJob',
'Get-OCIAianomalydetectionDetectAnomalyJobsList',
'Get-OCIAianomalydetectionModel',
'Get-OCIAianomalydetectionModelsList',
'Get-OCIAianomalydetectionProject',
'Get-OCIAianomalydetectionProjectsList',
'Get-OCIAianomalydetectionWorkRequest',
'Get-OCIAianomalydetectionWorkRequestErrorsList',
'Get-OCIAianomalydetectionWorkRequestLogsList',
'Get-OCIAianomalydetectionWorkRequestsList',
'Invoke-OCIAianomalydetectionDetectAnomalies',
'Move-OCIAianomalydetectionAiPrivateEndpointCompartment',
'Move-OCIAianomalydetectionDataAssetCompartment',
'Move-OCIAianomalydetectionDetectAnomalyJobCompartment',
'Move-OCIAianomalydetectionModelCompartment',
'Move-OCIAianomalydetectionProjectCompartment',
'New-OCIAianomalydetectionAiPrivateEndpoint',
'New-OCIAianomalydetectionDataAsset',
'New-OCIAianomalydetectionDetectAnomalyJob',
'New-OCIAianomalydetectionModel',
'New-OCIAianomalydetectionProject',
'Remove-OCIAianomalydetectionAiPrivateEndpoint',
'Remove-OCIAianomalydetectionDataAsset',
'Remove-OCIAianomalydetectionDetectAnomalyJob',
'Remove-OCIAianomalydetectionModel',
'Remove-OCIAianomalydetectionProject',
'Stop-OCIAianomalydetectionWorkRequest',
'Update-OCIAianomalydetectionAiPrivateEndpoint',
'Update-OCIAianomalydetectionDataAsset',
'Update-OCIAianomalydetectionDetectAnomalyJob',
'Update-OCIAianomalydetectionModel',
'Update-OCIAianomalydetectionProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aianomalydetection'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.