full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/3549.ps1
3549.ps1
$resourceGroupName = "RecoveryServicesBackupTestRg"; $resourceName = "PsTestRsVault"; $policyName = "PsTestPolicy"; $defaultPolicyName = "DefaultPolicy"; $DefaultSnapshotDays = 2; $UpdatedSnapShotDays = 5; $oldResourceGroupName = "shracrg" $oldVaultName = "shracsql" $oldPolicyName = "iaasvmretentioncheck" function Test-AzureVMPolicy { $location = Get-ResourceGroupLocation $resourceGroupName = Create-ResourceGroup $location try { $vault = Create-RecoveryServicesVault $resourceGroupName $location $schedulePolicy = Get-AzRecoveryServicesBackupSchedulePolicyObject -WorkloadType AzureVM Assert-NotNull $schedulePolicy $retentionPolicy = Get-AzRecoveryServicesBackupRetentionPolicyObject -WorkloadType AzureVM Assert-NotNull $retentionPolicy $policyName = "newPolicy" $policy = New-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $policyName ` -WorkloadType AzureVM ` -RetentionPolicy $retentionPolicy ` -SchedulePolicy $schedulePolicy Assert-NotNull $policy Assert-AreEqual $policy.Name $policyName Assert-AreEqual $policy.SnapshotRetentionInDays $DefaultSnapshotDays $oldVault = Get-AzRecoveryServicesVault -ResourceGroupName $oldResourceGroupName -Name $oldVaultName $oldPolicy = Get-AzRecoveryServicesBackupProtectionPolicy -Name $oldPolicyName -VaultId $oldVault.ID Assert-AreEqual $oldPolicy.RetentionPolicy.DailySchedule.DurationCountInDays 1 $policy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $policyName Assert-NotNull $policy Assert-AreEqual $policy.Name $policyName $defaultPolicy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $defaultPolicyName Assert-NotNull $defaultPolicy Assert-AreEqual $defaultPolicy.Name $defaultPolicyName Assert-True { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Saturday" } Assert-True { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Thursday" } Assert-False { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Sunday" } Assert-False { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Friday" } $schedulePolicy = Get-AzRecoveryServicesBackupSchedulePolicyObject -WorkloadType AzureVM Assert-NotNull $schedulePolicy $retentionPolicy = Get-AzRecoveryServicesBackupRetentionPolicyObject -WorkloadType AzureVM Assert-NotNull $retentionPolicy $policy.SnapshotRetentionInDays = $UpdatedSnapShotDays; Set-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -RetentionPolicy $retentionPolicy ` -SchedulePolicy $schedulePolicy ` -Policy $policy $policy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $policyName Assert-AreEqual $policy.SnapshotRetentionInDays $UpdatedSnapShotDays Remove-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Policy $policy ` -Force } finally { Cleanup-ResourceGroup $resourceGroupName } }
combined_dataset/train/non-malicious/New-XVM_3.ps1
New-XVM_3.ps1
#Examples <# New-XVM -Name "WS2012-TestServer01" -SwitchName "Switch(192.168.2.0/24)" -VhdType NoVHD New-XVM -Name "WS2012-TestServer02" -SwitchName "Switch(192.168.2.0/24)" -VhdType ExistingVHD -VhdPath 'D:\\vhds\\WS2012-TestServer02.vhdx' New-XVM -Name "WS2012-TestServer03" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD New-XVM -Name "WS2012-TestServer04" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -DiskType Fixed -DiskSize 1GB New-XVM -Name "WS2012-TestServer05" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -DiskType Dynamic New-XVM -Name "WS2012-TestServer06" -SwitchName "Switch(192.168.2.0/24)" -VhdType Differencing -ParentVhdPath 'D:\\vhds\\Windows Server 2012 RC Base.vhdx' New-XVM -Name "WS2012-TestServer07" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -Configuration @{"MemoryStartupBytes"=1GB;"BootDevice"="LegacyNetworkAdapter"} #> Function New-XVM { [cmdletbinding()] Param ( [Parameter(Mandatory=$false,Position=1)] [string]$ComputerName=$env:COMPUTERNAME, [Parameter(Mandatory=$true,Position=2)] [string]$Name, [Parameter(Mandatory=$true,Position=3)] [string]$SwitchName, [Parameter(Mandatory=$true,Position=4)] [ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")] [string]$VhdType, [Parameter(Mandatory=$false,Position=5)] [hashtable]$Configuration ) DynamicParam { Switch ($VhdType) { "ExistingVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("VhdPath",$vhdPath) return $paramDictionary break } "NewVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("DiskType",$diskType) $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection) $paramDictionary.Add("DiskSize",$diskSize) return $paramDictionary break } "Differencing" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("ParentVhdPath",$parentVhdPath) return $paramDictionary } } } Begin { Try { $vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop } Catch { $PSCmdlet.ThrowTerminatingError($Error[0]) } $defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath } Process { $validConfigNames = "MemoryStartupBytes","BootDevice" $configParams = @() Switch ($VhdType) { "NoVHD" { $newVhdPath = $null } "ExistingVHD" { $newVhdPath = $vhdPath.Value } "NewVhd" { if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"} if (-not $diskSize.IsSet) {$diskSize.Value = 127GB} $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" Switch ($diskType.Value) { "Fixed" { $vhdFile = New-VHD -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } "Dynamic" { $vhdFile = New-VHD -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } } } "Differencing" { $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" $vhdFile = New-VHD -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop } } if ($vhdFile -ne $null) { Try { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$($vhdFile.Path)'" } Catch { $PSCmdlet.WriteError($Error[0]) Remove-Item -Path $vhdFile.Path } } else { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD" } if ($Configuration -ne $null) { foreach ($configName in $Configuration.Keys.GetEnumerator()) { if ($validConfigNames -contains $configName) { $configParams += "-$configName" + " " + $Configuration[$configName] } } $configParams = $configParams -join " " } if ($configParams.Count -eq 0) { $command += " -ErrorAction Stop" } else { $command += " $configParams -ErrorAction Stop" } Invoke-Expression -Command $command } End {} }
combined_dataset/train/non-malicious/4126.ps1
4126.ps1
param ( [string]$WindowsRepository, [string]$BIOSPassword, [switch]$BIOS, [switch]$Drivers, [switch]$Applications, [string]$WinPERepository ) function Get-Architecture { [CmdletBinding()][OutputType([string])] param () $OSArchitecture = (Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture).OSArchitecture Return $OSArchitecture } function Get-WindowsUpdateReport { [CmdletBinding()][OutputType([xml])] param () If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) { $Executable = Get-ChildItem -Path "x:\DCU" -Filter dcu-cli.exe $ReportFile = "x:\DCU\DriverReport.xml" } else { $Architecture = Get-Architecture If ($Architecture -eq "32-Bit") { $Executable = Get-ChildItem -Path $env:ProgramFiles"\Dell\CommandUpdate" -Filter dcu-cli.exe } else { $Executable = Get-ChildItem -Path ${env:ProgramFiles(x86)}"\Dell\CommandUpdate" -Filter dcu-cli.exe } If ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") { $ReportFile = $WindowsRepository + "\" + "DriverReport.xml" } else { $ReportFile = $WindowsRepository + "DriverReport.xml" } } If ((Test-Path -Path $ReportFile) -eq $true) { Remove-Item -Path $ReportFile -Force -ErrorAction SilentlyContinue } $Switches = "/report" + [char]32 + $ReportFile $ErrCode = (Start-Process -FilePath $Executable.FullName -ArgumentList $Switches -Wait -Passthru).ExitCode If ((Test-Path -Path $ReportFile) -eq $true) { [xml]$DriverList = Get-Content -Path $ReportFile Return $DriverList } else { Return $null } } function Get-WinPEUpdateReport { [CmdletBinding()] param () $ReportFile = $env:SystemDrive + "\DCU\DriversReport.xml" If ((Test-Path $ReportFile) -eq $true) { Remove-Item -Path $ReportFile -Force | Out-Null } $Executable = $env:SystemDrive + "\DCU\dcu-cli.exe" $Switches = "/report" + [char]32 + $ReportFile $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode If ((Test-Path -Path $ReportFile) -eq $true) { [xml]$DriverList = Get-Content -Path $ReportFile Return $DriverList } else { Return $null } } function Update-Repository { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()]$Updates ) If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) { If ($WinPERepository[$WinPERepository.Length - 1] -ne "\") { $Repository = $WinPERepository + "\" } else { $Repository = $WinPERepository } } elseif ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") { $Repository = $WindowsRepository + "\" } else { $Repository = $WindowsRepository } foreach ($Update in $Updates.Updates.Update) { $UpdateRepository = $Repository + $Update.Release $DownloadURI = $Update.file $DownloadFileName = $UpdateRepository + "\" + ($DownloadURI.split("/")[-1]) If ((Test-Path $UpdateRepository) -eq $false) { New-Item -Path $UpdateRepository -ItemType Directory -Force | Out-Null } If ((Test-Path $DownloadFileName) -eq $false) { Invoke-WebRequest -Uri $DownloadURI -OutFile $DownloadFileName } } } function Update-Applicatons { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()]$Updates ) if ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") { $Repository = $WindowsRepository + "\" } else { $Repository = $WindowsRepository } foreach ($Update in $Updates.Updates.Update) { If ($Update.type -eq "Application") { $UpdateFile = $Repository + $Update.Release + "\" + (($Update.file).split("/")[-1]) If ((Test-Path $UpdateFile) -eq $true) { $Output = "Installing " + $Update.name + "....." Write-Host $Output -NoNewline $Switches = "/s" $ErrCode = (Start-Process -FilePath $UpdateFile -ArgumentList $Switches -WindowStyle Minimized -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } } } } function Update-BIOS { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()]$Updates ) If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) { If ($WinPERepository[$WinPERepository.Length - 1] -ne "\") { $Repository = $WinPERepository + "\" } else { $Repository = $WinPERepository } } elseif ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") { $Repository = $WindowsRepository + "\" } else { $Repository = $WindowsRepository } foreach ($Update in $Updates.Updates.Update) { If ($Update.type -eq "BIOS") { $UpdateFile = $Repository + $Update.Release + "\" + (($Update.file).split("/")[-1]) If ((Test-Path $UpdateFile) -eq $true) { $Output = "Installing " + $Update.name + "....." Write-Host $Output -NoNewline $Switches = "/s /p=" + $BIOSPassword $ErrCode = (Start-Process -FilePath $UpdateFile -ArgumentList $Switches -WindowStyle Minimized -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 2) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } } } } function Update-Drivers { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()]$Updates ) if ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") { $Repository = $WindowsRepository + "\" } else { $Repository = $WindowsRepository } foreach ($Update in $Updates.Updates.Update) { If ($Update.type -eq "Driver") { $UpdateFile = $Repository + $Update.Release + "\" + (($Update.file).split("/")[-1]) $UpdateFile = Get-ChildItem -Path $UpdateFile If ((Test-Path $UpdateFile) -eq $true) { $Output = "Installing " + $Update.name + "....." Write-Host $Output -NoNewline $Switches = "/s" $ErrCode = (Start-Process -FilePath $UpdateFile.Fullname -ArgumentList $Switches -WindowStyle Minimized -Passthru).ExitCode $Start = Get-Date Do { $Process = (Get-Process | Where-Object { $_.ProcessName -eq $UpdateFile.BaseName }).ProcessName $Duration = (Get-Date - $Start).TotalMinutes } While (($Process -eq $UpdateFile.BaseName) -and ($Duration -lt 10)) If (($ErrCode -eq 0) -or ($ErrCode -eq 2) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code $ErrCode" -ForegroundColor Red } } } } } Clear-Host If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) { $Updates = Get-WinPEUpdateReport } Else { $Updates = Get-WindowsUpdateReport } $Updates.Updates.Update.Name If ($Updates -ne $null) { Update-Repository -Updates $Updates } If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) { Update-BIOS -Updates $Updates } Else { If (($Applications.IsPresent) -or ((!($Applications.IsPresent)) -and (!($BIOS.IsPresent)) -and (!($Drivers.IsPresent)))) { Update-Applicatons -Updates $Updates } If (($BIOS.IsPresent) -or ((!($Applications.IsPresent)) -and (!($BIOS.IsPresent)) -and (!($Drivers.IsPresent)))) { Update-BIOS -Updates $Updates } If (($Drivers.IsPresent) -or ((!($Applications.IsPresent)) -and (!($BIOS.IsPresent)) -and (!($Drivers.IsPresent)))) { Update-Drivers -Updates $Updates } }
combined_dataset/train/non-malicious/TabExpansion for V2CTP_2.ps1
TabExpansion for V2CTP_2.ps1
## Tab-Completion ################# ## For V2CTP3. ## This won't work on V1 and V2CTP and V2CTP2. ## Please dot souce this script file. ## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list. ## ## What this can do is: ## ## [datetime]::n<tab> ## [datetime]::now.d<tab> ## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell" ## $c = [ref]$a; $d = [ref]$b,$c ## $d[0].V<tab>[0][0].Get<tab> ## $d[1].V<tab>[0,0].tos<tab> ## $function:a<tab> ## $env:a<tab> ## [System.Type].a<tab> ## [datetime].Assembly.a<tab> ## ).a<tab> # shows System.Type properties and methods... ## #native command name expansion ## fsu<tab> ## #command option name expansion (for fsutil ipconfig net powershell only) ## fsutil <tab> ## ipconfig <tab> ## net <tab> ## powershell <tab> ## #TypeNames and Type accelerators expansion ## [Dec<tab> ## [system.Man<tab>.auto<tab>.p<tab> ## New-Object -TypeName IO.Dir<tab> ## New-Object System.win<tab>.for<tab>.bu<tab> ## #ProgIDs expansion ## New-Object -Com shel<tab> ## #Enum option expansion ## Set-ExecutionPolicy <tab> ## Set-ExecutionPolicy All<tab> ## Set-ExcusionPolisy -ex <tab> ## Get-TraceSource Inte<tab> ## iex -Errora <tab> -wa Sil<tab> ## #WmiClasses expansion ## Get-WmiObject -class Win32_<tab> ## gwmi __Instance<tab> ## #Encoding expansion ## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab> ## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab> ## #PSProvider name expansion ## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab> ## Get-PSProvider <tab> ## pwd -psp al<tab> ## #PSDrive name expansion ## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab> ## Get-PSDrive <tab> ## pwd -psd <tab> ## #PSSnapin name expansion ## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab> ## Get-Command -PSSnapin <tab> ## Remove-PSSnapin <tab> ## Get-PSSnapin M<tab> ## #Eventlog name and expansion ## Get-Eventlog -Log <tab> ## Get-Eventlog w<tab> ## #Eventlog's entrytype expansion ## Get-EventLog -EntryType <tab> ## Get-EventLog -EntryType Er<tab> ## Get-EventLog -Ent <tab> ## #Service name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab> ## New-Service -DependsOn <tab> ## New-Service -Dep e<tab> ## Get-Service -n <tab> ## Get-Service <tab>,a<tab>,p<tab> ## gsv <tab> ## #Service display name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab> ## Get-Service -Dis <tab> ## gsv -Dis <tab>,w<tab>,b<tab> ## #Cmdlet and Topic name expansion ## Get-Help [-Name] about_<tab> ## Get-Help <tab> ## #Category name expansion ## Get-Help -Category c<tab>,<tab> ## #Command name expansion ## Get-Command [-Name] <tab> ## Get-Command -Name <tab> ## gcm a<tab>,<tab> ## #Scope expansion ## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias ## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab> ## Clear-Variable -Scope G<tab> ## Set-Alias -s <tab> ## #Process name expansion ## [Get-Process | Stop-Process] [-Name] <tab> ## Stop-Process -Name <tab> ## Stop-Process -N pow<tab> ## Get-Process <tab> ## ps power<tab> ## #Trace sources expansion ## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab> ## #Trace -ListenerOption expansion ## [Set-TraceSource | Trace-Command] -ListenerOption <tab> ## Set-TraceSource -Lis <tab>,n<tab> ## #Trace -Option expansion ## [Set-TraceSource | Trace-Command] -Option <tab> ## Set-TraceSource -op <tab>,con<tab> ## #ItemType expansion ## New-Item -Item <tab> ## ni -ItemType d<tab> ## #ErrorAction and WarningAction option expansion ## CMDLET [-ErrorAction | -WarningAction] <tab> ## CMDLET -Errora s<tab> ## CMDLET -ea con<tab> ## CMDLET -wa <tab> ## #Continuous expansion with comma when parameter can treat multiple option ## # if there are spaces, occur display bug in the line ## # if strings contains '$' or '-', not work ## Get-Command -CommandType <tab>,<tab><tab>,cm<tab> ## pwd -psp <tab>,f<tab>,va<tab> ## Get-EventLog -EntryType <tab>,i<tab>,s<tab> ## #Enum expansion in method call expression ## # this needs one or more spaces after left parenthesis or comma ## $str = "day night" ## $str.Split( " ",<space>rem<tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR ## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success ## $type = [System.Type] ## $type.GetMembers(<space>Def<tab> ## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab> ## # this can do continuous enum expansion with comma and no spaces ## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>" ## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab> ## #Better '$_.' expansion when cmdlet output objects or method return objects ## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> } ## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB } ## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> } ## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" } ## $data = Get-Process ## $data[2,4,5] | % { $_.<tab> ## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type ## #Property name expansion by -Property parameter ## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object | ## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab> ## Select-Object -ExcludeProperty <tab> ## Select-Object -ExpandProperty <tab> ## gcm Get-Acl|select -exp Par<tab> ## ps |group na<tab> ## ls | ft A<tab>,M<tab>,L<tab> ## #Hashtable key expansion in the variable name and '.<tab>' ## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} } ## $hash.pow<tab>.pro<tab> ## #Parameter expansion for function, filter and script ## man -f<tab> ## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1 ## .\\foobar.ps1 -<tab> -b<tab> ## #Enum expansion for function, filter and scripts ## # this can do continuous enum expansion with comma and no spaces ## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab> ## #Enum expansion for assignment expression ## #needs space(s) after '=' and comma ## #strongly-typed with -as operator and space(s) ## $ErrorActionPreference =<space><tab> ## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3 ## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab> ## #Path expansion with variable and '\\' or '/' ## $PWD\\../../<tab>\\<tab> ## "$env:SystemDrive/pro<tab>/<tab> ## #Operator expansion which starts with '-' ## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2' ## 1..9 -co<tab> 5 ## #Keyword expansion ## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } } ## #Variable name expansion (only global scope) ## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab> ## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab> ## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab> ## Tee-Object -Variable <tab> ## gv pro<tab>,<tab> ## Remove-Variable -Name out<tab>,<tab>,ps<tab> ## ... | ... | tee -v <tab> ## #Alias name expansion ## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab> ## Export-Alias -Name <tab> ## Get-Alias i<tab>,e<tab>,a<tab> ## epal -n for<tab> ## #Property name expansion with -groupBy parameter ## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab> ## ps | ft -g <tab> ## gcm | Format-Wide -GroupBy Par<tab> ## #Type accelerators expansion with no charactors ## [<tab> ## New-Object -typename <tab> ## New-Object <tab> ## # File glob expansion with '@' ## ls *.txt@<tab> ## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma ## ls * -Filter *.txt # 2 <tab> refactoring ## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern ## This can also use '^'(hat) or '~'(tilde) for Excluding ## ls <hat>*.txt@<tab> ## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma ## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring ## *.txt<tilde>foo*<tilde>bar*@<tab> ## ls file.txt # 1 <tab> expanding with comma ## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring ## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> ) ## ls * -Filter * -Excluding foo*, bar*<Enter> ## #ls<tab> ## #1<tab> ## # Command buffer stack with ';'(semicolon) ## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1 ## echo "PowerShell"<semicolon><tab> # push command2 ## get-process<semicolon><tab> # push command3 ## {COMMAND}<Enter> # execute another command ## get-process # Auto pop command3 from stack by LIFO ## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon) ## get-process; <semicolon><comma><tab> ## get-process; echo "PowerShell" # pop command2 from stack by LIFO ## # Function name expansion after 'function' or 'filter' keywords ## function cl<tab> ### Generate ProgIDs list... if ( Test-Path $PSHOME\\ProgIDs.txt ) { $_reader = New-Object IO.StreamReader $PSHOME\\ProgIDs.txt $_ProgID = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_reader.Close() Remove-Variable _reader } else { $_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\") $_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_subkey in $_HKCR.GetSubKeyNames() ) { foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") ) { if ($_i -ne $null) { $_ProgID.Add($_i.GetValue("")) } } } '$_ProgID was updated...' | Out-Host $_ProgID = $_ProgID|sort -Unique Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose } ### Generate TypeNames list... if ( Test-Path $PSHOME\\TypeNames.txt ) { $_reader = New-Object IO.StreamReader $PSHOME\\TypeNames.txt $_TypeNames = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_reader.Close() Remove-Variable _reader } else { $_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() ) { foreach ( $_type in $_asm.GetTypes() ) { $_TypeNames.Add($_type.FullName) } } '$_TypeNames was updated...' | Out-Host $_TypeNames = $_TypeNames | sort -Unique Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose } if ( Test-Path $PSHOME\\TypeNames_System.txt ) { $_reader = New-Object IO.StreamReader $PSHOME\\TypeNames_System.txt $_TypeNames_System = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_reader.Close() Remove-Variable _reader } else { $_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.' '$_TypeNames_System was updated...' | Out-Host Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose } ### Generate WMIClasses list... if ( Test-Path $PSHOME\\WMIClasses.txt ) { $_reader = New-Object IO.StreamReader $PSHOME\\WMIClasses.txt $_WMIClasses = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_reader.Close() Remove-Variable _reader } else { $_WMIClasses = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_class in gwmi -List ) { $_WMIClasses.Add($_class.Name) } $_WMIClasses = $_WMIClasses | sort -Unique '$_WMIClasses was updated...' | Out-Host Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose } [Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null $global:_cmdstack = New-Object Collections.Stack $global:_snapin = $null $global:_TypeAccelerators = [type]::gettype("System.Management.Automation.TypeAccelerators")::get.keys | sort iex (@' function prompt { if ($_cmdstack.Count -gt 0) { $line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) } '@ + @" ${function:prompt} } "@) function Write-ClassNames ( $data, $i, $prefix='', $sep='.' ) { $preItem = "" foreach ( $class in $data -like $_opt ) { $Item = $class.Split($sep) if ( $preItem -ne $Item[$i] ) { if ( $i+1 -eq $Item.Count ) { if ( $prefix -eq "[" ) { $suffix = "]" } elseif ( $sep -eq "_" ) { $suffix = "" } else { $suffix = " " } } else { $suffix = "" } $prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix $preItem = $Item[$i] } } } function Get-PipeLineObject { $i = -2 $property = $null do { $str = $line.Split("|") # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1] # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] if ( $_cmdlet -eq "?" ) { $_cmdlet = "Where-Object" } $global:_exp = $_cmdlet # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Select-Object" -eq $_cmdlet ) { if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' ) { $property = $Matches[1] + ";" + $property } } $i-- } while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet ) if ( $global:_forgci -eq $null ) { $a = @(ls "Alias:\\")[0] $e = @(ls "Env:\\")[0] $f = @(ls "Function:\\")[0] $h = @(ls "HKCU:\\")[0] $v = @(ls "Variable:\\")[0] $c = @(ls "cert:\\")[0] $global:_forgci = gi $PSHOME\\powershell.exe | Add-Member -Name CommandType -MemberType 'NoteProperty' -Value $f.CommandType -PassThru | Add-Member -Name Definition -MemberType 'NoteProperty' -Value $a.Definition -PassThru | Add-Member -Name Description -MemberType 'NoteProperty' -Value $a.Description -PassThru | Add-Member -Name Key -MemberType 'NoteProperty' -Value $e.Key -PassThru | Add-Member -Name Location -MemberType 'NoteProperty' -Value $c.Location -PassThru | Add-Member -Name LocationName -MemberType 'NoteProperty' -Value $c.LocationName -PassThru | Add-Member -Name Options -MemberType 'NoteProperty' -Value $a.Options -PassThru | Add-Member -Name ReferencedCommand -MemberType 'NoteProperty' -Value $a.ReferencedCommand -PassThru | Add-Member -Name ResolvedCommand -MemberType 'NoteProperty' -Value $a.ResolvedCommand -PassThru | Add-Member -Name ScriptBlock -MemberType 'NoteProperty' -Value $f.ScriptBlock -PassThru | Add-Member -Name StoreNames -MemberType 'NoteProperty' -Value $c.StoreNames -PassThru | Add-Member -Name SubKeyCount -MemberType 'NoteProperty' -Value $h.SubKeyCount -PassThru | Add-Member -Name Value -MemberType 'NoteProperty' -Value $e.Value -PassThru | Add-Member -Name ValueCount -MemberType 'NoteProperty' -Value $h.ValueCount -PassThru | Add-Member -Name Visibility -MemberType 'NoteProperty' -Value $a.Visibility -PassThru | Add-Member -Name Property -MemberType 'NoteProperty' -Value $h.Property -PassThru | Add-Member -Name ResolvedCommandName -MemberType 'NoteProperty' -Value $a.ResolvedCommandName -PassThru | Add-Member -Name Close -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteSubKeyTree -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Flush -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetSubKeyNames -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValueKind -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValueNames -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsValidValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name OpenSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name SetValue -MemberType 'ScriptMethod' -Value {} -PassThru } if ( $global:_mix -eq $null ) { $f = gi $PSHOME\\powershell.exe $t = [type] $s = "" $global:_mix = ` Add-Member -InputObject (New-Object PSObject) -Name Mode -MemberType 'NoteProperty' -Value $f.Mode -PassThru | Add-Member -Name Assembly -MemberType 'NoteProperty' -Value $t.Assembly -PassThru | Add-Member -Name AssemblyQualifiedName -MemberType 'NoteProperty' -Value $t.AssemblyQualifiedName -PassThru | Add-Member -Name Attributes -MemberType 'NoteProperty' -Value $f.Attributes -PassThru | Add-Member -Name BaseType -MemberType 'NoteProperty' -Value $t.BaseType -PassThru | Add-Member -Name ContainsGenericParameters -MemberType 'NoteProperty' -Value $t.ContainsGenericParameters -PassThru | Add-Member -Name CreationTime -MemberType 'NoteProperty' -Value $f.CreationTime -PassThru | Add-Member -Name CreationTimeUtc -MemberType 'NoteProperty' -Value $f.CreationTimeUtc -PassThru | Add-Member -Name DeclaringMethod -MemberType 'NoteProperty' -Value $t.DeclaringMethod -PassThru | Add-Member -Name DeclaringType -MemberType 'NoteProperty' -Value $t.DeclaringType -PassThru | Add-Member -Name Exists -MemberType 'NoteProperty' -Value $f.Exists -PassThru | Add-Member -Name Extension -MemberType 'NoteProperty' -Value $f.Extension -PassThru | Add-Member -Name FullName -MemberType 'NoteProperty' -Value $f.FullName -PassThru | Add-Member -Name GenericParameterAttributes -MemberType 'NoteProperty' -Value $t.GenericParameterAttributes -PassThru | Add-Member -Name GenericParameterPosition -MemberType 'NoteProperty' -Value $t.GenericParameterPosition -PassThru | Add-Member -Name GUID -MemberType 'NoteProperty' -Value $t.GUID -PassThru | Add-Member -Name HasElementType -MemberType 'NoteProperty' -Value $t.HasElementType -PassThru | Add-Member -Name IsAbstract -MemberType 'NoteProperty' -Value $t.IsAbstract -PassThru | Add-Member -Name IsAnsiClass -MemberType 'NoteProperty' -Value $t.IsAnsiClass -PassThru | Add-Member -Name IsArray -MemberType 'NoteProperty' -Value $t.IsArray -PassThru | Add-Member -Name IsAutoClass -MemberType 'NoteProperty' -Value $t.IsAutoClass -PassThru | Add-Member -Name IsAutoLayout -MemberType 'NoteProperty' -Value $t.IsAutoLayout -PassThru | Add-Member -Name IsByRef -MemberType 'NoteProperty' -Value $t.IsByRef -PassThru | Add-Member -Name IsClass -MemberType 'NoteProperty' -Value $t.IsClass -PassThru | Add-Member -Name IsCOMObject -MemberType 'NoteProperty' -Value $t.IsCOMObject -PassThru | Add-Member -Name IsContextful -MemberType 'NoteProperty' -Value $t.IsContextful -PassThru | Add-Member -Name IsEnum -MemberType 'NoteProperty' -Value $t.IsEnum -PassThru | Add-Member -Name IsExplicitLayout -MemberType 'NoteProperty' -Value $t.IsExplicitLayout -PassThru | Add-Member -Name IsGenericParameter -MemberType 'NoteProperty' -Value $t.IsGenericParameter -PassThru | Add-Member -Name IsGenericType -MemberType 'NoteProperty' -Value $t.IsGenericType -PassThru | Add-Member -Name IsGenericTypeDefinition -MemberType 'NoteProperty' -Value $t.IsGenericTypeDefinition -PassThru | Add-Member -Name IsImport -MemberType 'NoteProperty' -Value $t.IsImport -PassThru | Add-Member -Name IsInterface -MemberType 'NoteProperty' -Value $t.IsInterface -PassThru | Add-Member -Name IsLayoutSequential -MemberType 'NoteProperty' -Value $t.IsLayoutSequential -PassThru | Add-Member -Name IsMarshalByRef -MemberType 'NoteProperty' -Value $t.IsMarshalByRef -PassThru | Add-Member -Name IsNested -MemberType 'NoteProperty' -Value $t.IsNested -PassThru | Add-Member -Name IsNestedAssembly -MemberType 'NoteProperty' -Value $t.IsNestedAssembly -PassThru | Add-Member -Name IsNestedFamANDAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamANDAssem -PassThru | Add-Member -Name IsNestedFamily -MemberType 'NoteProperty' -Value $t.IsNestedFamily -PassThru | Add-Member -Name IsNestedFamORAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamORAssem -PassThru | Add-Member -Name IsNestedPrivate -MemberType 'NoteProperty' -Value $t.IsNestedPrivate -PassThru | Add-Member -Name IsNestedPublic -MemberType 'NoteProperty' -Value $t.IsNestedPublic -PassThru | Add-Member -Name IsNotPublic -MemberType 'NoteProperty' -Value $t.IsNotPublic -PassThru | Add-Member -Name IsPointer -MemberType 'NoteProperty' -Value $t.IsPointer -PassThru | Add-Member -Name IsPrimitive -MemberType 'NoteProperty' -Value $t.IsPrimitive -PassThru | Add-Member -Name IsPublic -MemberType 'NoteProperty' -Value $t.IsPublic -PassThru | Add-Member -Name IsSealed -MemberType 'NoteProperty' -Value $t.IsSealed -PassThru | Add-Member -Name IsSerializable -MemberType 'NoteProperty' -Value $t.IsSerializable -PassThru | Add-Member -Name IsSpecialName -MemberType 'NoteProperty' -Value $t.IsSpecialName -PassThru | Add-Member -Name IsUnicodeClass -MemberType 'NoteProperty' -Value $t.IsUnicodeClass -PassThru | Add-Member -Name IsValueType -MemberType 'NoteProperty' -Value $t.IsValueType -PassThru | Add-Member -Name IsVisible -MemberType 'NoteProperty' -Value $t.IsVisible -PassThru | Add-Member -Name LastAccessTime -MemberType 'NoteProperty' -Value $f.LastAccessTime -PassThru | Add-Member -Name LastAccessTimeUtc -MemberType 'NoteProperty' -Value $f.LastAccessTimeUtc -PassThru | Add-Member -Name LastWriteTime -MemberType 'NoteProperty' -Value $f.LastWriteTime -PassThru | Add-Member -Name LastWriteTimeUtc -MemberType 'NoteProperty' -Value $f.LastWriteTimeUtc -PassThru | Add-Member -Name MemberType -MemberType 'NoteProperty' -Value $t.MemberType -PassThru | Add-Member -Name MetadataToken -MemberType 'NoteProperty' -Value $t.MetadataToken -PassThru | Add-Member -Name Module -MemberType 'NoteProperty' -Value $t.Module -PassThru | Add-Member -Name Name -MemberType 'NoteProperty' -Value $t.Name -PassThru | Add-Member -Name Namespace -MemberType 'NoteProperty' -Value $t.Namespace -PassThru | Add-Member -Name Parent -MemberType 'NoteProperty' -Value $f.Parent -PassThru | Add-Member -Name ReflectedType -MemberType 'NoteProperty' -Value $t.ReflectedType -PassThru | Add-Member -Name Root -MemberType 'NoteProperty' -Value $f.Root -PassThru | Add-Member -Name StructLayoutAttribute -MemberType 'NoteProperty' -Value $t.StructLayoutAttribute -PassThru | Add-Member -Name TypeHandle -MemberType 'NoteProperty' -Value $t.TypeHandle -PassThru | Add-Member -Name TypeInitializer -MemberType 'NoteProperty' -Value $t.TypeInitializer -PassThru | Add-Member -Name UnderlyingSystemType -MemberType 'NoteProperty' -Value $t.UnderlyingSystemType -PassThru | Add-Member -Name PSChildName -MemberType 'NoteProperty' -Value $f.PSChildName -PassThru | Add-Member -Name PSDrive -MemberType 'NoteProperty' -Value $f.PSDrive -PassThru | Add-Member -Name PSIsContainer -MemberType 'NoteProperty' -Value $f.PSIsContainer -PassThru | Add-Member -Name PSParentPath -MemberType 'NoteProperty' -Value $f.PSParentPath -PassThru | Add-Member -Name PSPath -MemberType 'NoteProperty' -Value $f.PSPath -PassThru | Add-Member -Name PSProvider -MemberType 'NoteProperty' -Value $f.PSProvider -PassThru | Add-Member -Name BaseName -MemberType 'NoteProperty' -Value $f.BaseName -PassThru | Add-Member -Name Clone -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CompareTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Contains -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CopyTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Create -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateObjRef -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateSubdirectory -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Delete -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name EndsWith -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name FindInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name FindMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetArrayRank -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetConstructor -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetConstructors -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetCustomAttributes -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetDefaultMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetDirectories -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetElementType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEnumerator -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEvent -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEvents -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetField -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFields -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFiles -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFileSystemInfos -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericArguments -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericParameterConstraints -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericTypeDefinition -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterface -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterfaceMap -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMember -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMethod -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMethods -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetNestedType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetNestedTypes -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetObjectData -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetProperties -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetProperty -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetTypeCode -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IndexOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name InitializeLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Insert -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name InvokeMember -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsAssignableFrom -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsDefined -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsInstanceOfType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsNormalized -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsSubclassOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name LastIndexOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name LastIndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeArrayType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeByRefType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeGenericType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakePointerType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MoveTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Normalize -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name PadLeft -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name PadRight -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Refresh -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Remove -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Replace -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name SetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Split -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name StartsWith -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Substring -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToCharArray -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToLower -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToLowerInvariant -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToUpper -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToUpperInvariant -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Trim -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name TrimEnd -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name TrimStart -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Chars -MemberType 'NoteProperty' -Value $s.Chars -PassThru } if ( "Add-Member" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Compare-Object" -eq $_cmdlet ) { $global:_dummy = (Compare-Object 1 2)[0] } if ( "ConvertFrom-SecureString" -eq $_cmdlet ) { $global:_dummy = $null } if ( "ConvertTo-SecureString" -eq $_cmdlet ) { $global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force } if ( "ForEach-Object" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Acl" -eq $_cmdlet ) { $global:_dummy = Get-Acl } if ( "Get-Alias" -eq $_cmdlet ) { $global:_dummy = (Get-Alias)[0] } if ( "Get-AuthenticodeSignature" -eq $_cmdlet ) { $global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe } if ( "Get-ChildItem" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-Command" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-Content" -eq $_cmdlet ) { $global:_dummy = (type $PSHOME\\profile.ps1)[0] } if ( "Get-Credential" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Culture" -eq $_cmdlet ) { $global:_dummy = Get-Culture } if ( "Get-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( "Get-Event" -eq $_cmdlet ) { $global:_dummy = (Get-Event)[0] } if ( "Get-EventLog" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-ExecutionPolicy" -eq $_cmdlet ) { $global:_dummy = Get-ExecutionPolicy } if ( "Get-Help" -eq $_cmdlet ) { $global:_dummy = Get-Help Add-Content } if ( "Get-History" -eq $_cmdlet ) { $global:_dummy = Get-History -Count 1 } if ( "Get-Host" -eq $_cmdlet ) { $global:_dummy = Get-Host } if ( "Get-Item" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-ItemProperty" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Location" -eq $_cmdlet ) { $global:_dummy = Get-Location } if ( "Get-Member" -eq $_cmdlet ) { $global:_dummy = (1|Get-Member)[0] } if ( "Get-Module" -eq $_cmdlet ) { $global:_dummy = (Get-Module)[0] } if ( "Get-PfxCertificate" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Process" -eq $_cmdlet ) { $global:_dummy = ps powershell } if ( "Get-PSBreakpoint" -eq $_cmdlet ) { $global:_dummy = Add-Member -InputObject (New-Object PSObject) -Name Action -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Command -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Enabled -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name HitCount -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Id -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Script -MemberType 'NoteProperty' -Value '' -PassThru } if ( "Get-PSCallStack" -eq $_cmdlet ) { $global:_dummy = Get-PSCallStack } if ( "Get-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Function } if ( "Get-PSProvider" -eq $_cmdlet ) { $global:_dummy = Get-PSProvider FileSystem } if ( "Get-PSSnapin" -eq $_cmdlet ) { $global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core } if ( "Get-Service" -eq $_cmdlet ) { $global:_dummy = (Get-Service)[0] } if ( "Get-TraceSource" -eq $_cmdlet ) { $global:_dummy = Get-TraceSource AddMember } if ( "Get-UICulture" -eq $_cmdlet ) { $global:_dummy = Get-UICulture } if ( "Get-Variable" -eq $_cmdlet ) { $global:_dummy = Get-Variable _ } if ( "Get-WmiObject" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Group-Object" -eq $_cmdlet ) { $global:_dummy = 1 | group } if ( "Measure-Command" -eq $_cmdlet ) { $global:_dummy = Measure-Command {} } if ( "Measure-Object" -eq $_cmdlet ) { $global:_dummy = Measure-Object } if ( "New-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Alias } if ( "New-TimeSpan" -eq $_cmdlet ) { $global:_dummy = New-TimeSpan } if ( "Resolve-Path" -eq $_cmdlet ) { $global:_dummy = $PWD } if ( "Select-String" -eq $_cmdlet ) { $global:_dummy = " " | Select-String " " } if ( "Set-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( $property -ne $null) { foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) ) { $global:_dummy = @($global:_dummy.$name)[0] } } } function TabExpansion { param($line, $lastWord) & { function Write-Members ($sep='.') { Invoke-Expression ('$_val=' + $_expression) if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } $_method = [Management.Automation.PSMemberTypes] ` 'Method,CodeMethod,ScriptMethod,ParameterizedProperty' if ($sep -eq '.') { $params = @{view = 'extended','adapted','base'} } else { $params = @{static=$true} } if ( $_val -is [Hashtable] ) { [Object[]]$_keys = $null foreach ( $_name in $_val.Keys ) { $_keys += ` New-Object Microsoft.PowerShell.Commands.MemberDefinition ` [int],$_name,"Property",0 } } if ( $_keys -ne $null ) { $_members = [Object[]](Get-Member @params -InputObject $_val $_pat) + ($_keys | ? {$_.name -like $_pat}) } else { $_members = (Get-Member @params -InputObject $_val $_pat) } foreach ($_m in $_members | Sort-Object membertype,name) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } $host.UI.RawUI.WindowTitle = "Windows PowerShell V2 (CTP2)" + $lastword switch -regex ($lastWord) { # Handle property and method expansion at '$_' '(^.*)(\\$_\\.)(\\w*)$' { $_base = $matches[1] $_expression = '$global:_dummy' $_pat = $matches[3] + '*' $global:_dummy = $null Get-PipeLineObject if ( $global:_dummy -eq $null ) { if ( $global:_exp -match '^\\$.*\\(.*$' ) { $type = ( iex $global:_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' ) { $tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1] $type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' ) { $global:_dummy = @(iex $Matches[1])[0] } else { $global:_dummy = $global:_mix } } Write-Members break; } # Handle property and method expansion rooted at variables... # e.g. $a.b.<tab> '(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle simple property and method expansion on static members... # e.g. [datetime]::n<tab> '(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' Write-Members '::' break; } # Handle complex property and method expansion on static members # where there are intermediate properties... # e.g. [datetime]::now.d<tab> '(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' { $_base = $matches[1] # everything before the expression $_expression = $matches[2].TrimEnd('.') # expression less trailing '.' $_pat = $matches[5] + '*' # the member to look for... Write-Members break; } # Handle variable name expansion... '(^.*\\$)(\\w+)$' { $_prefix = $matches[1] $_varName = $matches[2] foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*')) { $_prefix + $_v.name } break; } # Handle env&function drives variable name expansion... '(^.*\\$)(.*\\:)(\\w+)$' { $_prefix = $matches[1] $_drive = $matches[2] $_varName = $matches[3] if ($_drive -eq "env:" -or $_drive -eq "function:") { foreach ($_v in Get-ChildItem ($_drive + $_varName + '*')) { $_prefix + $_drive + $_v.name } } break; } # Handle array's element property and method expansion # where there are intermediate properties... # e.g. foo[0].n.b<tab> '(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$' { $_base = $matches[1] $_expression = $matches[2].TrimEnd('.') $_pat = $Matches[8] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle property and method expansion rooted at type object... # e.g. [System.Type].a<tab> '(^\\[(\\w|\\.)+\\])\\.(\\w*)$' { if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; } $_expression = $Matches[1] $_pat = $Matches[$matches.Count-1] + '*' Write-Members break; } # Handle complex property and method expansion on type object members # where there are intermediate properties... # e.g. [datetime].Assembly.a<tab> '^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' { $_expression = $matches[1].TrimEnd('.') # expression less trailing '.' $_pat = $matches[4] + '*' # the member to look for... if ( $(iex $_expression) -eq $null ) { break; } Write-Members break; } # Handle property and method expansion rooted at close parenthes... # e.g. (123).a<tab> '^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' { $_base = $Matches[1] + ")" if ( $matches[3] -eq $null) { $_expression = '[System.Type]' } else { $_expression = '[System.Type]' + $Matches[2] } $_pat = $matches[4] + '*' iex "$_expression | Get-Member $_pat | sort MemberType,Name" | % { if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" } if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes } else { $_base + $Matches[2] + "." + $_.Name + $parenthes } } break; } # Handle .NET type name expansion ... # e.g. [Microsoft.PowerShell.Com<tab> '^\\[((\\w+\\.?)*)$' { $_opt = $matches[1] + '*' if ( $_opt -eq "*" ) { $_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]' } else { $_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]' Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '[' Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '[' } break; } # Handle file/directory name which contains $env: variable # e.g. $env:windir\\<tab> '^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' { $path = iex ('"' + $Matches[0] + '"') if ( $Matches[2].Length -gt 1 ) { $parent = Split-Path $path -Parent $leaf = (Split-Path $path -Leaf) + '*' } else { $parent = $path $leaf = '*' } if ( Test-Path $parent ) { $i = $Matches[0].LastIndexOfAny("/\\") $_base = $Matches[0].Substring(0,$i+1) [IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') } } } # Handle file glob expansion ... # e.g. *.txt~about*@<tab> '^(\\^?([^~]+))(~(.*))*@$' { if ( $Matches[1] -notlike "^*" ) { $include = $Matches[2] -replace '``','`' if ( $Matches[3] ) { $exclude = $Matches[3].Split("~", "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace '``','`' } } else { $include = "*" $exclude = $Matches[2] -replace '``','`' } $fse = [IO.Directory]::GetFileSystemEntries($PWD) $fse = $fse -replace '.*[\\\\/]([^/\\\\]*)$','$1' % -in ($fse -like $include) { $fse = $_; $exclude | % { $fse = $fse -notlike $_ } } $fse = $fse -replace '^.*\\s.*$', ("'`$0'") $fse = $fse -replace '([\\[\\]])', '``$1' -replace '^.*([\\[\\]]).*$', ("'`$0'") $fse = $fse -replace "''", "'" $OFS = ", "; "$fse" $OFS = ", "; "* -Filter $include " + $(if($exclude){"-Exclude $exclude"}) $Matches[0].Substring(0, $Matches[0].Length-1) break; } # Handle command buffer stack... '(.*);(.?)$' { $_base = $Matches[1] if ( $Matches[2] -eq ":" -or $Matches[2] -eq "," ) { if ( $_cmdstack.Count -gt 0 ) { $_base + $global:_cmdstack.Pop() } else { "" } } elseif ( $Matches[2] -eq "" ) { $global:_cmdstack.Push($line.SubString(0,$line.Length-1)) [System.Windows.Forms.SendKeys]::SendWait("{ESC}") } } # Do completion on parameters... '^-([\\w0-9]*)' { $_pat = $matches[1] + '*' # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_command = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_command -match '\\{([^\\{\\}]*)$') { $_command = $matches[1] } # Extract the longest unclosed parenthetical expression... if ($_command -match '\\(([^()]*)$') { $_command = $matches[1] } # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_command = $_command.Trim().Split()[0] # now get the info object for it... $_command = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_command)[0] # loop resolving aliases... while ($_command.CommandType -eq 'alias') { $_command = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_command.Definition)[0] } if ( $_command -ne $null ) { # expand the parameter sets and emit the matching elements foreach ($_n in $_command.Parameters.Keys | sort) { if ($_n -like $_pat) { '-' + $_n } } } else { "-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt", "-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge", "-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike", "-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains", "-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat" } break; } # Tab complete against history either #<pattern> or #<id> '^#(\\w*)' { $_pattern = $matches[1] if ($_pattern -match '^[0-9]+$') { Get-History -ea SilentlyContinue -Id $_pattern | Foreach { $_.CommandLine } } else { $_pattern = '*' + $_pattern + '*' Get-History | Sort-Object -Descending Id| Foreach { $_.CommandLine } | where { $_ -like $_pattern } } break; } # try to find a matching command... default { $lastex = [regex]::Split($line, '[|;]')[-1] if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' ) { if ( $Matches[6] -ne $nul ) { $brackets = "[]" } '['+ $global:_enum + $brackets + ']' break; } if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' ) { $_pat = $Matches[7] + '*' $_type = @(iex $Matches[1])[0].GetType() if ( $_type.IsEnum ) { $global:_enum = $_type.FullName [Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"' break; } } $lastex = [regex]::Split($line, '[|;=]')[-1] if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$') { '['+ $global:_enum + ']' } elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' ) { $_method = $Matches[1] if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" ) { $continuous = $true $_opt = $Matches[5] + '*' $_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1' $position = $Matches[1].Split(",").Length } else { $continuous = $false $_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*" $position = $Matches[3].Split(",").Length } if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null ) { $tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }') } foreach ( $def in $_mdefs ) { [void] ($def -match '\\((.*)\\)') foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] ) { if ($param -eq $null -or $param -eq "") { continue; } $type = $param.split()[0] if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" ) { continue; } $fullname = @($_typenames -like "*$type*") foreach ( $name in $fullname ) { if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum ) { $output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1') $output | sort } elseif ( ( $name -as [System.Type] ).IsEnum ) { $global:_enum = $name $output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"' $output | sort } } } } if ( $output -ne $null ) { break; } } if ( $line -match '(function|filter)\\s+(\\w*)$') { $_pat = 'function:\\' + $Matches[2] + '*' Get-ChildItem $_pat| % { $_.Name } break; } if ( $line[-1] -eq " " ) { $_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1] # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name ) { "Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ) { Get-TraceSource | % { $_.Name } | sort -Unique break; } if ( "New-Object" -eq $_cmdlet.Name ) { $_TypeAccelerators break; } if ( $_cmdlet.Noun -like "*WMI*" ) { $_WMIClasses break; } if ( "Get-Process" -eq $_cmdlet.Name ) { Get-Process | % { $_.Name } | sort break; } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name ) { if ( $global:_snapin -ne $null ) { $global:_snapin break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin break; } } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" ) { Get-PSDrive | sort break; } if ( "Get-Eventlog" -eq $_cmdlet.Name ) { Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name ) { Get-Help -Category all | % { $_.Name } | sort -Unique break; } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name ) { Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name ) { Get-PipeLineObject $_dummy | gm -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ) { Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ) { Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( $line[-1] -eq " " ) { $_cmdlet = [regex]::Split($line, '[|;=]')[-1] if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } $_cmdlet = $_cmdlet.Trim().Split()[0] $_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0] if ( $_cmdlet.Name -eq "powershell.exe" ) { "-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive", "-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort break; } if ( $_cmdlet.Name -eq "fsutil.exe" ) { "behavior query", "behavior set", "dirty query", "dirty set", "file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew", "fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics", "hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create", "quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query", "reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange", "usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort break; } if ( $_cmdlet.Name -eq "net.exe" ) { "ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ", "HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ", "SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort break; } if ( $_cmdlet.Name -eq "ipconfig.exe" ) { "/?", "/all", "/renew", "/release", "/flushdns", "/displaydns", "/registerdns", "/showclassid", "/setclassid" break; } } if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' ) { $_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2] $_opt = $Matches[1].Split(" ,")[-1] + '*' $_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length) $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name ) { "Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ) { Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "New-Object" -eq $_cmdlet.Name ) { $_TypeAccelerators -like $_opt Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) break; } if ( $_cmdlet.Name -like "*WMI*" ) { Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_' break; } if ( "Get-Process" -eq $_cmdlet.Name ) { Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name ) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-PSProvider" -eq $_cmdlet.Name ) { Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Eventlog" -eq $_cmdlet.Name ) { Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name ) { Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique break; } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name ) { Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ) { Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( $line -match '(-(\\w+))\\s+([^-]*$)' ) { $_param = $matches[2] + '*' $_opt = $Matches[3].Split(" ,")[-1] + '*' $_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length) $_cmdlet = [regex]::Split($line, '[|;=]')[-1] if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } $_cmdlet = $_cmdlet.Trim().Split()[0] $_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet)[0] while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet.Definition)[0] } if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" ) { "SilentlyContinue", "Stop", "Continue", "Inquire" | ? { $_ -like $_opt } | sort -Unique break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name ` -and "groupBy" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name } break; } if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or "ErrorVariable" -like $_param -or "OutVariable" -like $_param) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort break; } if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param ) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name ` -and "Encoding" -like $_param) { "Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" | ? { $_ -like $_opt } | sort -Unique break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "New-Object" -like $_cmdlet.Name ) { if ( "ComObject" -like $_param ) { $_ProgID -like $_opt | % { $_ -replace '\\s','` ' } break; } if ( "TypeName" -like $_param ) { if ( $_opt -eq "*" ) { $_TypeAccelerators -like $_opt } else { $_TypeAccelerators -like $_opt Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) } break; } } if ( "New-Item" -eq $_cmdlet.Name ) { if ( "ItemType" -like $_param ) { "directory", "file" -like $_opt break; } } if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name ` -and "PSProvider" -like $_param ) { Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" -like $_param ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + $_ } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" ` -contains $_cmdlet.Name -and "Name" -like $_param ) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + $_ } break; } } if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias", "New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" ` -contains $_cmdlet.Name -and "Scope" -like $_param ) { "Global", "Local", "Script" -like $_opt break; } if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param ) { Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param ) { Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name ) { if ( "Name" -like $_param ) { Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique break; } if ( "Category" -like $_param ) { "Alias", "Cmdlet", "Provider", "General", "FAQ", "Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ } break; } } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { if ( "Name" -like $_param ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "DisplayName" -like $_param ) { Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') } break; } } if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param ) { "Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ } break; } if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param ) { Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( $_cmdlet.Noun -like "*WMI*" ) { if ( "Class" -like $_param ) { Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_' break; } } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name -and "Property" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Select-Object" -eq $_cmdlet.Name ) { if ( "ExcludeProperty" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "ExpandProperty" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name } break; } } select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters | ? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } | % { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ } } # parse the script... $_tokens = [System.Management.Automation.PSParser]::Tokenize($line, [ref] $null) if ($_tokens) { $_lastToken = $_tokens[$_tokens.count - 1] if ($_lastToken.Type -eq 'Command') { $_cmd = $_lastToken.Content # don't look for paths... if ($_cmd.IndexOfAny('/\\') -eq -1) { # handle parsing errors - the last token string should be the last # string in the line... if ($lastword.substring($lastword.length-$_cmd.length) -eq $_cmd) { $_pat = $_cmd + '*' $_base = $lastword.substring(0, $lastword.length-$_cmd.length) "begin {", "break", "catch {", "continue", "data {", "do {", "dynamicparam (", "else {", "elseif (", "end {", "exit", "filter ", "finally {", "for (", "foreach ", "from", "function ", "if (", "in ", "param (", "process {", "return", "switch ", "throw ", "trap ", "try {", "until (", "while (" ` -like $_pat | % {'{0}{1}' -f $_base,$_ } $ExecutionContext.InvokeCommand.GetCommandName($_pat,$true, $false) | Sort-Object -Unique | ForEach-Object {'{0}{1}' -f $_base,$_ } } } } } } } } }
combined_dataset/train/non-malicious/sample_22_33.ps1
sample_22_33.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for CspmMonitorGithubOffering. .Description Create an in-memory object for CspmMonitorGithubOffering. .Outputs Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering .Link https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgithubofferingobject #> function New-AzSecurityCspmMonitorGithubOfferingObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering')] [CmdletBinding(PositionalBinding=$false)] Param( ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering]::New() return $Object } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzcg19ntJ2Vm7n # Nv4fpwbIBZeaYikalO0kGBD7E0awuKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIZp0STCH1uZvsGk3OK8X7CV # ND6/KRrc5f3Ioitol4r3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAcTK/jPUAs9sI/OwnTpBofRko7MXKURYh26zQTT+hKfF5unrnSpRzUqfS # MwcukwKd9gnVze1BzWjLoVtUa/K77J0AKP98juCHgCHY08grgIOuM49aUVOJp3dj # +ivJoHOQ4K53Dz+3BYQ3qcCamWVc7+AFxKyputUpo4RnzhpQgxUpjfWo1Fj4wyCt # pVts4+K99cccAYdcKXnIeldzZrW3osRxLqNNMQp2BLSabLu/MEnfgo/0ml6gaNw9 # OkqJW2X4GDIluwi0SIx/h3lbO4JLBbT+Um4pIeVeN0rqChUH8nCZHpRur7ZSnp0P # qWuD3EatgES+aX/hJGVW1zlsODjchKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDBMeEzSZpQJAygmyqmF+bMz0E1jMu9AXfDOdKRfaDP9AIGZhf9t082 # GBMyMDI0MDQyMzEzMTUxNC42MzhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGk+zAiGA8yMDI0MDQyMzAzMDk0 # N1oYDzIwMjQwNDI0MDMwOTQ3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0aT7 # AgEAMAoCAQACAh2yAgH/MAcCAQACAhQBMAoCBQDp0vZ7AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAG3Tuff4zR8zcaVgTLUDfl0xfRocWtx6pvLTWn5lo6N9 # Ak/XTdyVZV3oFZBAbtKglmbTcLN40qFbmrGuTqIuiHb7JQZlTjW5F+EQgD7YsS4c # wJ6YQVFrXtZDUB0EICL7yMptISLaBGXZPelWUJ7qLaIFu9jwk1lhSiJBBWtmOqXf # qbtcuT8D1Y1cggfTZkt8vGF4GZRkEaQwd14QQKGm8fLz4WwtzneqbM0vXhNcJy6o # Q/GCqSvXz1qE8em5Ym2ZtBL14QDm8x+/D8tLpZXCx6+AsR26NUgkkQjRyuEunW+c # KSokVvA6lrCyTg8VerFU7w8xbfbO2/dRz4EkBrijI9MxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAMl6tnhI7PZeICr9DzjgcUslVHiA1hXyCveN2mt/IG # DDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgkSVAVMCQP43gRUUZLldZpT1L # MwzkyidT5GxFNcH73KkwDQYJKoZIhvcNAQELBQAEggIABo04ejpsA4GmDf5rZnsL # Y8b2D0E5ase3yxCIVyC8kz2GC4yijYxwHPmobmCCrn+FnZn5bhcIV2HxaVahGUl8 # D8Si3C0xufxdQGWvtD+MRHkJDB9G74IK09UYpI7uOqCnQzCaC69vz39rMb02CYxs # 8oGW6q5lXyAw5Y1v9dSrhSOvViW7pnGT+Zg6jq/+ZyoP1OXDYRm+/IMqe35zNucA # TCEQq17wmkR4GQD9AJ7bReZxNkE2qvM/W1s0vzdqU0R5qlNFpGxqbINXrhEb+hO7 # 86cbDuZn7D3YKRLWWURTttSP1pUPRh+KmpO+HbVfwC2qr+zCODtvycHw7McZqhGi # ZW1QPBuPuzopmBfgJIHRx8OYLYR8BLhzcc3vVZoXXyM4VP4ownyzDnKHMDJopI9V # /qz4JVYjCPhu3n2WdYVa0jFv5xFuHrCt5K7XjY/y9dNOa+wcuwSJpDGUd+a6+rzw # YYLv6cRHnQLANUpEbfGXtoSEWQKlxabNU1Jqw/1/Xad//lhIMWpQqSu07cqK8ror # jlXe8KHjMJjQgufHYF1IgDlGHgvlfqUEaDwpQMIGnQcZinUcUFMmumFikpELbMnh # IUzCmAeQbaZ9sK4thZ08OaJ8x1xmDdiWj3xgQz4ESBbh36fkkC7AVlcMzbqGvC/2 # OrQB++YUSRMm05JoorBhW/A= # SIG # End signature block
combined_dataset/train/non-malicious/1125.ps1
1125.ps1
& (Join-Path -Path $PSScriptRoot 'Initialize-CarbonTest.ps1' -Resolve) function Assert-HostsFileContains { param( [Parameter(ParameterSetName='ExactLine')] $Line, [Parameter(ParameterSetName='ConstructLine')] [Net.IPAddress] $IPAddress, [Parameter(ParameterSetName='ConstructLine')] $HostName, [Parameter(ParameterSetName='ConstructLine')] $Description, $Path = $customHostsFile ) if( $PSCmdlet.ParameterSetName -eq 'ConstructLine' ) { $Line = '{0,-45} {1}' -f $IPAddress,$HostName if( $Description ) { $Line = "{0}`t } } It ('should set entry {0}' -f $Line) { $hostsFile = Read-File -Path $Path $hostsFile | Where-Object { $_ -eq $Line } | Should Not BeNullOrEmpty } } function New-TestHostsFile { param( [Parameter(ValueFromPipeline=$true)] [string] $Line ) begin { $testDrive = (Get-Item -Path 'TestDrive:').FullName $path = Join-Path -Path $testDrive -ChildPath 'hosts' } process { $Line | Add-Content -Path $path } end { return $path } } Describe 'Set-HostsEntry.when passed a new IPv6 address' { $hostsPath = New-TestHostsFile Set-HostsEntry -IPAddress 'cc1a:2078:ec06:4f32:8ea8:7119:663a:f2d2' -HostName 'ipv6' -Path $hostsPath Assert-HostsFileContains -IPAddress 'cc1a:2078:ec06:4f32:8ea8:7119:663a:f2d2' -HostName 'ipv6' -Path $hostsPath } Describe 'Set-HostsEntry.when IPv6 address contains IP tunnel' { $hostsPath = New-TestHostsFile Set-HostsEntry -IPAddress '2001:4860:4860::8888:255.255.255.255' -HostName 'ipv6' -Path $hostsPath Assert-HostsFileContains -IPAddress '2001:4860:4860::8888:255.255.255.255' -HostName 'ipv6' -Path $hostsPath } Describe 'Set-HostsEntry.when updating an existing IPv6 address' { $hostsPath = New-TestHostsFile Set-HostsEntry -IPAddress '2001:4860:4860::8888' -HostName 'ipv6' -Path $hostsPath Set-HostsEntry -IPAddress '2001:4860:4860::8844' -HostName 'ipv6' -Path $hostsPath Assert-HostsFileContains -IPAddress '2001:4860:4860::8844' -HostName 'ipv6' -Path $hostsPath } Describe 'Set-HostsEntry.when no path parameter provided' { Mock -CommandName 'Write-File' -Verifiable -ModuleName 'Carbon' Set-HostsEntry -IPAddress '5.6.7.8' -HostName 'example.com' -Description 'Customizing example.com' It 'should operate on system hosts file by default' { Assert-MockCalled -CommandName 'Write-File' -ModuleName 'Carbon' -ParameterFilter { Write-Debug $Path Write-Debug (Get-PathToHostsFile) $Path -eq (Get-PathToHostsFile) } } } Describe 'Set-HostsEntry.when setting an existin IPv4 entry' { $hostsFile = '1.2.3.4 example.com' | New-TestHostsFile Set-HostsEntry -IPAddress '5.6.7.8' -HostName 'example.com' -Description 'Customizing example.com' -Path $hostsFile Assert-HostsFileContains -IPAddress "5.6.7.8" -HostName 'example.com' -Description 'Customizing example.com' -Path $hostsFile } Describe 'Set-HostsEntry.when adding a new IPv4 entry' { $hostsFile = New-TestHostsFile $ip = '255.255.255.255' $hostname = 'shouldaddnewhostsentry.example.com' $description = 'testing if new hosts entries get added' Set-HostsEntry -IPAddress $ip -Hostname $hostname -Description $description -Path $hostsFile Assert-HostsFileContains -IPAddress $ip -HostName $hostname -Description $description -Path $hostsFile } Describe 'Set-HostsEntry.when an existing entry has a comment but is updated without a comment' { $ip = '1.1.1.1' $hostname = 'shouldremovecomment.example.com' $hostsFile = "$ip $hostname Set-HostsEntry -IPAddress $ip -HostName $hostname -Path $hostsFile Assert-HostsFileContains -IPAddress $ip -HostName $hostname -Path $hostsFile } Describe 'Set-HostsEntry.when there are duplicate hostnames' { $ip = '3.3.3.3' $hostname = 'shouldcommentoutduplicates.example.com' $line = "$ip $hostname" $hostsFile = ($line,$line) | New-TestHostsFile Set-HostsEntry -IPAddress $ip -HostName $hostname -Path $hostsFile Assert-HostsFileContains -IPAddress $ip -HostName $hostname -Path $hostsFile $commentedLine = ' Assert-HostsFileContains -Line $commentedLine -Path $hostsFile It 'should comment out second duplicate' { Get-Content -Path $hostsFile | Select-Object -Last 1 | Should Be $commentedLine } } Describe 'Set-HostsEntry.when using -WhatIf switch' { $hostsFile = New-TestHostsFile Set-HostsEntry -IPAddress '127.0.0.1' -Hostname 'example.com' -WhatIf -Path $hostsFile It 'should not update the hosts file' { Get-Content -Path $hostsFile | Should BeNullOrEmpty } } Describe 'Set-HostsEntry.when hosts file exists and is empty' { $hostsFile = New-TestHostsFile Remove-Item -Path $hostsFile New-Item -Path $hostsFile -ItemType File Set-HostsEntry -IPAddress '127.0.0.1' -Hostname 'example.com' -Path $hostsFile Assert-HostsFileContains -IPAddress '127.0.0.1' -Hostname 'example.com' -Path $hostsFile } Describe 'Set-HostsEntry.when hosts file does not exist' { $Global:Error.Clear() $hostsFile = New-TestHostsFile Remove-Item -Path $hostsFile Set-HostsEntry -IPAddress '127.0.0.1' -Hostname 'example.com' -Path $hostsFile It 'should not write any errors' { $Global:Error | Should BeNullOrEmpty } It 'should create hosts file' { $hostsFile | Should Exist } Assert-HostsFileContains -IPAddress '127.0.0.1' -HostName 'example.com' -Path $hostsFile } Describe 'Set-HostsEntry.when hosts file contains invalid entries' { $hostsFile = 'Invalid Line' | New-TestHostsFile Set-HostsEntry -IPAddress '4.3.2.1' -Hostname 'example.com' -Path $hostsFile Assert-HostsFileContains -IPAddress '4.3.2.1' -HostName 'example.com' -Path $hostsFile Assert-HostsFileContains -Line ' } Describe 'Set-HostsEntry.when the hosts file is in use' { $Global:Error.Clear() $line1 = '0.3.2.1 example1.com' $line2 = '0.6.7.8 example2.com' $hostsFile = $line1,$line2 | New-TestHostsFile $expectedHostsFile = @" $line1 $line2 "@ Context 'the hosts file is locked for writing' { $file = [IO.File]::Open($hostsFile, 'Open', 'Read', 'Read') try { Set-HostsEntry '1.2.3.4' -HostName 'example.com' -Path $hostsFile -ErrorAction SilentlyContinue } finally { $file.Close() } It 'should write an error' { $Global:Error.Count | Should Be 1 $Global:Error.Count | Should BeGreaterThan 0 $Global:Error | Should Match 'cannot access the file' } It 'should not modify the file' { Get-Content -Raw -Path $hostsFile | Should Be $expectedHostsFile } } Context 'the hosts file is locked for reading' { $Global:Error.Clear() $job = Start-Job -ScriptBlock { $file = [IO.File]::Open($using:hostsFile, 'Open', 'Read', 'None') Start-Sleep -Seconds 5 $file.Close() } try { do { Start-Sleep -Milliseconds 100 Write-Debug -Message ('Waiting for hosts file to get locked.') } while( (Get-Content -Raw -Path $hostsFile -ErrorAction Ignore) ) Set-HostsEntry '0.4.5.6' -HostName 'example1.com' -Path $hostsFile -ErrorAction SilentlyContinue It 'should write error' { $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'cannot access the file' } do { Start-Sleep -Milliseconds 100 Write-Debug -Message ('Waiting for hosts file to get unlocked.') } while( -not (Get-Content -Raw -Path $hostsFile -ErrorAction Ignore) ) It 'should not modify the file' { $hostsFile = Get-Content -Raw -Path $hostsFile -ErrorAction Ignore | Should Be $expectedHostsFile } } finally { $job | Wait-Job | Receive-Job | Out-String | Write-Debug } } } Describe 'Set-HostsEntry.when updating entries with descriptions' { $hostsFile = New-TestHostsFile Set-HostsEntry -IPAddress 127.0.0.1 -HostName 'test' -Description 'Test' -Path $hostsFile Set-HostsEntry -IPAddress 127.0.0.1 -HostName 'test2' -Description 'Test2' -Path $hostsFile Set-HostsEntry -IPAddress 127.0.0.1 -HostName 'test3' -Path $hostsFile Assert-HostsFileContains -IPAddress "127.0.0.1" -HostName 'test' -Description 'Test' -Path $hostsFile Assert-HostsFileContains -IPAddress "127.0.0.1" -HostName 'test2' -Description 'Test2' -Path $hostsFile Assert-HostsFileContains -IPAddress "127.0.0.1" -HostName 'test3' -Path $hostsFile } Describe 'Set-HostsEntry.when the hosts file contains trailing empty lines' { $line = @" {0,-45} fubarsnafu {0,-45} snafufubar "@ -f '127.0.0.1' $hostsFile = $line | New-TestHostsFile Set-HostsEntry -IPAddress '127.0.0.1' -HostName 'fubarsnafu' -Path $hostsFile It 'should trim trailing space' { (Get-Content -Raw -Path $hostsFile).Trim("`r","`n") | Should Be $line.Trim() } }
combined_dataset/train/non-malicious/sample_39_70.ps1
sample_39_70.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. ##################################################################################################### # # Registers the WinRM endpoint for this instance of PowerShell. # # If the parameters '-PowerShellHome' were specified, it means that the script will be registering # an instance of PowerShell from another instance of PowerShell. # # If no parameter is specified, it means that this instance of PowerShell is registering itself. # # Assumptions: # 1. The CoreCLR and the PowerShell assemblies are side-by-side in $PSHOME # 2. Plugins are registered by version number. Only one plugin can be automatically registered # per PowerShell version. However, multiple endpoints may be manually registered for a given # plugin. # ##################################################################################################### [CmdletBinding(DefaultParameterSetName = "NotByPath")] param ( [parameter(Mandatory = $true, ParameterSetName = "ByPath")] [switch]$Force, [string] $PowerShellHome ) Set-StrictMode -Version 3.0 if (! ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Write-Error "WinRM registration requires Administrator rights. To run this cmdlet, start PowerShell with the `"Run as administrator`" option." return } function Register-WinRmPlugin { param ( # # Expected Example: # %windir%\\system32\\PowerShell\\6.0.0\\pwrshplugin.dll # [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginAbsolutePath, # # Expected Example: powershell.6.0.0-beta.3 # [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginEndpointName ) $regKey = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN\Plugin\$pluginEndpointName" $pluginArchitecture = "64" if ($env:PROCESSOR_ARCHITECTURE -match "x86" -or $env:PROCESSOR_ARCHITECTURE -eq "ARM") { $pluginArchitecture = "32" } $regKeyValueFormatString = @" <PlugInConfiguration xmlns="http://schemas.microsoft.com/wbem/wsman/1/config/PluginConfiguration" Name="{0}" Filename="{1}" SDKVersion="2" XmlRenderingType="text" Enabled="True" OutputBufferingMode="Block" ProcessIdleTimeoutSec="0" Architecture="{2}" UseSharedProcess="false" RunAsUser="" RunAsPassword="" AutoRestart="false"> <InitializationParameters> <Param Name="PSVersion" Value="7.0"/> </InitializationParameters> <Resources> <Resource ResourceUri="http://schemas.microsoft.com/powershell/{0}" SupportsOptions="true" ExactMatch="true"> <Security Uri="http://schemas.microsoft.com/powershell/{0}" ExactMatch="true" Sddl="O:NSG:BAD:P(A;;GA;;;BA)S:P(AU;FA;GA;;;WD)(AU;SA;GXGW;;;WD)"/> <Capability Type="Shell"/> </Resource> </Resources> <Quotas IdleTimeoutms="7200000" MaxConcurrentUsers="5" MaxProcessesPerShell="15" MaxMemoryPerShellMB="1024" MaxShellsPerUser="25" MaxConcurrentCommandsPerShell="1000" MaxShells="25" MaxIdleTimeoutms="43200000"/> </PlugInConfiguration> "@ $valueString = $regKeyValueFormatString -f $pluginEndpointName, $pluginAbsolutePath, $pluginArchitecture New-Item $regKey -Force > $null New-ItemProperty -Path $regKey -Name ConfigXML -Value $valueString > $null } function New-PluginConfigFile { [CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")] param ( [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginFile, [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $targetPsHomeDir ) # This always overwrites the file with a new version of it if the # script is invoked multiple times. Set-Content -Path $pluginFile -Value "PSHOMEDIR=$targetPsHomeDir" -ErrorAction Stop Add-Content -Path $pluginFile -Value "CORECLRDIR=$targetPsHomeDir" -ErrorAction Stop Write-Verbose "Created Plugin Config File: $pluginFile" -Verbose } function Install-PluginEndpoint { [CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")] param ( [Parameter()] [bool] $Force, [switch] $VersionIndependent ) ###################### # # # Install the plugin # # # ###################### if (-not [String]::IsNullOrEmpty($PowerShellHome)) { $targetPsHome = $PowerShellHome $targetPsVersion = & "$targetPsHome\pwsh" -NoProfile -Command '$PSVersionTable.PSVersion.ToString()' } else { ## Get the PSHome and PSVersion using the current powershell instance $targetPsHome = $PSHOME $targetPsVersion = $PSVersionTable.PSVersion.ToString() } Write-Verbose "PowerShellHome: $targetPsHome" -Verbose # For default, not tied to the specific version endpoint, we apply # only first number in the PSVersion string to the endpoint name. # Example name: 'PowerShell.6'. if ($VersionIndependent) { $dotPos = $targetPsVersion.IndexOf(".") if ($dotPos -ne -1) { $targetPsVersion = $targetPsVersion.Substring(0, $dotPos) } } Write-Verbose "Using PowerShell Version: $targetPsVersion" -Verbose $pluginEndpointName = "PowerShell.$targetPsVersion" $endPoint = Get-PSSessionConfiguration $pluginEndpointName -Force:$Force -ErrorAction silentlycontinue 2>&1 # If endpoint exists and -Force parameter was not used, the endpoint would not be overwritten. if ($endpoint -and !$Force) { Write-Error -Category ResourceExists -ErrorId "PSSessionConfigurationExists" -Message "Endpoint $pluginEndpointName already exists." return } if (!$PSCmdlet.ShouldProcess($pluginEndpointName)) { return } if ($PSVersionTable.PSVersion -lt "6.0") { # This script is primarily used from Windows PowerShell for Win10 IoT and NanoServer to setup PSCore6 remoting endpoint # so it's ok to hardcode to 'C:\Windows' for those systems $pluginBasePath = Join-Path "C:\Windows\System32\PowerShell" $targetPsVersion } else { $pluginBasePath = Join-Path ([System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::Windows) + "\System32\PowerShell") $targetPsVersion } $resolvedPluginAbsolutePath = "" if (! (Test-Path $pluginBasePath)) { Write-Verbose "Creating $pluginBasePath" $resolvedPluginAbsolutePath = New-Item -Type Directory -Path $pluginBasePath } else { $resolvedPluginAbsolutePath = Resolve-Path $pluginBasePath } $pluginPath = Join-Path $resolvedPluginAbsolutePath "pwrshplugin.dll" # This is forced to ensure the file is placed correctly Copy-Item $targetPsHome\pwrshplugin.dll $resolvedPluginAbsolutePath -Force -Verbose -ErrorAction Stop $pluginFile = Join-Path $resolvedPluginAbsolutePath "RemotePowerShellConfig.txt" New-PluginConfigFile $pluginFile (Resolve-Path $targetPsHome) # Register the plugin Register-WinRmPlugin $pluginPath $pluginEndpointName #################################################################### # # # Validations to confirm that everything was registered correctly. # # # #################################################################### if (! (Test-Path $pluginFile)) { throw "WinRM Plugin configuration file not created. Expected = $pluginFile" } if (! (Test-Path $resolvedPluginAbsolutePath\pwrshplugin.dll)) { throw "WinRM Plugin DLL missing. Expected = $resolvedPluginAbsolutePath\pwrshplugin.dll" } try { Write-Host "`nGet-PSSessionConfiguration $pluginEndpointName" -ForegroundColor "green" Get-PSSessionConfiguration $pluginEndpointName -ErrorAction Stop } catch [Microsoft.PowerShell.Commands.WriteErrorException] { throw "No remoting session configuration matches the name $pluginEndpointName." } } Install-PluginEndpoint -Force $Force Install-PluginEndpoint -Force $Force -VersionIndependent Write-Host "Restarting WinRM to ensure that the plugin configuration change takes effect.`nThis is required for WinRM running on Windows SKUs prior to Windows 10." -ForegroundColor Magenta Restart-Service winrm # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAmMBO/z6uvMDNL # ywsEntW1l8ui09V7mB9QxyD4sH3/L6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIASzAbkapgzkIHyjEtglU6vA # HP0o6aqvz8pdcZCJCVXCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUojy/6UU4L3Vrn/dK+XJByO4hTJOqIPTzWVdj5ai/pNX+eUNphh8Tf0a # xHN7BsJqb2Qgq8YNMrEB6Sxl61PqD1LEURtyKJYjk8b8K7Kfrhi64VAYHmi0OWjq # aJx+EfcvDB7dP5FT9PH/Z5uv4SAiByOv5z1X0YvJBNIFDmTtlvMIqQjRtrJvZO9a # 7o8iJGnxo5Vndllw9S+ZIIMkncs4UQAr0wui06M6LlRp91xmUwEPd/xe5uorliBv # A6ztNcGc/IiBjoT1hmppbilf4cNI3Wvg/Q8lc91kVRl0l0eqMMmn2jFxXe9NgALo # Fbvo8me3db60yjPg0t51gWVQnq2naKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA665q8c4j/x8zJ68EYw6yuGbLJV5LA3xdRxe9zMCIbFAIGZfLiXpIL # GBMyMDI0MDQwOTIzMzYzNS43NjNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cBM/jAiGA8yMDI0MDQwOTIzMjU1 # MFoYDzIwMjQwNDEwMjMyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpwEz+ # AgEAMAcCAQACAgUFMAcCAQACAhLlMAoCBQDpwZ5+AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFSDY14N3Mh+ee3rMt8yNKIob7etD06huplZvq9MQcEm9sd2 # IwCVb2OAM0npW+vDqfe2iRy5dUq/4ubbql82Rsb48/DunMxczqLklNH7RzTv+itS # E787LO58JXJmQ55onV/q6qlk3cmoxwvJM9weNSwzT0JA30FMjuz2fwPPTcAowDEK # Y+ndrxZ5tIA8d75m4Mqr2P1GL6A+U33dPs/iYGT/SjWZelVM+RlKDVxnIle4Y+bT # az5p8+5LbYuAhe6XZg0bxAaSzq21Q027WKSRELU52LJl0ooypH0xvCSMMiMoz/YG # S3VRrb/UZX9Eo5N00QfzwfFDuXKnofC7gDRCZ3gxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCA9uEmBvEFv7G6AploStR3XcZJkkr/c9OlU+qq+NHsC1zCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ # IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgaFrF5LHEGY4yi4AlSQ/fTO1cM36c # /ejauRhx8H1amdswDQYJKoZIhvcNAQELBQAEggIAq5PCbMbV2oE9WoPprG/dMAPp # FXJ8PZ84Qdbg8YrW4yJ2NPnTCWzDJl+i2Pfrk+AcERZmwn4YDKoCw1vwHxy8Nqxi # N1Uw+9ehicYBwhr1R90U9whOLJEozRfw3LTppf+zHVSpKPIOwnXLuT7Br1J9sxoR # wB4E8lCr0k9dlHea1NR+0eLfbZQkGijzUhXgPnLQkTkDk7VOi6rlQ3RntOyj+DyW # wrSk6WaK9tHJCAEhHfVZwfPRQtLBgxgc4ixgPtVWCt3jEUTGYzU4VRCa0+2KKFUF # grtW8hlBVvG+RGXi9IG/40geG0ojpSAMleG0zSA5XoDrVNLRwHKmP3JIAr+/ayTB # X/+umzn2kQBsWTVkaxo9UyQlTdVkOhY6pbGs4Ex92CiAgRcLSPix1MWGIIoaJ6JL # nEgwBGza+ajw+pKIK0bT1bVfou9lCYkJ7okgYve+PP+RacpGPkSlKG7GqnPJLnCc # Gkx3Jes3BVYbb3NegRuFEEi8OBG98Zfrj1TKDQU863VmCWoeynvdsL9U9GUgh21B # ACRPc60XQj6rH/sr0pCD0kYseTCk3m0l9NrmdQAJXA+wQzg6ehbgwbgyHt22+MtX # dsVYUm42bl0z/43zU3kCNs5h1dc8sdgiVyzDcMc/jETS5UjfgnugZ6Hqjvi+BTa7 # 9SIzOTp0lRAWwK8JZZ0= # SIG # End signature block
combined_dataset/train/non-malicious/94.ps1
94.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Test-JSON(){ param ( $JSON ) try { $TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop $validJson = $true } catch { $validJson = $false $_.Exception } if (!$validJson){ Write-Host "Provided JSON isn't in valid JSON format" -f Red break } } Function Add-RBACRole(){ [cmdletbinding()] param ( $JSON ) $graphApiVersion = "Beta" $Resource = "deviceManagement/roleDefinitions" try { if(!$JSON){ write-host "No JSON was passed to the function, provide a JSON variable" -f Red break } Test-JSON -JSON $JSON $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $Json -ContentType "application/json" } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $JSON = @" { "@odata.type": " "displayName": "Graph RBAC Role", "description": "New RBAC Role Description", "permissions": [ { "actions": [ "Microsoft.Intune/MobileApps/Read", "Microsoft.Intune/TermsAndConditions/Read", "Microsoft.Intune/ManagedApps/Read", "Microsoft.Intune/ManagedDevices/Read", "Microsoft.Intune/DeviceConfigurations/Read", "Microsoft.Intune/TelecomExpenses/Read", "Microsoft.Intune/Organization/Read", "Microsoft.Intune/RemoteTasks/RebootNow", "Microsoft.Intune/RemoteTasks/RemoteLock" ] } ], "isBuiltInRoleDefinition": false } "@ Add-RBACRole -JSON $JSON
combined_dataset/train/non-malicious/sample_49_86.ps1
sample_49_86.ps1
# # Module manifest for module 'OCI.PSModules.Database' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Database.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e1b520e7-13c2-41a0-be48-3eacc401dff5' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Database Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Database.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabaseStorageCapacityCloudExadataInfrastructure', 'Add-OCIDatabaseStorageCapacityExadataInfrastructure', 'Add-OCIDatabaseVirtualMachineToCloudVmCluster', 'Add-OCIDatabaseVirtualMachineToVmCluster', 'Complete-OCIDatabaseExternalBackupJob', 'Confirm-OCIDatabaseVmClusterNetwork', 'Disable-OCIDatabaseAutonomousDatabaseManagement', 'Disable-OCIDatabaseAutonomousDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalContainerDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalContainerDatabaseStackMonitoring', 'Disable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring', 'Disable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalPluggableDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalPluggableDatabaseStackMonitoring', 'Disable-OCIDatabaseManagement', 'Disable-OCIDatabasePluggableDatabaseManagement', 'Edit-OCIDatabaseManagement', 'Edit-OCIDatabasePluggableDatabaseManagement', 'Enable-OCIDatabaseAutonomousDatabaseManagement', 'Enable-OCIDatabaseAutonomousDatabaseOperationsInsights', 'Enable-OCIDatabaseExadataInfrastructure', 'Enable-OCIDatabaseExternalContainerDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalContainerDatabaseStackMonitoring', 'Enable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights', 'Enable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring', 'Enable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalPluggableDatabaseOperationsInsights', 'Enable-OCIDatabaseExternalPluggableDatabaseStackMonitoring', 'Enable-OCIDatabaseManagement', 'Enable-OCIDatabasePluggableDatabaseManagement', 'Get-OCIDatabase', 'Get-OCIDatabaseApplicationVip', 'Get-OCIDatabaseApplicationVipsList', 'Get-OCIDatabaseAutonomousContainerDatabase', 'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociationsList', 'Get-OCIDatabaseAutonomousContainerDatabaseResourceUsage', 'Get-OCIDatabaseAutonomousContainerDatabasesList', 'Get-OCIDatabaseAutonomousContainerDatabaseVersionsList', 'Get-OCIDatabaseAutonomousDatabase', 'Get-OCIDatabaseAutonomousDatabaseBackup', 'Get-OCIDatabaseAutonomousDatabaseBackupsList', 'Get-OCIDatabaseAutonomousDatabaseCharacterSetsList', 'Get-OCIDatabaseAutonomousDatabaseClonesList', 'Get-OCIDatabaseAutonomousDatabaseDataguardAssociation', 'Get-OCIDatabaseAutonomousDatabaseDataguardAssociationsList', 'Get-OCIDatabaseAutonomousDatabaseRefreshableClonesList', 'Get-OCIDatabaseAutonomousDatabaseRegionalWallet', 'Get-OCIDatabaseAutonomousDatabasesList', 'Get-OCIDatabaseAutonomousDatabaseWallet', 'Get-OCIDatabaseAutonomousDbPreviewVersionsList', 'Get-OCIDatabaseAutonomousDbVersionsList', 'Get-OCIDatabaseAutonomousExadataInfrastructure', 'Get-OCIDatabaseAutonomousExadataInfrastructureShapesList', 'Get-OCIDatabaseAutonomousExadataInfrastructuresList', 'Get-OCIDatabaseAutonomousPatch', 'Get-OCIDatabaseAutonomousVirtualMachine', 'Get-OCIDatabaseAutonomousVirtualMachinesList', 'Get-OCIDatabaseAutonomousVmCluster', 'Get-OCIDatabaseAutonomousVmClusterAcdResourceUsageList', 'Get-OCIDatabaseAutonomousVmClusterResourceUsage', 'Get-OCIDatabaseAutonomousVmClustersList', 'Get-OCIDatabaseBackup', 'Get-OCIDatabaseBackupDestination', 'Get-OCIDatabaseBackupDestinationList', 'Get-OCIDatabaseBackupsList', 'Get-OCIDatabaseCloudAutonomousVmCluster', 'Get-OCIDatabaseCloudAutonomousVmClusterAcdResourceUsageList', 'Get-OCIDatabaseCloudAutonomousVmClusterResourceUsage', 'Get-OCIDatabaseCloudAutonomousVmClustersList', 'Get-OCIDatabaseCloudExadataInfrastructure', 'Get-OCIDatabaseCloudExadataInfrastructuresList', 'Get-OCIDatabaseCloudExadataInfrastructureUnallocatedResources', 'Get-OCIDatabaseCloudVmCluster', 'Get-OCIDatabaseCloudVmClusterIormConfig', 'Get-OCIDatabaseCloudVmClustersList', 'Get-OCIDatabaseCloudVmClusterUpdate', 'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntriesList', 'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntry', 'Get-OCIDatabaseCloudVmClusterUpdatesList', 'Get-OCIDatabaseConsoleConnection', 'Get-OCIDatabaseConsoleConnectionsList', 'Get-OCIDatabaseConsoleHistoriesList', 'Get-OCIDatabaseConsoleHistory', 'Get-OCIDatabaseConsoleHistoryContent', 'Get-OCIDatabaseContainerDatabasePatchesList', 'Get-OCIDatabaseDataGuardAssociation', 'Get-OCIDatabaseDataGuardAssociationsList', 'Get-OCIDatabaseDbHome', 'Get-OCIDatabaseDbHomePatch', 'Get-OCIDatabaseDbHomePatchesList', 'Get-OCIDatabaseDbHomePatchHistoryEntriesList', 'Get-OCIDatabaseDbHomePatchHistoryEntry', 'Get-OCIDatabaseDbHomesList', 'Get-OCIDatabaseDbNode', 'Get-OCIDatabaseDbNodesList', 'Get-OCIDatabaseDbServer', 'Get-OCIDatabaseDbServersList', 'Get-OCIDatabaseDbSystem', 'Get-OCIDatabaseDbSystemComputePerformancesList', 'Get-OCIDatabaseDbSystemPatch', 'Get-OCIDatabaseDbSystemPatchesList', 'Get-OCIDatabaseDbSystemPatchHistoryEntriesList', 'Get-OCIDatabaseDbSystemPatchHistoryEntry', 'Get-OCIDatabaseDbSystemShapesList', 'Get-OCIDatabaseDbSystemsList', 'Get-OCIDatabaseDbSystemStoragePerformancesList', 'Get-OCIDatabaseDbSystemUpgradeHistoryEntriesList', 'Get-OCIDatabaseDbSystemUpgradeHistoryEntry', 'Get-OCIDatabaseDbVersionsList', 'Get-OCIDatabaseExadataInfrastructure', 'Get-OCIDatabaseExadataInfrastructureOcpus', 'Get-OCIDatabaseExadataInfrastructuresList', 'Get-OCIDatabaseExadataInfrastructureUnAllocatedResources', 'Get-OCIDatabaseExadataIormConfig', 'Get-OCIDatabaseExternalBackupJob', 'Get-OCIDatabaseExternalContainerDatabase', 'Get-OCIDatabaseExternalContainerDatabasesList', 'Get-OCIDatabaseExternalDatabaseConnector', 'Get-OCIDatabaseExternalDatabaseConnectorsList', 'Get-OCIDatabaseExternalNonContainerDatabase', 'Get-OCIDatabaseExternalNonContainerDatabasesList', 'Get-OCIDatabaseExternalPluggableDatabase', 'Get-OCIDatabaseExternalPluggableDatabasesList', 'Get-OCIDatabaseFlexComponentsList', 'Get-OCIDatabaseGiVersionsList', 'Get-OCIDatabaseInfrastructureTargetVersions', 'Get-OCIDatabaseKeyStore', 'Get-OCIDatabaseKeyStoresList', 'Get-OCIDatabaseMaintenanceRun', 'Get-OCIDatabaseMaintenanceRunHistory', 'Get-OCIDatabaseMaintenanceRunHistoryList', 'Get-OCIDatabaseMaintenanceRunsList', 'Get-OCIDatabaseOneoffPatch', 'Get-OCIDatabaseOneoffPatchesList', 'Get-OCIDatabasePdbConversionHistoryEntriesList', 'Get-OCIDatabasePdbConversionHistoryEntry', 'Get-OCIDatabasePluggableDatabase', 'Get-OCIDatabasePluggableDatabasesList', 'Get-OCIDatabasesList', 'Get-OCIDatabaseSoftwareImage', 'Get-OCIDatabaseSoftwareImagesList', 'Get-OCIDatabaseSystemVersionsList', 'Get-OCIDatabaseUpgradeHistoryEntriesList', 'Get-OCIDatabaseUpgradeHistoryEntry', 'Get-OCIDatabaseVmCluster', 'Get-OCIDatabaseVmClusterNetwork', 'Get-OCIDatabaseVmClusterNetworksList', 'Get-OCIDatabaseVmClusterPatch', 'Get-OCIDatabaseVmClusterPatchesList', 'Get-OCIDatabaseVmClusterPatchHistoryEntriesList', 'Get-OCIDatabaseVmClusterPatchHistoryEntry', 'Get-OCIDatabaseVmClustersList', 'Get-OCIDatabaseVmClusterUpdate', 'Get-OCIDatabaseVmClusterUpdateHistoryEntriesList', 'Get-OCIDatabaseVmClusterUpdateHistoryEntry', 'Get-OCIDatabaseVmClusterUpdatesList', 'Invoke-OCIDatabaseAutonomousDatabaseManualRefresh', 'Invoke-OCIDatabaseCheckExternalDatabaseConnectorConnectionStatus', 'Invoke-OCIDatabaseConfigureAutonomousDatabaseVaultKey', 'Invoke-OCIDatabaseConfigureSaasAdminUser', 'Invoke-OCIDatabaseConvertToPdb', 'Invoke-OCIDatabaseConvertToRegularPluggableDatabase', 'Invoke-OCIDatabaseDbNodeAction', 'Invoke-OCIDatabaseDownloadExadataInfrastructureConfigFile', 'Invoke-OCIDatabaseDownloadOneoffPatch', 'Invoke-OCIDatabaseDownloadValidationReport', 'Invoke-OCIDatabaseDownloadVmClusterNetworkConfigFile', 'Invoke-OCIDatabaseFailoverAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseFailOverAutonomousDatabase', 'Invoke-OCIDatabaseFailoverDataGuardAssociation', 'Invoke-OCIDatabaseLaunchAutonomousExadataInfrastructure', 'Invoke-OCIDatabaseLocalClonePluggableDatabase', 'Invoke-OCIDatabaseMigrateExadataDbSystemResourceModel', 'Invoke-OCIDatabaseMigrateVaultKey', 'Invoke-OCIDatabaseRefreshPluggableDatabase', 'Invoke-OCIDatabaseReinstateAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseReinstateDataGuardAssociation', 'Invoke-OCIDatabaseRemoteClonePluggableDatabase', 'Invoke-OCIDatabaseResizeVmClusterNetwork', 'Invoke-OCIDatabaseResourcePoolShapes', 'Invoke-OCIDatabaseRotateAutonomousContainerDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateAutonomousDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateAutonomousVmClusterOrdsCerts', 'Invoke-OCIDatabaseRotateAutonomousVmClusterSslCerts', 'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterOrdsCerts', 'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterSslCerts', 'Invoke-OCIDatabaseRotateOrdsCerts', 'Invoke-OCIDatabaseRotatePluggableDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateSslCerts', 'Invoke-OCIDatabaseRotateVaultKey', 'Invoke-OCIDatabaseSaasAdminUserStatus', 'Invoke-OCIDatabaseScanExternalContainerDatabasePluggableDatabases', 'Invoke-OCIDatabaseShrinkAutonomousDatabase', 'Invoke-OCIDatabaseSwitchoverAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseSwitchoverAutonomousDatabase', 'Invoke-OCIDatabaseSwitchoverDataGuardAssociation', 'Invoke-OCIDatabaseTerminateAutonomousContainerDatabase', 'Invoke-OCIDatabaseTerminateAutonomousExadataInfrastructure', 'Invoke-OCIDatabaseTerminateDbSystem', 'Invoke-OCIDatabaseUpgradeDatabase', 'Invoke-OCIDatabaseUpgradeDbSystem', 'Move-OCIDatabaseAutonomousContainerDatabaseCompartment', 'Move-OCIDatabaseAutonomousDatabaseCompartment', 'Move-OCIDatabaseAutonomousExadataInfrastructureCompartment', 'Move-OCIDatabaseAutonomousVmClusterCompartment', 'Move-OCIDatabaseBackupDestinationCompartment', 'Move-OCIDatabaseCloudAutonomousVmClusterCompartment', 'Move-OCIDatabaseCloudExadataInfrastructureCompartment', 'Move-OCIDatabaseCloudVmClusterCompartment', 'Move-OCIDatabaseDataguardRole', 'Move-OCIDatabaseDbSystemCompartment', 'Move-OCIDatabaseDisasterRecoveryConfiguration', 'Move-OCIDatabaseExadataInfrastructureCompartment', 'Move-OCIDatabaseExternalContainerDatabaseCompartment', 'Move-OCIDatabaseExternalNonContainerDatabaseCompartment', 'Move-OCIDatabaseExternalPluggableDatabaseCompartment', 'Move-OCIDatabaseKeyStoreCompartment', 'Move-OCIDatabaseKeyStoreType', 'Move-OCIDatabaseOneoffPatchCompartment', 'Move-OCIDatabaseSoftwareImageCompartment', 'Move-OCIDatabaseVmClusterCompartment', 'New-OCIDatabase', 'New-OCIDatabaseApplicationVip', 'New-OCIDatabaseAutonomousContainerDatabase', 'New-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'New-OCIDatabaseAutonomousDatabase', 'New-OCIDatabaseAutonomousDatabaseBackup', 'New-OCIDatabaseAutonomousDatabaseWallet', 'New-OCIDatabaseAutonomousVmCluster', 'New-OCIDatabaseBackup', 'New-OCIDatabaseBackupDestination', 'New-OCIDatabaseCloudAutonomousVmCluster', 'New-OCIDatabaseCloudExadataInfrastructure', 'New-OCIDatabaseCloudVmCluster', 'New-OCIDatabaseConsoleConnection', 'New-OCIDatabaseConsoleHistory', 'New-OCIDatabaseDataGuardAssociation', 'New-OCIDatabaseDbHome', 'New-OCIDatabaseDbSystem', 'New-OCIDatabaseExadataInfrastructure', 'New-OCIDatabaseExternalBackupJob', 'New-OCIDatabaseExternalContainerDatabase', 'New-OCIDatabaseExternalDatabaseConnector', 'New-OCIDatabaseExternalNonContainerDatabase', 'New-OCIDatabaseExternalPluggableDatabase', 'New-OCIDatabaseKeyStore', 'New-OCIDatabaseMaintenanceRun', 'New-OCIDatabaseOneoffPatch', 'New-OCIDatabasePluggableDatabase', 'New-OCIDatabaseRecommendedVmClusterNetwork', 'New-OCIDatabaseSoftwareImage', 'New-OCIDatabaseVmCluster', 'New-OCIDatabaseVmClusterNetwork', 'Register-OCIDatabaseAutonomousDatabaseDataSafe', 'Remove-OCIDatabase', 'Remove-OCIDatabaseApplicationVip', 'Remove-OCIDatabaseAutonomousDatabase', 'Remove-OCIDatabaseAutonomousDatabaseBackup', 'Remove-OCIDatabaseAutonomousVmCluster', 'Remove-OCIDatabaseBackup', 'Remove-OCIDatabaseBackupDestination', 'Remove-OCIDatabaseCloudAutonomousVmCluster', 'Remove-OCIDatabaseCloudExadataInfrastructure', 'Remove-OCIDatabaseCloudVmCluster', 'Remove-OCIDatabaseConsoleConnection', 'Remove-OCIDatabaseConsoleHistory', 'Remove-OCIDatabaseDbHome', 'Remove-OCIDatabaseExadataInfrastructure', 'Remove-OCIDatabaseExternalContainerDatabase', 'Remove-OCIDatabaseExternalDatabaseConnector', 'Remove-OCIDatabaseExternalNonContainerDatabase', 'Remove-OCIDatabaseExternalPluggableDatabase', 'Remove-OCIDatabaseKeyStore', 'Remove-OCIDatabaseOneoffPatch', 'Remove-OCIDatabasePluggableDatabase', 'Remove-OCIDatabaseSoftwareImage', 'Remove-OCIDatabaseVirtualMachineFromCloudVmCluster', 'Remove-OCIDatabaseVirtualMachineFromVmCluster', 'Remove-OCIDatabaseVmCluster', 'Remove-OCIDatabaseVmClusterNetwork', 'Restart-OCIDatabaseAutonomousContainerDatabase', 'Restart-OCIDatabaseAutonomousDatabase', 'Restore-OCIDatabase', 'Restore-OCIDatabaseAutonomousDatabase', 'Start-OCIDatabaseAutonomousDatabase', 'Start-OCIDatabasePluggableDatabase', 'Stop-OCIDatabaseAutonomousDatabase', 'Stop-OCIDatabaseBackup', 'Stop-OCIDatabasePluggableDatabase', 'Unregister-OCIDatabaseAutonomousDatabaseDataSafe', 'Update-OCIDatabase', 'Update-OCIDatabaseAutonomousContainerDatabase', 'Update-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'Update-OCIDatabaseAutonomousDatabase', 'Update-OCIDatabaseAutonomousDatabaseBackup', 'Update-OCIDatabaseAutonomousDatabaseRegionalWallet', 'Update-OCIDatabaseAutonomousDatabaseWallet', 'Update-OCIDatabaseAutonomousExadataInfrastructure', 'Update-OCIDatabaseAutonomousVmCluster', 'Update-OCIDatabaseBackupDestination', 'Update-OCIDatabaseCloudAutonomousVmCluster', 'Update-OCIDatabaseCloudExadataInfrastructure', 'Update-OCIDatabaseCloudVmCluster', 'Update-OCIDatabaseCloudVmClusterIormConfig', 'Update-OCIDatabaseConsoleConnection', 'Update-OCIDatabaseConsoleHistory', 'Update-OCIDatabaseDataGuardAssociation', 'Update-OCIDatabaseDbHome', 'Update-OCIDatabaseDbNode', 'Update-OCIDatabaseDbSystem', 'Update-OCIDatabaseExadataInfrastructure', 'Update-OCIDatabaseExadataIormConfig', 'Update-OCIDatabaseExternalContainerDatabase', 'Update-OCIDatabaseExternalDatabaseConnector', 'Update-OCIDatabaseExternalNonContainerDatabase', 'Update-OCIDatabaseExternalPluggableDatabase', 'Update-OCIDatabaseKeyStore', 'Update-OCIDatabaseMaintenanceRun', 'Update-OCIDatabaseOneoffPatch', 'Update-OCIDatabasePluggableDatabase', 'Update-OCIDatabaseSoftwareImage', 'Update-OCIDatabaseVmCluster', 'Update-OCIDatabaseVmClusterNetwork' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Database' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Find files not containig.ps1
Find files not containig.ps1
# Find all files which does not contains the text in $Pattern function ssHasNot( [string] $Path="*.txt" ,[string] $pattern="" ) { $has=[string]@(get-childitem $path | ss $pattern | foreach {$_.Path}) get-childitem $path| where {$has.Contains($_.FullName) -eq $false} }
combined_dataset/train/non-malicious/Simplest animation.ps1
Simplest animation.ps1
[int]$x = 0 [int]$y = 0 [int]$cX = 200 [int]$cY = 200 [int]$rad = 100 [int]$grad = 0 [float]$kfc = 0.5 $tabPag1_OnPaint= { $tmrTim2.Enabled = $false $g = $tabPag1.CreateGraphics() $pen = New-Object Drawing.Pen([Drawing.Brushes]::Red) $g.DrawRectangle($pen, [Convert]::ToInt32($cX - 100), [Convert]::ToInt32($cY - 100), $cX, $cY) $g.FillEllipse([Drawing.Brushes]::Red, [Convert]::ToInt32($cX + $x - 10), ` [Convert]::ToInt32($cY + $y - 10), 20, 20) $g.Dispose() $tmrTim1.Enabled = $true } $tmrTim1_OnTick= { $grad += 5 if ($gard -gt 360) { $grad -= 360 } $x = $rad * [Math]::Cos($grad * [Math]::PI / 180) $y = $kfc * $rad * [Math]::Sin($grad * [Math]::PI / 180) $tabPag1.Invalidate() } $tabPag2_OnPaint= { $tmrTim1.Enabled = $false $g = $tabPag2.CreateGraphics() $brush = New-Object Drawing.SolidBrush Blue $font = New-Object Drawing.Font("Tahoma", (12 + $val), 1) $msg = "Hello from GDI+!" [float]$center = $tabPag2.DisplayRectangle.Width / 2 $size = $g.MeasureString($msg, $font) [float]$swlpos = $center - ($size.Width / 2) $g.DrawString($msg, $font, $brush, $swlpos, 10) $tmrTim2.Enabled = $true } $tmrTim2_OnTick= { $val += 5 if ($val -ge 50) { $val = $null } $tabPag2.Invalidate() } function ShowMainWindow { [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Drawing") [Windows.Forms.Application]::EnableVisualStyles() $frmMain = New-Object Windows.Forms.Form $tabTabs = New-Object Windows.Forms.TabControl $tabPag1 = New-Object Windows.Forms.TabPage $tabPag2 = New-Object Windows.Forms.TabPage $tmrTim1 = New-Object Windows.Forms.Timer $tmrTim2 = New-Object Windows.Forms.Timer #tabTabs $tabTabs.Controls.AddRange(@($tabPag1, $tabPag2)) $tabTabs.Dock = "Fill" #tabPag1 $tabPag1.Text = "Orbital moving" $tabPag1.UseVisualStyleBackColor = $true $tabPag1.Add_Paint($tabPag1_OnPaint) #tabPag2 $tabPag2.Text = "Swelling font" $tabPag2.UseVisualStyleBackColor = $true $tabPag2.Add_Paint($tabPag2_OnPaint) #tmrTim1 $tmrTim1.Interval = 100 $tmrTim1.Add_Tick($tmrTim1_OnTick) #tmrTim2 $tmrTim2.Interval = 100 $tmrTim2.Add_Tick($tmrTim2_OnTick) #frmMain $frmMain.ClientSize = New-Object Drawing.Size(410, 430) $frmMain.Controls.AddRange(@($tabTabs)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.MaximizeBox = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "Animation" [void]$frmMain.ShowDialog() } ShowMainWindow
combined_dataset/train/non-malicious/sample_37_22.ps1
sample_37_22.ps1
# # Module manifest for module 'OCI.PSModules.Globallydistributeddatabase' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Globallydistributeddatabase.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '31a94d9b-5cc3-4808-88f0-6b82ed090ffe' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Globallydistributeddatabase Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Globallydistributeddatabase.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIGloballydistributeddatabaseNetwork', 'Get-OCIGloballydistributeddatabasePrivateEndpoint', 'Get-OCIGloballydistributeddatabasePrivateEndpointsList', 'Get-OCIGloballydistributeddatabaseShardedDatabase', 'Get-OCIGloballydistributeddatabaseShardedDatabasesList', 'Get-OCIGloballydistributeddatabaseWorkRequest', 'Get-OCIGloballydistributeddatabaseWorkRequestErrorsList', 'Get-OCIGloballydistributeddatabaseWorkRequestLogsList', 'Get-OCIGloballydistributeddatabaseWorkRequestsList', 'Invoke-OCIGloballydistributeddatabaseConfigureShardedDatabaseGsms', 'Invoke-OCIGloballydistributeddatabaseConfigureSharding', 'Invoke-OCIGloballydistributeddatabaseDownloadGsmCertificateSigningRequest', 'Invoke-OCIGloballydistributeddatabaseFetchConnectionString', 'Invoke-OCIGloballydistributeddatabaseFetchShardableCloudAutonomousVmClusters', 'Invoke-OCIGloballydistributeddatabasePatchShardedDatabase', 'Invoke-OCIGloballydistributeddatabasePrevalidateShardedDatabase', 'Move-OCIGloballydistributeddatabasePrivateEndpointCompartment', 'Move-OCIGloballydistributeddatabaseShardedDatabaseCompartment', 'New-OCIGloballydistributeddatabaseGsmCertificateSigningRequest', 'New-OCIGloballydistributeddatabasePrivateEndpoint', 'New-OCIGloballydistributeddatabaseShardedDatabase', 'New-OCIGloballydistributeddatabaseWallet', 'Remove-OCIGloballydistributeddatabasePrivateEndpoint', 'Remove-OCIGloballydistributeddatabaseShardedDatabase', 'Start-OCIGloballydistributeddatabaseShardedDatabase', 'Stop-OCIGloballydistributeddatabaseShardedDatabase', 'Update-OCIGloballydistributeddatabasePrivateEndpoint', 'Update-OCIGloballydistributeddatabaseShardedDatabase', 'Write-OCIGloballydistributeddatabaseSignedCertificateAndGenerateWallet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Globallydistributeddatabase' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/format-iislog.ps1
format-iislog.ps1
param ( [Parameter( Mandatory=$true, Position = 0, ValueFromPipeline=$true, HelpMessage="Specifies the path to the IIS *.log file to import. You can also pipe a path to Import-Iss-Log." )] [ValidateNotNullOrEmpty()] [string] $Path, [Parameter( Mandatory=$true, Position = 1, ValueFromPipeline=$true, HelpMessage="Specifies the desired field names. Must be in the following format: #Fields: fname1 fname2" )] [ValidateNotNullOrEmpty()] [string] $NewPath, [Parameter( Mandatory=$true, Position = 2, ValueFromPipeline=$true, HelpMessage="Specifies the output location for the modified log file." )] [ValidateNotNullOrEmpty()] [string] $OutPath, [Parameter( Position = 3, HelpMessage="Specifies the delimiter that separates the property values in the IIS *.log file. The default is a spacebar." )] [ValidateNotNullOrEmpty()] [string] $Delimiter = " ", [Parameter(HelpMessage="The character encoding for the IIS *log file. The default is the UTF8.")] [Microsoft.PowerShell.Commands.FileSystemCmdletProviderEncoding] $Encoding = [Microsoft.PowerShell.Commands.FileSystemCmdletProviderEncoding]::UTF8 ) begin { $fieldNames = @() $newfieldnames = @() } process { #add headers to new output file (get-content $path)[0..2] | Out-File $outpath -Append -encoding Default $newpath | Out-File $outpath -Append -encoding Default #populate $newfieldnames from the mandatory parameter $newpath $newfieldNames = @($newpath.Substring("#Fields: ".Length).Split($Delimiter)); foreach($line in Get-Content -Path $Path) { # Indentify / parse the log header to determine field names if($line.StartsWith("#Fields: ")) { $fieldNames = @($line.Substring("#Fields: ".Length).Split($Delimiter)); } # Identify / parse the "non log header" lines to determine field values elseif(-not $line.StartsWith("#")) { $logline = "" $fieldValues = @($line.Split($Delimiter)); #Initialize a hashtable to hold fields and values #Default value is a hyphen #Only fields specified in the $newpath parameter are initialized $output = @{} foreach ($item in $newfieldnames) { switch($item) { "date"{ $output.add("date", "-")} "time"{ $output.add("time", "-")} "s-ip"{ $output.add("s-ip", "-")} "cs-method"{ $output.add("cs-method", "-")} "cs-uri-stem"{ $output.add("cs-uri-stem", "-")} "cs-uri-query"{ $output.add("cs-uri-query", "-")} "s-port"{ $output.add("s-port", "-")} "cs-username"{ $output.add("cs-username", "-")} "c-ip"{ $output.add("c-ip", "-")} "cs-version"{ $output.add("cs-version", "-")} "cs(User-Agent)"{ $output.add("cs(User-Agent)", "-")} "sc-status"{ $output.add("sc-status", "-")} "sc-substatus"{ $output.add("sc-substatus", "-")} "sc-win32-status"{ $output.add("sc-win32-status", "-")} "sc-bytes"{ $output.add("sc-bytes", "-")} "time-taken"{ $output.add("time-taken", "-")} "cs-host"{ $output.add("cs-host", "-")} "cs(Cookie)"{ $output.add("cs(Cookie)", "-")} "cs(Referer)"{ $output.add("cs(Referer)", "-")} "s-sitename"{ $output.add("s-sitename", "-")} "s-computername"{ $output.add("s-computername", "-")} "cs-bytes"{ $output.add("cs-bytes", "-")} } } #Add every field from old log file to the $ouptuts hashtable #Portions of the hash table which are not over written at this point retain the default value (hyphen) for($i = 0; $i -lt $fieldnames.Length; $i++) { $name = $fieldNames[$i] $value = $fieldValues[$i] switch($name) { "date"{ $output['date'] = $value} "time"{ $output['time'] = $value} "s-ip"{ $output['s-ip'] = $value} "cs-method"{ $output['cs-method'] = $value} "cs-uri-stem"{ $output['cs-uri-stem'] = $value} "cs-uri-query"{ $output['cs-uri-query'] = $value} "s-port"{ $output['s-port'] = $value} "cs-username"{ $output['cs-username'] = $value} "c-ip"{ $output['c-ip'] = $value} "cs-version"{ $output['cs-version'] = $value} "cs(User-Agent)"{ $output['cs(User-Agent)'] = $value} "sc-status"{ $output['sc-status'] = $value} "sc-substatus"{ $output['sc-substatus'] = $value} "sc-win32-status"{ $output['sc-win32-status'] = $value} "sc-bytes"{ $output['sc-bytes'] = $value} "time-taken"{ $output['time-taken'] = $value} "cs-host"{ $output['cs-host'] = $value} "cs(Cookie)"{ $output['cs(Cookie)'] = $value} "cs(Referer)"{ $output['cs(Referer)'] = $value} "s-sitename"{ $output['s-sitename'] = $value} "s-computername"{ $output['s-computername'] = $value} "cs-bytes"{ $output['cs-bytes'] = $value} } } #$output $linewriter = $null #Write lines to new log file #Only call upon keys (from output hash) which correspond to desired $newfieldnames as specified in $newpath parameter. #Unwanted fields from old log are inherently dropped #Newly included fields not present in old log are inherently replaced by hypens foreach ($item in $newfieldnames) { $linewriter += $output[$item] $linewriter += " " } $linewriter |%{$_ -replace " $",""}| Out-File $outpath -Append -encoding Default } } } # usage example #.\\import-iislog-final.ps1 "C:\\Old Logs\\u_ex120218.log" "#Fields: date time s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Referer) sc-status sc-substatus sc-win32-status sc-bytes time-taken" "C:\\Revised Logs\\u_ex120218.log" #foreach ($log in (gci "c:\\Old Logs")) {.\\import-iislog-final.ps1 $log.fullname "#Fields: date time s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Referer) sc-status sc-substatus sc-win32-status sc-bytes time-taken" "C:\\Revised Logs\\$log"}
combined_dataset/train/non-malicious/Get- ExchangeMBStore.ps1
Get- ExchangeMBStore.ps1
Param ( [Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$true)] [alias("Name","ComputerName")]$Computer=@("xcserver01") ) process{ $XCinfo = GetXCDatabases $Computer $XCMaintInfo = GetMBStoreMaintenance $Computer foreach ($DB in $XCinfo){ try{ $DB.WhiteSpace = $XCMaintInfo[$DB.MB].WhiteSpace $DB.RetainedMailbox = $XCMaintInfo[$DB.MB].RetainedMailbox $DB.RetainedMailboxSize = $XCMaintInfo[$DB.MB].RetainedMailboxSize $DB.DeletedMailbox = $XCMaintInfo[$DB.MB].DeletedMailbox $DB.DeletedMailboxSize = $XCMaintInfo[$DB.MB].DeletedMailboxSize $DB.DeletedItems = $XCMaintInfo[$DB.MB].DeletedItems $DB.DeletedItemsSize = $XCMaintInfo[$DB.MB].DeletedItemsSize } catch{ Write-Error $("For " + $Computer + ": " + $($error[0])) } } $Global:XCserverInfo += $XCinfo | select Server, StorageGroup, DatabaseName, Path, FileSize, DeletedMailbox, DeletedMailboxSize, RetainedMailbox, RetainedMailboxSize, DeletedItems, DeletedItemsSize } begin{ $Global:XCserverInfo = @() $Quote = [char]34 Function GetADSIObject ($Name){ write-verbose "get ADSI information for $Name" $root = [ADSI]'LDAP://RootDSE' $cfConfigRootpath = "LDAP://" + $root.ConfigurationNamingContext.tostring() $configRoot = [ADSI]$cfConfigRootpath $searcher = new-object System.DirectoryServices.DirectorySearcher($configRoot) $searcher.Filter = '(&(objectCategory=msExchExchangeServer)(cn=' + $Name + '))' $searchres = $searcher.FindOne() $snServerEntry = New-Object System.DirectoryServices.directoryentry $snServerEntry = $searchres.GetDirectoryEntry() $adsiServer = [ADSI]('LDAP://' + $snServerEntry.DistinguishedName) return $adsiserver } Function GetXCDatabases($XCservername){ $XCDatabases = @() $XCserver = GetADSIObject $XCservername write-verbose "get XC DB information for $($XCserver.Name)" $dfsearcher = new-object System.DirectoryServices.DirectorySearcher($XCserver) #get all standard mailstores $dfsearcher.Filter = "(objectCategory=msExchPrivateMDB)" $srSearchResults = $dfsearcher.FindAll() #get all public folder stores $dfsearcher.Filter = "(objectCategory=msExchPublicMDB)" $srSearchResults += $dfsearcher.FindAll() foreach ($srSearchResult in $srSearchResults){ $msMailStore = $srSearchResult.GetDirectoryEntry() $msMailStoreFileName = $msMailStore.msExchEDBFile $Filter = $msMailStoreFileName -replace '\\\\','\\\\' write-verbose "getting details for $Filter thru WMI" $msMailStoreFile = (Gwmi -computername $XCservername -class CIM_DataFile -filter "Name = '$Filter'") $sgStorageGroup = $msMailStore.psbase.Parent #skip recovery databases if ($sgStorageGroup.msExchESEParamBaseName -ne "R00"){ $XCdatabase = New-Object PSObject -Property @{ Server = [string] $XCservername StorageGroup = [string] $sgStorageGroup.Name DataBaseName = [string] $msMailStore.Name MB = "$($sgStorageGroup.Name)\\$($msMailStore.Name)" Path = [string] $msMailStoreFileName FileSize = "$([math]::round($msMailStoreFile.FileSize/1048576,0)) MB" WhiteSpace = "" RetainedMailbox = "" RetainedMailboxSize = "" DeletedMailbox = "" DeletedMailboxSize = "" DeletedItems = "" DeletedItemsSize = "" } } write-verbose "retrieved information for $($XCdatabase.MB)" $XCDatabases += $XCdatabase } return $XCdatabases | sort MB } Function GetMBStoreMaintenance ($Computername){ $MBMaintInfo = @{} $WmidtQueryDT = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime([DateTime]::UtcNow.AddDays(-1)) $Filter = "Logfile='Application' and SourceName = 'MSExchangeIS Mailbox Store' and TimeWritten >='" + $WmidtQueryDT + "'" $Events = (Get-WmiObject -Computername $ComputerName -class Win32_NTLogEvent -Filter $Filter | sort $_.TimeWritten -Descending) foreach ($Event in $Events){ write-verbose "getting details of Event $($Event.Eventcode)" switch ($Event.Eventcode){ '1207'{ #Cleanup Item Recovery $itemsremovedStart = $Event.Insertionstrings[0] $itemsremovedSizeStart = $Event.Insertionstrings[1] $itemsremovedEnd = $Event.Insertionstrings[2] $itemsremovedSizeEnd = $Event.Insertionstrings[3] $MB = $Event.Insertionstrings[4] write-verbose "For: $MB Item Cleanup details" write-verbose "Begin: $itemsremovedStart items with a total size of $itemsremovedStartSize KB" write-verbose "End: $itemsremovedEnd items with a total size of $itemsremovedEndSize KB" if (-not $MBMaintInfo.ContainsKey($MB)){ $MBMaintInfo.add($MB,@{}) $MBMaintInfo.$MB.Name = $MB } if (-not $MBMaintInfo.$MB.ContainsKey("DeletedItems")){$MBMaintInfo.$MB.Add("DeletedItems",$itemsremovedEnd)} if (-not $MBMaintInfo.$MB.ContainsKey("DeletedItemsSize")){$MBMaintInfo.$MB.Add("DeletedItemsSize","$itemsremovedSizeEnd KB")} } '1221'{ #Online Defrag Whitespace $WhiteSpace = $Event.Insertionstrings[0] $MB = $Event.Insertionstrings[1] write-verbose "For: $MB Online Defrag details" write-verbose "Defrag has freed up $WhiteSpace MB" if (-not $MBMaintInfo.ContainsKey($MB)){ $MBMaintInfo.add($MB,@{}) $MBMaintInfo.$MB.Name = $MB } if (-not $MBMaintInfo.$MB.ContainsKey("WhiteSpace")){$MBMaintInfo.$MB.Add("WhiteSpace","$WhiteSpace MB")} } '9535'{ #Cleanup Deleted Mailboxes $mbremoved = $Event.Insertionstrings[0] $mbremovedSize = $Event.Insertionstrings[1] $mbretained = $Event.Insertionstrings[2] $mbretainedSize = $Event.Insertionstrings[3] $MB = $Event.Insertionstrings[4] write-verbose "For: $MB Mailbox Cleanup details" write-verbose "Removed: $mbremoved mailboxes with a total size of $mbremovedSize KB" write-verbose "Retained: $mbretained mailboxes with a total size of $mbretainedSize KB" if (-not $MBMaintInfo.ContainsKey($MB)){ $MBMaintInfo.add($MB,@{}) $MBMaintInfo.$MB.Name = $MB } if (-not $MBMaintInfo.$MB.ContainsKey("DeletedMailbox")){$MBMaintInfo.$MB.Add("DeletedMailbox",$mbremoved)} if (-not $MBMaintInfo.$MB.ContainsKey("DeletedMailboxSize")){$MBMaintInfo.$MB.Add("DeletedMailboxSize","$mbremovedSize KB")} if (-not $MBMaintInfo.$MB.ContainsKey("RetainedMailbox")){$MBMaintInfo.$MB.Add("RetainedMailbox",$mbretained)} if (-not $MBMaintInfo.$MB.ContainsKey("RetainedMailboxSize")){$MBMaintInfo.$MB.Add("RetainedMailboxSize","$mbretainedSize KB")} } 'default'{write-verbose "event $($Event.Eventcode) not defined"} } } return $MBMaintInfo | Sort Name } } end{ $Global:XCserverInfo | sort Server, StorageGroup, DatabaseName }
combined_dataset/train/non-malicious/sample_63_67.ps1
sample_63_67.ps1
# # Module manifest for module 'OCI.PSModules.Capacitymanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Capacitymanagement.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '847ff9d9-1cd2-4050-8297-31d3b08d96b0' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Capacitymanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Capacitymanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICapacitymanagementInternalNamespaceOccOverviewsList', 'Get-OCICapacitymanagementOccAvailabilitiesList', 'Get-OCICapacitymanagementOccAvailabilityCatalog', 'Get-OCICapacitymanagementOccAvailabilityCatalogContent', 'Get-OCICapacitymanagementOccAvailabilityCatalogsInternalList', 'Get-OCICapacitymanagementOccAvailabilityCatalogsList', 'Get-OCICapacitymanagementOccCapacityRequest', 'Get-OCICapacitymanagementOccCapacityRequestsInternalList', 'Get-OCICapacitymanagementOccCapacityRequestsList', 'Get-OCICapacitymanagementOccCustomerGroup', 'Get-OCICapacitymanagementOccCustomerGroupsList', 'Get-OCICapacitymanagementOccOverviewsList', 'Invoke-OCICapacitymanagementPatchInternalOccCapacityRequest', 'Invoke-OCICapacitymanagementPatchOccCapacityRequest', 'Invoke-OCICapacitymanagementPublishOccAvailabilityCatalog', 'New-OCICapacitymanagementOccAvailabilityCatalog', 'New-OCICapacitymanagementOccCapacityRequest', 'Remove-OCICapacitymanagementOccAvailabilityCatalog', 'Remove-OCICapacitymanagementOccCapacityRequest', 'Update-OCICapacitymanagementInternalOccCapacityRequest', 'Update-OCICapacitymanagementOccAvailabilityCatalog', 'Update-OCICapacitymanagementOccCapacityRequest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Capacitymanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_53_42.ps1
sample_53_42.ps1
# # Module manifest for module 'OCI.PSModules.Ocicontrolcenter' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ocicontrolcenter.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'fc85f17d-35f9-4106-a77a-ccaa291877f6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ocicontrolcenter Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocicontrolcenter.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOcicontrolcenterMetricPropertiesList', 'Get-OCIOcicontrolcenterNamespacesList', 'Invoke-OCIOcicontrolcenterRequestSummarizedMetricData' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocicontrolcenter' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_61_30.ps1
sample_61_30.ps1
# # Module manifest for module 'OCI.PSModules.Functions' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Functions.dll' # Version number of this module. ModuleVersion = '90.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Functions Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList', 'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList', 'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList', 'Get-OCIFunctionsPbfListingVersion', 'Get-OCIFunctionsPbfListingVersionsList', 'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction', 'Move-OCIFunctionsApplicationCompartment', 'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction', 'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction', 'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3787.ps1
3787.ps1
Param( [Parameter(Mandatory = $true, HelpMessage="Name of the resource group to which the KeyVault belongs to. A new resource group with this name will be created if one doesn't exist")] [ValidateNotNullOrEmpty()] [string]$resourceGroupName, [Parameter(Mandatory = $true, HelpMessage="Name of the KeyVault in which encryption keys are to be placed. A new vault with this name will be created if one doesn't exist")] [ValidateNotNullOrEmpty()] [string]$keyVaultName, [Parameter(Mandatory = $true, HelpMessage="Location of the KeyVault. Important note: Make sure the KeyVault and VMs to be encrypted are in the same region / location.")] [ValidateNotNullOrEmpty()] [string]$location, [Parameter(Mandatory = $true, HelpMessage="Identifier of the Azure subscription to be used")] [ValidateNotNullOrEmpty()] [string]$subscriptionId, [Parameter(Mandatory = $false, HelpMessage="Name of the AAD application that will be used to write secrets to KeyVault. A new application with this name will be created if one doesn't exist. If this app already exists, pass aadClientSecret parameter to the script")] [ValidateNotNullOrEmpty()] [string]$aadAppName, [Parameter(Mandatory = $false, HelpMessage="Client secret of the AAD application that was created earlier")] [ValidateNotNullOrEmpty()] [string]$aadClientSecret, [Parameter(Mandatory = $false, HelpMessage="Name of optional key encryption key in KeyVault. A new key with this name will be created if one doesn't exist")] [ValidateNotNullOrEmpty()] [string]$keyEncryptionKeyName ) $VerbosePreference = "Continue" $ErrorActionPreference = "Stop" Select-AzSubscription -SubscriptionId $subscriptionId; if($aadAppName) { $SvcPrincipals = (Get-AzADServicePrincipal -SearchString $aadAppName); if(-not $SvcPrincipals) { $identifierUri = [string]::Format("http://localhost:8080/{0}",[Guid]::NewGuid().ToString("N")); $defaultHomePage = 'http://contoso.com'; $now = [System.DateTime]::Now; $oneYearFromNow = $now.AddYears(1); $aadClientSecret = [Guid]::NewGuid().ToString(); Write-Host "Creating new AAD application ($aadAppName)"; $secureAadClientSecret = ConvertTo-SecureString -String $aadClientSecret -AsPlainText -Force; $ADApp = New-AzADApplication -DisplayName $aadAppName -HomePage $defaultHomePage -IdentifierUris $identifierUri -StartDate $now -EndDate $oneYearFromNow -Password $secureAadClientSecret; $servicePrincipal = New-AzADServicePrincipal -ApplicationId $ADApp.ApplicationId; $SvcPrincipals = (Get-AzADServicePrincipal -SearchString $aadAppName); if(-not $SvcPrincipals) { Write-Error "Failed to create AAD app $aadAppName. Please log in to Azure using Connect-AzAccount and try again"; return; } $aadClientID = $servicePrincipal.ApplicationId; Write-Host "Created a new AAD Application ($aadAppName) with ID: $aadClientID "; } else { if(-not $aadClientSecret) { $aadClientSecret = Read-Host -Prompt "Aad application ($aadAppName) was already created, input corresponding aadClientSecret and hit ENTER. It can be retrieved from https://manage.windowsazure.com portal" ; } if(-not $aadClientSecret) { Write-Error "Aad application ($aadAppName) was already created. Re-run the script by supplying aadClientSecret parameter with corresponding secret from https://manage.windowsazure.com portal"; return; } $aadClientID = $SvcPrincipals[0].ApplicationId; } } Try { $resGroup = Get-AzResourceGroup -Name $resourceGroupName -ErrorAction SilentlyContinue; } Catch [System.ArgumentException] { Write-Host "Couldn't find resource group: ($resourceGroupName)"; $resGroup = $null; } if (-not $resGroup) { Write-Host "Creating new resource group: ($resourceGroupName)"; $resGroup = New-AzResourceGroup -Name $resourceGroupName -Location $location; Write-Host "Created a new resource group named $resourceGroupName to place keyVault"; } Try { $keyVault = Get-AzKeyVault -VaultName $keyVaultName -ErrorAction SilentlyContinue; } Catch [System.ArgumentException] { Write-Host "Couldn't find Key Vault: $keyVaultName"; $keyVault = $null; } if (-not $keyVault) { Write-Host "Creating new key vault: ($keyVaultName)"; $keyVault = New-AzKeyVault -VaultName $keyVaultName -ResourceGroupName $resourceGroupName -Sku Standard -Location $location; Write-Host "Created a new KeyVault named $keyVaultName to store encryption keys"; } if($aadAppName) { Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ServicePrincipalName $aadClientID -PermissionsToKeys wrapKey -PermissionsToSecrets set; } Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -EnabledForDiskEncryption; Write-Host "Enabling Soft Delete on KeyVault $keyVaultName"; $resource = Get-AzResource -ResourceId $keyVault.ResourceId; $resource.Properties | Add-Member -MemberType "NoteProperty" -Name "enableSoftDelete" -Value "true" -Force; Set-AzResource -resourceid $resource.ResourceId -Properties $resource.Properties -Force; Write-Host "Adding resource lock on KeyVault $keyVaultName"; $lockNotes = "KeyVault may contain AzureDiskEncryption secrets required to boot encrypted VMs"; New-AzResourceLock -LockLevel CanNotDelete -LockName "LockKeyVault" -ResourceName $resource.Name -ResourceType $resource.ResourceType -ResourceGroupName $resource.ResourceGroupName -LockNotes $lockNotes -Force; $diskEncryptionKeyVaultUrl = $keyVault.VaultUri; $keyVaultResourceId = $keyVault.ResourceId; if($keyEncryptionKeyName) { Try { $kek = Get-AzKeyVaultKey -VaultName $keyVaultName -Name $keyEncryptionKeyName -ErrorAction SilentlyContinue; } Catch [Microsoft.Azure.KeyVault.KeyVaultClientException] { Write-Host "Couldn't find key encryption key named : $keyEncryptionKeyName in Key Vault: $keyVaultName"; $kek = $null; } if(-not $kek) { Write-Host "Creating new key encryption key named:$keyEncryptionKeyName in Key Vault: $keyVaultName"; $kek = Add-AzKeyVaultKey -VaultName $keyVaultName -Name $keyEncryptionKeyName -Destination Software -ErrorAction SilentlyContinue; Write-Host "Created key encryption key named:$keyEncryptionKeyName in Key Vault: $keyVaultName"; } $keyEncryptionKeyUrl = $kek.Key.Kid; } Write-Host "Please note down below details that will be needed to enable encryption on your VMs " -foregroundcolor Green; if($aadAppName) { Write-Host "`t aadClientID: $aadClientID" -foregroundcolor Green; Write-Host "`t aadClientSecret: $aadClientSecret" -foregroundcolor Green; } Write-Host "`t DiskEncryptionKeyVaultUrl: $diskEncryptionKeyVaultUrl" -foregroundcolor Green; Write-Host "`t DiskEncryptionKeyVaultId: $keyVaultResourceId" -foregroundcolor Green; if($keyEncryptionKeyName) { Write-Host "`t KeyEncryptionKeyURL: $keyEncryptionKeyUrl" -foregroundcolor Green; Write-Host "`t KeyEncryptionKeyVaultId: $keyVaultResourceId" -foregroundcolor Green; } Write-Host "Please Press [Enter] after saving values displayed above. They are needed to enable encryption using Set-AzVmDiskEncryptionExtension cmdlet" -foregroundcolor Green; Read-Host; foreach($vm in $allVMs) { if($vm.Location.replace(' ','').ToLower() -ne $keyVault.Location.replace(' ','').ToLower()) { Write-Error "To enable AzureDiskEncryption, VM and KeyVault must belong to same subscription and same region. vm Location: $($vm.Location.ToLower()) , keyVault Location: $($keyVault.Location.ToLower())"; return; } Write-Host "Encrypting VM: $($vm.Name) in ResourceGroup: $($vm.ResourceGroupName) " -foregroundcolor Green; if($aadAppName) { if(-not $kek) { Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All'; } else { Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All'; } } else { if(-not $kek) { Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All'; } else { Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All'; } } Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name; }
combined_dataset/train/non-malicious/sample_46_7.ps1
sample_46_7.ps1
@{ GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @('MSFT_MpPerformanceRecording.psm1') FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml') CompatiblePSEditions = @('Desktop', 'Core') FunctionsToExport = @( 'New-MpPerformanceRecording', 'Get-MpPerformanceReport' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '5.1' } # SIG # Begin signature block # MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5QoGq9EV41ZN5 # fnwNlxKx8aIBP8W7y/AxkQ4SrJmPcKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEICjaAYW6dpF96OECCa1j0HmEWEEdofGluuKS # KwAnvISeMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAaxgs # 9GkngpovGZ++THpqnZRiAcdPPw0wrkmXHC/WHOqLT1FEVw3B3NMjc818wWbLlYtb # f3geto2AIEcVBIq3DvZA0nm1OId6pmsER3FzA314dSjj2ln54h5T0r46eX5996i9 # Tm/vT4whBKAfGq98C9cGcCUXqpD8EhB+QjbHfKofqZLSAhtJeo6N8s/mc0MHNSvp # 2Abh6w1qRt0wRjpByyanYrNSBrpqATFTiq5GQgGRi2/MtB2t1UpMjqw+N2YnBZqR # laeoHW84Lm2fgeYgm0qdHmsfYDjYYlU+PmPp9Omb2cOIGqhtl/f3zPTJVdzcFDaM # qnnAonXp99i6JFu3TKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3 # DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB # BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCs # NQqhRClUZDXHBEqXRdiBxl3jjjYSt87orYc9z50r3wIGZjOrDNN5GBMyMDI0MDUw # OTAwNDQ0Ni40MjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJC # Qy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # eDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5 # WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtcta # irCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+P # RsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7 # uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7 # uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77 # +X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMM # aEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb # 2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQ # kK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkW # hjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA # 6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz # 5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4l # w/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU # oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB # BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j # cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B # Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K # 8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6y # ZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQW # kXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj # 0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAI # kS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdI # llsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/ # A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/e6zR98Pkplml # iO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Z # daard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8E # ZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBg # bQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN # BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y # aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi # vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G # awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm # ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks # UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr # g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B # mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR # c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR # RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR # lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS # xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd # MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa # voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD # VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud # JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G # CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix # BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY # Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5 # 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU # hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM # vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A # PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN # n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs # c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1 # 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g # MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm # 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0 # aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMt # OTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB # MAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOnmEfEwIhgP # MjAyNDA1MDgyMzAwMDFaGA8yMDI0MDUwOTIzMDAwMVowdDA6BgorBgEEAYRZCgQB # MSwwKjAKAgUA6eYR8QIBADAHAgEAAgIW5TAHAgEAAgIUETAKAgUA6edjcQIBADA2 # BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB # AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAK/QKumm9PKZykw1Polf4lAG3ZzJBOGf # +2ZXn9mgyaF6JwG4wg6u1mZJBVZaWgrqZVnGmjM2M/NorN2buMqs4MA3flcoFq/j # B/t0K+UwTZR05VEEPwrfFgLRatoYbpdhbZP5+1WyGJwowH95Rkl9QmwaBHcxn9fB # PdTr7UHoD/ZJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgfqouKUei # vGoYDlJ1b7GruEpjOeuL102fiYvJsKcpJnIwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEA # AAHdMCIEINAKWOVA+P6UX3km3sMfBv/ZT9ljcGdKI2r+/FtcYbEGMA0GCSqGSIb3 # DQEBCwUABIICACsJzxy4Scda6jBN0eADlBvzWwy9Zp9xwOTnIJ6OSs8Pot/8CKR6 # gK4PyJm/PrE2bSFlwtdhu3iMSI4WFTT7CukH/kRxJfOaRhE17rmTneKfu+aaGNWq # qtaysFPo4kFodXwPW+Z512NcbPbB35vo8BclGQztJFD35LE/41e78y+uPOwTwIEE # q1p+yhQgGUC9Vh4apCZCKjnyr9CkdTy1e9j6HXJ7ClVuKN0eqJvBQuCKyvtG+iUj # LF+2et54Y5A5tN0pikuepqjinCNUO2T5EimmOddQCAPV7xkIKdp92wI9ysJ9s53e # Kh5P9CReTBlnXeJIDZdVHlwqejcysuATt2Gwxck3XtIODamKA8vV6HVAuwe4sHjn # 69yvvA8L9EtEkD4uf0XLRPG3euRwcXjRTpKHXKVVn4fmNIqow09L5Fh1EiMVAQ8/ # G41kjq2YIocCE2UufrHA7Xa47nRYQiwZLpbWcnrwjzayS5bSK7hmLY6rykViOgR+ # n8PJLke4yYJyTw+qb5xBXqjy60MPoMpwhkupBM1nXWBYeMP+Dud4tMQooD+HoG+n # qu9Bq6E5C/w6DkwXB0nKidR3D6UKCCdO9/Oi6JtaBGUsoB0R3IU5xX5vMP3F6HwH # 2JY3UjJzUSLY1IhbISA0zU5kVyvkZD6+YbVhuFDEoFRBhJBYadh+Kwtf # SIG # End signature block
combined_dataset/train/non-malicious/Get-WMIVersions_2.ps1
Get-WMIVersions_2.ps1
#Requires -Version 2 param ( $Credential, $ComputerName ) # The official way to detect .NET versions is to look at their known location on the hard drive as per # this article: http://msdn.microsoft.com/en-us/kb/kb00318785.aspx # thanks to David M (http://twitter.com/makovec) for the WQL $query = "select name from win32_directory where name like 'c:\\\\windows\\\\microsoft.net\\\\framework\\\\v%'" $res = Get-WmiObject -query $query -Credential $Credential -ComputerName $ComputerName | ForEach-Object { Split-Path $_.name -Leaf } | # returns directories Where-Object { $_ -like 'v*' } | # only include those that start with v ForEach-Object { [system.version]( $_ -replace "^v" ) } # remove "v" from the string and convert to version object # Create hashtable with computername and version details $prop = @{ ComputerName = $ComputerName V1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 0 } ) { $true } } V1_1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 1 } ) { $true } } V2Present = &{ if ( $res | Where-Object { $_.Major -eq 2 -and $_.Minor -eq 0 } ) { $true } } V3_5Present = &{ if ( $res | Where-Object { $_.Major -eq 3 -and $_.Minor -eq 5 } ) { $true } } V4Present = &{ if ( $res | Where-Object { $_.Major -eq 4 -and $_.Minor -eq 0 } ) { $true } } VersionDetails = $res } # Create and output PSobject using hashtable New-Object PSObject -Property $prop
combined_dataset/train/non-malicious/sample_12_77.ps1
sample_12_77.ps1
##---------------------------------------------------------------------------- ## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved. ##---------------------------------------------------------------------------- # Import string constants . ./StringConstants.ps1 # Import shared functions and vars . ./Commonalities.ps1 Stop-Service -Name $ServiceConstants.serviceName Remove-Service -ServiceToRemove $ServiceConstants.serviceName # Get temporary scoped Environment variables from ACS component framework $dataPath = Get-DataPath $installationPath = Get-InstallationPath # Remove files when stopped if its an axis path Remove-AxisDirectory -AxisFilePath $dataPath Remove-AxisDirectory -AxisFilePath $installationPath # SIG # Begin signature block # MIIoIQYJKoZIhvcNAQcCoIIoEjCCKA4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBpzVb2Ni4mr+so # HX7QJ3UIWzYSPUcVkmMxSFV/IfT8gaCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc # TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z # NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0 # JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr # Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF # LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F # LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh # 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ # wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay # g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI # YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp # QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro # OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB # WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+ # YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P # AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC # hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v # dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED # MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql # +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF # UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h # mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw # YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld # AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw # 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP # LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE # QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn # KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji # WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq # yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G # CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx # MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW # QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0 # aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH # zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9 # hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB # UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t # 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g # fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu # j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP # cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc # aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC # AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE # FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI # KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E # BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp # Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0 # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5 # NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu # Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB # CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH # fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY # SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs # X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G # Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j # +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB # Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl # EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet # ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF # xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM # aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGekwghnl # AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw # PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2 # IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF # AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCC8 # zpn/ICHg5yqsnPKbuMkmlTNOcU8e8bXR5Jl73q3ZXTANBgkqhkiG9w0BAQEFAASC # AYAl2sJKrfvadGgAzljkTovOfJWLOPdSB0UdoPUMtGpWXjFP9wX+4a+COI6SB2WV # NPipxUd/yI71SwJ3q3R4rcC/GUbpqKmwSy45R2vsvNrSkYNL7MYTbwaTKj+6hu7m # vahxwlAX4Mo+8AqOQdSmtcCfdRM8SYGPcOuEQXeJJNRmXSaB/MYw3XrbchR2XsUd # rxZPQH95UMMbePUbVjIw++qMRKDdS1LDfcJ7pZ14xSehtolNgvvFWwsZJTMbrNvI # WB5qb5ieuHksn73rWTiiCZbRvVJmXMsypxaTadR2EV8MTsm5+NBHm2uPaF3n+EMw # PbYGhTx6xKfzSW9kvvkFSCVmum0fxDDWoylpDBrSO7J/dRX/wKc9mBnAE+h/tly/ # GQBNSKBantVMW8TsiUfrhbpbrkyH6D1LkcFigGhlXMt8HuByYAlM2xlWfBk69iTm # JHe+qJpmse4TYspHhAveTFRCe0gv35PNzbRTWRt5skuTRPkkNDLmgvK4j1sXkuwv # L8ehghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG9w0BBwKgghcYMIIX # FAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEEoGgEZjBkAgEBBglg # hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgN4QSSsXv021u0ZUzk3DINC7AY59k # wUo0OeF/62eq0GECEEeZ/t0ljquiXcuI5ojj/j4YDzIwMjQwOTIwMDk1NjM4WqCC # EwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUA # MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE # AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp # bmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQG # EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0 # IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # o1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrd # ECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLP # ywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8b # ZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK # 1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9 # MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapM # ZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyq # q1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8Sdlal # JPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+ # 8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rx # KBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4G # A1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAW # gBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUx # o97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29t # L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy # bDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp # Z2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NB # LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN # 6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3 # aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM # 2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ # +OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgm # agNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doR # S4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/K # wtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHL # FAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquv # czroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIj # TvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mt # kIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3 # DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX # BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0 # ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJ # BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln # aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0Ew # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE # 8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBML # JnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU # 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLy # dkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFk # dECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgm # f6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9a # bJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwY # SH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80Vg # vCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5 # FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9 # Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIB # ADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG # AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au # ZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy # dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0 # hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0 # LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcN # AQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp # +3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9 # qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8 # ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6Z # JxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnE # tp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx # ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV7 # 7QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT # 1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkP # Cr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvm # fxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCC # BHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYD # VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln # aWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew # HhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEV # MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t # MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3 # DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZ # wuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4V # pX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAd # YyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3 # T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjU # N6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNda # SaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm # mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyV # w4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3 # AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYi # Cd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmp # sh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNt # yA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUG # A1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2Vy # dEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3 # DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+Ica # aVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096ww # epqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcD # x4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsg # jTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37Y # OtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYD # VQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lD # ZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAF # RK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzEN # BgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIwMDk1NjM4WjArBgsq # hkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG # 9w0BCQQxIgQgZt8I6422OjBF3Oe2n7X+oR0+4i5jijRhBm+me1yoSuUwNwYLKoZI # hvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQM # eCgwDQYJKoZIhvcNAQEBBQAEggIAFhZDw4qMwV2oSAC+kS+DXNhnMTiDoeQ+/x8C # v8f6BQ1HjWk/BAeeCDj/ZCgiC+3z+QgSdm2/Q0mp6M0beLdgplOzLFE3BrcWGHSs # iEiRkIeTgYZt1048D5Zp7mpGmPJJayi/fTtcuv+mhyJF+3Loug/GZgMGWQdFDTM1 # Zf/Rg8ZdxneqAWbh9P+7KcUi+QWxzQss5wWHeGsOb3r3ayCVlC6iRqE2pXAOyEkb # D60qnwQ7nOKjikfs6IrLTHFh6KWKpKzD6yvAKEekEiJRRZPpvIsndLZ2sjt//Fy8 # mo73CXdKs3jty6iJgnwRrStxItss+03xX4JApM04Nzv70CSqTW9b4dZQRB42kP4Y # 8Q0lliGGKzmDBr+neaDWEwYIBOYfP0i3hGaTvlqozLfNgKns7ZRmLXnWHgcdLKWo # QXiLf9Lvk1H51l95d9HL2pYS1BoDeKeGt67yajOdp1AwJqPbfs6QOxkSRYbhVHuF # zLGPnLdLwWgjL9npI92hNIQfP6luvfPC9We0XWl0DhnNzTGs5ketXF9/E4Nhj1Qf # xq+Uezd7JznsCH4k7IUemAnVtT0FBYs8DcbzCZwFlzC5WmBnud/LiV+WD/O8YGI4 # IDepEkd/SMDe8WcbmV1od+L564mKxbqYE7TxK+git8OfmaBcB7GO27xRcCsBl5Y8 # IdIE+bU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_8_7.ps1
sample_8_7.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ # gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b # 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAMRTpJFtQXp8dB2qwtspSYtVsdb3LigCOQf6YLm8YcybLMDFEodZ1AnYW # bvIBMx+xC7nEdaovVvLufneNAwpmQoz5U3oY5azDJP7Epqf/ULiBdh4NKztiVaRg # zI9olhtJhcCcQRDhOcXCsuJxq73Vi76ibCArt1QKMXhxWvZPfDlvQbp30ppaqaU/ # Dm3jlJ/XAN4wiSrPNjdpRG8sU+RUTBz043HjNBUk5y4/BZT/WWIJtGZ5f3ksXIIi # qTZUiRnwWLKWwMurfa2Os7tIi5lwlPj9uikYomS7ySsaPuhm7CpR2S/niAKHxr26 # NilmmZTBfOnpQoKXN5IwVfn9xCEQ/qGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCpSGZOV1rkmMcR+xJ3U9Qs29ie/rp0GKMzn1kdnWWx2wIGZwfraroD # GBMyMDI0MTAxNjE4MjcxOC45MTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpSYjAiGA8yMDI0MTAxNjE0NTUz # MFoYDzIwMjQxMDE3MTQ1NTMwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqulJi # AgEAMAoCAQACAgPRAgH/MAcCAQACAh0+MAoCBQDqu6PiAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAHQbttDwVR794xiQd2p8+NLUv3933V2n+D2JAsA1z531 # 1N0q7uVJM4NYxiCxcL30EJtnN2M3CaClr+r/02ipbiwsG98G4E0u4JtzoIA6m77k # B/nLoop0pnuRB7NFdUAsLTe1On0ocS31jjaK630e1S6slt3dBf+8sTaJpdYuCkO7 # Zf199KHBNqLTj9Z5LiRrgZLRDdwVYqDiouOuwrGj2wYwCR9B8qJSUms5gbOI19+P # JT4f/eC4Dd3LAfzz0HYcnPgKtmLQncNlISUvUnOWYPjRjJBt+xbNMHWe37Z0FDoo # 4kYNBSo91Dp7avxRLYgDYCLhO3B5fs25lLRQo5LQr7sxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCB9B7W5zjIi7fAxstr1bvAnL3ok3sR4LqYIVvZ1QR1D # LjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQg+uMbsqvcZ/jcMOOmPy0C1nGa # qZqkCTFfXvAWn3rEsYYwDQYJKoZIhvcNAQELBQAEggIAALATnhOR+e8Vg78bHdbe # 2EfRVxyhRaysyU6HNUMEhfYNLdBSmNSPLPm8sJ9SJR/FO9dZL3ono0z+HZlzFVsk # bF+RFQYgF+UwxgoMuRQ6YY8MSSGLg/Eoq4GcitY7Vis4Fxuhi366TlhkKtWWSb0Y # WR39YYiOoYgfM3UNd4dw1DNegw6Fy78NSYY32vXLfigfAjZFNGq0oKBFR1PSiFgK # 5emr03GmGP875ltCI8rSQWoLyAAOc1WT2U3D/xMMU11nacvoNRSIkTIu8npHJaGK # t2i8CgTnvWFKXge4IupmdN2pC/5tqSKZjfGISBNReWIhTR++BMvx/Dh07Aqzbt0x # zgwbujxYAiMZL4dFbSHuAi+t7BxJyW5yT1qE7J0TYVcBldo812XiKxZS6DQF9Mig # pwts+uZichngLE8pQOvWc5NLM+NesjN0glaSb/RyuK8yUTWM+FfPKdkcnqMa4zxq # xIlJ8y1x1E8SMEcxkyn9drrl7B2pjC3ev9YtBNjXQwptTgBhNFPo3B8EKZkcHd82 # dD2OWAB86DtJyChW4jLFRl6OLDmRN29bZY0CEzv70mvdCB99gAeWueoJKrhqgHdm # oQsUbcfnOUIZ41lqFGAL1zGOjDUSVfteOtPgZ9E+jCf5bE2QX+hSOHlay4X3FrX2 # wWNSBi8J4JanTwtRj9n11Ig= # SIG # End signature block
combined_dataset/train/non-malicious/sample_35_75.ps1
sample_35_75.ps1
(self.webpackChunkshell_app=self.webpackChunkshell_app||[]).push([[179,429],{4174:(W,F,d)=>{"use strict";d.d(F,{X:()=>f});var u=d(8714);let f=(()=>{class s{static themeStorageKey="msft.sme.shell-assetManager-theme";static defaultTheme="light";static darkTheme="dark";static assets;static get theme(){const c=MsftSme.LocalStorageHandler.getItem(s.themeStorageKey);return s.ensureValidTheme(c)}static set theme(c){c=s.ensureValidTheme(c),MsftSme.LocalStorageHandler.setItem(s.themeStorageKey,c),u.R.assetManager.setTheme(c)}static getBaseLocationPath(c,N=!0){const m=MsftSme.self();return`${m.Host.isWeb||"http:"===location.protocol?window.location.origin:m.Environment.loadPath}/${c}${N?`?v=${m.Environment.version}`:""}`}static getAssetLocationPath(c){return this.getBaseLocationPath(`assets/styles/${c}`)}static getLibraryLocationPath(c){return this.getBaseLocationPath(`external/${c}`,!1)}static initialize(c){u.R.localizationManager.getLocaleId();const m=MsftSme.getLocationSearchParameter("theme");m&&(s.theme=m.value),s.configureWithBrowserTheme(),s.assets={css:[s.getAssetLocationPath("fonts.css")],cssV2:[s.getAssetLocationPath("fonts.css")],js:[]},u.R.assetManager.loadAssets(s.theme,s.assets);const E=MsftSme.self();E.Resources.assets.css.push(s.getAssetLocationPath("main.css")),E.Resources.assets.cssV2.push(s.getAssetLocationPath("main-v2.css")),E.Resources.assets.js.push(),E.Resources.lib={monaco:{"0.17.1":this.getLibraryLocationPath("monaco/0.17.1/vs"),"0.36.1":this.getLibraryLocationPath("monaco/0.36.1/vs")},jsll:{"4.2.18":this.getLibraryLocationPath("jsll/4.2.18/")}}}static ensureValidTheme(c){const N=[s.defaultTheme,s.darkTheme];return(MsftSme.isNullOrWhiteSpace(c)||N.every(m=>m!==c))&&(c=s.defaultTheme),c}static configureWithBrowserTheme(){!MsftSme.LocalStorageHandler.getItem(s.themeStorageKey)&&window.matchMedia&&window.matchMedia("(prefers-color-scheme: dark)").matches&&(s.theme=s.darkTheme)}}return s})()},3905:(W,F,d)=>{"use strict";d.d(F,{c:()=>u});class u{static get element(){return document.getElementById("sme-splash")}static get progress(){return document.getElementById("sme-splash-progress")}static get message(){return document.getElementById("sme-splash-message")}static get errorElement(){return document.getElementById("sme-splash-error")}static get errorResponse(){return document.getElementById("sme-splash-error-response-message")}static setProgressValue(s,b){if(u.progress){const c=Number(s);if(isNaN(c))return;const N=Number(u.progress.getAttribute("value"));if(!isNaN(N)&&c<N)return;u.progress.setAttribute("value",s),u.progress.setAttribute("aria-valuenow",s),u.message.innerText=b}}static complete(){if(!u.element)return;const s=MsftSme.getStrings();u.setProgressValue("100",s.MsftSmeShell.App.Splash.Messages.applicationReady),u.element.remove()}static aadSsoError(s){u.element&&(u.errorElement.style.display="inline",u.message.style.display="none",u.errorResponse.innerHTML=s)}}},3054:(W,F,d)=>{"use strict";var u;d.d(F,{B:()=>u}),function(f){let s,b,c,N;var m;f.module="Microsoft.SME.Shell",f.resourceName="MsftSmeShell",f.powerShellPrefix="WACSH",f.Get_CimWin32OperatingSystem={command:"Get-CimWin32OperatingSystem",script:"##Get-CimWin32OperatingSystem##:Get-CimWin32OperatingSystem.ps1\nimport-module CimCmdlets\nGet-CimInstance -Namespace root/cimv2 -ClassName Win32_OperatingSystem\n"},(s=f.Internal||(f.Internal={})).Get_SystemLockdownPolicy={command:"Get-SystemLockdownPolicy",script:"##Get-SystemLockdownPolicy##:Get-SystemLockdownPolicy.ps1\nreturn [System.Management.Automation.Security.SystemPolicy]::GetSystemLockdownPolicy().ToString()\n"},(m=b=f.Azure||(f.Azure={})).Set_AzureHybridManagement={command:"Set-AzureHybridManagement",script:'##Set-AzureHybridManagement##:Set-AzureHybridManagement.ps1\nparam (\n[Parameter(Mandatory = $true)]\n[String]\n$subscriptionId,\n[Parameter(Mandatory = $true)]\n[String]\n$resourceGroup,\n[Parameter(Mandatory = $true)]\n[String]\n$tenantId,\n[Parameter(Mandatory = $true)]\n[String]\n$azureRegion,\n[Parameter(Mandatory = $true)]\n[boolean]\n$useProxyServer,\n[Parameter(Mandatory = $false)]\n[String]\n$proxyServerIpAddress,\n[Parameter(Mandatory = $false)]\n[String]\n$proxyServerIpPort,\n[Parameter(Mandatory = $true)]\n[string]\n$authToken,\n[Parameter(Mandatory = $true)]\n[string]\n$correlationId\n)\nSet-StrictMode -Version 5.0\nfunction setupScriptEnv() {\nSet-Variable -Name LogName -Option ReadOnly -Value "Microsoft-ServerManagementExperience" -Scope Script\nSet-Variable -Name LogSource -Option ReadOnly -Value "SMEScript" -Scope Script\nSet-Variable -Name ScriptName -Option ReadOnly -Value "Set-HybridManagement.ps1" -Scope Script\nSet-Variable -Name Machine -Option ReadOnly -Value "Machine" -Scope Script\nSet-Variable -Name HybridAgentFile -Option ReadOnly -Value "AzureConnectedMachineAgent.msi" -Scope Script\nSet-Variable -Name HybridAgentPackageLink -Option ReadOnly -Value "https://aka.ms/AzureConnectedMachineAgent" -Scope Script\nSet-Variable -Name HybridAgentExecutable -Option ReadOnly -Value "$env:ProgramFiles\\AzureConnectedMachineAgent\\azcmagent.exe" -Scope Script\nSet-Variable -Name HttpsProxy -Option ReadOnly -Value "https_proxy" -Scope Script\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name LogName -Scope Script -Force\nRemove-Variable -Name LogSource -Scope Script -Force\nRemove-Variable -Name ScriptName -Scope Script -Force\nRemove-Variable -Name Machine -Scope Script -Force\nRemove-Variable -Name HybridAgentFile -Scope Script -Force\nRemove-Variable -Name HybridAgentPackageLink -Scope Script -Force\nRemove-Variable -Name HybridAgentExecutable -Scope Script -Force\nRemove-Variable -Name HttpsProxy -Scope Script -Force\n}\nfunction main(\n[string]$subscriptionId,\n[string]$resourceGroup,\n[string]$tenantId,\n[string]$azureRegion,\n[boolean]$useProxyServer,\n[string]$proxyServerIpAddress,\n[string]$proxyServerIpPort,\n[string]$authToken,\n[string]$correlationId\n) {\n$err = $null\n$args = @{}\nInvoke-WebRequest -Uri $HybridAgentPackageLink -OutFile $HybridAgentFile -ErrorAction SilentlyContinue -ErrorVariable +err\nif ($err) {\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]:Couldn\'t download the hybrid management package. Error: $err" -ErrorAction SilentlyContinue\nWrite-Error @($err)[0]\nreturn @()\n}\nmsiexec /i $HybridAgentFile /l*v installationlog.txt /qn | Out-String -ErrorAction SilentlyContinue -ErrorVariable +err\nif ($err) {\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]:Error while installing the hybrid agent package. Error: $err" -ErrorAction SilentlyContinue\nWrite-Error @($err)[0]\nreturn @()\n}\nif ($useProxyServer) {\n[System.Environment]::SetEnvironmentVariable($HttpsProxy, $proxyServerIpAddress+\':\'+$proxyServerIpPort, $Machine)\n$env:https_proxy = [System.Environment]::GetEnvironmentVariable($HttpsProxy, $Machine)\n}\n& $HybridAgentExecutable connect --resource-group $resourceGroup --tenant-id $tenantId --location $azureRegion `\n--subscription-id $subscriptionId --access-token $authToken --correlation-id $correlationId\nRestart-Service -Name himds -ErrorAction SilentlyContinue -ErrorVariable +err\nif ($err) {\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]:Couldn\'t restart the himds service. Error: $err" -ErrorAction SilentlyContinue\nWrite-Error @($err)[0]\nreturn $err\n}\n}\nsetupScriptEnv\ntry {\nMicrosoft.PowerShell.Management\\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue\nreturn main $subscriptionId $resourceGroup $tenantId $azureRegion $useProxyServer $proxyServerIpAddress $proxyServerIpPort $authToken $correlationId\n} finally {\ncleanupScriptEnv\n}\n'},m.Test_ScriptCanBeRun={command:"Test-ScriptCanBeRun",script:"##Test-ScriptCanBeRun##:Test-ScriptCanBeRun.ps1\nparam(\n[Parameter(Mandatory = $True)]\n[string]\n$nodeName\n)\nreturn @{ ScriptCanRun = $true }\n"},function(m){m.Disable_CredSspClientRole={command:"Disable-CredSspClientRole",script:'##Disable-CredSspClientRole##:Disable-CredSspClientRole.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\n}\nfunction getCredSSPClientEnabled() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction disableCredSSP() {\n$err = $null\n$result = Disable-WSManCredSSP -Role Client -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction main() {\nsetupScriptEnv\ntry {\nif (getCredSSPClientEnabled) {\n$err = disableCredSSP\nif ($err) {\nif (getCredSSPClientEnabled) {\nthrow @($err)[0]\n}\n}\n}\n} catch {\nWrite-Error $_.Exception.Message\nthrow $_.Exception.Message\n} finally {\ncleanupScriptEnv\n}\nreturn $true\n}\n$results = $null\nif (-not ($env:pester)) {\n$results = main\n}\nreturn $results\n'},m.Disable_CredSspManagedServer={command:"Disable-CredSspManagedServer",script:'##Disable-CredSspManagedServer##:Disable-CredSspManagedServer.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction getCredSSPClientEnabled() {\nSet-Variable credSSPClientPath -Option Constant -Value "WSMan:\\localhost\\Client\\Auth\\CredSSP" -ErrorAction SilentlyContinue\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $credSSPClientPath -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction disableCredSSPClientRole() {\n$err = $null\n$result = Disable-WSManCredSSP -Role Client -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction disableCredSSPClient() {\nif (-not (getCredSSPClientEnabled)) {\nreturn $null\n}\n$err = disableCredSSPClientRole\nif ($err) {\nif (-not (getCredSSPClientEnabled)) {\nreturn $null\n}\nreturn $err\n}\nreturn $null\n}\nfunction getCredSSPServerEnabled() {\nSet-Variable credSSPServicePath -Option Constant -Value "WSMan:\\localhost\\Service\\Auth\\CredSSP" -ErrorAction SilentlyContinue\n$credSSPServerEnabled = $false;\n$credSSPServerService = Get-Item $credSSPServicePath -ErrorAction SilentlyContinue\nif ($credSSPServerService) {\n$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)\n}\nreturn $credSSPServerEnabled\n}\nfunction disableCredSSPServerRole() {\n$err = $null\n$result = Disable-WSManCredSSP -Role Server -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction disableCredSSPServer() {\nif (-not (getCredSSPServerEnabled)) {\nreturn $null\n}\n$err = disableCredSSPServerRole\nif ($err) {\nif (-not (getCredSSPServerEnabled)) {\nreturn $null\n}\nreturn $err\n}\nreturn $null\n}\nfunction main() {\n$err = disableCredSSPServer\nif ($err) {\nthrow $err\n}\n$err = disableCredSSPClient\nif ($err) {\nthrow $err\n}\nreturn $true\n}\nif (-not ($env:pester)) {\nreturn main\n}\n'},m.Enable_CredSSPClientRole={command:"Enable-CredSSPClientRole",script:'##Enable-CredSSPClientRole##:Enable-CredSSPClientRole.ps1\nparam (\n[Parameter(Mandatory=$True)]\n[string[]]$serverNames\n)\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\nSet-Variable -Name CredentialsDelegationPolicyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation"\nSet-Variable -Name AllowFreshCredentialsPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation\\AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation\\AllowFreshCredentialsWhenNTLMOnly"\nSet-Variable -Name AllowFreshCredentialsPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentialsWhenNTLMOnly"\nSet-Variable -Name TypeAlreadyExistsHResult -Option ReadOnly -Scope Script -Value -2146233088\n Set-Variable -Name NativeCode -Option ReadOnly -Scope Script -Value @"\n using Microsoft.Win32;\n using System;\n using System.Collections.Generic;\n using System.Globalization;\n using System.Linq;\n using System.Runtime.InteropServices;\n using System.Text;\n using System.Threading;\n \n namespace SME\n {\n public static class LocalGroupPolicy\n {\n [Guid("EA502722-A23D-11d1-A7D3-0000F87571E3")]\n [ComImport]\n [ClassInterface(ClassInterfaceType.None)]\n public class GPClass\n {\n }\n \n [ComImport, Guid("EA502723-A23D-11d1-A7D3-0000F87571E3"),\n InterfaceType(ComInterfaceType.InterfaceIsIUnknown)]\n public interface IGroupPolicyObject\n {\n void New(\n [MarshalAs(UnmanagedType.LPWStr)] string pszDomainName,\n [MarshalAs(UnmanagedType.LPWStr)] string pszDisplayName,\n uint dwFlags);\n \n void OpenDSGPO(\n [MarshalAs(UnmanagedType.LPWStr)] string pszPath,\n uint dwFlags);\n \n void OpenLocalMachineGPO(uint dwFlags);\n \n void OpenRemoteMachineGPO(\n [MarshalAs(UnmanagedType.LPWStr)] string pszComputerName,\n uint dwFlags);\n \n void Save(\n [MarshalAs(UnmanagedType.Bool)] bool bMachine,\n [MarshalAs(UnmanagedType.Bool)] bool bAdd,\n [MarshalAs(UnmanagedType.LPStruct)] Guid pGuidExtension,\n [MarshalAs(UnmanagedType.LPStruct)] Guid pGuid);\n \n void Delete();\n \n void GetName(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszName,\n int cchMaxLength);\n \n void GetDisplayName(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszName,\n int cchMaxLength);\n \n void SetDisplayName(\n [MarshalAs(UnmanagedType.LPWStr)] string pszName);\n \n void GetPath(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszPath,\n int cchMaxPath);\n \n void GetDSPath(\n uint dwSection,\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszPath,\n int cchMaxPath);\n \n void GetFileSysPath(\n uint dwSection,\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszPath,\n int cchMaxPath);\n \n IntPtr GetRegistryKey(uint dwSection);\n \n uint GetOptions();\n \n void SetOptions(uint dwOptions, uint dwMask);\n \n void GetMachineName(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszName,\n int cchMaxLength);\n \n uint GetPropertySheetPages(out IntPtr hPages);\n }\n \n private const int GPO_OPEN_LOAD_REGISTRY = 1;\n private const int GPO_SECTION_MACHINE = 2;\n private const string ApplicationName = @"wsman";\n private const string AllowFreshCredentials = @"AllowFreshCredentials";\n private const string AllowFreshCredentialsWhenNTLMOnly = @"AllowFreshCredentialsWhenNTLMOnly";\n private const string ConcatenateDefaultsAllowFresh = @"ConcatenateDefaults_AllowFresh";\n private const string PathCredentialsDelegationPath = @"SOFTWARE\\Policies\\Microsoft\\Windows";\n private const string GPOpath = @"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects";\n private const string Machine = @"Machine";\n private const string CredentialsDelegation = @"\\CredentialsDelegation";\n private const string PoliciesPath = @"Software\\Policies\\Microsoft\\Windows";\n private const string BackSlash = @"\\";\n \n public static string EnableAllowFreshCredentialsPolicy(string[] serverNames, bool hasNTLMOnlyUpdateBeenMade)\n {\n if (Thread.CurrentThread.GetApartmentState() == ApartmentState.STA)\n {\n return EnableAllowFreshCredentialsPolicyImpl(serverNames, hasNTLMOnlyUpdateBeenMade);\n }\n else\n {\n string value = null;\n \n var thread = new Thread(() =>\n {\n value = EnableAllowFreshCredentialsPolicyImpl(serverNames, hasNTLMOnlyUpdateBeenMade);\n });\n \n thread.SetApartmentState(ApartmentState.STA);\n thread.Start();\n thread.Join();\n \n return value;\n }\n }\n \n public static string RemoveServersFromAllowFreshCredentialsPolicy(string[] serverNames)\n {\n if (Thread.CurrentThread.GetApartmentState() == ApartmentState.STA)\n {\n return RemoveServersFromAllowFreshCredentialsPolicyImpl(serverNames);\n }\n else\n {\n string value = null;\n \n var thread = new Thread(() =>\n {\n value = RemoveServersFromAllowFreshCredentialsPolicyImpl(serverNames);\n });\n \n thread.SetApartmentState(ApartmentState.STA);\n thread.Start();\n thread.Join();\n \n return value;\n }\n }\n \n private static string EnableAllowFreshCredentialsPolicyImpl(string[] serverNames, bool hasNTLMOnlyUpdateBeenMade)\n {\n IGroupPolicyObject gpo = (IGroupPolicyObject)new GPClass();\n gpo.OpenLocalMachineGPO(GPO_OPEN_LOAD_REGISTRY);\n \n var KeyHandle = gpo.GetRegistryKey(GPO_SECTION_MACHINE);\n \n try\n {\n var rootKey = Registry.CurrentUser;\n \n using (RegistryKey GPOKey = rootKey.OpenSubKey(GPOpath, true))\n {\n foreach (var keyName in GPOKey.GetSubKeyNames())\n {\n if (keyName.EndsWith(Machine, StringComparison.OrdinalIgnoreCase))\n {\n var key = GPOpath + BackSlash + keyName + BackSlash + PoliciesPath;\n \n UpdateGpoRegistrySettingsAllowFreshCredentials(ApplicationName, serverNames, Registry.CurrentUser, key, hasNTLMOnlyUpdateBeenMade);\n }\n }\n }\n \n //saving gpo settings\n gpo.Save(true, true, new Guid("35378EAC-683F-11D2-A89A-00C04FBBCFA2"), new Guid("7A9206BD-33AF-47af-B832-D4128730E990"));\n }\n catch (Exception ex)\n {\n return ex.Message;\n }\n finally\n {\n KeyHandle = IntPtr.Zero;\n }\n \n return null;\n }\n \n private static string RemoveServersFromAllowFreshCredentialsPolicyImpl(string[] serverNames)\n {\n IGroupPolicyObject gpo = (IGroupPolicyObject)new GPClass();\n gpo.OpenLocalMachineGPO(GPO_OPEN_LOAD_REGISTRY);\n \n var KeyHandle = gpo.GetRegistryKey(GPO_SECTION_MACHINE);\n \n try\n {\n var rootKey = Registry.CurrentUser;\n \n using (RegistryKey GPOKey = rootKey.OpenSubKey(GPOpath, true))\n {\n foreach (var keyName in GPOKey.GetSubKeyNames())\n {\n if (keyName.EndsWith(Machine, StringComparison.OrdinalIgnoreCase))\n {\n var key = GPOpath + BackSlash + keyName + BackSlash + PoliciesPath;\n \n UpdateGpoRegistrySettingsRemoveServersFromFreshCredentials(ApplicationName, serverNames, Registry.CurrentUser, key);\n }\n }\n }\n \n //saving gpo settings\n gpo.Save(true, true, new Guid("35378EAC-683F-11D2-A89A-00C04FBBCFA2"), new Guid("7A9206BD-33AF-47af-B832-D4128730E990"));\n }\n catch (Exception ex)\n {\n return ex.Message;\n }\n finally\n {\n KeyHandle = IntPtr.Zero;\n }\n \n return null;\n }\n \n private static void UpdateGpoRegistrySettingsAllowFreshCredentials(string applicationName, string[] serverNames, RegistryKey rootKey, string registryPath, bool hasNTLMOnlyUpdateBeenMade)\n {\n var registryPathCredentialsDelegation = registryPath + CredentialsDelegation;\n var credentialDelegationKey = rootKey.OpenSubKey(registryPathCredentialsDelegation, true);\n \n try\n {\n if (credentialDelegationKey == null)\n {\n credentialDelegationKey = rootKey.CreateSubKey(registryPathCredentialsDelegation, RegistryKeyPermissionCheck.ReadWriteSubTree);\n }\n \n credentialDelegationKey.SetValue(AllowFreshCredentials, 1, RegistryValueKind.DWord);\n credentialDelegationKey.SetValue(ConcatenateDefaultsAllowFresh, 1, RegistryValueKind.DWord);\n }\n finally\n {\n credentialDelegationKey.Dispose();\n credentialDelegationKey = null;\n }\n \n var allowFreshCredentialKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentials, true);\n \n try\n {\n\n if (allowFreshCredentialKey == null)\n {\n allowFreshCredentialKey = rootKey.CreateSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentials, RegistryKeyPermissionCheck.ReadWriteSubTree);\n }\n\n if (allowFreshCredentialKey != null)\n {\n var values = allowFreshCredentialKey.ValueCount;\n var valuesToAdd = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialKey.GetValueNames();\n var existingValues = new Dictionary<string, string>(StringComparer.OrdinalIgnoreCase);\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialKey.GetValue(valueName).ToString();\n \n if (!existingValues.ContainsKey(value))\n {\n existingValues.Add(value, value);\n }\n }\n \n foreach (var key in valuesToAdd.Keys)\n {\n if (!existingValues.ContainsKey(key))\n {\n allowFreshCredentialKey.SetValue(Convert.ToString(values + 1, CultureInfo.InvariantCulture), key, RegistryValueKind.String);\n values++;\n }\n }\n }\n }\n finally\n {\n allowFreshCredentialKey.Dispose();\n allowFreshCredentialKey = null;\n }\n\n if (hasNTLMOnlyUpdateBeenMade) {\n var allowFreshCredentialWhenNTLMOnlyKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentialsWhenNTLMOnly, true);\n \n try\n {\n\n if (allowFreshCredentialWhenNTLMOnlyKey == null)\n {\n allowFreshCredentialWhenNTLMOnlyKey = rootKey.CreateSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentialsWhenNTLMOnly, RegistryKeyPermissionCheck.ReadWriteSubTree);\n }\n\n if (allowFreshCredentialWhenNTLMOnlyKey != null)\n {\n var values = allowFreshCredentialWhenNTLMOnlyKey.ValueCount;\n var valuesToAdd = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialWhenNTLMOnlyKey.GetValueNames();\n var existingValues = new Dictionary<string, string>(StringComparer.OrdinalIgnoreCase);\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialWhenNTLMOnlyKey.GetValue(valueName).ToString();\n \n if (!existingValues.ContainsKey(value))\n {\n existingValues.Add(value, value);\n }\n }\n \n foreach (var key in valuesToAdd.Keys)\n {\n if (!existingValues.ContainsKey(key))\n {\n allowFreshCredentialWhenNTLMOnlyKey.SetValue(Convert.ToString(values + 1, CultureInfo.InvariantCulture), key, RegistryValueKind.String);\n values++;\n }\n }\n }\n }\n finally\n {\n allowFreshCredentialWhenNTLMOnlyKey.Dispose();\n allowFreshCredentialWhenNTLMOnlyKey = null;\n }\n }\n }\n \n private static void UpdateGpoRegistrySettingsRemoveServersFromFreshCredentials(string applicationName, string[] serverNames, RegistryKey rootKey, string registryPath)\n {\n var registryPathCredentialsDelegation = registryPath + CredentialsDelegation;\n \n using (var allowFreshCredentialKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentials, true))\n {\n if (allowFreshCredentialKey != null)\n {\n var valuesToRemove = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialKey.GetValueNames();\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialKey.GetValue(valueName).ToString();\n \n if (valuesToRemove.ContainsKey(value))\n {\n allowFreshCredentialKey.DeleteValue(valueName);\n }\n }\n }\n }\n\n using (var allowFreshCredentialWhenNTLMOnlyKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentialsWhenNTLMOnly, true))\n {\n if (allowFreshCredentialWhenNTLMOnlyKey != null)\n {\n var valuesToRemove = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialWhenNTLMOnlyKey.GetValueNames();\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialWhenNTLMOnlyKey.GetValue(valueName).ToString();\n \n if (valuesToRemove.ContainsKey(value))\n {\n allowFreshCredentialWhenNTLMOnlyKey.DeleteValue(valueName);\n }\n }\n }\n }\n }\n }\n }\n"@ # Cannot have leading whitespace on this line!\n}\n\n<#\n\n.SYNOPSIS\nClean up all added global variables, constants, etc.\n\n.DESCRIPTION\nClean up all added global variables, constants, etc.\n\n#>\n\nfunction cleanupScriptEnv() {\n Remove-Variable -Name WsManApplication -Scope Script -Force\n Remove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\n Remove-Variable -Name CredentialsDelegationPolicyPath -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsPath -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPath -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsPropertyName -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Scope Script -Force\n Remove-Variable -Name TypeAlreadyExistsHResult -Scope Script -Force\n Remove-Variable -Name NativeCode -Scope Script -Force\n}\n\n<#\n\n.SYNOPSIS\nEnable CredSSP client role on this computer.\n\n.DESCRIPTION\nEnable the CredSSP client role on this computer. This computer should be a \nWindows Admin Center gateway, desktop or service mode.\n\n#>\n\nfunction enableCredSSPClient() {\n $path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n\n Set-Item -Path $path True -Force -ErrorAction SilentlyContinue -ErrorVariable +err\n\n return $err\n}\n\n<#\n\n.SYNOPSIS\nGet if CredSSP is enabled on client.\n\n.DESCRIPTION\nGet if CredSSP is enabled on client for client role.\n\n#>\n\nfunction getCredSSPClientEnabled() {\n $credSSPClientEnabled = $false;\n\n $path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n $credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\n\n if ($credSSPClientService) {\n $credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n }\n\n return $credSSPClientEnabled\n}\n\n<#\n\n.SYNOPSIS\nGet the CredentialsDelegation container from the registry.\n\n.DESCRIPTION\nGet the CredentialsDelegation container from the registry. If the container\ndoes not exist then a new one will be created.\n\n#>\n\nfunction getCredentialsDelegationItem() {\n $credentialDelegationItem = Get-Item $CredentialsDelegationPolicyPath -ErrorAction SilentlyContinue\n if (-not ($credentialDelegationItem)) {\n $credentialDelegationItem = New-Item $CredentialsDelegationPolicyPath\n }\n\n return $credentialDelegationItem\n}\n\n<#\n\n.SYNOPSIS\nCreates the CredentialsDelegation\\AllowFreshCredentials / CredentialsDelegation\\AllowFreshCredentialsWhenNTLMOnly container from the registry.\n\n.DESCRIPTION\nCreate the CredentialsDelegation\\AllowFreshCredentials / CredentialsDelegation\\AllowFreshCredentialsWhenNTLMOnly container from the registry. If the container\ndoes not exist then a new one will be created.\n\n#>\n\nfunction createCredentialsDelegationItem([string] $propertyPath) {\n $allowFreshCredentialsItem = Get-Item $propertyPath -ErrorAction SilentlyContinue\n if (-not ($allowFreshCredentialsItem)) {\n New-Item $propertyPath\n }\n}\n\n<#\n\n.SYNOPSIS\nSet the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly property value in the CredentialsDelegation container.\n\n.DESCRIPTION\nSet the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly property value in the CredentialsDelegation container.\nIf the value exists then it is not changed.\n\n#>\n\nfunction setCredentialsDelegationProperty([Object] $credentialDelegationItem, [string] $propertyName) {\n $credentialDelegationItem | New-ItemProperty -Name $propertyName -Value 1 -Type DWord -Force\n}\n\n<#\n\n.SYNOPSIS\nAdd the passed in server(s) to the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly key/container.\n\n.DESCRIPTION\nAdd the passed in server(s) to the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly key/container. \nIf a given server is already present then do not add it again.\n\n#>\n\nfunction addServersToCredentialsDelegationItem([string[]] $serverNames, [string] $propertyName, [string] $propertyPath) {\n $valuesAdded = 0\n\n foreach ($serverName in $serverNames) {\n $newValue = "{0}/{1}" -f $WsManApplication, $serverName\n\n $hasValue = $false\n\n # Check if any registry-value nodes values of registry-key node have certain value.\n $key = Get-ChildItem $CredentialsDelegationPolicyPath | ? PSChildName -eq $propertyName\n\n if ($null -eq $key) {\n New-Item -Path $propertyPath\n $valueNames = @()\n } else {\n $valueNames = @($key.GetValueNames())\n\n foreach ($valueName in $valueNames) {\n $value = $key.GetValue($valueName)\n \n if ($value -eq $newValue) {\n $hasValue = $true\n break\n }\n }\n }\n\n if (-not ($hasValue)) {\n New-ItemProperty $propertyPath -Name ($valueNames.Length + 1) -Value $newValue -Force\n $valuesAdded++\n }\n }\n\n return $valuesAdded -gt 0\n}\n\n<#\n\n.SYNOPSIS\nAdd the passed in server(s) to the delegation list in the registry.\n\n.DESCRIPTION\nAdd the passed in server(s) to the delegation list in the registry.\n\n#>\n\nfunction addServersToDelegation([string[]] $serverNames) {\n # Get the CredentialsDelegation key/container\n $credentialDelegationItem = getCredentialsDelegationItem\n\n # Test, and create if needed, the AllowFreshCredentials property value\n setCredentialsDelegationProperty $credentialDelegationItem $AllowFreshCredentialsPropertyName\n # Test, and create if needed, the AllowFreshCredentialsWhenNTLMOnly property value\n setCredentialsDelegationProperty $credentialDelegationItem $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n\n # Create the AllowFreshCredentials key/container\n createCredentialsDelegationItem $AllowFreshCredentialsPath\n # Create the AllowFreshCredentialsWhenNTLMOnly key/container\n createCredentialsDelegationItem $AllowFreshCredentialsWhenNTLMOnlyPath\n\n # Add the servers to the AllowFreshCredentials key/container, if not already present\n $updateFreshCredentialsGroupPolicy = addServersToCredentialsDelegationItem $serverNames $AllowFreshCredentialsPropertyName $AllowFreshCredentialsPath\n # Add the servers to the AllowFreshCredentialsWhenNTLMOnly key/container, if not already present\n $updateFreshCredentialsWhenNTLMOnlyGroupPolicy = addServersToCredentialsDelegationItem $serverNames $AllowFreshCredentialsWhenNTLMOnlyPropertyName $AllowFreshCredentialsWhenNTLMOnlyPath\n\n if ($updateFreshCredentialsGroupPolicy) {\n $hasNTLMOnlyUpdateBeenMade = $false\n if ($updateFreshCredentialsWhenNTLMOnlyGroupPolicy) {\n $hasNTLMOnlyUpdateBeenMade = $true\n }\n setLocalGroupPolicy $serverNames $hasNTLMOnlyUpdateBeenMade\n }\n}\n\n<#\n\n.SYNOPSIS\nSet the local group policy to match the settings that have already been made.\n\n.DESCRIPTION\nLocal Group Policy must match the settings that were made by this script to\nensure that an older Local GP setting does not overwrite the thos settings.\n\n#>\n\nfunction setLocalGroupPolicy([string[]] $serverNames, [bool] $hasNTLMOnlyUpdateBeenMade) {\n try {\n Add-Type -TypeDefinition $NativeCode\n } catch {\n if ($_.Exception.HResult -ne $TypeAlreadyExistsHResult) {\n throw $_.Exception.Message\n }\n }\n\n $errorMessage = [SME.LocalGroupPolicy]::EnableAllowFreshCredentialsPolicy($serverNames, $hasNTLMOnlyUpdateBeenMade)\n\n if ($errorMessage) {\n throw $errorMessage\n }\n\n return $true\n}\n\n<#\n\n.SYNOPSIS\nMain function of this script.\n\n.DESCRIPTION\nEnable CredSSP client role and add the passed in servers to the list\nof servers to which this client can delegate credentials.\n\n#>\nfunction main([string[]] $serverNames) {\n setupScriptEnv\n\n try {\n # If client role is enabled, skip to adding servers to delegation\n if (-not (getCredSSPClientEnabled)) {\n # If not enabled try to enable\n $err = enableCredSSPClient\n if ($err) {\n # If there was an error, and server role is not enabled return error.\n if (-not (getCredSSPClientEnabled)) {\n throw $err\n }\n }\n }\n\n addServersToDelegation $serverNames\n } catch {\n Write-Error $_.Exception.Message\n\n throw $_.Exception.Message\n } finally {\n cleanupScriptEnv\n }\n\n return $true\n}\n\n###############################################################################\n# Script execution starts here\n###############################################################################\nif (-not ($env:pester)) {\n return main $serverNames\n}\n'},m.Enable_CredSspManagedServer={command:"Enable-CredSspManagedServer",script:'##Enable-CredSspManagedServer##:Enable-CredSspManagedServer.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable CredSSPServicePath -Option ReadOnly -Scope Script -Value "WSMan:\\localhost\\Service\\Auth\\CredSSP"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable CredSSPServicePath -Scope Script -Force\n}\nfunction getCredSSPServerEnabled()\n{\n$credSSPServerEnabled = $false;\n$credSSPServerService = Get-Item $CredSSPServicePath -ErrorAction SilentlyContinue\nif ($credSSPServerService) {\n$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)\n}\nreturn $credSSPServerEnabled\n}\nfunction enableCredSSP() {\n$err = $null\n$result = Enable-WSManCredSSP -Role Server -Force -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction main() {\nsetupScriptEnv\ntry {\nif (-not (getCredSSPServerEnabled)) {\n$err = enableCredSSP\nif ($err) {\nif (-not (getCredSSPServerEnabled)) {\nthrow $err\n}\n}\n}\n} catch {\nWrite-Error $err\nthrow $_.Exception.Message\n} finally {\ncleanupScriptEnv\n}\nreturn $true\n}\nif (-not ($env:pester)) {\nreturn main\n}\n'},m.Get_CredSspClientConfigurationOnGateway={command:"Get-CredSspClientConfigurationOnGateway",script:'##Get-CredSspClientConfigurationOnGateway##:Get-CredSspClientConfigurationOnGateway.ps1\nparam (\n[Parameter(Mandatory=$True)]\n[string[]]$serverNames\n)\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\nSet-Variable -Name CredentialsDelegationPolicyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation"\nSet-Variable -Name AllowFreshCredentialsPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentialsWhenNTLMOnly"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\nRemove-Variable -Name CredentialsDelegationPolicyPath -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsPropertyName -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Scope Script -Force\n}\nfunction getCredSSPClientStatus() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction verifyCredentialsDelegationRegKeyPresent([string] $registryKeyName) {\n$credentialDelegationItem = Get-Item $CredentialsDelegationPolicyPath -ErrorAction SilentlyContinue\nif ($credentialDelegationItem) {\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | Where-Object PSChildName -eq $registryKeyName\nif ($key -and $key.GetValueNames()) {\nreturn $True\n}\n}\nreturn $False\n}\nfunction getDelegatableServersListForRegKey([string]$registryKeyName) {\n$serversList = @()\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | Where-Object PSChildName -eq $registryKeyName\n$valueNames = $key.GetValueNames()\nforeach ($valueName in $valueNames) {\n$serversList += $key.GetValue($valueName).ToLower()\n}\nreturn $serversList\n}\nfunction main([string[]] $serverNames) {\nsetupScriptEnv\n$serverNames = $serverNames | ForEach-Object { $_.ToLower() }\n$isGatewayConfiguredAsClientRole = getCredSSPClientStatus\n$allowFreshCredentialsKeyPresent = verifyCredentialsDelegationRegKeyPresent $AllowFreshCredentialsPropertyName\n$allowFreshCredentialsWhenNTLMOnlyKeyPresent = verifyCredentialsDelegationRegKeyPresent $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n$allowFreshCredentialsDelegatableServers = @()\n$allowFreshCredentialsWhenNTLMOnlyDelegatableServers = @()\n$notDelegatableServers = @()\nif ($allowFreshCredentialsKeyPresent) {\n$freshCredentialsServers = getDelegatableServersListForRegKey $AllowFreshCredentialsPropertyName\n[array]$allowFreshCredentialsDelegatableServers = $serverNames | Where-Object { $freshCredentialsServers.Contains("$WsManApplication/$($_)") }\n}\nif (-not $allowFreshCredentialsDelegatableServers) {\n$allowFreshCredentialsDelegatableServers = @()\n}\nif ($allowFreshCredentialsWhenNTLMOnlyKeyPresent) {\n$freshCredentialsWhenNTLMServers = getDelegatableServersListForRegKey $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n[array]$allowFreshCredentialsWhenNTLMOnlyDelegatableServers = $serverNames | Where-Object { $freshCredentialsWhenNTLMServers.Contains("$WsManApplication/$($_)") }\n}\nif (-not $allowFreshCredentialsWhenNTLMOnlyDelegatableServers) {\n$allowFreshCredentialsWhenNTLMOnlyDelegatableServers = @()\n}\n[array]$notDelegatableServers = $serverNames | Where-Object { -not $allowFreshCredentialsDelegatableServers.Contains($_) -and -not $allowFreshCredentialsWhenNTLMOnlyDelegatableServers.Contains($_) }\nif (-not $notDelegatableServers) {\n$notDelegatableServers = @()\n}\ncleanupScriptEnv\n$result = [PSCustomObject]@{\nIsGatewayConfiguredAsClientRole = $isGatewayConfiguredAsClientRole\nAllowFreshCredentialsKeyPresent = $allowFreshCredentialsKeyPresent\nAllowFreshCredentialsWhenNTLMOnlyKeyPresent = $allowFreshCredentialsWhenNTLMOnlyKeyPresent\nAllowFreshCredsDelegatableServers = $allowFreshCredentialsDelegatableServers\nAllowFreshCredsWhenNTLMOnlyDelegatableServers = $allowFreshCredentialsWhenNTLMOnlyDelegatableServers\nNotDelegatableServers = $notDelegatableServers\n}\nreturn $result\n}\nreturn main $serverNames\n'},m.Get_CredSspClientRole={command:"Get-CredSspClientRole",script:'##Get-CredSspClientRole##:Get-CredSspClientRole.ps1\nparam (\n[Parameter(Mandatory=$True)]\n[string[]]$serverNames\n)\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\nSet-Variable -Name CredentialsDelegationPolicyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation"\nSet-Variable -Name AllowFreshCredentialsPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentialsWhenNTLMOnly"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\nRemove-Variable -Name CredentialsDelegationPolicyPath -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsPropertyName -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Scope Script -Force\n}\nfunction getCredSSPClientEnabled() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction getServersDelegated([string[]] $serverNames, [string] $propertyName) {\n$valuesFound = 0\nforeach ($serverName in $serverNames) {\n$newValue = "{0}/{1}" -f $WsManApplication, $serverName\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | ? PSChildName -eq $propertyName\n$valueNames = $key.GetValueNames()\nforeach ($valueName in $valueNames) {\n$value = $key.GetValue($valueName)\nif ($value -eq $newValue) {\n$valuesFound++\nbreak\n}\n}\n}\nreturn $valuesFound -eq $serverNames.Length\n}\nfunction areCredentialsDelegationItemsPresent([string] $propertyName) {\n$credentialDelegationItem = Get-Item $CredentialsDelegationPolicyPath -ErrorAction SilentlyContinue\nif ($credentialDelegationItem) {\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | ? PSChildName -eq $propertyName\nif ($key) {\n$valueNames = $key.GetValueNames()\nif ($valueNames) {\nreturn $true\n}\n}\n}\nreturn $false\n}\nfunction main([string[]] $serverNames) {\nsetupScriptEnv\n$isServersDelegatedToAllowFreshCredentials = $false\n$isServersDelegatedToAllowFreshCredentialsWhenNTLMOnly = $false\n$isClientEnabled = getCredSSPClientEnabled\nif (areCredentialsDelegationItemsPresent $AllowFreshCredentialsPropertyName) {\n$isServersDelegatedToAllowFreshCredentials = getServersDelegated $serverNames $AllowFreshCredentialsPropertyName\n}\nif (areCredentialsDelegationItemsPresent $AllowFreshCredentialsWhenNTLMOnlyPropertyName) {\n$isServersDelegatedToAllowFreshCredentialsWhenNTLMOnly = getServersDelegated $serverNames $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n}\ncleanupScriptEnv\nreturn $isClientEnabled -and $isServersDelegatedToAllowFreshCredentials -and $isServersDelegatedToAllowFreshCredentialsWhenNTLMOnly\n}\nreturn main $serverNames\n'},m.Get_CredSspManagedServer={command:"Get-CredSspManagedServer",script:'##Get-CredSspManagedServer##:Get-CredSspManagedServer.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPServiceAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Service\\Auth\\CredSSP"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPServiceAuthPath -Scope Script -Force\n}\nfunction getCredSSPServerEnabled() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPServiceAuthPath\n$credSSPServerEnabled = $false;\n$credSSPServerService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPServerService) {\n$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)\n}\nreturn $credSSPServerEnabled\n}\nfunction main() {\nsetupScriptEnv\n$result = getCredSSPServerEnabled\ncleanupScriptEnv\nreturn $result\n}\nif (-not ($env:pester)) {\nreturn main\n}\n'},m.Test_CredSsp={command:"Test-CredSsp",script:"##Test-CredSsp##:Test-CredSsp.ps1\nparam (\n[Parameter(Mandatory = $true)]\n[string]\n$ServerName,\n[Parameter(Mandatory = $true)]\n[string]\n$Username,\n[Parameter(Mandatory = $true)]\n[string]\n$Password\n)\n$secure_password = ConvertTo-SecureString $Password -AsPlainText -Force\n$cred = New-Object System.Management.Automation.PSCredential ($Username, $secure_password)\nTest-WSMan -computerName $ServerName -Authentication Credssp -Credential $cred\n"}}(c=f.CredSsp||(f.CredSsp={})),function(m){m.Get_ArcStatus={command:"Get-ArcStatus",script:'##Get-ArcStatus##:Get-ArcStatus.ps1\n$LogName = "Microsoft-ServerManagementExperience"\n$LogSource = "SMEScript"\n$ScriptName = "Get-ArcStatus.ps1"\n$AzcmagentExecutable = "$env:ProgramFiles\\AzureConnectedMachineAgent\\azcmagent.exe"\nfunction main() {\n$service = Get-Service -Name himds -ErrorVariable Err -ErrorAction SilentlyContinue\nif(!!$Err){\n$Err = "Failed to retrieve HIMDS service. Details: $Err"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "NotInstalled"\n}\nelseif ($service.Status -ne "Running") {\n$Err = "The Azure arc agent is not running. Details: HIMDS service is $($service.Status)"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "Disconnected"\n}\nelse {\n$rawStatus = Invoke-Command { & $AzcmagentExecutable show --json --log-stderr } -ErrorVariable Err 2>$null\nif (!!$Err) {\n$Err = "The Azure arc agent failed to communicate. Details: $rawStatus"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "Disconnected"\n}\nelseif (!$rawStatus) {\n$Err = "The Azure arc agent is not connected. Details: $rawStatus"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "Disconnected"\n}\nelse {\n$status = ($rawStatus | ConvertFrom-Json -ErrorAction Stop).status\n}\n}\n$computerSummary = Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\\Select-Object Name\n@{\nazureArcStatus = $status\ncomputerName = $computerSummary.Name\n}\n}\nif (-not ($env:pester)) {\nMicrosoft.PowerShell.Management\\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue\nreturn main\n}\n'},m.Get_RebootPendingStatus={command:"Get-RebootPendingStatus",script:'##Get-RebootPendingStatus##:Get-RebootPendingStatus.ps1\nimport-module CimCmdlets\nfunction Get-ComputerNameChangeStatus {\n$currentComputerName = (Get-ItemProperty "HKLM:SYSTEM\\CurrentControlSet\\Control\\ComputerName\\ComputerName"-ErrorAction SilentlyContinue).ComputerName\n$activeComputerName = (Get-ItemProperty "HKLM:SYSTEM\\CurrentControlSet\\Control\\ComputerName\\ActiveComputerName"-ErrorAction SilentlyContinue).ComputerName\nreturn $currentComputerName -ne $activeComputerName\n}\nfunction Get-CCMRebootPending {\n$status = Invoke-WmiMethod -Namespace "ROOT\\ccm\\ClientSDK" -Class CCM_ClientUtilities -Name ` DetermineIfRebootPending -ErrorAction SilentlyContinue\nreturn $status\n}\nfunction Test-PendingReboot {\nif ($value = Get-ChildItem "HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Component Based Servicing\\RebootPending" -ErrorAction Ignore) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = $value\n}\n}\nif ($value = Get-Item "HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WindowsUpdate\\Auto Update\\RebootRequired" -ErrorAction Ignore) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = $value\n}\n}\nif (Get-ComputerNameChangeStatus) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = \'Computer ID changed\'\n}\n}\n$status = Get-CCMRebootPending\nif (($status -ne $null) -and $status.RebootPending) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = $status\n}\n}\nreturn @{\nrebootRequired = $false\nadditionalInformation = $null\n}\n}\nTest-PendingReboot\n'},m.Get_ScheduledTask={command:"Get-ScheduledTask",script:"##Get-ScheduledTask##:Get-ScheduledTask.ps1\nImport-Module ScheduledTasks -ErrorAction SilentlyContinue\nGet-ScheduledTaskInfo -TaskName WACInstallUpdates\n"},m.Get_UpdateStatus={command:"Get-UpdateStatus",script:"##Get-UpdateStatus##:Get-UpdateStatus.ps1\n$fileContent = Get-Content $env:temp\\InstallLog.txt -ErrorAction SilentlyContinue\nif($null -eq $fileContent){\nreturn @{failedToUpdate = $false}\n}\n$file_data = Get-Content $env:temp\\InstallLog.txt | Where-Object { $_ -like '*Windows Admin Center -- Installation failed*' }\nif ( $file_data ) {\nreturn @{failedToUpdate = $true}\n}\nreturn @{failedToUpdate = $false}\n"},m.New_WindowsAdminCenterUpdateSchedule={command:"New-WindowsAdminCenterUpdateSchedule",script:'##New-WindowsAdminCenterUpdateSchedule##:New-WindowsAdminCenterUpdateSchedule.ps1\nparam (\n[Parameter(Mandatory = $true)]\n[string]$installTime,\n[Parameter(Mandatory = $true)]\n[string]$downloadWACUrl,\n[Parameter(Mandatory = $true)]\n[bool]$installNow,\n[Parameter(Mandatory = $true)]\n[boolean]\n$fromTaskScheduler\n)\nImport-Module ScheduledTasks -ErrorAction SilentlyContinue\nfunction newWindowsAdminCenterUpdateSchedule() {\nparam (\n[string]\n$downloadWACUrl\n)\nfunction Get-CurrentSslCertificates([string]$portNumber) {\nWrite-Host "Retrieving current certificate for $portNumber"\n$netshCommand = "netsh http show sslcert ipport=0.0.0.0:{0}" -f $portNumber\n$portCertificate = (Invoke-Expression $netshCommand) -Join \' \'\n$pattern = "Certificate hash\\s+: (\\w+)"\n$thumbprint = $portCertificate | Microsoft.PowerShell.Utility\\Select-String -Pattern $pattern | ForEach-Object { $_ -match $pattern > $null; $matches[1] };\nreturn @{ thumbprint = $thumbprint }\n}\nfunction Set-ErrorLogContent {\nParam(\n[Parameter(Mandatory = $True)]\n[bool] $failedToUpdate,\n[Parameter(Mandatory = $True)]\n[string] $errorCode,\n[Parameter(Mandatory = $True)]\n[string] $errorMessage\n)\n$errorLogFile = $env:temp + "\\WindowsAdminCenterErrorLogFile.json"\n$fileContents = ""\n$errorContent = "{ ""failedToUpdate"": ""$($failedToUpdate)"", ""time"": ""$(Get-Date)"", ""errorCode"": ""$($errorCode)"", ""errorMessage"": ""$($errorMessage)""}"\nif (-Not(Test-Path $errorLogFile)) {\nnew-item $errorLogFile\n$json = \'{\n"errors":[]\n}\'\n$fileContents = ConvertFrom-Json -InputObject $json\n}\nelse {\n$fileContents = ([System.IO.File]::ReadAllText($errorLogFile) | ConvertFrom-Json)\nif ($fileContents.errors -eq $null) {\n$json = \'{\n"errors":[]\n}\'\n$fileContents = ConvertFrom-Json -InputObject $json\n}\n}\n$fileContents.errors += $errorContent\nConvertTo-Json -InputObject $fileContents | Out-File $errorLogFile\n}\n$serviceFound = Get-Service ServerManagementGateway -ErrorAction SilentlyContinue\nif ($null -eq $serviceFound) {\n$isServiceMode = $false\n}\nelse {\n$isServiceMode = $true\n}\n$isHAEnabled = "false"\nif (Test-Path -Path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway\\Ha") {\n$HARegistryResult = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway\\HA" -Name isHAEnabled\n$isHAEnabled = $HARegistryResult\n}\n$registryResult = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway" -Name SmePort\n$port = $registryResult\n$directoryForDownload = "$($env:Temp)"\n$tempDlPath = $directoryForDownload + "\\WAC.msi"\n$privacyType = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway" -Name SmeTelemetryPrivacyType\n$devMode = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway" -Name DevMode\nif ($null -eq $devMode -or \'\' -eq $devMode) {\n$devMode = \'0\'\n}\n$testConnection = Test-NetConnection\nif ($testConnection.pingSucceeded -eq $false) {\n$errorMessage = "InternetConnectionFailed"\nSet-ErrorLogContent $true "503" $errorMessage\nreturn $errorMessage\n}\nif ($isServiceMode -eq $true) {\nStop-Service ServerManagementGateway\n}\nelse {\nStop-Process -Name SmeDesktop\n}\nfor ($i = 1; $i -le 5 ; $i++) {\ntry {\nInvoke-WebRequest $downloadWACUrl -OutFile $tempDlPath -ErrorVariable +err\nBreak\n}\ncatch {\nif ($i -ge 5) {\n$statusMessage = $Error[0].Exception.Message\n$errorMessage = "WACDownloadNotFound " + $statusMessage\nSet-ErrorLogContent $true "404" $errorMessage\nreturn @{err = $err }\n}\nelse {\nStart-Sleep -s 1\n}\n}\n}\n$logPath = "$($env:Temp)" + "\\installLog.txt"\n$certResults = Get-CurrentSslCertificates($port)\n$certThumbprint = $certResults.thumbprint\nif ($isHAEnabled -eq "true") {\n$zipFilePath = $directoryForDownload + "Install-WindowsAdminCenterHA-1907.zip"\nInvoke-WebRequest "http://aka.ms/WACHAScript" -OutFile $zipFilePath\nExpand-Archive -Path $zipFilePath -DestinationPath $directoryForDownload -Verbose -Force\nRemove-Item $zipFilePath\nSet-Location $directoryForDownload # so we can locate and run the install-WindowsAdminCenterHA.ps1 script\n.\\Install-WindowsAdminCenterHA.ps1 -msiPath $tempDlPath -Verbose\n}\nelse {\n$exitCode = 0;\n$updateFailed = $false\nif ($null -eq $certThumbprint) {\n$process = Start-Process -NoNewWindow -Wait -FilePath \'msiexec.exe\' `\n-ArgumentList "/i $tempDlPath /qn /L*v ""$($logPath)"" SME_PORT=$port SSL_CERTIFICATE_OPTION=generate DEV_MODE=$devMode SME_TELEMETRY_PRIVACY_TYPE=$privacyType" `\n-Passthru\n$exitCode = $process.exitCode\n}\nelse {\n$process = Start-Process -NoNewWindow -Wait -FilePath "msiexec.exe" `\n-ArgumentList "/i $tempDlPath /qn /L*v ""$($logPath)"" SME_PORT=$port SME_THUMBPRINT=$certThumprint SSL_CERTIFICATE_OPTION=installed DEV_MODE=$devMode SME_TELEMETRY_PRIVACY_TYPE=$privacyType" `\n-Passthru\n$exitCode = $process.exitCode\n}\n$errorMessage = "WAC_InstallSuccessful"\nif ( $exitCode -ne 0 ) {\n$errorMessage = "WAC_InstallFailed"\n$updateFailed = $true\n}\nSet-ErrorLogContent $updateFailed $exitCode $errorMessage\nif ($isServiceMode -eq $true) {\nRestart-Service ServerManagementGateway\n}\nelse {\nStart-Process "$env:ProgramFiles\\Windows Admin Center\\SmeDesktop.exe"\n}\n}\nRemove-item $tempDlPath\n}\nenum UpdateScheduleErrorCode {\nnoError = 0\nscriptNotCreated = 1\nnotAnAdmin = 2\nschedulerNoConnection = 3\n}\n$isWdacEnforced = $ExecutionContext.SessionState.LanguageMode -eq \'ConstrainedLanguage\';\nif ($isWdacEnforced) {\nif ($fromTaskScheduler) {\nnewWindowsAdminCenterUpdateSchedule $downloadWACUrl;\nreturn;\n}\n}\nelse {\n$ScriptFile = $env:Temp + "\\WACInstall-Updates.ps1"\n}\n$Scheduler = New-Object -ComObject Schedule.Service\nfor ($i = 1; $i -le 3; $i++) {\nTry {\n$Scheduler.Connect()\nBreak\n}\nCatch {\nif ($i -ge 3) {\nWrite-EventLog -LogName Application -Source "SME Windows Updates Install Updates" -EntryType Error -EventID 1 -Message "Can\'t connect to Schedule service"\nWrite-Error "Can\'t connect to Schedule service" -ErrorAction Stop\nreturn @{\nIsSuccess = $false\nErrorCode = [UpdateScheduleErrorCode]::schedulerNoConnection\n}\n}\nelse {\nStart-Sleep -s 1\n}\n}\n}\n$cmdInstallNowValue = if ($installNow -eq $true) { "`$true" } else { "`$false" }\nif ($isWdacEnforced) {\n$arg = "-WindowStyle Hidden -command ""&{Import-Module Microsoft.SME.Shell; New-WACSHWindowsAdminCenterUpdateSchedule -fromTaskScheduler `$true -installTime $installTime -installNow $cmdInstallNowValue -downloadWACUrl $downloadWACUrl}"""\n}\nelse {\n(Get-Command newWindowsAdminCenterUpdateSchedule).ScriptBlock | Set-Content -path $ScriptFile\nif (-Not(Test-Path $ScriptFile)) {\n$message = "Failed to create file:" + $ScriptFile\nWrite-Error $message\nreturn @{\nIsSuccess = $false\nErrorCode = [UpdateScheduleErrorCode]::scriptNotCreated\n}\n}\n$arg = "-WindowStyle Hidden -File $ScriptFile -downloadWACUrl $downloadWACUrl"\n}\n$RootFolder = $Scheduler.GetFolder("\\")\n$taskName = "WACInstallUpdates"\nif ($RootFolder.GetTasks(0) | Where-Object { $_.Name -eq $taskName }) {\nWrite-Debug("Deleting existing task" + $taskName)\nUnregister-ScheduledTask -TaskName \'WACInstallUpdates\' -Confirm:$false\n}\n$taskTrigger = New-ScheduledTaskTrigger -Once -At $installTime\n$taskSettings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -WakeToRun -RunOnlyIfNetworkAvailable\n$taskAction = New-ScheduledTaskAction `\n-Execute \'powershell.exe\' `\n-Argument $arg\n$description = "Update WAC to the latest version at the defined time"\n$id = [System.Security.Principal.WellKnownSidtype]::BuiltinAdministratorsSid\n$x = new-object System.Security.Principal.SecurityIdentifier -ArgumentList $id, $null\n$translatedID = $x.Translate([System.Security.Principal.NTAccount])\n$taskPrincipal = New-ScheduledTaskPrincipal -GroupId $translatedID.value -RunLevel Highest\nRegister-ScheduledTask `\n-TaskName $taskName `\n-Action $taskAction `\n-Trigger $taskTrigger `\n-Description $description `\n-Settings $taskSettings `\n-Principal $taskPrincipal | Out-Null\nif ($installNow -eq $true) {\nStart-ScheduledTask -TaskName "WACInstallUpdates"\n}\nreturn @{\nIsSuccess = $true\nErrorCode = [UpdateScheduleErrorCode]::noError\n}\n'},m.Remove_InstallUpdateScheduledTask={command:"Remove-InstallUpdateScheduledTask",script:"##Remove-InstallUpdateScheduledTask##:Remove-InstallUpdateScheduledTask.ps1\nImport-Module ScheduledTasks -ErrorAction SilentlyContinue\nUnregister-ScheduledTask -TaskName 'WACInstallUpdates' -Confirm:$false\n"}}(N=f.Updates||(f.Updates={}))}(u||(u={}))},9906:(W,F,d)=>{"use strict";var u=d(6150),s=(d(4155),d(5281)),b=d(8714),c=d(5610),N=d(3678),m=d(7011),E=d(564),M=d(5930);let L=(()=>{class g{preload(l,o){return l.data&&l.data.preload?o():(0,M.of)(null)}static \u0275fac=function(o){return new(o||g)};static \u0275prov=s.Yz7({token:g,factory:g.\u0275fac})}return g})();var I=d(1387);const x=[{path:"extensions",loadChildren:()=>d.e(177).then(d.bind(d,2177)).then(g=>g.ExtensionsRootModule)},{path:"",loadChildren:()=>Promise.all([d.e(420),d.e(576),d.e(817),d.e(975),d.e(531),d.e(380),d.e(485),d.e(417),d.e(709)]).then(d.bind(d,2709)).then(g=>g.ShellModule)}];let z=(()=>{class g{static \u0275fac=function(o){return new(o||g)};static \u0275mod=s.oAB({type:g});static \u0275inj=s.cJS({imports:[I.Bz.forRoot(x,{initialNavigation:"enabledBlocking",preloadingStrategy:L}),I.Bz]})}return g})(),_=(()=>{class g{static \u0275fac=function(o){return new(o||g)};static \u0275cmp=s.Xpm({type:g,selectors:[["sme-root"]],decls:1,vars:0,template:function(o,h){1&o&&s._UZ(0,"router-outlet")},dependencies:[I.lC],encapsulation:2})}return g})(),X=(()=>{class g{static \u0275fac=function(o){return new(o||g)};static \u0275mod=s.oAB({type:g,bootstrap:[_]});static \u0275inj=s.cJS({providers:[L],imports:[m.ez,u.b2,z,E.ioB]})}return g})();var K=d(4174),U=d(3905);var Z=d(3054);let Q=(()=>class g{static version="4.174.0"})();(0,s.G48)();const D={name:N.Xd.nameOfShell,version:Q.version,powerShellModuleName:Z.B.module,powerShellPrefix:Z.B.powerShellPrefix,isProduction:true},Y={},G={};let q=MsftSme.noop;if(window.location.pathname.startsWith("/extensions/")||window.location.pathname.startsWith("/idle"))D.name="msft.sme.shell-extensions",G.websocket=!0,G.cssV2=!0,window.location.pathname.startsWith("/extensions/background")&&(G.disableAccessibility=!0,G.disableStyleInjection=!0);else{console.log('%cWelcome to the Windows Admin Center debugging api. Type "MsftSme.help()" to see a list of available commands',"font-size: medium; font-weight: bold; color: #0078D7;");const g=MsftSme.getLocationSearchParameter("l");g&&!MsftSme.isNullOrWhiteSpace(g.value)&&(Y.azureLocale=g.value),q=()=>{MsftSme.self().Host.isElectron&&(MsftSme.self().Environment.loadPath=location.href.substring(0,location.href.indexOf("/index.html")));const A=MsftSme.getStrings();U.c.setProgressValue("10",A.MsftSmeShell.App.Splash.Messages.preparingAssets),K.X.initialize(true),U.c.setProgressValue("20",A.MsftSmeShell.App.Splash.Messages.bootstrappingAngular)}}b.R.initialize(D,Y,G).then(()=>{q(),u.q6().bootstrapModule(X)},g=>{const A=g;if(!A.extendedSource&&A.extendedSource!==c.U.sources.getNoCache&&A.extendedSource!==c.U.sources.aadSso)throw g;if(A.extendedSource===c.U.sources.aadSso&&!MsftSme.isNullOrWhiteSpace(A.message))return U.c.aadSsoError(A.message),void console.error(A);const l=new URL(A.extended.url);if(403===A.extended.status){const o=window.location,h=new URLSearchParams(o.search),v=new URLSearchParams;for(const $ of["l","theme","staticVersion"])h.has($)&&v.append($,h.get($));const S=encodeURI(o.origin+o.pathname);v.append("redirect",S),window.location.replace(`${l.origin}?${v.toString()}`)}else(0===A.extended.status||404===A.extended.status)&&console.error(`Couldn't access to ${l.origin}: ${A.message}`)})},4155:(W,F,d)=>{"use strict";d(1122),d(5753)},4915:(W,F,d)=>{"use strict";d.d(F,{CA:()=>A,Tb:()=>g,Tx:()=>q,Y:()=>_,kz:()=>U});var u,f,s,b,c=function(l,o){return{name:l,value:void 0===o?-1:o,delta:0,entries:[],id:"v2-".concat(Date.now(),"-").concat(Math.floor(8999999999999*Math.random())+1e12)}},N=function(l,o){try{if(PerformanceObserver.supportedEntryTypes.includes(l)){if("first-input"===l&&!("PerformanceEventTiming"in self))return;var h=new PerformanceObserver(function(v){return v.getEntries().map(o)});return h.observe({type:l,buffered:!0}),h}}catch{}},m=function(l,o){var h=function v(S){"pagehide"!==S.type&&"hidden"!==document.visibilityState||(l(S),o&&(removeEventListener("visibilitychange",v,!0),removeEventListener("pagehide",v,!0)))};addEventListener("visibilitychange",h,!0),addEventListener("pagehide",h,!0)},E=function(l){addEventListener("pageshow",function(o){o.persisted&&l(o)},!0)},M=function(l,o,h){var v;return function(S){o.value>=0&&(S||h)&&(o.delta=o.value-(v||0),(o.delta||void 0===v)&&(v=o.value,l(o)))}},L=-1,I=function(){return"hidden"===document.visibilityState?0:1/0},x=function(){m(function(l){L=l.timeStamp},!0)},z=function(){return L<0&&(L=I(),x(),E(function(){setTimeout(function(){L=I(),x()},0)})),{get firstHiddenTime(){return L}}},_=function(l,o){var h,v=z(),S=c("FCP"),$=function(e){"first-contentful-paint"===e.name&&(O&&O.disconnect(),e.startTime<v.firstHiddenTime&&(S.value=e.startTime,S.entries.push(e),h(!0)))},C=window.performance&&performance.getEntriesByName&&performance.getEntriesByName("first-contentful-paint")[0],O=C?null:N("paint",$);(C||O)&&(h=M(l,S,o),C&&$(C),E(function(e){S=c("FCP"),h=M(l,S,o),requestAnimationFrame(function(){requestAnimationFrame(function(){S.value=performance.now()-e.timeStamp,h(!0)})})}))},X=!1,K=-1,U=function(l,o){X||(_(function(n){K=n.value}),X=!0);var h,v=function(n){K>-1&&l(n)},S=c("CLS",0),$=0,C=[],O=function(n){n.hadRecentInput||($&&n.startTime-C[C.length-1].startTime<1e3&&n.startTime-C[0].startTime<5e3?($+=n.value,C.push(n)):($=n.value,C=[n]),$>S.value&&(S.value=$,S.entries=C,h()))},e=N("layout-shift",O);e&&(h=M(v,S,o),m(function(){e.takeRecords().map(O),h(!0)}),E(function(){$=0,K=-1,S=c("CLS",0),h=M(v,S,o)}))},V={passive:!0,capture:!0},Z=new Date,Q=function(l,o){u||(u=o,f=l,s=new Date,G(removeEventListener),D())},D=function(){if(f>=0&&f<s-Z){var l={entryType:"first-input",name:u.type,target:u.target,cancelable:u.cancelable,startTime:u.timeStamp,processingStart:u.timeStamp+f};b.forEach(function(o){o(l)}),b=[]}},Y=function(l){if(l.cancelable){var o=(l.timeStamp>1e12?new Date:performance.now())-l.timeStamp;"pointerdown"==l.type?(h=o,v=l,S=function(){Q(h,v),C()},$=function(){C()},C=function(){removeEventListener("pointerup",S,V),removeEventListener("pointercancel",$,V)},addEventListener("pointerup",S,V),addEventListener("pointercancel",$,V)):Q(o,l)}var h,v,S,$,C},G=function(l){["mousedown","keydown","touchstart","pointerdown"].forEach(function(o){return l(o,Y,V)})},q=function(l,o){var h,v=z(),S=c("FID"),$=function(O){O.startTime<v.firstHiddenTime&&(S.value=O.processingStart-O.startTime,S.entries.push(O),h(!0))},C=N("first-input",$);h=M(l,S,o),C&&m(function(){C.takeRecords().map($),C.disconnect()},!0),C&&E(function(){S=c("FID"),h=M(l,S,o),b=[],f=-1,u=null,G(addEventListener),b.push($),D()})},ee={},g=function(l,o){var h,v=z(),S=c("LCP"),$=function(e){var n=e.startTime;n<v.firstHiddenTime&&(S.value=n,S.entries.push(e),h())},C=N("largest-contentful-paint",$);if(C){h=M(l,S,o);var O=function(){ee[S.id]||(C.takeRecords().map($),C.disconnect(),ee[S.id]=!0,h(!0))};["keydown","click"].forEach(function(e){addEventListener(e,O,{once:!0,capture:!0})}),m(O,!0),E(function(e){S=c("LCP"),h=M(l,S,o),requestAnimationFrame(function(){requestAnimationFrame(function(){S.value=performance.now()-e.timeStamp,ee[S.id]=!0,h(!0)})})})}},A=function(l){var o,h=c("TTFB");o=function(){try{var v=performance.getEntriesByType("navigation")[0]||function(){var S=performance.timing,$={entryType:"navigation",startTime:0};for(var C in S)"navigationStart"!==C&&"toJSON"!==C&&($[C]=Math.max(S[C]-S.navigationStart,0));return $}();if(h.value=h.delta=v.responseStart,h.value<0||h.value>performance.now())return;h.entries=[v],l(h)}catch{}},"complete"===document.readyState?setTimeout(o,0):addEventListener("load",function(){return setTimeout(o,0)})}},6616:(W,F,d)=>{var u={"./af":76,"./af.js":76,"./ar":9392,"./ar-dz":9786,"./ar-dz.js":9786,"./ar-kw":9616,"./ar-kw.js":9616,"./ar-ly":2415,"./ar-ly.js":2415,"./ar-ma":1950,"./ar-ma.js":1950,"./ar-sa":7565,"./ar-sa.js":7565,"./ar-tn":4264,"./ar-tn.js":4264,"./ar.js":9392,"./az":3843,"./az.js":3843,"./be":7544,"./be.js":7544,"./bg":5557,"./bg.js":5557,"./bm":4431,"./bm.js":4431,"./bn":8769,"./bn-bd":3546,"./bn-bd.js":3546,"./bn.js":8769,"./bo":4012,"./bo.js":4012,"./br":9654,"./br.js":9654,"./bs":6772,"./bs.js":6772,"./ca":8172,"./ca.js":8172,"./cs":4145,"./cs.js":4145,"./cv":5084,"./cv.js":5084,"./cy":7684,"./cy.js":7684,"./da":2621,"./da.js":2621,"./de":268,"./de-at":5784,"./de-at.js":5784,"./de-ch":4364,"./de-ch.js":4364,"./de.js":268,"./dv":5772,"./dv.js":5772,"./el":1758,"./el.js":1758,"./en-au":2557,"./en-au.js":2557,"./en-ca":4831,"./en-ca.js":4831,"./en-gb":9589,"./en-gb.js":9589,"./en-ie":6950,"./en-ie.js":6950,"./en-il":7356,"./en-il.js":7356,"./en-in":3623,"./en-in.js":3623,"./en-nz":3223,"./en-nz.js":3223,"./en-sg":6268,"./en-sg.js":6268,"./eo":4190,"./eo.js":4190,"./es":6983,"./es-do":611,"./es-do.js":611,"./es-mx":2010,"./es-mx.js":2010,"./es-us":7210,"./es-us.js":7210,"./es.js":6983,"./et":4419,"./et.js":4419,"./eu":8558,"./eu.js":8558,"./fa":9169,"./fa.js":9169,"./fi":8719,"./fi.js":8719,"./fil":4176,"./fil.js":4176,"./fo":8604,"./fo.js":8604,"./fr":4354,"./fr-ca":1744,"./fr-ca.js":1744,"./fr-ch":4285,"./fr-ch.js":4285,"./fr.js":4354,"./fy":7505,"./fy.js":7505,"./ga":1667,"./ga.js":1667,"./gd":5128,"./gd.js":5128,"./gl":2411,"./gl.js":2411,"./gom-deva":172,"./gom-deva.js":172,"./gom-latn":4252,"./gom-latn.js":4252,"./gu":9612,"./gu.js":9612,"./he":9301,"./he.js":9301,"./hi":9232,"./hi.js":9232,"./hr":1094,"./hr.js":1094,"./hu":9430,"./hu.js":9430,"./hy-am":719,"./hy-am.js":719,"./id":2186,"./id.js":2186,"./is":1763,"./is.js":1763,"./it":765,"./it-ch":6969,"./it-ch.js":6969,"./it.js":765,"./ja":9834,"./ja.js":9834,"./jv":4278,"./jv.js":4278,"./ka":3959,"./ka.js":3959,"./kk":4302,"./kk.js":4302,"./km":1573,"./km.js":1573,"./kn":2808,"./kn.js":2808,"./ko":3006,"./ko.js":3006,"./ku":2370,"./ku.js":2370,"./ky":3965,"./ky.js":3965,"./lb":8729,"./lb.js":8729,"./lo":3297,"./lo.js":3297,"./lt":8418,"./lt.js":8418,"./lv":9153,"./lv.js":9153,"./me":2569,"./me.js":2569,"./mi":223,"./mi.js":223,"./mk":9234,"./mk.js":9234,"./ml":3043,"./ml.js":3043,"./mn":6420,"./mn.js":6420,"./mr":1637,"./mr.js":1637,"./ms":8068,"./ms-my":4459,"./ms-my.js":4459,"./ms.js":8068,"./mt":9128,"./mt.js":9128,"./my":6525,"./my.js":6525,"./nb":8897,"./nb.js":8897,"./ne":2387,"./ne.js":2387,"./nl":9534,"./nl-be":6937,"./nl-be.js":6937,"./nl.js":9534,"./nn":2817,"./nn.js":2817,"./oc-lnc":7214,"./oc-lnc.js":7214,"./pa-in":4973,"./pa-in.js":4973,"./pl":2878,"./pl.js":2878,"./pt":2608,"./pt-br":4452,"./pt-br.js":4452,"./pt.js":2608,"./ro":8095,"./ro.js":8095,"./ru":5819,"./ru.js":5819,"./sd":2149,"./sd.js":2149,"./se":6870,"./se.js":6870,"./si":8647,"./si.js":8647,"./sk":871,"./sk.js":871,"./sl":4347,"./sl.js":4347,"./sq":4741,"./sq.js":4741,"./sr":5074,"./sr-cyrl":2928,"./sr-cyrl.js":2928,"./sr.js":5074,"./ss":4577,"./ss.js":4577,"./sv":6967,"./sv.js":6967,"./sw":7580,"./sw.js":7580,"./ta":9384,"./ta.js":9384,"./te":8228,"./te.js":8228,"./tet":74,"./tet.js":74,"./tg":6952,"./tg.js":6952,"./th":1539,"./th.js":1539,"./tk":2277,"./tk.js":2277,"./tl-ph":252,"./tl-ph.js":252,"./tlh":8966,"./tlh.js":8966,"./tr":2200,"./tr.js":2200,"./tzl":509,"./tzl.js":509,"./tzm":2231,"./tzm-latn":1580,"./tzm-latn.js":1580,"./tzm.js":2231,"./ug-cn":5582,"./ug-cn.js":5582,"./uk":4162,"./uk.js":4162,"./ur":5284,"./ur.js":5284,"./uz":9449,"./uz-latn":8127,"./uz-latn.js":8127,"./uz.js":9449,"./vi":7288,"./vi.js":7288,"./x-pseudo":8275,"./x-pseudo.js":8275,"./yo":5249,"./yo.js":5249,"./zh-cn":8119,"./zh-cn.js":8119,"./zh-hk":9610,"./zh-hk.js":9610,"./zh-mo":3741,"./zh-mo.js":3741,"./zh-tw":7512,"./zh-tw.js":7512};function f(b){var c=s(b);return d(c)}function s(b){if(!d.o(u,b)){var c=new Error("Cannot find module '"+b+"'");throw c.code="MODULE_NOT_FOUND",c}return u[b]}f.keys=function(){return Object.keys(u)},f.resolve=s,W.exports=f,f.id=6616},4795:(W,F,d)=>{"use strict";function u(s,b,c,N,m,E,M){try{var L=s[E](M),I=L.value}catch(x){return void c(x)}L.done?b(I):Promise.resolve(I).then(N,m)}function f(s){return function(){var b=this,c=arguments;return new Promise(function(N,m){var E=s.apply(b,c);function M(I){u(E,N,m,M,L,"next",I)}function L(I){u(E,N,m,M,L,"throw",I)}M(void 0)})}}d.d(F,{Z:()=>f})},2970:(W,F,d)=>{"use strict";function c(e,n,r,t){var p,i=arguments.length,a=i<3?n:null===t?t=Object.getOwnPropertyDescriptor(n,r):t;if("object"==typeof Reflect&&"function"==typeof Reflect.decorate)a=Reflect.decorate(e,n,r,t);else for(var P=e.length-1;P>=0;P--)(p=e[P])&&(a=(i<3?p(a):i>3?p(n,r,a):p(n,r))||a);return i>3&&a&&Object.defineProperty(n,r,a),a}function N(e,n){return function(r,t){n(r,t,e)}}function I(e,n){if("object"==typeof Reflect&&"function"==typeof Reflect.metadata)return Reflect.metadata(e,n)}function x(e,n,r,t){return new(r||(r=Promise))(function(a,p){function P(w){try{y(t.next(w))}catch(R){p(R)}}function j(w){try{y(t.throw(w))}catch(R){p(R)}}function y(w){w.done?a(w.value):function i(a){return a instanceof r?a:new r(function(p){p(a)})}(w.value).then(P,j)}y((t=t.apply(e,n||[])).next())})}function D(e){return this instanceof D?(this.v=e,this):new D(e)}function Y(e,n,r){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var i,t=r.apply(e,n||[]),a=[];return i={},p("next"),p("throw"),p("return"),i[Symbol.asyncIterator]=function(){return this},i;function p(T){t[T]&&(i[T]=function(k){return new Promise(function(B,H){a.push([T,k,B,H])>1||P(T,k)})})}function P(T,k){try{!function j(T){T.value instanceof D?Promise.resolve(T.value.v).then(y,w):R(a[0][2],T)}(t[T](k))}catch(B){R(a[0][3],B)}}function y(T){P("next",T)}function w(T){P("throw",T)}function R(T,k){T(k),a.shift(),a.length&&P(a[0][0],a[0][1])}}function q(e){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var r,n=e[Symbol.asyncIterator];return n?n.call(e):(e=function K(e){var n="function"==typeof Symbol&&Symbol.iterator,r=n&&e[n],t=0;if(r)return r.call(e);if(e&&"number"==typeof e.length)return{next:function(){return e&&t>=e.length&&(e=void 0),{value:e&&e[t++],done:!e}}};throw new TypeError(n?"Object is not iterable.":"Symbol.iterator is not defined.")}(e),r={},t("next"),t("throw"),t("return"),r[Symbol.asyncIterator]=function(){return this},r);function t(a){r[a]=e[a]&&function(p){return new Promise(function(P,j){!function i(a,p,P,j){Promise.resolve(j).then(function(y){a({value:y,done:P})},p)}(P,j,(p=e[a](p)).done,p.value)})}}}d.d(F,{FC:()=>Y,KL:()=>q,fM:()=>N,gn:()=>c,mG:()=>x,qq:()=>D,w6:()=>I}),"function"==typeof SuppressedError&&SuppressedError}},W=>{W.O(0,[817,975,509,531,865,57,683,436,967,37],()=>W(W.s=9906)),W.O()}]);
combined_dataset/train/non-malicious/sample_63_68.ps1
sample_63_68.ps1
# Import the helper functions Import-Module $PSScriptRoot\..\..\Misc\helper.psm1 -Verbose:$false function Get-TargetResource { [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [parameter(Mandatory = $true)] [System.String] $Category ) #Write-Verbose "Use this cmdlet to deliver information about command processing." #Write-Debug "Use this cmdlet to write debug information while troubleshooting." <# $returnValue = @{ Category = [System.String] Keypad = [System.String] Numlock = [System.String] Fastboot = [System.String] FnLock = [System.String] FullScreenLogo = [System.String] FnLockMode = [System.String] Password = [System.String] SecurePassword = [System.String] PathToKey = [System.String] WarningsAndErr = [System.String] PowerWarn = [System.String] PntDevice = [System.String] ExternalHotKey = [System.String] PostF2Key = [System.String] PostF12Key = [System.String] PostHelpDeskKey = [System.String] RptKeyErr = [System.String] ExtPostTime = [System.String] SignOfLifeIndication = [System.String] WyseP25Access = [System.String] } $returnValue #> # Check if module DellBIOSprovider is already loaded. If not, load it. try{ $bool = Confirm-DellPSDrive -verbose } catch { write-Verbose $_ $msg = "Get-TargetResource: $($_.Exception.Message)" Write-DellEventLog -Message $msg -EventID 1 -EntryType 'Error' write-Verbose "Exiting Get-TargetResource" return } if ($bool) { Write-Verbose "Dell PS-Drive DellSmbios is found." } else{ $Message = “Get-TargetResource: Module DellBiosProvider was imported correctly." Write-DellEventLog -Message $Message -EventID 2 } $Get = get-childitem -path @("DellSmbios:\" + $Category) # Removing Verbose and Debug from output $PSBoundParameters.Remove("Verbose") | out-null $PSBoundParameters.Remove("Debug") | out-null $out = @{} $Get | foreach-Object {$out.Add($_.Attribute, $_.CurrentValue)} $out.add('Category', $Category ) $out } function Set-TargetResource { [CmdletBinding()] param ( [parameter(Mandatory = $true)] [System.String] $Category, [ValidateSet("Enabled","Disabled")] [System.String] $AdvancedMode, [System.String] $Password, [System.String] $SecurePassword, [System.String] $PathToKey ) if (-not(CheckModuleLoaded)) { Write-Verbose -Message 'Required module DellBiosProvider does not exist. Exiting.' return $true } $DellPSDrive = get-psdrive -name Dellsmbios if ( !$DellPSDrive) { $Message = "Drive DellSmbios is not found. Exiting." Write-Verbose $Message Write-DellEventLog -Message $Message -EventID 3 -EntryType "Error" return $true } $attributes_desired = $PSBoundParameters $atts = $attributes_desired $pathToCategory = $DellPSDrive.Name + ':\' + $atts["Category"] Dir $pathToCategory -verbose $atts.Remove("Verbose") | out-null $atts.Remove("Category") | out-null $atts.Remove("Debug") | out-null $securePwd=$atts["SecurePassword"] $passwordSet=$atts["Password"] $atts.Remove("Password") | Out-Null $atts.Remove("SecurePassword") | Out-Null $pathToKey=$atts["PathToKey"] if(-Not [string]::IsNullOrEmpty($pathToKey)) { if(Test-Path $pathToKey) { $key=Get-Content $pathToKey } else { $key="" } } $atts.Remove("PathToKey") | Out-Null #foreach($a in Import-Csv((Get-DellBIOSEncryptionKey))) #{ # $key+=$a # } $atts.Keys | foreach-object { # $atts[$_] $path = $pathToCategory + '\' + $($_) $value = $atts[$_] if(-Not [string]::IsNullOrEmpty($securePwd)) { $pasvar=ConvertTo-SecureString $securePwd.ToString() -Key $key Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue -PasswordSecure $pasvar } elseif(-Not [string]::IsNullOrEmpty($passwordSet)) { Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue -Password $passwordSet } else { Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue } if ( $ev) { $cmdline = $ExecutionContext.InvokeCommand.ExpandString($ev.InvocationInfo.Line) $Message = "An error occured in executing " + $cmdline + "`nError message: $($ev.ErrorDetails)" Write-Verbose $Message Write-DellEventLog -Message $Message -EventID 5 -EntryType "Error" } } } function Test-TargetResource { [CmdletBinding()] [OutputType([System.Boolean])] param ( [parameter(Mandatory = $true)] [System.String] $Category, [ValidateSet("Enabled","Disabled")] [System.String] $AdvancedMode, [System.String] $Password, [System.String] $SecurePassword, [System.String] $PathToKey ) $Get = Get-TargetResource $PSBoundParameters['Category'] -verbose New-DellEventLog $PSBoundParameters.Remove("Verbose") | out-null $PSBoundParameters.Remove("Debug") | out-null $PSBoundParameters.Remove("Category") | out-null $PSBoundParameters.Remove("Password") | out-null $PSBoundParameters.Remove("SecurePassword") | out-null $attributes_desired = $PSBoundParameters $bool = $true foreach ($config_att in $PSBoundParameters.GetEnumerator()) { if ($Get.ContainsKey($config_att.Key)) { $currentvalue = $Get[$config_att.Key] $currentvalue_nospace = $currentvalue -replace " ", "" if ($config_att.Value -ne $currentvalue_nospace){ $bool = $false $drift = "`nCurrentValue: $currentvalue_nospace`nDesiredValue: $($config_att.value)" $message = "Configuration is drifted in category $Category for $($config_att.Key). $drift" write-verbose $message Write-DellEventLog -Message $message -EventID 4 -EntryType Warning } else { write-Debug "Configuration is same for $config_att." } } else { $message = "Unsupported attribute $($config_att)" Write-Verbose $message } } return $bool } Export-ModuleMember -Function *-TargetResource # SIG # Begin signature block # MIIqwgYJKoZIhvcNAQcCoIIqszCCKq8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAF6qnWCP9lQTCC # Dv7bJQ0BKB1KKql0ynlvpmrIYQ464KCCElwwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ATCCA+mgAwIBAgIQKcjO4K8g4fYFFpiqGB6UiDANBgkqhkiG9w0BAQ0FADBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yMzA5MjExNTMxMjZaFw0y # NDA5MjExNTMxMjVaMH4xCzAJBgNVBAYTAlVTMQ4wDAYDVQQIEwVUZXhhczETMBEG # A1UEBxMKUm91bmQgUm9jazERMA8GA1UEChMIRGVsbCBJbmMxJDAiBgNVBAsTG0RV # UCBDbGllbnQgQ3JlYXRpb24gU2VydmljZTERMA8GA1UEAxMIRGVsbCBJbmMwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQCMaBhwV7jJkdmP+tXH06aqD1fq # fge3rGr6hGz+V/ifIReHg8LxzLxOspMPj6t8IpXRcpkV3tt3fg793FCg4jfSWVmR # inwVJOHD8bR6XUNfLbtS/1M/PsSQijNKdSbL1nDKcIF5JfeN6CgkdU9AateJGLKF # Qc9YUgbNnnwlrHWjQmV78Cu4TDz7dOxjrwnRMTXe9wPL+38nwRZYOo97bBYmtTjW # LGfZOfg3e9DypJykJ1kQqGUa9O5PLAfvQb+NOi8gSpn3+XkliY29xx0ocQQrGDG8 # +KzfjXjGArElKBwjVirQaLhpBeeaWuDNeKTcJOzYL9Sh9IzVNpuBPwiImin5Za7S # KwyEPlPAsFgCduEsKCoWq67MPx0z7bGRPwp5Y03KZGJUDxQAG+PlI3jvjFZiZ6YB # Xi4TStiisY6t0Ol5kpE2lKHp3Pt/9iam1x7/y0EiQtkMXTuep1qdc3Waa7s0jEDD # 3/T4AknlkfhROxP85xaii32M9In0Tqr1hPm3pqsCAwEAAaOCASgwggEkMAwGA1Ud # EwEB/wQCMAAwHQYDVR0OBBYEFBFKGdzeU/CRsp0sA1HLF7oe6ORSMB8GA1UdIwQY # MBaAFO+funmwc/IlHnicA1KcG1OE3o3tMGcGCCsGAQUFBwEBBFswWTAjBggrBgEF # BQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYBBQUHMAKGJmh0dHA6 # Ly9haWEuZW50cnVzdC5uZXQvb3ZjczItY2hhaW4ucDdjMDEGA1UdHwQqMCgwJqAk # oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvb3ZjczIuY3JsMA4GA1UdDwEB/wQE # AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzATBgNVHSAEDDAKMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQ0FAAOCAgEAGtZRY5WmdTQbQGP/Nx77+u6udEUQn40GDjXPfT4j # nVlhJ99N35giv1mWstRXxOqY7YauotNcUNzep1d8oV5/YKc7+x0s/ZwuNQmLtVyb # VSrDy7DJiYNle/4am6GDefIUMMWgr8BGY8n/LdDVfL9Gir72V+HOe2N4cVnti0Ti # U9/1ebEdhKd/a0awP+mh8EZG7OJ41A1JkPc4rjsh3yfQi5AQ4P1RF1hSgudkZpQI # 8051WnnwjStKEWA2uiX3x2z63TvrPtdaJoYbtIniUx9ZVg3373sV8StFwPcyPzqX # 9Eod7Goj4D+Vg3bB73jjG+miuykSjxNHVnhNB7EnCVffnsD5hJHRXGRCZvof59id # NhpkuF0G4ZIYDrAF06HvJ4kxyGZCiNi6oJxfyndhG4FsCPI4XiE0n1N25lx1GeJZ # tgRH7okPBMOu3rYTQDH2+g85yNBwap18EC7XDTyi7H/Ih616pG9ca9Xv4MsptRU9 # 6UXqPemiXG9TbuEsBWgu6YYx0qBMlIT+bqDbghkpeXrF/zRjDBAD9p38VHnqay3B # r4RTbap/gUMQzgD2P2f6axjAg3yZaXab1qtI7VZptyXmVK7nRPwXCZmTR6SnxCaS # 7gD2GtIZiCiztpBq6zJEQhS39BQoXVV0bQ7k+m1ZX2VW0z8Ld54PZlbc8vnP1YcA # iyowggZwMIIEWKADAgECAhBx71V0rzVUw1osafZvS2vNMA0GCSqGSIb3DQEBDQUA # MGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQD # DDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9y # aXR5IC0gQ1NCUjEwHhcNMjEwNTA3MTkyMDQ1WhcNNDAxMjI5MjM1OTAwWjBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAJ6ZdhcanlYXCGMsk02DYYQzNAK22WKg3sIOuSBMyFedD91U # Ww0M1gHdL0jhkQnh28gVBIK2e/DY1jA7GXFw+6iml/YpXaQMqfRTPlfbDE5u/Hbb # XyTpql9D45PnDs/KJbzETDALWg/mBvTlbgyZZlhPg2HCc3xcIm8BRcUP90BPZEvQ # FwqpDh4CL6GPTPJnUNs+5J/CTz906zGk0JTQmbwwkglqyyTNoth2UtBOdZhPZFrS # XoP0WMBdanXE2D9kOosUDdh24eq5a+cRcEkROGMTbvHG+r0QRTUH5nYV0HUWqsJD # V/6r/mNzRiKguPPkx3BGCfmpN0Gas0tsH3Byowf2NZJ0EWRu+QLVwJKV8ZdZfg3u # oiXycVW4m42/ze6u3fsM564yTlCNod/Rc7/Bzn912qu/0K2COMXniO2ibTqGEbfX # sOGoizsMQReaX+RbmMidAJ/3c9LD6Z8Fh3khg9YL7dHMCJ/g8cXJWLpTX9SHsYtZ # qNJezWnQPvrEOQmvtLXt5zz6IofWc/kXlWrDHPVVeF/U+gvAWz+MeBUOWkw6buUm # mNAnzCDfwIY7eo1lRn7ZYV6p9K4+1PyvRcc6s4UESovICV2zewIoWeOGfYCiWEBm # YuA4VYOrnylBJrq76dhk+La7KHPNFUrXnnPjZkyxUZ2BI4vIhneytiw3InAhAgMB # AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTvn7p5sHPy # JR54nANSnBtThN6N7TAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz # BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu # bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni # cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBFBgNV # HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0 # Lm5ldC9ycGEwCAYGZ4EMAQQBMA0GCSqGSIb3DQEBDQUAA4ICAQBe84aZNcF57vAQ # r9eSQ9KF0FvgmKDgcVHJFMtQmmAOsAQmSbHP6bqbCKHaQ13UbyOiufhAx0f+TQEL # SJA/yNxqtD5TNSi+QEpHhWoed0DMgH9htDxPeajmo6agfkSGcb8SG5WBcvcNpdDe # Z5/Gorjxavn8/nRmxmTmeT1qA2FOSx/MIGLLAhjsY+1+cT+WugteaCJn7B/A0gUW # ZrGypOr8xZWjjRKl9Y3vGyDNmffnMvNZcR/dlOZ55VIjEFYq/Fk4v795JZJqx/2r # Z3dxsQR9Na0UwT6o/CMXVggYfNd6ImuRasw1RW1PO51DnQW4nfP8NCFcBBgyVzg0 # wcqDI0amiCMhxn4UgKux77sLrAk/7lORMbPiVESqtX0wPCwjnOg/o1jqQAgXoyBf # esAM26r/AxYDDXRkIpqUXjA1dhP10+Hj4AfK2epFiEacVNUQ4vMyCUC251wXMv7M # r+ttz2A8dfPuXGBAVRu1Wa9yI2hNnHQEDBDJr1Bbpw1mD5blmpXgIKIa0LDuOEme # KmeekZZsmNvEEG1gfB5uSOe2fq8zBxJx772VO76pg9RCfbenNNdfhpG1r1ZY2lV9 # F73bvM1kQRWNMVEGT7Qusos9nPNN41gDVMysiPhSPE5LRgklGf8V56eYRi59uurj # 43z/+bkZlb52uQ15sgJRGkrIn4jCQzGCF7wwghe4AgEBMGMwTzELMAkGA1UEBhMC # VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAMTH0VudHJ1c3QgQ29k # ZSBTaWduaW5nIENBIC0gT1ZDUzICECnIzuCvIOH2BRaYqhgelIgwDQYJYIZIAWUD # BAIBBQCgfDAQBgorBgEEAYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGC # NwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQx # IgQgzrzyoPS3IdVkPT3fYkqyOywvPOc9TI3yTG3Gh/cNeiEwDQYJKoZIhvcNAQEB # BQAEggGAisnESBF6cuERTi3imjpnAlOg0CzB7YAdWWBClgfJSWnoF2adtnp+jLM2 # siaztJw/9nIQUQZWgiIoMTnLyC2iCcQz0hKp99T226co3cshXKlTxW6pRE68qlsM # PlXG1DITsqXan/VrZ/VMq1TRLbhEZvjJgy2ay10XJn8zi1uiVWv8nyxpAk1FNmzX # zXZDJUF3XpBmvYARru0uNaYigKlc8M6XWS3pz7+FXwDjUJAzcbBPJLYTx9LsmqPq # so2bXv/Ms9f5OOOuD1OTHduNX6JLHera6FpxJkaAvEmP/qEoLQH3HVgpa8YSV1cA # UhqtYPyx7ufqjpg5pEwakLE3pPCDdAaiBYIpdbp/7I5HWhx8wv5IB2xAJFcWvWOt # Q79e6NXHa3HP/FGN1uWL3gymDGlLxvUgiJ7zdFv7UXU4IUzbjuNZ3QDioPHh06oS # IRxcAUdYJurTj8bLbusKfMxMYSnCBcSyNb5YEIoEuB+5qqc1kZogUPZmcxbp9UmH # FtqKRhQroYIVLDCCFSgGCisGAQQBgjcDAwExghUYMIIVFAYJKoZIhvcNAQcCoIIV # BTCCFQECAQMxDTALBglghkgBZQMEAgEwgfQGCyqGSIb3DQEJEAEEoIHkBIHhMIHe # AgEBBgpghkgBhvpsCgMFMDEwDQYJYIZIAWUDBAIBBQAEINaiFpchPOfqxxbGMg7x # LolKN2TmHCrNEB2LB5xrTEyeAgkA54jTte8HM0AYDzIwMjQwNDE5MTA1MzM0WjAD # AgEBoHmkdzB1MQswCQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UE # BxMGT3R0YXdhMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSswKQYDVQQDEyJFbnRy # dXN0IFRpbWVzdGFtcCBBdXRob3JpdHkgLSBUU0ExoIIPWDCCBCowggMSoAMCAQIC # BDhj3vgwDQYJKoZIhvcNAQEFBQAwgbQxFDASBgNVBAoTC0VudHJ1c3QubmV0MUAw # PgYDVQQLFDd3d3cuZW50cnVzdC5uZXQvQ1BTXzIwNDggaW5jb3JwLiBieSByZWYu # IChsaW1pdHMgbGlhYi4pMSUwIwYDVQQLExwoYykgMTk5OSBFbnRydXN0Lm5ldCBM # aW1pdGVkMTMwMQYDVQQDEypFbnRydXN0Lm5ldCBDZXJ0aWZpY2F0aW9uIEF1dGhv # cml0eSAoMjA0OCkwHhcNOTkxMjI0MTc1MDUxWhcNMjkwNzI0MTQxNTEyWjCBtDEU # MBIGA1UEChMLRW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9D # UFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsT # HChjKSAxOTk5IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3Qu # bmV0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTCCASIwDQYJKoZIhvcN # AQEBBQADggEPADCCAQoCggEBAK1NS6kShrLqoyAHFRZkKitL0b8LSk2O7YB2pWe3 # eEDAc0LIaMDbUyvdXrh2mDWTixqdfBM6Dh9btx7P5SQUHrGBqY19uMxrSwPxAgzc # q6VAJAB/dJShnQgps4gL9Yd3nVXN5MN+12pkq4UUhpVblzJQbz3IumYM4/y9uEnB # dolJGf3AqL2Jo2cvxp+8cRlguC3pLMmQdmZ7lOKveNZlU1081pyyzykD+S+kULLU # SM4FMlWK/bJkTA7kmAd123/fuQhVYIUwKfl7SKRphuM1Px6GXXp6Fb3vAI4VIlQX # AJAmk7wOSWiRv/hH052VQsEOTd9vJs/DGCFiZkNw1tXAB+ECAwEAAaNCMEAwDgYD # VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFXkgdERgL7Y # ibkIozH5oSQJFrlwMA0GCSqGSIb3DQEBBQUAA4IBAQA7m49WmzDnU5l8enmnTZfX # GZWQ+wYfyjN8RmOPlmYk+kAbISfK5nJz8k/+MZn9yAxMaFPGgIITmPq2rdpdPfHO # bvYVEZSCDO4/la8Rqw/XL94fA49XLB7Ju5oaRJXrGE+mH819VxAvmwQJWoS1btgd # OuHWntFseV55HBTF49BMkztlPO3fPb6m5ZUaw7UZw71eW7v/I+9oGcsSkydcAy1v # MNAethqs3lr30aqoJ6b+eYHEeZkzV7oSsKngQmyTylbe/m2ECwiLfo3q15ghxvPn # PHkvXpzRTBWN4ewiN8yaQwuX3ICQjbNnm29ICBVWz7/xK3xemnbpWZDFfIM1EWVR # MIIFEzCCA/ugAwIBAgIMWNoT/wAAAABRzg33MA0GCSqGSIb3DQEBCwUAMIG0MRQw # EgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQ # U18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc # KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u # ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMB4XDTE1MDcyMjE5MDI1 # NFoXDTI5MDYyMjE5MzI1NFowgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRy # dXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRl # cm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhv # cml6ZWQgdXNlIG9ubHkxJjAkBgNVBAMTHUVudHJ1c3QgVGltZXN0YW1waW5nIENB # IC0gVFMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2SPmFKTofEuF # cVj7+IHmcotdRsOIAB840Irh1m5WMOWv2mRQfcITOfu9ZrTahPuD0Cgfy3boYFBp # m/POTxPiwT7B3xLLMqP4XkQiDsw66Y1JuWB0yN5UPUFeQ18oRqmmt8oQKyK8W01b # jBdlEob9LHfVxaCMysKD4EdXfOdwrmJFJzEYCtTApBhVUvdgxgRLs91oMm4QHzQR # uBJ4ZPHuqeD347EijzRaZcuK9OFFUHTfk5emNObQTDufN0lSp1NOny5nXO2W/KW/ # dFGI46qOvdmxL19QMBb0UWAia5nL/+FUO7n7RDilCDkjm2lH+jzE0Oeq30ay7PKK # GawpsjiVdQIDAQABo4IBIzCCAR8wEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8B # Af8EBAMCAQYwOwYDVR0gBDQwMjAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6 # Ly93d3cuZW50cnVzdC5uZXQvcnBhMDMGCCsGAQUFBwEBBCcwJTAjBggrBgEFBQcw # AYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYDVR0fBCswKTAnoCWgI4YhaHR0 # cDovL2NybC5lbnRydXN0Lm5ldC8yMDQ4Y2EuY3JsMBMGA1UdJQQMMAoGCCsGAQUF # BwMIMB0GA1UdDgQWBBTDwnHSe9doBa47OZs0JQxiA8dXaDAfBgNVHSMEGDAWgBRV # 5IHREYC+2Im5CKMx+aEkCRa5cDANBgkqhkiG9w0BAQsFAAOCAQEAHSTnmnRbqnD8 # sQ4xRdcsAH9mOiugmjSqrGNtifmf3w13/SQj/E+ct2+P8/QftsH91hzEjIhmwWON # uld307gaHshRrcxgNhqHaijqEWXezDwsjHS36FBD08wo6BVsESqfFJUpyQVXtWc2 # 6Dypg+9BwSEW0373LRFHZnZgghJpjHZVcw/fL0td6Wwj+Af2tX3WaUWcWH1hLvx4 # S0NOiZFGRCygU6hFofYWWLuRE/JLxd8LwOeuKXq9RbPncDDnNI7revbTtdHeaxOZ # RrOL0k2TdbXxb7/cACjCJb+856NlNOw/DR2XjPqqiCKkGDXbBY524xDIKY9j0K6s # GNnaxJ9REjCCBg8wggT3oAMCAQICEAfXE1PaJWG0YemQR4pMzgQwDQYJKoZIhvcN # AQELBQAwgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgw # JgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQL # EzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9u # bHkxJjAkBgNVBAMTHUVudHJ1c3QgVGltZXN0YW1waW5nIENBIC0gVFMxMB4XDTI0 # MDExOTE2NDYyOFoXDTI5MDYwMTAwMDAwMFowdTELMAkGA1UEBhMCQ0ExEDAOBgNV # BAgTB09udGFyaW8xDzANBgNVBAcTBk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwg # SW5jLjErMCkGA1UEAxMiRW50cnVzdCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNB # MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMeSOEE5/6A/X01Nipcx # 45uHw3gFaTYLUrOqg12w0r1+voOgX16el/PbNRep+dsVYnzK9sXJNBXiEaWSsS7g # aVRdDiu+VcYBjIVjskktNV/lTkPEcQuktB40Tf9FyP5P4TDo6WVsa2XTvtQsaNCt # BJtqudBU+zUAkDHG2GhqXa/qftD5nRPvzp1jZEJyB4X7BjGL450LptUy21KlTgw8 # wcCa0X8Cd2MTzfM9PB4CSzaG4AS0eHfkmy/hiSregl3r5Brcjbp7pJ+Pjmx16wPg # gAS/sQkc+mF6s5uBtwvJEwp47Qj2zKZfQkcSOkd4dv682pk/ZOs3XirfUuKZsP3v # hMqROqKwp7G2Vhw/RPh+ke94piT+3ike+PX3UX+2eC2HtL0AucYe4OjhE+7uX9de # 7qR8dWDOoTWQWMKrtUhDe+nHd4mJi8ahjGmXz256Q/70X/tj5STq3+AQkKcSkMwb # rQiK0Y2FIKJuoYsWJ5Ux089uAymfRMInCKy39IlNN+QliVpTLFMNghRzxuzFsNmH # 2JsS7iY6X5cvcMkweKFaSm3SSEoPVWp+9lvih1/aERt3vhpe90gKmHEMfa4qgX2y # npFgDtHZajASiuSa7KZLb4UGSRAOhUg/LuYUz1rjTzgqr9cxALwslpWSrXPPehxR # y/4t6cAuWA4KFWXLiHsyG2ANAgMBAAGjggFbMIIBVzAMBgNVHRMBAf8EAjAAMB0G # A1UdDgQWBBRDaB9vnyLQ+F8J9/y45SPGjgdCkjAfBgNVHSMEGDAWgBTDwnHSe9do # Ba47OZs0JQxiA8dXaDBoBggrBgEFBQcBAQRcMFowIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLmVudHJ1c3QubmV0MDMGCCsGAQUFBzAChidodHRwOi8vYWlhLmVudHJ1 # c3QubmV0L3RzMS1jaGFpbjI1Ni5jZXIwMQYDVR0fBCowKDAmoCSgIoYgaHR0cDov # L2NybC5lbnRydXN0Lm5ldC90czFjYS5jcmwwDgYDVR0PAQH/BAQDAgeAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMEIGA1UdIAQ7MDkwNwYKYIZIAYb6bAoBBzApMCcG # CCsGAQUFBwIBFhtodHRwczovL3d3dy5lbnRydXN0Lm5ldC9ycGEwDQYJKoZIhvcN # AQELBQADggEBAL6w3P28+man/CMd89lXYvQk3x0v+VjLyswMfc9uh/Vuglor3uNf # xs4a5AivjgQBHv8C+AVTuKhihXuZq0V72aqxF4PRKX6TIeg2iEIhOPv7DYHJw4qM # yipeZq/5nPSNfBL7em06irAA9ztwpQ+7tVOp4cYpJurcEkovXVoEuKrjhwt9yJ4G # /mlmS46n9L4wyaXikKGogQ0+RyGSUF0y5PJWz6mUIbswwncYEZomrvHiPi/8P4kz # N12U590axeXMZmz6AM6W4oDt+CynxWgTaXwERK0I1fmrya0XZtUvC1fwm89cHqsN # J0Zp/qi3BSWO4LIVM0pfupyL0CgJPLWFsuExggSYMIIElAIBATCBxzCBsjELMAkG # A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 # d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDE1IEVu # dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEmMCQGA1UEAxMd # RW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzECEAfXE1PaJWG0YemQR4pMzgQw # CwYJYIZIAWUDBAIBoIIBpTAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJ # KoZIhvcNAQkFMQ8XDTI0MDQxOTEwNTMzNFowKQYJKoZIhvcNAQk0MRwwGjALBglg # hkgBZQMEAgGhCwYJKoZIhvcNAQELMC8GCSqGSIb3DQEJBDEiBCCjeJsqScEP8INy # RzhT9fVWxGsVzj16gA7gzJHDKfBzRDCCAQsGCyqGSIb3DQEJEAIvMYH7MIH4MIH1 # MIHyBCAoSfcxGNdBRQVhc80+7Mu9U0teDvD6BhaNsOJzSQPujzCBzTCBuKSBtTCB # sjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsT # H1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAy # MDE1IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEmMCQG # A1UEAxMdRW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzECEAfXE1PaJWG0YemQ # R4pMzgQwCwYJKoZIhvcNAQELBIICAAPl8vsnLIYacP3AlJJLcSkRFwcjoyICSxi1 # uz/zP+EOS0r9oViU9m0U3/a/x7+3pFy0W4cH/5wenN3B3R9BYnpSDoziqSWo8zay # AUdF+AWEQnKBu5aT32zxqNH+tamxiBMxU54OwtMtl3n6QO3nMiyu4QVl6OHALVVd # n+3hKqC1QwyKSeb/Ia0dWmzmkG/mbPgnByoAtoEX7kC3qA521Lo9wNhf/mWeOZV2 # aiGDRIdRGyqzzTi1s5oZm18P4bwPwrciXzhoBT3NXPDQP/2F7FYNbsD8u5OCi9Nj # g3FNB3DhlpmS8hZAVbVkER6VPS8fFN04P0L59EH9Nh7xUqg4oIqrcErYQgHfliKM # FxeceiqGee0nPwMFOodHILBJYMioGexMGU5xj9d8+g5uhRoDsGmKSPvBPCyW50Po # v9zHlm2Xc5g2rtiwx+tqdPbfMJtNrITfgyydcXLC6h1HSq6dI7SMa/YKMQ2bJLbi # PcOJ5QDtouUz5/6M6JV7QJNQwF0GftSUgc7GM6bdu/ESPS1OPbC/rhk6C+dXQ93Q # hZf7+Higas/t/v97iHzooR2MWhe64zVl5Bhhx3ulWTasmQ6y6L1wkG5ggBATdg6d # JKnyEBWC0cYp689mJ1vLfkAGydWKOiKhHGoa/J9nnet87gMcQWpN09MMFeDyUDCy # /GQbq6i/ # SIG # End signature block
combined_dataset/train/non-malicious/sample_4_48.ps1
sample_4_48.ps1
# Copyright ?2010, Microsoft Corporation. All rights reserved. # You may use this code and information and create derivative works of it, # provided that the following conditions are met: # 1. This code and information and any derivative works may only be used for # troubleshooting a) Windows and b) products for Windows, in either case using # the Windows Troubleshooting Platform # 2. Any copies of this code and information # and any derivative works must retain the above copyright notice, this list of # conditions and the following disclaimer. # 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND, # WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES # OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND # INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION # WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER. #************************************************ #************************************************ # DistSvcs_Utils.ps1 # Version 1.0.0 # Date: 05-09-2011 # Author: Jeremy LaBorde - jlaborde@microsoft.com # Description: This script provides gathers MSDTC registry keys in XML format, # generates a summary report, and a XAML representation of the local DTC settings # # This is the main SDP package for MSDTC #************************************************ ########################################################### # # Last Update: 5-9-2011 # Author: jlaborde # # Description: # returns string representing the OS version # # Usage: # Get-OSVersionString # # Example: # Get-OSVersionString # # Needs to be moved to a utils / globally accessible location # ########################################################### function Get-OSVersionString( ) { $local:version = ([Environment]::OSVersion.Version.Major.ToString()) + "." + ([Environment]::OSVersion.Version.Minor.ToString()) switch( $local:version ) { "6.2" { return "Windows 8 / 2012" } "6.1" { return "Windows 7 / 2008 R2" } "6.0" { return "Windows Vista / 2008" } "5.2" { return "Windows XP 64 / 2003" } "5.1" { return "Windows XP" } "5.0" { return "Windows 2000" } } return "" } ########################################################### # # Last Update: 5-9-2011 # Author: jlaborde # # Description: # collect Distributed Services application event logs of interest # # Usage: # Get-DistSvcsAppLogsAsCSV [string]$local:outputfile # where $local:outputfile will be a csv file # # Example: # Get-DistSvcsAppLogsAsCSV "ApplicationLogs.csv" # ########################################################### function Get-DistSvcsAppLogsAsCSV( [string]$local:outputfile ) { if( (Get-Host).version.major -eq "1" ) { $Logs = Get-EventLog -LogName application | Select-Object -Property EntryType, EventID, Source, TimeWritten, Message } else { $Logs = get-eventlog -logname application -Source "*Windows Error Reporting*", "*SideBySide*", "*Application Error*", "*Application Hang*", "*Application Popup*", "*User Profile Service*", "*MsiInstaller*", "*DNS*", "*VSS*", "*SQL*", "*Cluster*", "*MSDTC*", "*COM*", "*Complus*", "*gupdate*", "*Userenv*"` | Select-Object ` -property EntryType, EventID, Source, TimeWritten, Message } $Logs | Export-Csv $local:outputfile } ########################################################### # # Last Update: 5-9-2011 # Author: jlaborde # # Description: # collect Distributed Services system event logs of interest # # Usage: # Get-DistSvcsSysLogsAsCSV [string]$local:outputfile # where $local:outputfile will be a csv file # # Example: # Get-DistSvcsSysLogsAsCSV "SystemLogs.csv" # ########################################################### function Get-DistSvcsSysLogsAsCSV( [string]$local:outputfile ) { if( (Get-Host).version.major -eq "1" ) { $Logs = Get-EventLog -LogName system | Select-Object -Property EntryType, EventID, Source, TimeWritten, Message } else { $Logs = get-eventlog -logname system -Source "*Windows Error Reporting*", "*VSS*", "*SQL*", "*Cluster*", "*MSDTC*", "*Complus*", "*DistributedCOM*", "*Kerberos*", "*GroupPolicy*", "*SMSvcHost*", "*DnsApi*"` | Select-Object ` -property EntryType, EventID, Source, TimeWritten, Message } $Logs | Export-Csv $local:outputfile } ########################################################### # # Last Update: 5-9-2011 # Author: jlaborde # Inspired By: Joe Mansfield ( http://helvick.blogspot.com/2007/08/checking-service-permissions-with.html ) # # Description: # output permissions on a service # # Usage: # Get-ServicePermission [string]$local:ServiceNameMask # # Example: # Get-ServicePermission "*msdtc*" # ########################################################### function Get-ServicePermission( [string]$local:ServiceNameMask ) { $local:retv = "" # get the services $local:services = Get-CimInstance -query 'select * from win32_service' # loop through each, looking for the ones of interest foreach( $local:service in $local:services ) { if( $local:service.Name -like $local:ServiceNameMask ) { $local:retv += "Display Name: " + $local:service.DisplayName + "`r`n" $local:retv += "Name: " + $local:service.Name + "`r`n" $local:retv += "Path: " + $local:service.PathName + "`r`n" # get the permissions on the object $local:path = $local:service.PathName.Substring( 0, $local:service.PathName.IndexOf( "." ) ) + ".exe" $local:secure = get-acl $local:path # output permissions foreach( $local:item in $local:secure.Access ) { $local:retv += "`r`n" $local:retv += "`t" + $item.IdentityReference.Value + "`r`n" $local:retv += "`t" + $item.AccessControlType.ToString() + "`r`n" $local:retv += "`t" + $item.FileSystemRights.ToString() + "`r`n" } $local:retv += "`r`n" $local:retv += "`r`n" } } return $local:retv } ########################################################### # # Last Update: 5-24-2011 # Author: jlaborde # # Description: # return a reg key value # # Usage: # Get-RegKeyValue [string]$local:regkey, [string]$local:regvalue # # Example: # $local:binSD = Get-RegKeyValue "HKEY_LOCAL_MACHINE\software\microsoft\ole" "MachineLaunchRestriction" # ########################################################### function Get-RegKeyValue( [string]$local:regkey, [string]$local:regvalue ) { if( (Test-Path ("registry::" + $local:regkey)) -eq $false ) { return $null } $local:reg = Get-Item ("registry::" + $local:regkey) if( $local:regvalue -eq $null -or $local:regvalue -eq "" ) { return ( ($local:reg).GetValue( "", $null ) ) } $local:val = Get-ItemProperty $reg.PSPath if( $local:val -eq $null ) { return $null } return $local:val.$local:regvalue } ########################################################### # # Last Update: 3-31-2012 # Author: jlaborde # # Description: # test if a registry value exists # # Usage: # Get-RegKeyValueExists [string]$local:regkey, [string]$local:regvalue # # Example: # if( ( Get-RegKeyValue "HKEY_LOCAL_MACHINE\software\microsoft\ole" "MachineLaunchRestriction" ) ) # ########################################################### function Get-RegKeyValueExists( [string]$local:regkey, [string]$local:regvalue ) { if( (Test-Path ("registry::" + $local:regkey)) -eq $false ) { return $false } $local:reg = Get-Item ("registry::" + $local:regkey) if( $local:regvalue -eq $null -or $local:regvalue -eq "" ) { return $true } $local:val = Get-ItemProperty $reg.PSPath if( $local:val -eq $null ) { return $false } return $true } ########################################################### # # Last Update: 10-6-2011 # Author: jlaborde # # Description: # return a reg key value as true or false # # Usage: # Get-RegKeyBool [string]$local:regkey, [string]$local:regvalue # # Example: # $local:bool = Get-RegKeyValue "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" "NetworkDtcAccess" # ########################################################### function Get-RegKeyBool( [string]$local:regkey, [string]$local:regvalue ) { $local:bool = Get-RegKeyValue $local:regkey $local:regvalue if( $local:bool -eq $null -or $local:bool -eq $false -or $local:bool -eq 0 ) { return $false } return $true } ########################################################### # # Last Update: 10-6-2011 # Author: jlaborde # # Description: # find subkey based on presence of an inner subkey, possibly at a certain default value # # Usage: # Get-RegistryKeyBasedOnSubkey [string]$local:keyname, [string]$local:subkeyname, [string]$local:subkeyvalue # # Example: # Get-RegistryKeyBasedOnSubkey "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CID" "Description" "MSDTC" # we're looking for the subkey who contains a subkey name Description set to default value MSDTC # ########################################################### function Get-RegistryKeyBasedOnSubkey( [string]$local:keyname, [string]$local:subkeyname, [string]$local:subkeyvalue ) { # get the subkeys for this key $local:ChildKeys = Get-Item ("registry::" + $local:keyname + "\*") -ErrorAction SilentlyContinue # loop through the root's subkeys foreach( $local:subkey in $local:ChildKeys ) { # find the subkey off the looping subkey $local:s2 = Get-Item ("registry::" + $local:subkey.Name + "\" + $local:subkeyname) -ErrorAction SilentlyContinue if( $local:s2 -ne $null ) { # if we don't care about the default value, return this key if( $local:subkeyvalue -eq $null -or $local:subkeyvalue -eq "" ) { return $local:subkey } # if we do care about the default value, make sure we have one and compare it $local:default = ($local:s2).GetValue( "", $null ) if( $local:default -ne $null ) { if( $local:default.CompareTo( $local:subkeyvalue ) -eq 0 ) { return $local:subkey } } } } return $null } ########################################################### # # Last Update: 10-6-2011 # Author: jlaborde # # Description: # find subkey based on presence of an entry # # Usage: # Get-RegistrySubKeyBasedOnEntry [string]$local:keyname [string]$local:entryname [string]$local:entryvalue # # Example: # Get-RegistrySubKeyBasedOnEntry "HKEY_LOCAL_MACHINE\Cluster\Resources\{GUID}" "MSDTC" "" # we're looking for the subkey who contains an entry name MSDTC set to any value # ########################################################### function Get-RegistrySubKeyBasedOnEntry( [string]$local:keyname, [string]$local:entryname, [string]$local:entryvalue ) { # get the subkeys for this key $local:ChildKeys = Get-Item ("registry::" + $local:keyname + "\*") -ErrorAction SilentlyContinue # loop through the root's subkeys foreach( $local:subkey in $local:ChildKeys ) { # try to find the entry name $local:regentries = ($local:subkey).GetValueNames( ) if( $local:regentries -ne $null ) { foreach( $local:entry in $local:regentries ) { if( $local:entry -eq $local:entryname ) { if( $local:entryvalue -eq $null -or $local:entryvalue -eq "" ) { return $local:subkey } if( (Get-RegKeyValue $local:subkey.Name $local:entryname) -eq $local:entryvalue ) { return $local:subkey } return $null } } } } return $null } ########################################################### # # Last Update: 5-24-2011 # Author: jlaborde # # Description: # create a basic 'permissions' class # # Usage: # Get-PermissionsClass # # Example: # $local:Perms = Get-PermissionsClass # ########################################################### function Get-PermissionsClass( ) { $local:strings = @() $local:object = New-Object Object | Add-Member -MemberType NoteProperty -Name Account -Value "" -PassThru | Add-Member -MemberType NoteProperty -Name Type -Value "" -PassThru | Add-Member -MemberType NoteProperty -Name Rights -Value 0 -PassThru return $local:object } ########################################################### # # Last Update: 5-24-2011 # Author: jlaborde # # Description: # create a a permission object based on a binary representation of a SID # # Usage: # Get-PermissionsFromBinarySID $local:binary # # Example: # $local:Perm = Get-PermissionsFromBinarySID $local:binSD # ########################################################### function Get-PermissionsFromBinarySID( $local:binary ) { $local:array = @() # not supported pre-Vista #if( $OSVersion.Major -lt 6 ) #{ return $local:array #} #$converter = new-object system.management.ManagementClass Win32_SecurityDescriptorHelper #$SDDL = $converter.BinarySDToSDDL( $local:binary ) #$CSD = New-Object System.Security.AccessControl.CommonSecurityDescriptor -ArgumentList $false, $false, $SDDL.SDDL $CSD = New-Object System.Security.AccessControl.CommonSecurityDescriptor -ArgumentList $false, $false, $local:binary, 0 foreach( $dacl_ in $CSD.DiscretionaryAcl ) { $local:Perms = Get-PermissionsClass $AccountSID = New-Object System.Security.Principal.SecurityIdentifier ( $dacl_.SecurityIdentifier ) $local:RealSID = $AccountSID.Translate( [System.Security.Principal.NTAccount] ) if( $local:RealSID -ne $null ) { $local:Perms.Account = $local:RealSID.Value $local:Perms.Type = $dacl_.AceType $local:Perms.Rights = $dacl_.AccessMask $local:array = $local:array + $local:Perms } } return $local:array } function Get-CombinePermissionsClass( ) { $local:objects1 = @() $local:objects2 = @() $local:object = New-Object Object | Add-Member -MemberType NoteProperty -Name Account -Value "" -PassThru | Add-Member -MemberType NoteProperty -Name aAllow -Value $local:objects1 -PassThru | Add-Member -MemberType NoteProperty -Name aDeny -Value $local:objects2 -PassThru return $local:object } function Get-CombinedPermFromListByAccount( [Object]$local:CombPermsArray, [string]$local:account ) { foreach( $local:perm in $local:CombPermsArray ) { if( $local:perm.Account.ToUpper( ) -eq $local:account.ToUpper( ) ) { return $local:perm } } return $null } function Get-CombinedPermissionsFromPermissionsList( $local:PermsArray ) { $local:CombPerms = @() foreach( $local:perm in $local:PermsArray ) { $local:cp = Get-CombinedPermFromListByAccount $local:CombPerms $local:perm.Account if( $local:cp -eq $null ) { $local:cp = Get-CombinePermissionsClass $local:cp.Account = $local:perm.Account $local:CombPerms = $local:CombPerms + $local:cp } if( $local:perm.Type -eq "AccessAllowed" ) { $local:cp.aAllow = $local:cp.aAllow + $local:perm } else { $local:cp.aDeny = $local:cp.aDeny + $local:perm } } return $local:CombPerms } ########################################################### # # Last Update: 6-21-2011 # Author: jlaborde # # Description: # generate a GUID with { } around it # # Usage: # Get-GUID # # Example: # $local:guid = Get-GUID # ########################################################### function Get-GUID( ) { return ( "{" + ([System.Guid]::NewGuid()).ToString( ) + "}" ) } # functions used to output SDDL information # use Format-SDDL for full text output # returns a string of the SID / Account function Get-SDDL_WellKnown( [string] $code ) { if( $code.Length -gt 2 ) { return $code } switch( $code ) { "AN" { return "Anonymous" } "AO" { return "Account Operators" } "AU" { return "Authenticated Users" } "BA" { return "Built-In Administrators" } "BG" { return "Built-In Guests" } "BO" { return "Backup Operators" } "BU" { return "Built-In Users" } "CA" { return "Certificate Publishers" } "CD" { return "Users Cert DCOM" } "CG" { return "Creator Group" } "CO" { return "Creator Owner" } "DA" { return "Domain Administrators" } "DC" { return "Domain Computers" } "DD" { return "Domain Controllers" } "DG" { return "Domain Guests" } "DU" { return "Domain Users" } "EA" { return "Enterprise Administrators" } "ED" { return "Enterprise DCs" } "HI" { return "High Integrity Level" } "IU" { return "Interactively Logged-On User" } "LA" { return "Local Administrator" } "LG" { return "Local Guest" } "LS" { return "Local Service Account" } "LW" { return "Low Integrity Level" } "ME" { return "Medium Integrity Level" } "MU" { return "Performance Monitor Users" } "NO" { return "Network Configuration Operators" } "NS" { return "Network Service Account" } "NU" { return "Network Logon User" } "PA" { return "Group Policy Administrators" } "PO" { return "Printer Operators" } "PS" { return "Principal Self" } "PU" { return "Power Users" } "RC" { return "Restricted Code" } "RD" { return "Terminal Server Users" } "RE" { return "Replicator" } "RO" { return "Enterprise Read-only DCs" } "RS" { return "RAS Servers Group" } "RU" { return "Alias PreWin2K" } "SA" { return "Schema Administrators" } "SI" { return "System Integrity Level" } "SO" { return "Server Operators" } "SU" { return "Service Logon User" } "SY" { return "Local System" } "WD" { return "Everyone" } } return "unknown SDDL group ( " + $code + " )" } # returns a string name of the Owner function Get-SDDL_Owner( [string] $SDDLString ) { $indexOwner = $SDDLString.IndexOf( "O:" ) $indexGroup = $SDDLString.IndexOf( "G:" ) if( $indexOwner -eq -1 -or $indexGroup -eq -1 ) { return "error parsing owner (1)" } if( $indexGroup -lt $indexOwner ) { return "error parsing owner (2)" } $substring = $SDDLString.Substring( $indexOwner +2, $indexGroup -2 ) return Get-SDDL_WellKnown $substring } # returns a string name of the Group function Get-SDDL_Group( [string] $SDDLString ) { $indexGroup = $SDDLString.IndexOf( "G:" ) $indexDACL = $SDDLString.IndexOf( "D:" ) if( $indexDACL -eq -1 -or $indexGroup -eq -1 ) { return "error parsing group (1)" } if( $indexDACL -lt $indexOwner ) { return "error parsing group (2)" } $substring = $SDDLString.Substring( $indexGroup +2, $indexDACL -2 -$indexGroup ) return Get-SDDL_WellKnown $substring } # returns a string name of ACE type function Get-SDDL_Ace_Type( [string] $code ) { if( $code -eq $null -or $code -eq "" ) { return "" } switch( $code ) { "A" { return "Access Allowed" } "D" { return "Access Denied" } "OA" { return "Access Allowed Object" } "OD" { return "Access Denied Object" } "AU" { return "Audit" } "AL" { return "Alarm" } "OU" { return "Audit Object" } "OL" { return "Alaram Object" } "ML" { return "Mandatory Label" } } return "Unknown ACE Type: " + $code } # returns a string array of ACE flags function Get-SDDL_Ace_Flags( [string] $code ) { $retstring = @() if( $code -eq $null -or $code -eq "" ) { return $retstring } while( $code.Length -gt 0 ) { if( $code.Length -gt 1 ) { $tempcode = $code.Substring( 0, 2 ) $code = $code.Substring( 2 ) } else { $tempcode = $code $code = "" } switch( $tempcode ) { "CI" { $retstring += "Container Inherit" } "OI" { $retstring += "Object Inherit" } "NP" { $retstring += "No Propagate Inherit" } "IO" { $retstring += "Inherit Only" } "ID" { $retstring += "Inherited" } "SA" { $retstring += "Audit Successful" } "FA" { $retstring += "Audit Failure" } } } return $retstring } # returns a string array of ACE rights function Get-SDDL_Ace_Rights( [string] $code ) { $retstring = @() if( $code -eq $null -or $code -eq "" ) { return $retstring } while( $code.Length -gt 0 ) { if( $code.Length -gt 1 ) { $tempcode = $code.Substring( 0, 2 ) $code = $code.Substring( 2 ) } else { $tempcode = $code $code = "" } if( $tempcode.StartsWith( "0x" ) ) { $tempcode = $code.Substring( 0, 6 ) $code = $code.Substring( 6 ) $retstring += ( "0x" + $tempcode ).ToString( ) } switch( $tempcode ) { "GA" { $retstring += "Generic All" } "GR" { $retstring += "Generic Read" } "GW" { $retstring += "Generic Write" } "GX" { $retstring += "Generic Execute" } "RC" { $retstring += "Read" } "SD" { $retstring += "Delete" } "WD" { $retstring += "Write DAC" } "WO" { $retstring += "Write Owner" } "RP" { $retstring += "Read Property" } "WP" { $retstring += "Write Property" } "CC" { $retstring += "Create Child" } "DC" { $retstring += "Delete Child" } "LC" { $retstring += "List Children" } "SW" { $retstring += "Self Write" } "LO" { $retstring += "List Object" } "DT" { $retstring += "Delete Tree" } "CR" { $retstring += "Control Access" } "FA" { $retstring += "File All" } "FR" { $retstring += "File Read" } "FW" { $retstring += "File Write" } "FX" { $retstring += "File Execute" } "KA" { $retstring += "Reg Key All" } "KR" { $retstring += "Reg Key Read" } "KW" { $retstring += "Reg Key Write" } "KX" { $retstring += "Reg Key Execute" } "NR" { $retstring += "No Read Up" } "NW" { $retstring += "No Write Up" } "NX" { $retstring += "No Execute Up" } } } return $retstring } # returns a string of the SID / Account function Get-SDDL_Ace_ObjectGUID( [string] $code ) { if( $code -eq $null -or $code -eq "" ) { return "" } switch( $code ) { "CR;ab721a53-1e2f-11d0-9819-00aa0040529b" { return "Change Password" } "CR;00299570-246d-11d0-a768-00aa006e0529" { return "Reset Password" } } return Get-SDDL_WellKnown $code } # returns a string of the SID / Account function Get-SDDL_Ace_InheritObjectGUID( [string] $code ) { if( $code -eq $null -or $code -eq "" ) { return "" } return Get-SDDL_WellKnown $code } # returns a string of the SID / Account function Get-SDDL_Ace_SID( [string] $code ) { if( $code -eq $null -or $code -eq "" ) { return "" } return Get-SDDL_WellKnown $code } # returns a string of full ACE info function Get-SDDL_Ace( [string] $Ace ) { $Ace = $Ace.TrimStart( '(' ) $Ace = $Ace.TrimEnd( ')' ) $array = $Ace.Split( ';' ) $ret = "" $acetype = Get-SDDL_Ace_Type $array[0] $aceflags = Get-SDDL_Ace_Flags $array[1] $acerights = Get-SDDL_Ace_Rights $array[2] $aceobjg = Get-SDDL_Ace_ObjectGUID $array[3] $aceiobjg = Get-SDDL_Ace_InheritObjectGUID $array[4] $acesid = Get-SDDL_Ace_SID $array[5] $ret += "Type:`t" + $acetype + "`r`n" if( $aceflags -ne $null -and $aceflags.Count -gt 0 ) { $ret += "Flags:`t" foreach( $flag in $aceflags ) { $ret += $flag + "`r`n" } } if( $acerights -ne $null -and $acerights.Count -gt 0 ) { $ret += "Rights:`t" foreach( $right in $acerights ) { $ret += $right + "`r`n" } } if( $aceobjg -ne $null -and $aceobjg -ne "" ) { $ret += "Ace Obj:`t" + $aceobjg + "`r`n" } if( $aceiobjg -ne $null -and $aceiobjg -ne "" ) { $ret += "Ace IObj:`t" + $aceiobjg + "`r`n" } if( $acesid -ne $null -and $acesid -ne "" ) { $ret += "Ace SID:`t" + $acesid + "`r`n" } return $ret } # returns a string array of the flags for a DACL or SACL function Get-ACL_Flags( [string] $flags ) { $ret = @() if( $flags -eq $null -or $flags -eq "" ) { return $ret } while( $flags.Length -gt 0 ) { switch( $flags.SubString( 0, 1 ) ) { "P" { $ret += "Protected" } "A" { switch( $flags.SubString( 1, 1 ) ) { "R" { $ret += "Auto Inherit Req" } "I" { $ret += "Auto Inherit" } } $flags = $flags.Substring( 1 ) } } $flags = $flags.Substring( 1 ) } return $ret } function Get-SDDL_DACL( [string] $SDDLString ) { $indexDACL = $SDDLString.IndexOf( "D:" ) $indexSACL = $SDDLString.IndexOf( "S:" ) if( $indexDACL -eq -1 ) { return "error parsing DACL (1)" } if( $indexSACL -ne -1 -and $indexSACL -lt $indexDACL ) { return "error parsing DACL (2)" } if( $indexSACL -ne -1 ) { $substring = $SDDLString.Substring( $indexDACL +2, $indexSACL -2 -$indexDACL ) } else { $substring = $SDDLString.Substring( $indexDACL +2 ) } $ret = "DACL:`r`n" $array = $substring.Split( '(' ) $index = 0 if( -not $array[0].EndsWith( ')' ) ) { $dflags = Get-ACL_Flags $array[0] if( $dflags -ne $null -and $dflags.Count -gt 0 ) { $ret += "Flags:`t" foreach( $dflag in $dflags ) { $ret += $dflag + "`r`n" } } $index++ } while( $index -lt $array.Count ) { $rAce = Get-SDDL_Ace $array[ $index ] $ret += $rAce + "`r`n" $index++ } return $ret } function Get-SDDL_SACL( [string] $SDDLString ) { $indexSACL = $SDDLString.IndexOf( "S:" ) if( $indexSACL -eq -1 ) { return "" } $substring = $SDDLString.Substring( $indexSACL +2 ) $ret = "SACL:`r`n" $array = $substring.Split( '(' ) $index = 0 if( -not $array[0].EndsWith( ')' ) ) { $sflags = Get-ACL_Flags $array[0] if( $sflags -ne $null -and $sflags.Count -gt 0 ) { $ret += "Flags:`t" foreach( $dflag in $dflags ) { $ret += $dflag + "`r`n" } } $index++ } while( $index -lt $array.Count ) { $rAce = Get-SDDL_Ace $array[ $index ] $ret += $rAce + "`r`n" $index++ } return $ret } # main interface #ex. Format-SDDL "O:BAG:DUD:(A;ID;FA;;;BA)(A;ID;FA;;;SY)(A;ID;0x1301bf;;;AU)(A;ID;0x1200a9;;;BU)" function Format-SDDL( [string] $SDDLString ) { $ret = "" $ret += "Owner: " + (Get-SDDL_Owner $SDDLString) + "`r`n" $ret += "Group: " + (Get-SDDL_Group $SDDLString) + "`r`n" $ret += (Get-SDDL_DACL $SDDLString) + "`r`n" $ret += (Get-SDDL_SACL $SDDLString) + "`r`n" return $ret } ########################################################### # # Last Update: 5-11-2011 # Author: jlaborde # # Description: # retrieve EnableDOCM key # # Usage: # Get-EnableDCOM # # Example: # $local:OnOrOff = Get-EnableDCOM # returns $true or $false # ########################################################### function Get-EnableDCOM( ) { $local:value = (Get-ItemProperty "registry::HKEY_LOCAL_MACHINE\Software\Microsoft\OLE" EnableDCOM).EnableDCOM.ToUpper( ) if( $local:value -eq "Y" ) { return $true } return $false } ########################################################### # # Last Update: 3-20-2012 # Author: jlaborde # # Description: # used to log a 'root cause' message # # Usage: # AlertKnownIssue $true / $false "RootCauseID" "Description of error" "FTE Only" / "Partners" / "Internal" / "Public" # ########################################################### # Visibility = FTE Only, Partners, Internal, or Public function AlertKnownIssue( [string]$sRootCauseID, [string]$sStatement, [string]$sVisibility ) { switch( $sVisibility ) { "FTE Only" { $vis = 1 } "Partners" { $vis = 2 } "Internal" { $vis = 3 } "Public" { $vis = 4 } default { $vis = 1 } } if( $global:gDebugSDPOn ) { Update-DiagRootCause -Id $sRootCauseID -Detected $true Write-GenericMessage -RootCauseID $sRootCauseID -Visibility $vis -SolutionTitle $sStatement } else { "Issue detected: " + $sRootCauseID + ", " + $vis + ", " + $sStatement } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAzPoqinxv9sJh5 # RAjDS9ymd3yg5ZT5JlYD5qz4bd1mfaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICx68pwEBK9+SMzlty5pQBts # ed6tEA5RnY2lRsBEEG4RMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAciAF3tP+GhAW6TtpS6O6rENDANW/fHHNVvL1cBhFRfhOMPFogx5LEDqK # y9YjJR/mGN+fPu9M9F4ifA5X3GL9XuKDL/TMLRFVpiei1GcEagrTkzj+iZCUc8fg # 7AkeUu17C15X4IafBYy2QC2THwZMbhzkh9059JMlmv5PZeyNkg+GpramNNsFle7Q # 4aKLsz4Lgg07/row0V8lSYzgQACMbNAW5yNPw7woDypC6eoHLRL+LQTqSjiYLiWz # 45vm7Ge7Gudgs0lIEC0AP2NbzZ8ZWihkAtZRltHBoKYmqINIie7bJ46y3E/w4c8H # D2FaxRL597YJlsDNk0rRiK1ZmuCpQKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBd48VTyy/MIhAcDtKJDZ3rNdz7hOUSnYb/j2KhexjbnQIGZxp6XqTH # GBMyMDI0MTAyODExNDA0Mi4zMTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB # /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv # g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV # ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5 # hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d # 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f # PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj # +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5 # hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb # K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6 # YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J # OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9 # Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre # rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55 # ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH # XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb # KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP # maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY # yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr # 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA # sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4 # vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh # xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA # Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smV3jAiGA8yMDI0MTAyODA0NDcy # NloYDzIwMjQxMDI5MDQ0NzI2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZXe # AgEAMAcCAQACAiCYMAcCAQACAhOLMAoCBQDqyudeAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAEFghDjhxi2TSq7RRxDW8oDboQrBl/FnL9GFyUGkxt5Hz/YP # xhSGpJ8w4/Uc7LKfS5rtB+7Ou2rGzeojlAdVUArx1kj94wVSPeBrEy9PBwhiSqDW # DINZjAa60rf5xjy9lMiQcK54bc21WGJa4ZlGC9qrcYoQpLqiwuYZS76Io7iSbtEh # MY/0WpMko/8XFost2uITk8Hh2RjhtVnZ4rJ1N1+/2kZobq1RJX7cvC0OFH4gYrGg # GJDLvaPbnwgdNz88IdYs1Nch8qdg7r8oBSko61ML576CxdcnSGw9Vpf07jA/s0Rm # Tcg81r/kwthHbYIWPw+cOA4BYp09eecPmASoKj8xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCC4W2vgdnPNw/nTkk/KLU/CdbeiGtoKfG4tMx9tZ6RUVTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbd # izXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgWXKlh2TCsXUYprvY+OJSRQQYCPt9 # 9/x5xOK3eVkF+jEwDQYJKoZIhvcNAQELBQAEggIAOOWC/xn00LZ2bWGlDooEJB7g # t7rhXBMFFElr73dulOP7/W7y2EmtfnZlxGaZ5n3kwdyxl2bZulkY5MoSn/IzhOWN # zG9AkVNwzPiDKJLJjW4RlYGXIoCmlVPx4X1CGg8Z0FLJ8cu4PpMxqwLjrUbaBP01 # pUosCxhqnJ3MzXbQLQ0W/Sd36z/RBhcrOq1xL65/LXNwA+tUO5Kz4ze0jYoxVezS # FyxVsAlpqsH/WmAOW12KgiOaG+cnLKOcfoz3pN3byi/avKhAv9BaTp2h0RnJ1w1x # vkI7zfDjAQWRSTURMlZeeZaWE2uxnimN4iCW3wlDx7nRh3Jve1ityMhwYS2PuRnb # EWf5Ae6dQ8zRI9Qe2NfQBT58pvxZLWRdHVFWDZa84ObxE8E27Zk6nP9UWnXCIJEm # 1O4bZSE2HMoXPeGRcpvX3jRxa0LQt7hohBKZAbrVGk0DHV1ykhHAgQSKnCXJzjVi # 0RkLoQO4G6lE9Moe7gg2duBkwKIW11tJwpuaQXD4QUG7yOKn08aeJkqG1dwitDKa # YwRUnTs8gwwJcvO5uXO43p0KjDPIB8jLvyTSdNMLN01BzwbPNRIxG1IIqd49wKDL # AEVLh2o8VJG2gZXZj/D1iw9Lfrt/Ut63g3bBR3QB27WEjwRVQXOR0+mTn6cnUirL # u4R2HSL31gSQRRtwksc= # SIG # End signature block
combined_dataset/train/non-malicious/1259.ps1
1259.ps1
function Format-CADSearchFilterValue { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $String ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $string = $string.Replace('\', '\5c') $string = $string.Replace('*', '\2a') $string = $string.Replace('(', '\28') $string = $string.Replace(')', '\29') $string = $string.Replace('/', '\2f') $string.Replace("`0", '\00') } Set-Alias -Name 'Format-ADSpecialCharacters' -Value 'Format-CADSearchFilterValue'
combined_dataset/train/non-malicious/sample_65_31.ps1
sample_65_31.ps1
$ServerCertificateName = "CN=ServiceFabricServerCert" $ClientCertificateName = "CN=ServiceFabricClientCert" function IsSecurityX509([string]$ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $properties = $jsonConfig.properties if ($properties -ne $Null) { $security = $properties.security if ($security -ne $Null ) { $clusterCredentialType = $security.ClusterCredentialType return ($clusterCredentialType -ne $Null -And $clusterCredentialType -eq "X509") } } return $False } function IsLocalMachine([string] $MachineName) { return ($MachineName -eq $env:ComputerName) -Or ($MachineName -eq "localhost") } function GetHostName([string] $iPAddress) { $hostName = $iPAddress if ([bool]($iPAddress -as [ipaddress])) { $hostName = [System.Net.Dns]::GetHostByAddress($iPAddress).HostName } return $hostName } function IsThisMachineServer([string] $ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes Foreach ($node in $nodes) { $hostName = GetHostName -iPAddress $node.iPAddress if (IsLocalMachine -MachineName $hostName) { return $True; } } return $False } function InstallCertToLocal([string] $CertSetupScript) { invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ServerCertificateName'" invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ClientCertificateName'" $cerLoc = "cert:\LocalMachine\My" $cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ServerCertificateName*" } $serverthumbprint = $cert.Thumbprint $cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ClientCertificateName*" } $clientthumbprint = $cert.Thumbprint return $serverthumbprint,$clientthumbprint } function IsOneBox([string] $ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $machineNames = $nodes.iPAddress | select -uniq return ($machineNames.Count -eq 1) } function ExportCertificateToLocal([string]$PackageRoot, [string]$CertSetupScript, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$ClusterConfigFilePath) { $serverCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $serverThumbprint -Name "server" $clientCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $clientThumbprint -Name "client" Write-Host "Server certificate is exported to $($serverCertificate[0]) with the password $($serverCertificate[1])" Write-Host "Client certificate is exported to $($clientCertificate[0]) with the password $($clientCertificate[1])" # If the current machine is server, then remove the client cert. If the current machine is client, then remove server cert. if (IsThisMachineServer -ClusterConfigFilePath $ClusterConfigFilePath) { if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath)) { Write-Host "Remove client certificate on localhost." invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ClientCertificateName'" } } else { Write-Host "Remove server certificate on localhost." invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ServerCertificateName'" } return $serverCertificate } function ExportCertificate([string]$PackageRoot, [string]$Thumbprint, [string] $Name) { $OutputCertificateFolder = Join-Path $PackageRoot "Certificates" if (-Not(Test-Path $OutputCertificateFolder)) { try { New-Item -ItemType Directory -Force -Path $OutputCertificateFolder -ErrorAction Stop | Out-Null } catch { Write-Error "Unable to create output certificate directory $OutputCertificateFolder. Error: $_" exit 1 } } $PfxFilePath = "$OutputCertificateFolder\$Name.pfx" $randomnum = Get-Random $pswd = ConvertTo-SecureString -String "$randomnum" -Force -AsPlainText Get-ChildItem -Path "cert:\localMachine\my\$Thumbprint" | Export-PfxCertificate -FilePath $PfxFilePath -Password $pswd > $null return $PfxFilePath,$randomnum } function ModifyJsonThumbprint([string]$ClusterConfigFilePath, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$OutputPath) { Write-Host "Modify thumbprint in $ClusterConfigFilePath" $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $securityCertInfo = New-Object -TypeName PSObject $certificate= New-Object –TypeName PSObject $certificate | Add-Member -Name "Thumbprint" -value "$ServerThumbprint" -MemberType NoteProperty $certificate | Add-Member -Name "X509StoreName" -value "My" -MemberType NoteProperty $clientcertificate = New-Object -TypeName PSObject $clientcertificate | Add-Member -Name "CertificateThumbprint" -value "$ClientThumbprint" -MemberType NoteProperty $clientcertificate | Add-Member -Name "IsAdmin" -value $true -MemberType NoteProperty $clientcertificateArray = @() $clientcertificateArray += $clientcertificate $securityCertInfo | Add-Member -Name "ClusterCertificate" -value $certificate -MemberType NoteProperty $securityCertInfo | Add-Member -Name "ServerCertificate" -value $certificate -MemberType NoteProperty $securityCertInfo | Add-Member -Name "ClientCertificateThumbprints" -value $clientcertificateArray -MemberType NoteProperty if (IsReverseProxyEndPointConfigured -ClusterConfigFilePath $ClusterConfigFilePath) { $securityCertInfo | Add-Member -Name "ReverseProxyCertificate" -value $certificate -MemberType NoteProperty } $jsonConfig.properties.security.CertificateInformation = $securityCertInfo $jsonObject = ConvertTo-Json $jsonConfig -Depth 10 $jsonObject > $OutputPath } function IsReverseProxyEndPointConfigured([string]$ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $properties = $jsonConfig.properties $nodetypes = $properties.nodetypes foreach($node in $nodes) { $nodetypeRef = $node.nodetypeRef foreach($nodetype in $nodetypes) { if ($nodetype.Name -eq $nodetypeRef) { if ($nodetype.reverseProxyEndpointPort -ne $Null) { return $True; } } } } return $False } function AddToTrustedHosts([string]$MachineName) { Write-Host "Adding $MachineName to TrustedHosts" Set-Item WSMan:\localhost\Client\TrustedHosts -Value "$MachineName" -Concatenate -Force } function InstallCertToRemote([string]$ClusterConfigFilePath, [string]$CertificatePath, [string]$Password) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $pswd = ConvertTo-SecureString -String $Password -Force -AsPlainText $certBytes = [System.IO.File]::ReadAllBytes($CertificatePath) $iPAddressList = $nodes.iPAddress | select -uniq Foreach ($iPAddress in $iPAddressList) { $machineName = GetHostName -iPAddress $iPAddress if (IsLocalMachine -MachineName $machineName) { Write-Host "Skipping certificate installation in $machineName." continue } AddToTrustedHosts -MachineName $machineName Write-Host "Connectting to $machineName" for($retry = 0; $retry -le 2; $retry ++) { Write-Host "Installing server certificate in $machineName for iteration $retry" Invoke-Command -ComputerName $machineName -ScriptBlock { param($pswd, $certBytes) Get-ChildItem -Path Cert:\LocalMachine\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force Get-ChildItem -Path Cert:\LocalMachine\root | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force Get-ChildItem -Path Cert:\CurrentUser\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force $certPath = [System.IO.Path]::GetTempFileName() [system.IO.file]::WriteAllBytes($certPath, $certBytes); Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\My -FilePath $certPath -Password $pswd > $null Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\root -FilePath $certPath -Password $pswd > $null Import-PfxCertificate -Exportable -CertStoreLocation Cert:\CurrentUser\My -FilePath $certPath -Password $pswd > $null } -ArgumentList $pswd,$certBytes if ($?) { Write-Host "Installed server certificate in $machineName" break } if ($retry -eq 2) { Write-Host "Installing server certificate in $machineName failed after 3 attemps" } else { Write-Host "Unable to intall server certificate in $machineName, retry after 30 seconds..." Start-Sleep -Seconds 30 } } } } # SIG # Begin signature block # MIInkwYJKoZIhvcNAQcCoIInhDCCJ4ACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBes9mKwSwmEyt5 # rlIN/UE8nv4hdY7kCy+udFdDWSrVDaCCDXYwggX0MIID3KADAgECAhMzAAACy7d1 # OfsCcUI2AAAAAALLMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NTU5WhcNMjMwNTExMjA0NTU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC3sN0WcdGpGXPZIb5iNfFB0xZ8rnJvYnxD6Uf2BHXglpbTEfoe+mO//oLWkRxA # wppditsSVOD0oglKbtnh9Wp2DARLcxbGaW4YanOWSB1LyLRpHnnQ5POlh2U5trg4 # 3gQjvlNZlQB3lL+zrPtbNvMA7E0Wkmo+Z6YFnsf7aek+KGzaGboAeFO4uKZjQXY5 # RmMzE70Bwaz7hvA05jDURdRKH0i/1yK96TDuP7JyRFLOvA3UXNWz00R9w7ppMDcN # lXtrmbPigv3xE9FfpfmJRtiOZQKd73K72Wujmj6/Su3+DBTpOq7NgdntW2lJfX3X # a6oe4F9Pk9xRhkwHsk7Ju9E/AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUrg/nt/gj+BBLd1jZWYhok7v5/w4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzQ3MDUyODAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAJL5t6pVjIRlQ8j4dAFJ # ZnMke3rRHeQDOPFxswM47HRvgQa2E1jea2aYiMk1WmdqWnYw1bal4IzRlSVf4czf # zx2vjOIOiaGllW2ByHkfKApngOzJmAQ8F15xSHPRvNMmvpC3PFLvKMf3y5SyPJxh # 922TTq0q5epJv1SgZDWlUlHL/Ex1nX8kzBRhHvc6D6F5la+oAO4A3o/ZC05OOgm4 # EJxZP9MqUi5iid2dw4Jg/HvtDpCcLj1GLIhCDaebKegajCJlMhhxnDXrGFLJfX8j # 7k7LUvrZDsQniJZ3D66K+3SZTLhvwK7dMGVFuUUJUfDifrlCTjKG9mxsPDllfyck # 4zGnRZv8Jw9RgE1zAghnU14L0vVUNOzi/4bE7wIsiRyIcCcVoXRneBA3n/frLXvd # jDsbb2lpGu78+s1zbO5N0bhHWq4j5WMutrspBxEhqG2PSBjC5Ypi+jhtfu3+x76N # mBvsyKuxx9+Hm/ALnlzKxr4KyMR3/z4IRMzA1QyppNk65Ui+jB14g+w4vole33M1 # pVqVckrmSebUkmjnCshCiH12IFgHZF7gRwE4YZrJ7QjxZeoZqHaKsQLRMp653beB # fHfeva9zJPhBSdVcCW7x9q0c2HVPLJHX9YCUU714I+qtLpDGrdbZxD9mikPqL/To # /1lDZ0ch8FtePhME7houuoPcMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAALLt3U5+wJxQjYAAAAAAsswDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA+B+EZukwaT8LuzTsxMFVRL # J48wx+tVOjsI7NKS8YM/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUllumJw9iQ225s+TMIgk+k7S3gu3EZQ88Z0H4xFAZVJB+dlxaAjZZGxY # MuHAuO96XqnGJRjmwVvTGKQAhJjlB0J0lAzSBDsgDtHPOa9vyqeShaHrTZcCAbkp # b1+NVNXbW/dD/YPgyRTzcyGplUiCg1wgsSxjkbP4Y1VevXMlYQRxfvNLIuESSwnK # EN5H5NQtPG+SNqFpTH+eal/7GAu9VU5Rsy5ROLiYjdeC23+nzUSP1ED/YcT5L1Rz # M3gRB/diC4xrHHxxNs6iNFdeULoTLmLGiBuQt6ZndIxGVhx8lg0CZKkCUjm4fDKs # GJScbF8R6MpgiRLs0X1PmfbbQygsUqGCFv0wghb5BgorBgEEAYI3AwMBMYIW6TCC # FuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCTKV2eH6jVsya6IKCY+nZmUZ3awNks9S9KOzE2JqlY5gIGY+5PEE5e # GBMyMDIzMDIxODAyNTAwNC43MDlaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxMkJDLUUz # QUUtNzRFQjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EVQwggcMMIIE9KADAgECAhMzAAAByk/Cs+0DDRhsAAEAAAHKMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDE0 # MFoXDTI0MDIwMjE5MDE0MFowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjEyQkMtRTNBRS03NEVCMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEAwwGcq9j50rWEkcLSlGZLweUVfxXRaUjiPsyaNVxPdMRs # 3CVe58siu/EkaVt7t7PNTPko/s8lNtusAeLEnzki44yxk2c9ekm8E1SQ2YV9b8/L # OxfKapZ8tVlPyxw6DmFzNFQjifVm8EiZ7lFRoY448vpcbBD18qjYNF/2Z3SQchcs # dV1N9Y6V2WGl55VmLqFRX5+dptdjreBXzi3WW9TsoCEWcYCBK5wYgS9tT2SSSTza # e3jmdw40g+LOIyrVPF2DozkStv6JBDPvwahXWpKGpO7rHrKF+o7ECN/ViQFMZyp/ # vxePiUABDNqzEUI8s7klYmeHXvjeQOq/CM3C/Y8bj3fJObnZH7eAXvRDnxT8R6W/ # uD1mGUJvv9M9BMu3nhKpKmSxzzO5LtcMEh2tMXxhMGGNMUP3DOEK3X+2/LD1Z03u # sJTk5pHNoH/gDIvbp787Cw40tsApiAvtrHYwub0TqIv8Zy62l8n8s/Mv/P764CTq # rxcXzalBHh+Xy4XPjmadnPkZJycp3Kczbkg9QbvJp0H/0FswHS+efFofpDNJwLh1 # hs/aMi1K/ozEv7/WLIPsDgK16fU/axybqMKk0NOxgelUjAYKl4wU0Y6Q4q9N/9Pw # AS0csifQhY1ooQfAI0iDCCSEATslD8bTO0tRtqdcIdavOReqzoPdvAv3Dr1XXQ8C # AwEAAaOCATYwggEyMB0GA1UdDgQWBBT6x/6lS4ESQ8KZhd0RgU7RYXM8fzAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC # AQDY0HkqCS3KuKefFX8/rm/dtD9066dKEleNqriwZqsM4Ym8Ew4QiqOqO7mWoYYY # 4K5y8eXSOHKNXOfpO6RbaYj8jCOcJAB5tqLl5hiMgaMbAVLrl1hlix9sloO45LON # 0JphKva3D6AVKA7P78mA9iRHZYUVrRiyfvQjWxmUnxhis8fom92+/RHcEZ1Dh5+p # 4gzeeL84Yl00Wyq9EcgBKKfgq0lCjWNSq1AUG1sELlgXOSvKZ4/lXXH+MfhcHe91 # WLIaZkS/Hu9wdTT6I14BC97yhDsZWXAl0IJ801I6UtEFpCsTeOyZBJ7CF0rf5lxJ # 8tE9ojNsyqXJKuwVn0ewCMkZqz/cEwv9FEx8QmsZ0ZNodTtsl+V9dZm+eUrMKZk6 # PKsKArtQ+jHkfVsHgKODloelpOmHqgX7UbO0NVnIlpP55gQTqV76vU7wRXpUfz7K # hE3BZXNgwG05dRnCXDwrhhYz+Itbzs1K1R8I4YMDJjW90ASCg9Jf+xygRKZGKHjo # 2Bs2XyaKuN1P6FFCIVXN7KgHl/bZiakGq7k5TQ4OXK5xkhCHhjdgHuxj3hK5AaOy # +GXxO/jbyqGRqeSxf+TTPuWhDWurIo33RMDGe5DbImjcbcj6dVhQevqHClR1OHSf # r+8m1hWRJGlC1atcOWKajArwOURqJSVlThwVgIyzGNmjzjCCB3EwggVZoAMCAQIC # EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS # b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX # DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC # 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG # Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP # 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P # XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361 # VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB # Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9 # X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e # wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw # wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr # 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e # FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n # FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw # PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j # cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH # hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF # BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl # ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf # ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC # j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu # 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/ # GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D # YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO # xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO # Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I # 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0 # zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM # mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT # TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIBATCB+KGB0KSBzTCByjEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj # cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046MTJCQy1FM0FFLTc0RUIxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAKOO55cMT4syPP6nClg2IWfajMqkoIGD # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF # BQACBQDnmh8LMCIYDzIwMjMwMjE3MjM0MzA3WhgPMjAyMzAyMTgyMzQzMDdaMHQw # OgYKKwYBBAGEWQoEATEsMCowCgIFAOeaHwsCAQAwBwIBAAICJ0wwBwIBAAICEZ0w # CgIFAOebcIsCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC # AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQDUrVZ55zFEOMDH # xKaXnTpCDznfPZEx9BCoHg33vREQ2X+25B8dCkYQw074jzfqja5O8e7VOKQqInfr # wxuF619Uie05nRXI/du28cr+symmgqRYu6I0NqO5l7MwfqanY3SEEHmyKs4gKdFx # dVvt4dpYVz4oBsgJNi9W60QpyX8DEjGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAByk/Cs+0DDRhsAAEAAAHKMA0GCWCGSAFl # AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN # AQkEMSIEIFEPThtwkVID5ZFAxgoLCW0t5j5KbUxm1UHOd9+mgHPlMIH6BgsqhkiG # 9w0BCRACLzGB6jCB5zCB5DCBvQQgEz0b85vrVU2slZAk4jt1SDEk6IzZAwVCoWwF # 3KzcGuAwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AcpPwrPtAw0YbAABAAAByjAiBCBs2NLOHeQZicslZyYgpO23DnJ5iMSGZ1v1oe0Y # 0PkU5zANBgkqhkiG9w0BAQsFAASCAgBADC5yIkTmP3etL/2iQ3zcVhSsXeNbBrXs # 01RvX2ZjJqhuvetN5o82hOAfBbS4SkvJEC/aIbQyDGISQyv5x/sOAfr9WAWY1X8B # F9XHjHBwg2PJW35OC2ibYAl/OeD2XMSToQ31+FKX8RStp77Bl/UcNJpc1xD+jK69 # fmKDvBKZK695S3Bu0pbRfkmp3tVdO5HAYfOS6cHpRagt9huTZ07ay/mykQs1M3j8 # hkpl3MdlbHUYk2odHW2vu3GwU75Ct59S0XnJJu8Q4nGYa8XE2rwx8nVSbbuFR3R9 # 0PT35EuFxiBkpu4jz51VNARDMUi2VT34lLSvEYT8t+CEU2ftUTduXgNlXQ8HISVa # 6xRPp75yCFlVPV9W0jOKCkIngdo4Sw1VL4Hlgm7Mju/9obGsATxkm8VpVO4yqr4h # oJ2JrsDMnr4bWJ7Zq5xh5wnmzDlrphFTk7/GC7B81o47o0D/tMNgSOXBWH5fMGGq # duWX/l5Qjia1vN0r7NhVxToMdJvmnIrwhMQDjnTYRlFd5D9RMca2znADWO92twNY # lNFQcM1RvNBJyWdigEYEXeDQfaJqsO8DVnzVBDrc6Chkp966aGrJBerEO9uUlEHb # U6CreWT1frTjhkxM812nAPaGTAcTwNjDCY/46TZkIDOZxkNoZuUFPhJMu3oIiyll # eMBuZG0/lw== # SIG # End signature block
combined_dataset/train/non-malicious/833.ps1
833.ps1
Param( [parameter(Mandatory=$true)] $CsvFilePath ) $ErrorActionPreference = "Stop" $scriptsPath = $PSScriptRoot if ($PSScriptRoot -eq "") { $scriptsPath = "." } . "$scriptsPath\asr_logger.ps1" . "$scriptsPath\asr_common.ps1" . "$scriptsPath\asr_csv_processor.ps1" Function ProcessItemImpl($processor, $csvItem, $reportItem) { $reportItem | Add-Member NoteProperty "UpdatePropertiesJobId" $null $reportItem | Add-Member NoteProperty "ProtectableStatus" $null $reportItem | Add-Member NoteProperty "ProtectionState" $null $reportItem | Add-Member NoteProperty "ProtectionStateDescription" $null $vaultName = $csvItem.VAULT_NAME $sourceMachineName = $csvItem.SOURCE_MACHINE_NAME $sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER $targetAvailabilitySet = $csvItem.AVAILABILITY_SET $targetPrivateIP = $csvItem.PRIVATE_IP $targetSubnet = $csvItem.TARGET_SUBNET $targetMachineSize = $csvItem.MACHINE_SIZE $targetPostFailoverResourceGroup = $csvItem.TARGET_RESOURCE_GROUP $vaultServer = $asrCommon.GetAndEnsureVaultContext($vaultName) $fabricServer = $asrCommon.GetFabricServer($sourceConfigurationServer) $protectionContainer = $asrCommon.GetProtectionContainer($fabricServer) $protectableVM = $asrCommon.GetProtectableItem($protectionContainer, $sourceMachineName) $processor.Logger.LogTrace("ProtectableStatus: '$($protectableVM.ProtectionStatus)'") $reportItem.ProtectableStatus = $protectableVM.ProtectionStatus if ($protectableVM.ReplicationProtectedItemId -ne $null) { $protectedItem = $asrCommon.GetProtectedItem($protectionContainer, $sourceMachineName) $reportItem.ProtectionState = $protectedItem.ProtectionState $reportItem.ProtectionStateDescription = $protectedItem.ProtectionStateDescription $processor.Logger.LogTrace("ProtectionState: '$($protectedItem.ProtectionState)'") $processor.Logger.LogTrace("ProtectionDescription: '$($protectedItem.ProtectionStateDescription)'") if ($protectedItem.ProtectionState -eq 'Protected') { $processor.Logger.LogTrace("Creating job to set machine properties...") $nicDetails = $protectedItem.NicDetailsList[0] if (($targetAvailabilitySet -eq '') -or ($targetAvailabilitySet -eq $null)) { $updatePropertiesJob = Set-AzureRmRecoveryServicesAsrReplicationProtectedItem ` -InputObject $protectedItem ` -PrimaryNic $nicDetails.NicId ` -RecoveryNicStaticIPAddress $targetPrivateIP ` -RecoveryNetworkId $nicdetails.RecoveryVMNetworkId ` -RecoveryNicSubnetName $targetSubnet ` -UseManagedDisk $False ` -Size $targetMachineSize } else { $targetAvailabilitySetObj = Get-AzureRmAvailabilitySet ` -ResourceGroupName $targetPostFailoverResourceGroup ` -Name $targetAvailabilitySet $updatePropertiesJob = Set-AzureRmRecoveryServicesAsrReplicationProtectedItem ` -InputObject $protectedItem ` -PrimaryNic $nicDetails.NicId ` -RecoveryNicStaticIPAddress $targetPrivateIP ` -RecoveryNetworkId $nicdetails.RecoveryVMNetworkId ` -RecoveryNicSubnetName $targetSubnet ` -UseManagedDisk $False ` -RecoveryAvailabilitySet $targetAvailabilitySetObj.Id ` -Size $targetMachineSize } if ($updatePropertiesJob -eq $null) { $processor.Logger.LogErrorAndThrow("Error creating update properties job for '$($sourceMachineName)'") } $reportItem.UpdatePropertiesJobId = $updatePropertiesJob.Name } else { $processor.Logger.LogTrace("Item '$($sourceMachineName)' it is not in a Protected status") } } else { $processor.Logger.LogTrace("'$($sourceMachineName)' item is not in a protected state ready for replication") } } Function ProcessItem($processor, $csvItem, $reportItem) { try { ProcessItemImpl $processor $csvItem $reportItem } catch { $exceptionMessage = $_ | Out-String $processor.Logger.LogError($exceptionMessage) throw } } $logger = New-AsrLoggerInstance -CommandPath $PSCommandPath $asrCommon = New-AsrCommonInstance -Logger $logger $processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem $processor.ProcessFile($CsvFilePath)
combined_dataset/train/non-malicious/Get-WebFile _1.1.ps1
Get-WebFile _1.1.ps1
## Get-WebFile.ps1 (aka wget for PowerShell) ############################################################################################################## ## Downloads a file or page from the web ## History: ## v3.1 - Unwrap the filename when it has quotes around it ## v3 - rewritten completely using HttpWebRequest + HttpWebResponse to figure out the file name, if possible ## v2 - adds a ton of parsing to make the output pretty ## - added measuring the scripts involved in the command, (uses Tokenizer) ############################################################################################################## #function wget { param( $url = (Read-Host "The URL to download"), $fileName ) $req = [System.Net.HttpWebRequest]::Create($url); $res = $req.GetResponse(); if($fileName -and !(Split-Path $fileName)) { $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } elseif(($fileName -eq $null) -or (Test-Path -PathType "Container" $fileName)) { # if( -and !((Test-Path -PathType "Leaf" $fileName) -or ((Test-Path -PathType "Container" (Split-Path $fileName)) -and -not ))) [string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $res.Headers["Content-Disposition"] ).Groups[1].Value $fileName = $fileName.trim("\\/""'") if(!$fileName) { $fileName = $res.ResponseUri.Segments[-1] $fileName = $fileName.trim("\\/") if(!$fileName) { $fileName = Read-Host "Please provide a file name" } $fileName = $fileName.trim("\\/") if(!([IO.FileInfo]$fileName).Extension) { $fileName = $fileName + "." + $res.ContentType.Split(";")[0].Split("/")[1] } } $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } if($res.StatusCode -eq 200) { $reader = new-object System.IO.StreamReader $res.GetResponseStream() $writer = new-object System.IO.StreamWriter $fileName # TODO: stick this in a loop and give progress reports $writer.Write($reader.ReadToEnd()) $reader.Close(); $writer.Close(); } $res.Close(); ls $fileName #}
combined_dataset/train/non-malicious/sample_43_26.ps1
sample_43_26.ps1
# # Module manifest for module 'OCI.PSModules.Cloudguard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '416303ec-c9d6-4a65-8413-14973e520be8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudguard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardConditionMetadataType', 'Get-OCICloudguardConditionMetadataTypesList', 'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule', 'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource', 'Get-OCICloudguardDataSourceEventsList', 'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector', 'Get-OCICloudguardDetectorRecipe', 'Get-OCICloudguardDetectorRecipeDetectorRule', 'Get-OCICloudguardDetectorRecipeDetectorRulesList', 'Get-OCICloudguardDetectorRecipesList', 'Get-OCICloudguardDetectorRule', 'Get-OCICloudguardDetectorRulesList', 'Get-OCICloudguardDetectorsList', 'Get-OCICloudguardImpactedResourcesList', 'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList', 'Get-OCICloudguardManagedListTypesList', 'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem', 'Get-OCICloudguardProblemEndpointsList', 'Get-OCICloudguardProblemEntitiesList', 'Get-OCICloudguardProblemHistoriesList', 'Get-OCICloudguardProblemsList', 'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResourceProfile', 'Get-OCICloudguardResourceProfileEndpointsList', 'Get-OCICloudguardResourceProfileImpactedResourcesList', 'Get-OCICloudguardResourceProfilesList', 'Get-OCICloudguardResourceTypesList', 'Get-OCICloudguardResponderActivitiesList', 'Get-OCICloudguardResponderExecution', 'Get-OCICloudguardResponderExecutionsList', 'Get-OCICloudguardResponderRecipe', 'Get-OCICloudguardResponderRecipeResponderRule', 'Get-OCICloudguardResponderRecipeResponderRulesList', 'Get-OCICloudguardResponderRecipesList', 'Get-OCICloudguardResponderRule', 'Get-OCICloudguardResponderRulesList', 'Get-OCICloudguardSecurityPoliciesList', 'Get-OCICloudguardSecurityPolicy', 'Get-OCICloudguardSecurityRecipe', 'Get-OCICloudguardSecurityRecipesList', 'Get-OCICloudguardSecurityZone', 'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting', 'Get-OCICloudguardSightingEndpointsList', 'Get-OCICloudguardSightingImpactedResourcesList', 'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList', 'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe', 'Get-OCICloudguardTargetDetectorRecipeDetectorRule', 'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList', 'Get-OCICloudguardTargetDetectorRecipesList', 'Get-OCICloudguardTargetResponderRecipe', 'Get-OCICloudguardTargetResponderRecipeResponderRule', 'Get-OCICloudguardTargetResponderRecipeResponderRulesList', 'Get-OCICloudguardTargetResponderRecipesList', 'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList', 'Get-OCICloudguardWorkRequest', 'Get-OCICloudguardWorkRequestErrorsList', 'Get-OCICloudguardWorkRequestLogsList', 'Get-OCICloudguardWorkRequestsList', 'Invoke-OCICloudguardExecuteResponderExecution', 'Invoke-OCICloudguardRequestRiskScores', 'Invoke-OCICloudguardRequestSecurityScores', 'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend', 'Invoke-OCICloudguardRequestSummarizedActivityProblems', 'Invoke-OCICloudguardRequestSummarizedProblems', 'Invoke-OCICloudguardRequestSummarizedResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedRiskScores', 'Invoke-OCICloudguardRequestSummarizedSecurityScores', 'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendProblems', 'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores', 'Invoke-OCICloudguardSkipBulkResponderExecution', 'Invoke-OCICloudguardSkipResponderExecution', 'Invoke-OCICloudguardTriggerResponder', 'Move-OCICloudguardDataSourceCompartment', 'Move-OCICloudguardDetectorRecipeCompartment', 'Move-OCICloudguardManagedListCompartment', 'Move-OCICloudguardResponderRecipeCompartment', 'Move-OCICloudguardSecurityRecipeCompartment', 'Move-OCICloudguardSecurityZoneCompartment', 'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe', 'New-OCICloudguardDetectorRecipeDetectorRule', 'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe', 'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe', 'New-OCICloudguardTargetResponderRecipe', 'Remove-OCICloudguardCompartment', 'Remove-OCICloudguardDataMaskRule', 'Remove-OCICloudguardDataSource', 'Remove-OCICloudguardDetectorRecipe', 'Remove-OCICloudguardDetectorRecipeDetectorRule', 'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource', 'Remove-OCICloudguardManagedList', 'Remove-OCICloudguardResponderRecipe', 'Remove-OCICloudguardSecurityRecipe', 'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget', 'Remove-OCICloudguardTargetDetectorRecipe', 'Remove-OCICloudguardTargetResponderRecipe', 'Stop-OCICloudguardWorkRequest', 'Update-OCICloudguardBulkProblemStatus', 'Update-OCICloudguardConfiguration', 'Update-OCICloudguardDataMaskRule', 'Update-OCICloudguardDataSource', 'Update-OCICloudguardDetectorRecipe', 'Update-OCICloudguardDetectorRecipeDetectorRule', 'Update-OCICloudguardManagedList', 'Update-OCICloudguardProblemStatus', 'Update-OCICloudguardResponderRecipe', 'Update-OCICloudguardResponderRecipeResponderRule', 'Update-OCICloudguardSecurityRecipe', 'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget', 'Update-OCICloudguardTargetDetectorRecipe', 'Update-OCICloudguardTargetDetectorRecipeDetectorRule', 'Update-OCICloudguardTargetResponderRecipe', 'Update-OCICloudguardTargetResponderRecipeResponderRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/901.ps1
901.ps1
$gitdirectory="<Replace with path to local Git repo>" $webappname="mywebapp$(Get-Random)" cd $gitdirectory New-AzWebApp -Name $webappname git push azure master
combined_dataset/train/non-malicious/404.ps1
404.ps1
if (-not [PSFramework.Configuration.ConfigurationHost]::ImportFromRegistryDone) { $config_hash = Read-PsfConfigPersisted -Scope 127 foreach ($value in $config_hash.Values) { try { if (-not $value.KeepPersisted) { Set-PSFConfig -FullName $value.FullName -Value $value.Value -EnableException } else { Set-PSFConfig -FullName $value.FullName -PersistedValue $value.Value -PersistedType $value.Type -EnableException } [PSFramework.Configuration.ConfigurationHost]::Configurations[$value.FullName.ToLower()].PolicySet = $value.Policy [PSFramework.Configuration.ConfigurationHost]::Configurations[$value.FullName.ToLower()].PolicyEnforced = $value.Enforced } catch { } } [PSFramework.Configuration.ConfigurationHost]::ImportFromRegistryDone = $true }
combined_dataset/train/non-malicious/3819.ps1
3819.ps1
function Test-NewAzureRmVhdVMWithValidDiskFile { $rgname = Get-ComputeTestResourceName try { [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; [string]$file = ".\VhdFiles\tiny.vhd"; $vmname = $rgname + 'vm'; [string]$domainNameLabel = "$vmname-$rgname".tolower(); $vm = New-AzVM -ResourceGroupName $rgname -Name $vmname -Location $loc -DiskFile $file -OpenPorts 1234 -DomainNameLabel $domainNameLabel; Assert-AreEqual $vm.Name $vmname; Assert-AreEqual $vm.Location $loc; Assert-Null $vm.OSProfile $null; Assert-Null $vm.StorageProfile.DataDisks; Assert-NotNull $vm.StorageProfile.OSDisk.ManagedDisk; $stoname = $vmname; $diskname = $vmname; $disk = Get-AzDisk -ResourceGroupName $rgname -DiskName $diskname; Assert-AreEqual Windows $disk.OsType; Assert-AreEqual Import $disk.CreationData.CreateOption; Assert-AreEqual "https://${stoname}.blob.core.windows.net/${rgname}/${diskname}.vhd" $disk.CreationData.SourceUri; } finally { Clean-ResourceGroup $rgname; } } function Test-NewAzureRmVhdVMWithInvalidDiskFile { $rgname = Get-ComputeTestResourceName; try { [string]$file1 = ".\test_invalid_file_1.vhd"; $st = Set-Content -Path $file1 -Value "test1" -Force; [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; $expectedException = $false; $expectedErrorMessage = "*unsupported format*"; try { [string]$domainNameLabel = "$rgname-$rgname".tolower(); $st = New-AzVM -ResourceGroupName $rgname -Name $rgname -Location $loc -Linux -DiskFile $file1 -OpenPorts 1234 -DomainNameLabel $domainNameLabel; } catch { if ($_ -like $expectedErrorMessage) { $expectedException = $true; } } if (-not $expectedException) { throw "Expected exception from calling New-AzVM was not caught: '$expectedErrorMessage'."; } } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/sample_34_87.ps1
sample_34_87.ps1
########################################################################################## # <copyright file="Microsoft.EnterpriseManagement.OperationsManager.ClientShell.NonInteractiveStartup.ps1" company="Microsoft"> # Copyright (c) Microsoft Corporation. All rights reserved. # </copyright> # <summary>Microsoft.EnterpriseManagement.OperationsManager.ClientShell.NonInteractiveStartup.ps1 script.</summary> ########################################################################################## .\Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Functions.ps1; Start-OperationsManagerClientShell -ManagementServerName: "" -PersistConnection: $false -Interactive: $false; # SIG # Begin signature block # MIIn8QYJKoZIhvcNAQcCoIIn4jCCJ94CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNakoxqclAnwAG # P7Fus93V01sEW2Sjo0B1I6XqFAwnxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGdEwghnNAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCggeAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJevgd4IkNy9ZuDvHtdkVXgq # kbkxfV9g5wvj4jjqFrwmMHQGCisGAQQBgjcCAQwxZjBkoEaARABTAHkAcwB0AGUA # bQAgAEMAZQBuAHQAZQByACAALQAgAE8AcABlAHIAYQB0AGkAbwBuAHMAIABNAGEA # bgBhAGcAZQByoRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTANBgkqhkiG9w0B # AQEFAASCAQAu9V//Wk5T9fW0z7kLO/xCuXS9+cdEFPDZofh8s6/HHUtWuprXq7XL # slE48Oq6PpY/YwGhtXWCd8c7JdFtAJQgdP+QhrT30PQvbMO5mmnBNxKK3lsiW/3H # MgoRWBg5hOEdqnfirKcKOEDI0+J1k1PitHoUH2kSSsT+H0fmUWNunO3BPiliqBny # xrXpdjGcKbNh9E36dkNqIrVs9gvhiSjlaRmSTQIkRBYWZss5wBQL9KBgWuSUyZD4 # mhdpkehKSjRbhpu4TYq1R4efZg4wej5B8W+70nr6kDewTOf+dWVHBpapS+A+lOaB # zy0O2sJDnn3yPYkVAdGREhIQfZo1hVbLoYIXKTCCFyUGCisGAQQBgjcDAwExghcV # MIIXEQYJKoZIhvcNAQcCoIIXAjCCFv4CAQMxDzANBglghkgBZQMEAgEFADCCAVkG # CyqGSIb3DQEJEAEEoIIBSASCAUQwggFAAgEBBgorBgEEAYRZCgMBMDEwDQYJYIZI # AWUDBAIBBQAEIEyZ3BCjHAZqwqkoclBi7s8MrSQqEZrhhS3Z03YhJrtrAgZl1f2z # AXIYEzIwMjQwMzA1MTM0NTUyLjMzM1owBIACAfSggdikgdUwgdIxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJ # cmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeWPasDzPbQLowABAAAB5TAN # BgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0y # MzEwMTIxOTA3MzVaFw0yNTAxMTAxOTA3MzVaMIHSMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP # cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQt # NEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqXvgOtq7Y7osusk7cfJO # 871pdqL/943I/kwtZmuZQY04kw/AwjTxX3MF9E81y5yt4hhLIkeOQwhQaa6HSs9X # n/b5QIsas3U/vuf1+r+Z3Ncw3UXOpo8d0oSUqd4lDxHpw/h2u7YbKaa3WusZw17z # TQJwPp3812iiaaR3X3pWo62NkUDVda74awUF5YeJ7P8+WWpwz95ae2RAyzSUrTOY # J8f4G7uLWH4UNFHwXtbNSv/szeOFV0+kB+rbNgIDxlUs2ASLNj68WaDH7MO65T8Y # KEMruSUNwLD7+BWgS5I6XlyVCzJ1ZCMklftnbJX7UoLobUlWqk/d2ko8A//i502q # lHkch5vxNrUl+NFTNK/epKN7nL1FhP8CNY1hDuCx7O4NYz/xxnXWRyjUm9TI5DzH # 8kOQwWpJHCPW/6ZzosoqWP/91YIb8fD2ml2VYlfqmwN6xC5BHsVXt4KpX+V9qOgu # k83H/3MXV2/zJcF3OZYk94KJ7ZdpCesAoOqUbfNe7H201CbPYv3pN3Gcg7Y4aZjE # EABkBagpua1gj4KLPgJjI7QWblndPjRrl3som5+0XoJOhxxz9Sn+OkV9CK0t+N3v # VxL5wsJ6hD6rSfQgAu9X5pxsQ2i5I6uO/9C1jgUiMeUjnN0nMmcayRUnmjOGOLRh # Gxy/VbAkUC7LIIxC8t2Y910CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTf/5+Hu01z # MSJ8ReUJCAU5eAyHqjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAM/rCE4WMPVp3 # waQQn2gsG69+Od0zIZD1HgeAEpKU+3elrRdUtyKasmUOcoaAUGJbAjpc6DDzaF2i # UOIwMEstZExMkdZV5RjWBThcHw44jEFz39DzfNvVzRFYS6mALjwj5v7bHZU2AYlS # xAjI9HY+JdCFPk/J6syBqD05Kh1CMXCk10aKudraulXbcRTAV47n7ehJfgl4I1m+ # DJQ7MqnIy+pVq5uj4aV/+mx9bm0hwyNlW3R6WzB+rSok1CChiKltpO+/vGaLFQkZ # NuLFiJ9PACK89wo116Kxma22zs4dsAzv3lm8otISpeJFSMNhnJ4fIDKwwQAtsiF1 # eAcSHrQqhnLOUFfPdXESKsTueG5w3Aza1WI6XAjsSR5TmG51y2dcIbnkm4zD/Bvt # zvVEqKZkD8peVamYG+QmQHQFkRLw4IYN37Nj9P0GdOnyyLfpOqXzhV+lh72IebLs # +qrGowXYKfirZrSYQyekGu4MYT+BH1zxJUnae2QBHLlJ+W64n8wHrXJG9PWZTHeX # Kmk7bZ4+MGOfCgS9XFsONPWOF0w116864N4kbNEsr0c2ZMML5N1lCWP5UyAibxl4 # QhE0XShq+IX5BlxRktbNZtirrIOiTwRkoWJFHmi0GgYu9pgWnEFlQTyacsq4OVih # uOvGHuWfCvFX98zLQX19KjYnEWa0uC0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD3jaIa5gWuwTjDNYN3zkSkzpGLCqCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUA # AgUA6ZGdfzAiGA8yMDI0MDMwNTIxMzI0N1oYDzIwMjQwMzA2MjEzMjQ3WjB0MDoG # CisGAQQBhFkKBAExLDAqMAoCBQDpkZ1/AgEAMAcCAQACAgbDMAcCAQACAhHeMAoC # BQDpku7/AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAOO6iEHbVxoluzo8d # Dr7gCSkWprT8cLZLdWV07Fo38NtKqZwqdD64fkui1tmHK9n6dH1OAjaoJnsG/+Ab # nF3RsFpmP8hDOz8sXZVnwVc8OevTQqao2Q8AlHPLRhGLjSvlPaXtL+pb9c5FnxaH # 2RTg2pVQVuScb4KJJWuissB/qeQxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB5TANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCDJEpe3DGythD1nXyo2bE1KntzCeYynmvAzdzEjWyt3yTCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vwj+kCh/TULCFvFQf1 # Tr3tMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHl # j2rA8z20C6MAAQAAAeUwIgQg+jFt3esHkN6VfLXbA8YkXrZDohUatT70ABnTKsue # l5AwDQYJKoZIhvcNAQELBQAEggIASbYC98XJh4/fgtmPVE14g4HqWO0l7SO72Fin # /RPKPOSzHmNHX93F9X3TjeEQylSyZQXijcsy8T0Izd4R4BnLwWbQcw9ufUrKlPNV # TvKGw12MDBRrx3a5uEgs5pVRHoXaWZrIVb1eT7R2VEOSouWudE9CylmEVvexxHxb # sJiJZVqHE/VfdJfwh6u4pf9r3VwR9u1ouZkNag8LKgEzQcDHWr8KoJdO87q+jZPp # iHd4r+39SLVNRrhOebeQJ93RMx5svHKSo6/e3fXYbacs4mbBXW7fdyradTIDM4SM # ME4ypGCBb+lanQFXhOWVgFDUl93s6VMnoTnX9dntvNg/BKl4UFmi55m713DJG4fs # bSVCn44M0DG5yfR2S2wKpzPlMVohmu/dKs7H2Bc+uidqCzMztzQBDMvcsAQZHufV # fyBL11OHWg/W0soYPxVen5MMPj/UQJjRpK3W52YrQO1PPn86DJmpahK+0wIvRSf7 # fIF4KhwU9/acMHgfSOsD67j4kRWhod4s6tQYqvNJXV1dZ2mpG0u9jhr5YJ6cNbAU # nVMpbcY0swLftHX2dQdF83blz3Fx+JEgSeagMYMZ63cZmP1d2+pQbQ0iKfhH/Wr8 # FMiS/idJNnll0P29zeBqFqW/8zP1ae1X5hDLENDRstB81hEj/2mUOFA+BpfMlUBJ # CjVO0SI= # SIG # End signature block
combined_dataset/train/non-malicious/1408.ps1
1408.ps1
function Uninstall-CMsmqMessageQueue { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $Name, [Switch] $Private ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $commonArgs = @{ 'Name' = $Name ; 'Private' = $Private } if( -not (Test-CMsmqMessageQueue @commonArgs) ) { return } if( $pscmdlet.ShouldProcess( "MSMQ Message Queue $Name", "remove" ) ) { try { [Messaging.MessageQueue]::Delete( (Get-CMsmqMessageQueuePath @commonArgs) ) } catch { Write-Error $_ return } while( Test-CMsmqMessageQueue @commonArgs ) { Start-Sleep -Milliseconds 100 } } } Set-Alias -Name 'Remove-MsmqMessageQueue' -Value 'Uninstall-CMsmqMessageQueue'
combined_dataset/train/non-malicious/sample_27_60.ps1
sample_27_60.ps1
/////////////////////////////////////////////////////////////////////////////// // Helper to set a designer prop /////////////////////////////////////////////////////////////////////////////// function setDesignerProp(tname, ttype, tvalue) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = tvalue; } /////////////////////////////////////////////////////////////////////////////// // Toggle button and gobal state /////////////////////////////////////////////////////////////////////////////// var ct = command.getTrait("state"); if (ct.value == 0) { ct.value = 2; setDesignerProp("showVertexNormals", "bool", true); } else { ct.value = 0; setDesignerProp("showVertexNormals", "bool", false); } // SIG // Begin signature block // SIG // MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // 8WnjIYTGGZLXQAPNeLf+s8nHbPKRa9IodmxB9XX17/2g // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghoLMIIaBwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCDYy41hr/tCLcXLHqh+aauCDBgiWBaTtik8 // SIG // /BcZikSWhDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAJvP/rN4 // SIG // Rn3FTcLGUKdsDiWQ5wxVElxZttTFTMcXSUHRf2zIIZWM // SIG // utVnPhoqr0C+USChyihCmgqNsAd99+8jQ1XPRp6y1gLK // SIG // xDUYgtzM7e+StaioGQfVcUdiKnB1CXl8JeXqcF1xvY7t // SIG // NjUHXbKoSMwe5cB2DHjV60tQzbOPeD8nXmLxqH8/tEuV // SIG // k51n+eCFQ/6STZTfxJ0O+us9yOuvFnpi5Hhcr7YkAoWZ // SIG // E3Dve2RG02t1o6JSZj/fV94mXhbD92HvYkOupL9ZJvjY // SIG // svIfo4tQc8T3iKBKUW8Uo9ZZLiDa6UuSAQ3KF8G01M0w // SIG // p0zIut0VlL1c3aMvkdy4ZYEEadahgheVMIIXkQYKKwYB // SIG // BAGCNwMDATGCF4Ewghd9BgkqhkiG9w0BBwKgghduMIIX // SIG // agIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUQYLKoZIhvcN // SIG // AQkQAQSgggFABIIBPDCCATgCAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgl0KKpX7fKHVHzI5fuA/B // SIG // 8aPsy7APxE/ccB0d3Ud+vSMCBmXnp4zTeRgSMjAyNDAz // SIG // MDYwMjM4NTkuNThaMASAAgH0oIHRpIHOMIHLMQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQg // SIG // QW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hp // SIG // ZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV // SIG // BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg // SIG // ghHsMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB // SIG // AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MTlaFw0y // SIG // NTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy // SIG // YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046 // SIG // OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3 // SIG // DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1D // SIG // taWMv9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4 // SIG // CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 // SIG // tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE // SIG // 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23 // SIG // EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQqdskM // SIG // 48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWH // SIG // g9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4 // SIG // Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8/ar9cG4W // SIG // 7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+Df // SIG // Xl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0S // SIG // SCV/mpXC0BoPkk5asfxrrJbCsJePHSOEblpJzRmzaP6O // SIG // MXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1e // SIG // qdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08Wk // SIG // JJuyzPqfitgubdRCmYr9CVsNOuW+wHDYGhciJDF2Lkrj // SIG // kFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN // SIG // 7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiA // SIG // nzY4dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0A // SIG // XmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG // SIG // Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv // SIG // Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El // SIG // MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYI // SIG // KwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1T // SIG // dGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB // SIG // /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYD // SIG // VR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0 // SIG // ofDbk+llWi1cC6nsfie5Jtp09o6b6ARCpvtDPq2KFP+h // SIG // i+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815 // SIG // pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/ // SIG // OYG/B/gNnz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd // SIG // 2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5E // SIG // CAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEF // SIG // ikunbUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFb // SIG // fpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ // SIG // uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL // SIG // BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5H // SIG // s36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTeGEDO // SIG // oIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0x // SIG // aO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIu // SIG // fGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSvKhqQpmdB // SIG // zAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrx // SIG // dZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMA // SIG // AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw // SIG // gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n // SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1p // SIG // Y3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0 // SIG // eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4 // SIG // MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh // SIG // c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV // SIG // BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE // SIG // AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw // SIG // ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk // SIG // 4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX // SIG // 9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG // SIG // Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB // SIG // RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2 // SIG // Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+ // SIG // jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1 // SIG // KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL // SIG // 64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakX // SIG // W2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX78 // SIG // 2Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOm // SIG // TTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07B // SIG // MzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIz // SIG // GHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ // SIG // +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF // SIG // emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode // SIG // 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJ // SIG // KwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQU // SIG // KqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n // SIG // FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM // SIG // KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S // SIG // ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD // SIG // CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNV // SIG // HQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME // SIG // GDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8E // SIG // TzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j // SIG // b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRf // SIG // MjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG // SIG // CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 // SIG // LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt // SIG // 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U5 // SIG // 18JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN // SIG // 3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu // SIG // 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 // SIG // pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnD // SIG // vBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu // SIG // LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG // SIG // +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+Cljd // SIG // QDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJ // SIG // VGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRr // SIG // akURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+ // SIG // CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8C // SIG // wYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVn // SIG // K+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL // SIG // 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq // SIG // ELQdVTNYs6FwZvKhggNPMIICNwIBATCB+aGB0aSBzjCB // SIG // yzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 // SIG // b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p // SIG // Y3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj // SIG // cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE // SIG // CxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3 // SIG // MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT // SIG // ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCzcgTnGasSwe/d // SIG // ru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVT // SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS // SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y // SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZIm // SIG // DDAiGA8yMDI0MDMwNTIzMTUyNFoYDzIwMjQwMzA2MjMx // SIG // NTI0WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpkiYM // SIG // AgEAMAkCAQACARoCAf8wBwIBAAICEY8wCgIFAOmTd4wC // SIG // AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoD // SIG // AqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG // SIG // 9w0BAQsFAAOCAQEAQ/mVHAz1IukM9GD46PmITSSe28+V // SIG // SHS3asneU1ficTJ23Dvhyy9jTEyNJn4QyFQnaqDl1gDM // SIG // uw6kBCWD3sV0jQ9DeZe+NVGlt01/q45WZ8WRVJFxdYZW // SIG // x+QzmYRqJq9tbBKM6Oznz9xl8b9EMnRaQGupT92OTYLz // SIG // bUBBUiLeLRvbeEe4a0jJbBH4mfwvAVrxTZfXYZVe4cR+ // SIG // PDEMQ7mKVP5dW236cuKzLtwn/Za8T8z2imDFuA39zoeU // SIG // veKKKjI0tlDFoS5RqLJElU4vHDPjbDgUQegFr/EC7x4u // SIG // xPkwDB2k+2cJGBbeWJccIYOp3VIRgxjeP9diFzJOhp/+ // SIG // OitwXzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVT // SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS // SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y // SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFBDQSAyMDEwAhMzAAAB5y6PL5MLTxvpAAEAAAHn // SIG // MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx // SIG // DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEICss // SIG // 87P0debyzO7ABfhFdnvYfL4t3yhJuq806r3iclXOMIH6 // SIG // BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg5TZdDXZq // SIG // hv0N4MVcz1QUd4RfvgW/QAG9AwbuoLnWc60wgZgwgYCk // SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA // SIG // Aecujy+TC08b6QABAAAB5zAiBCDXJA3surVkGmcQwEiV // SIG // jkqKGBV2NaFjBQUYO+QQp/4amDANBgkqhkiG9w0BAQsF // SIG // AASCAgAQZAFJMaOJeO7YdUHu9zlEbtj0GXDsTzKLRpoq // SIG // grUwcTzZH+4jJK/NDstwCXEfrJDF3yuyMw+x8nuxHSn4 // SIG // +gL+dXZbHG1CJvbkrwfemGn+8U9bW0mzVtJS9BGwOl6b // SIG // /cS1XgsUW1F8w9nd9zhyWcYO1oPqyqfyR53ZYb3aXglX // SIG // IeDNQOF7GtG4G4Yf+7UXOVYTF0cbZR4+rF0F9GMO9EEY // SIG // 2ZqASnHQGTtaBcSYCk/c1d2UF3G3XHmCN8DJ8ES6fABj // SIG // AXwdjqyMmLeiX3yb+7CyE40K49hwj0SRyaxEEcankQHq // SIG // OVxUWKRzsoXJ9Mbq4KXxPOwObM5i58ZK5KPkKR471M+B // SIG // NVxOFAC1jelIuaXRdELcOE6W1WsXZHLlFiQqp4fJTxv0 // SIG // sJeOtq0PlQZqv7qzutprnT0XtgjsKI9nVFz4P6uKsury // SIG // 5d4WI1mXJVeXYmzfXvbxqzH60x5RqJ6QDVek/lb1QMxb // SIG // KXAItQe41U7HNEAaPQ2QW4xWzBf6EmF8+CqzNqcRPmWY // SIG // FoV5/bi1q9yCWKozT2tM9nTejHfjtZtCPTU3CKFD2f3w // SIG // 0zAExdmb/h2b9sl50j97wJvNi723Kkyh8ltV0zlZjlSB // SIG // fkAX9EzFbACHs+DxpfmZSPSXbd+OFPnfPXlncR7JZRoK // SIG // Bs2Z5vq/ns2moqehDsrRVPigqpaeoQ== // SIG // End signature block
combined_dataset/train/non-malicious/3862.ps1
3862.ps1
function Test-NewExchangeConnectionV4V6 { $kind = isDirect $false; $loc = "Los Angeles" $peeringLocation = getPeeringLocation $kind $loc; $facilityId = $peeringLocation[0].PeeringDBFacilityId Write-Debug "Creating Connection at $facilityId" $md5 = getHash $md5 = $md5.ToString() Write-Debug "Created Hash $md5" $sessionv4 = newIpV4Address $false $false 0 0 $sessionv6 = newIpV6Address $false $false 0 0 Write-Debug "Created IPs $sessionv4" $maxv4 = maxAdvertisedIpv4 $maxv6 = maxAdvertisedIpv6 Write-Debug "Created maxAdvertised $maxv4 $maxv6" $createdConnection = New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv4 $maxv4 -MaxPrefixesAdvertisedIPv6 $maxv6 -PeerSessionIPv4Address $sessionv4 -PeerSessionIPv6Address $sessionv6 -MD5AuthenticationKey $md5 Assert-AreEqual $md5 $createdConnection.BgpSession.Md5AuthenticationKey Assert-AreEqual $facilityId $createdConnection.PeeringDBFacilityId Assert-AreEqual $maxv4 $createdConnection.BgpSession.MaxPrefixesAdvertisedV4 Assert-AreEqual $maxv6 $createdConnection.BgpSession.MaxPrefixesAdvertisedv6 Assert-AreEqual $sessionv4 $createdConnection.BgpSession.PeerSessionIPv4Address Assert-AreEqual $sessionv6 $createdConnection.BgpSession.PeerSessionIPv6Address } function Test-NewExchangeConnectionV4 { $kind = isDirect $false; $loc = "Los Angeles" $peeringLocation = getPeeringLocation $kind $loc; $facilityId = $peeringLocation[0].PeeringDBFacilityId Write-Debug "Creating Connection at $facilityId" $md5 = getHash $md5 = $md5.ToString() Write-Debug "Created Hash $md5" $sessionv4 = newIpV4Address $false $false 0 0 $sessionv6 = $null Write-Debug "Created IPs $sessionv4" $maxv4 = maxAdvertisedIpv4 $maxv6 = $null Write-Debug "Created maxAdvertised $maxv4 $maxv6" $createdConnection = New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv4 $maxv4 -PeerSessionIPv4Address $sessionv4 -MD5AuthenticationKey $md5 Assert-AreEqual $md5 $createdConnection.BgpSession.Md5AuthenticationKey Assert-AreEqual $facilityId $createdConnection.PeeringDBFacilityId Assert-AreEqual $maxv4 $createdConnection.BgpSession.MaxPrefixesAdvertisedV4 Assert-AreEqual $maxv6 $createdConnection.BgpSession.MaxPrefixesAdvertisedv6 Assert-AreEqual $sessionv4 $createdConnection.BgpSession.PeerSessionIPv4Address Assert-AreEqual $sessionv6 $createdConnection.BgpSession.PeerSessionIPv6Address } function Test-NewExchangeConnectionV6 { $kind = isDirect $false; $loc = "Los Angeles" $peeringLocation = getPeeringLocation $kind $loc; $facilityId = $peeringLocation[0].PeeringDBFacilityId Write-Debug "Creating Connection at $facilityId" $md5 = getHash $md5 = $md5.ToString() Write-Debug "Created Hash $md5" $sessionv6 = newIpV6Address $false $false 0 0 Write-Debug "Created IPs $sessionv4" $maxv6 = maxAdvertisedIpv6 Write-Debug "Created maxAdvertised $maxv4 $maxv6" $createdConnection = New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv6 $maxv6 -PeerSessionIPv6Address $sessionv6 -MD5AuthenticationKey $md5 Assert-AreEqual $md5 $createdConnection.BgpSession.Md5AuthenticationKey Assert-AreEqual $facilityId $createdConnection.PeeringDBFacilityId Assert-AreEqual $null $createdConnection.BgpSession.MaxPrefixesAdvertisedV4 Assert-AreEqual $maxv6 $createdConnection.BgpSession.MaxPrefixesAdvertisedv6 Assert-AreEqual $null $createdConnection.BgpSession.PeerSessionIPv4Address Assert-AreEqual $sessionv6 $createdConnection.BgpSession.PeerSessionIPv6Address } function Test-NewExchangeConnectionWrongV4 { $kind = isDirect $false; $loc = "Los Angeles" $peeringLocation = getPeeringLocation $kind $loc; $facilityId = $peeringLocation[0].PeeringDBFacilityId Write-Debug "Creating Connection at $facilityId" $md5 = getHash $md5 = $md5.ToString() Write-Debug "Created Hash $md5" $sessionv4 = newIpV4Address $false $false 0 0 $sessionv6 = newIpV6Address $false $false 0 0 Write-Debug "Created IPs $sessionv4" $maxv4 = maxAdvertisedIpv4 $maxv6 = maxAdvertisedIpv6 Write-Debug "Created maxAdvertised $maxv4 $maxv6" Assert-ThrowsContains {New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv4 $maxv4 -MaxPrefixesAdvertisedIPv6 $maxv6 -PeerSessionIPv4Address $sessionv4 -PeerSessionIPv6Address $sessionv6 -MD5AuthenticationKey $md5} "Parameter name: Invalid Prefix" }
combined_dataset/train/non-malicious/sample_11_70.ps1
sample_11_70.ps1
ConvertFrom-StringData @' id_appliedsectemploutput=Applied Security Templates id_appliedsectemplobtaining=Gathering applied security templates '@ # SIG # Begin signature block # MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDMO44RTwPSzkwb # nqjwOLKr2rtbSa9yaD7TVGOq+rCar6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMfT # 8tUBctfXR2/YKi5tlzg2fBbKRz7CDW977mUbEuNAMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAer4bEJ7SlWq/sStroMJ9CuPyBp7UOZUVzo6F # GCl/AAfhAQgEmU6qsBE9TETzGfMT1Y8drv45+RGqWXDJy2rumDi7szon+0kUpP/P # XvIIhHW6P9dpDJNNJrM8fwS2hmvqw7bgJuonawF8tNuWmECndJMwbq+oMGrvq7ab # nh+q9zWg4C22MLKKslgjN4EVTATaacG5aM0AcROa6sA9gB3Bzg3/lAaJoXKSB7uz # 9K/qm6/CHHKZjgKQtFfgVSnsEJcyNrZRrTZz3Bja/wuaVt+d8x2MjFleZGFdHNzh # 82RK9vviW6z6hEbHxms+pcPt+XfK1rES19uZmf5/VcnVR2tnNaGCF68wgherBgor # BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCP/OyGFMMqnSyGXjXry2v4Q0zG2qn0IA7G # z1e2JHYCKgIGZutLSAOMGBIyMDI0MTAyODExNDA0MC40NFowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH/Ejh8 # 98Fl1qEAAQAAAf8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NEMxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ # 6JXSkHtuDz+pz+aSIN0lefMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1T # hUKQBkReq+TE/lA1O0Ebkil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGH # F8cVXu+G2aocsIKYPGFk+YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCed # xR22nXGMaYKl0EzKCT8rSHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9Mwq # NgPqkt4E/SFkOHk/d/jGEYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvR # J1HupCW/mnAM16tsrdhIQMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v3 # 98gSk8CULxiKzFdoZfhGkMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G # 5bN1SKvRneOI461oOrtd3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJp # uiLXa6xXxrG2VP90J48Lid1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0Dj # Lezob6BDfmj3SPaLpqZprwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj21 # 2xZMiBlZU5JL25QeFJiRuAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFMP6leT+tP93sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQA5I03kykuLK6ebzrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCn # pa2CiUitq2K9eM4bWUiNrIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86 # J699uwjNOT8bnX66JQmTvvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZm # Or87hn89yZUa2MamzZMK0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ # 3w3nqOmX2Si0uF293z1Fs6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd # 0thMAj3WBM1QXsED2rUS9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPL # Q8PzdoK3v1FrQh0MgxK7BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52B # F7y1d0auAOgF65U4r5xEKVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K26 # 6VhhxEr3mqKEXSKtCzr9Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDdd # FE7AC/TXogK5PyFjUifJbuPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJj # g4a4ZTVJdofj0lI/e3zIZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVy # c+TBEsVE9cWymaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snaZTAiGA8yMDI0MTAyODA5Mzk0OVoYDzIwMjQx # MDI5MDkzOTQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydplAgEAMAoCAQAC # AgU8AgH/MAcCAQACAhQpMAoCBQDqyyvlAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAC5Q0mZXZYSZmBYEzcnJMnCN3t5Hxb7Mh+9aVdlRs4Ds6h6ctOa91ofI # +MgGrNVVf46wKYwDisJIGIVXK3u8PunDoLSBDsbvikcTgar2Kxq7z1XrIVlvRypa # BzGly9Hn5cWIqjG02tn4gI1A0tIClGHW0Vn0Cc5rqkQATmkArMUWn+IpkZWd51Zx # aIPp3Jg+OInXRmWUMkCQh5L/CjIpVWoRHGKp+e+aHgX30Fpj7f3ssB8u9ZBpDtpj # yQ1q8MjADCb9YW1jNLAW/+CVOOA5Ke8WHeYrqB7VGJwwzdVOWr98Dm9KK7r1r7iz # APhAkFRjuT7rUWTleVm7qGj0XE7U7w4xggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCDgCnOm7m3+BXeVdUrXDY/61q84qgMcCmX4ROG7u3+vojCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONI # RXy6nKf9MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAH/Ejh898Fl1qEAAQAAAf8wIgQg7T5lmlzzvfxlHMbUmRWINSo0bA6YaFy+4mQP # 1xdlyRswDQYJKoZIhvcNAQELBQAEggIAW9Cnmwccf/woZbhRbVM/N1VFrHOrmCm4 # b4sgOxLhJoRAuEaoYlDZUNdxOEGmzQrqU9VDaWOElmNjMdOgSNbn1KVSf8VdJWn9 # TyFmAA2a+uITGJcIcok9npv9DU1SbbMS29FN2h4ur+/BQwzosKol4wu33qPDUhwR # gYJcFOTNg5pJRTYGp/LtWmu5jpiHoZciYoa6IbJGb3CQa92E1HAnfrFmwEbuBVAF # AdNoxwy03vLXbtNkrH/cSBuX13mIVjRK4wmLQINfWGd/ig4ybFWNNelclsWzW0Aj # gX+SBhvEwKmtG364L9zKWvRMGk6Mjyqs+LKieCFNAdDTrQV9PjubLeEX415CABKF # DJinhzfPjMw+DhV/jxPZY9a3LYtuUQ6SB5VOleA6zNi2yv3qZfBYtiV89EiT0XGg # 2fHWUIYEpYiY4p/HHExIH+8FreH10e+qlL+mp24otkEQFxOTN+1vN/eBcYWfYDTv # tDGdDCwcCXBRDkS+ijcZGqNRB65p1imcX8bK9fte50w/GtWyrhLLHW1a/dfVlbzV # r9vxHiloZ+uF7KsLy+6MplPUvbZsWYSzUNtSZps2T0CLLBbpkQx3ds9a91A9D5GB # xgVsdoBejt7YTB27aDTBsJ0YXeftkuue4Yx11cwaXF0J/o+cbLGAj9+oMges+2w5 # n5bU7Vz0rdA= # SIG # End signature block
combined_dataset/train/non-malicious/2040.ps1
2040.ps1
Describe "Credential tests" -Tags "CI" { It "Explicit cast for an empty credential returns null" { [PSCredential]::Empty.GetNetworkCredential() | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/sample_6_54.ps1
sample_6_54.ps1
[ dynamic, provider("dcismprovider"), Association, Description ( "DCIM_MetricDefForME is a derivation of CIM_MetricDefForME " "and represents an association that ties a DCIM_BaseMetricDefinition " "to a CIM_ManagedElement to define metrics for the latter." ) ] class DCIM_MetricDefForME : CIM_MetricDefForME { [ Description ("Dependent represents the object that is dependent on the Antecedent."), Override ("Dependent"), Required ] CIM_BaseMetricDefinition REF Dependent; [ Description ("Antecedent represents the independent object in this association."), Override ("Antecedent"), Required ] CIM_ManagedElement REF Antecedent; [ Description ("The property shall indicates whether the metric defined by the referenced CIM_BaseMetricDefinition is being collected for the referenced CIM_ManagedElement."), Override ("MetricCollectionEnabled"), Required, Valuemap { "2", "3", "4" }, Values { "Enabled", "Disabled", "Reserved" } ] uint16 MetricCollectionEnabled; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA63Tn1NdxRQugI */ /* xMiyY7iftjDta6qKNODt6iCn1rtozaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBKpbEhvvqU */ /* TVSNBxNnqfNe8BftTWlcK6ETMaUpstFc3DBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYBJU5RalM90xhsCr87DXsvCRPM1U8R1l5ggg1pTKVTEhfFS */ /* 4PbGam4/HbDVuf8m2Y/gwPw2Lmp7ZsFiVfC7iRjEeQ3qPuSoKYn/eq6NhzFYNYod */ /* i4q/zpuo9oBVpON0e4fLUHDeA2KqiEfR8OkPcr7NAe9/CeHCD78jJUhcJ4JKtxMq */ /* 1ll4EifzjVTWEsev6lsxPhfPZutnIswpDjHx26MsPzI5MmBCN6bAAxjZFRWju7fr */ /* mxrE8b1OLxbynwQNMK+/oIxPDWtzne1wlkF3wcpqnBiBAfPzBXSEiFpWpmOpybsl */ /* 6dpq+uGXiCX1p4o5JW1YGlaoMcpGkalO4+9Pu5euKD81vvxAwTa0M2yE0EgKHkOC */ /* BWmsUO55Cf2OiAKzoGHgSQgRA2tpiMS5uSOlsistXFsIcrnzd1fQgVeCfGOmUXv9 */ /* N5H1YaxnrJYxLl/bjA56dtEXHXuDLIcu2wG1HYEzjGy4JFe18IPlt1tu8c7y33pd */ /* PLNR3+Um5uso9B0dZUuhghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgI3rwUBo+2YV2 */ /* GgO/Ehs8F6JLUQqQQwWMFsUuz6s9Wb0CEAf5N2XxCWNMCVxZ6vFEZ/EYDzIwMjQw */ /* OTIwMDcwMTE2WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMTE2WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQg3OC53Tn65ifM7ACfYxksDkhSmhFjlMvKcOmS */ /* WGFclIMwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAbDj6daHyrj20w+a0pBCT */ /* 0V7XXLt59SWbEXKtsEFElSSVHqVK48gFQNpEvcfdFJvIg8JgNrr/n6n0Iy3RYinM */ /* FyvBGwxFuvHp/Pwpe8RXOxMY9QLbI07jSpGi+6m7sawVwb2tsLWtBvoutgjxlm1H */ /* 2zYU4dfCGy+VrlA3oZ+Bgea/5ErlxMqo3XG9hwhxUI0nlauDqhP3OGyMtR/0wm97 */ /* tcs6QZ5fueIbZPxZkcAj+f8YeXX0jnl0AnBTwvT7ur3lz34OcldH4QCiJB5UyP9I */ /* ok4E2Nw6vsVvB/HLd7uuw9DYIdXrprKOivAB9oE3vXzDzL1hjypm2FF6enwX76VE */ /* 98sQMd995H927y3LRDs5RjPWoqJKLpdYdxIlR/o91UtS31nsLBJ/Xw9bj7eW/WF/ */ /* C4nFFCCIWn8HddjAdn5qjK9KGKSJJ+dhH2PIlmrJqZ5TIVAiSg/HP3/6MfadhKqH */ /* GLKUAoXTP5My+VJRoY4ahwvScv7Zr2JPcjTfI1/lu4d6lKmsT3aKFW8FvioIPKOZ */ /* a++9o7SYkKxtlus06htUVPLjwmG+phvjQLrXD38zGCavg0AnIDrb8xlabM4tmI5Q */ /* qe0JyWEBf+vHogQBuB37CpLCgDpv8KPKe3higP2cnGqRwybNVZ1NvQsMA9n0M9as */ /* 605fnJwzUHIavzJZk2zwkos= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/sample_0_97.ps1
sample_0_97.ps1
#************************************************ # TS_RegistrySizeLimitCheck.ps1 # Version 1.0 # Date: 12-21-2011 # Author: v-anecho # Description: The RegistrySizeLimit entry exists in the registry. This may cause the computer to stop responding as well as log Event ID 333's in the System Event Log. #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_RegistrySizeLimitCheck -Status $ScriptStrings.ID_RegistrySizeLimitCheckDesc $RootCauseDetected = $false $RootCauseName = "RC_RegistrySizeLimitCheck" #Rule ID 1855 #----------- # http://sharepoint/sites/rules/Rule%20Submissions/Windows_madhbo_2011-11-11T09_03_41.xml #Description #----------- # The RegistrySizeLimit entry exists in the registry. This may cause the computer to stop responding as well as log Event ID 333's in the System Event Log. # #Related KB #---------- # 2567018 # 124594 # #Script Author #------------- # anecho #******************** #Data gathering #******************** $InformationCollected = new-object PSObject $HasIssue = $false Function registrySizeLimitValue { return (Get-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control").RegistrySizeLimit } #******************** #Detection Logic #******************** $RegistrySizeLimit = registrySizeLimitValue if ($RegistrySizeLimit -gt 0) #if the SizeLimit is active (not null and greater than 0) the statement is true { $HasIssue = $true } #******************** #Alert Evaluation #******************** if($HasIssue) { $RegSizeLimitHex = ("{0:X}" -f $RegistrySizeLimit) add-member -inputobject $InformationCollected -membertype noteproperty -name "Registry Size Limit Value" -value $RegSizeLimitHex Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/2567018" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 2 -SupportTopicsID 8113 -SolutionTitle $ScriptStrings.ID_RegistrySizeLimitCheckRC } else { Update-DiagRootCause -id $RootCauseName -Detected $false } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWxXWSKUSd1eWI # owCLaGwCxAeOEfITktdB50qD+M6e2qCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFqf # CSnseKuccR2XuUeY03G3XtiHdSWFCRGgpB4gMLmJMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAGzKU4VdkxZQbNSWMJb8U4A7c8ywF39m8wdjg # gL7ISBT9ZGIJu7wkRSyIedCuOSQaLYh7bre9gLIO9jwFjtLUdYXRbRk7RRhw2DaJ # p92eqmwEuE3N7Be1Etxm1QXcMAPdVx2k+fkkxczvXJxpVImlibjex10OQljaW+eo # nwvOLUSh8Q0aM8POwzFvbaestmO/Lkclr4XiYtY3ESXlrgRf+rEoLlG7Otch9Y8u # tDnnqH+LGKSngILcp4TPUSb7zZzDjaWMFRD469rbpeo6dYT8/Q3ftywVO4+ZmOaV # aERY0ht+K95JW1V3PRy+Z6TSVb+BP5F0gg5UsP/b8O+Ornr2zKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCjzmfdhmeKg1reoqo2RpLY1CI80bzFoIrY # EeLmq/I8YgIGZwf5Kl/TGBMyMDI0MTAxNzAwMjMxOS4wNjVaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpgHDAi # GA8yMDI0MTAxNjE1NTQwNFoYDzIwMjQxMDE3MTU1NDA0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqumAcAgEAMAcCAQACAhIvMAcCAQACAhPlMAoCBQDqu7GcAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHuP/X6PZbCsmOTK8GwWLZveG+/J # k5nliRyIl7wkEgUXr88W0WoQ4/kHI2QzLDs/NrwH3rrZNznm2seUGcvgV11gdnm5 # abKLdE5l24nz7DBD4SV2YoqBmCxz9goffWsZ0z+SpxyMY0b+bfLsONSmXErNbaX5 # b+bQg8dakYdSFu85vEuMjVBaue4c+p3GgzuTyygcHHBStANOrW3WF1+CdlUdewrO # o0fn5xtORyfXOmMXSHxAOKpmYyN0EJgPG39/QWLGn0Lg1rKqsa5I49+6MHy6gppY # Psryu72GTDjrSvWzZu4S2TZ0XI9M+R8fCgbUPw+rMt/lEzICgd0P99zV5ngxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCaJp0puoAyoSRkFQuLN3jyicCY # C0ZqPvA0FX6lvzJ29TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgoRyIaeGo # OOurQLPkkBY5FFnEbPsKgMDAtZbn8Dnp704wDQYJKoZIhvcNAQELBQAEggIARtJT # r7dVqm9uwCTtf2nagtd/TI0KyX+exR+2b967TLxgFTBT6UUlXlNHMAh4V0q6swjk # ElbaKoh0AVmV9OMZK/GUMYLeW9ETHBradsG8KGuwYw0XheUuJ5BRj7lHBLClHT6A # Fd2PAz6GVXrPUxLhSGMTpzhAPlDnVyawylIGdCdAhH7hu9hbFFuttSqq26otyNZO # ZbKjPpVGW6GJsig67uW7h1fNql8oQgH9O7VKF6JBWz9O8YxOtoxKLrewLLJYO40x # AOM2byTEFFJzGy2FhqJzFWyU1CcYGAhiNy9m6WELFRrUG8T8uNeAAU81U0PQyNKB # y//0dRlc03YCwf3MjkY5YQCcIjvnJ4fF9y6kRs707HETcukBKTZqzvmXpIz9oXAm # +/atD09CdTES2NKrM1cPF0sMFvmNmVPr1Dd9b6LAALCFSirgBL11g3xU3XlJVD8R # XlLHwX3JkhhtEhI5+JDxCVnlfFV8m/782t+vWoT4CL/00VyQ0QimujjQnuChVnxi # 1BWU3I/MFY5O3z4jyQBFAQ7awx6/has5H6nwtew67kvBX/7rJBpuIU6oSHu0A+Q1 # iV75k2iU0alBFeXIVaGXoLJhGsc5JMRN9ZLsvT1ylkAEkA8mNHla7uZhwiQVFqn8 # 4Du72bYU4Ohve05oUGBt5Hob6nVNfsTgf2HGBT4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_48_89.ps1
sample_48_89.ps1
param ( [Parameter(Mandatory = $true)] [PSObject] $Session, [Parameter(Mandatory = $true)] [string] $WindowsRegistryKeyPath ) Invoke-Command -Session $Session -ArgumentList $WindowsRegistryKeyPath -ScriptBlock { param($WindowsRegistryKeyPath) try { $returnArrayObject = @() Get-Item -Path $WindowsRegistryKeyPath | Select-Object -ExpandProperty Property | ForEach-Object { $registryEntryKey = $_ Write-Verbose "registryEntryKey: $registryEntryKey" $registryEntryValue = (Get-ItemProperty -path $WindowsRegistryKeyPath -Name $_).$_ Write-Verbose "registryEntryValue: $registryEntryValue" $newRegistryEntryObject = New-Object System.Object $newRegistryEntryObject | Add-Member -Type NoteProperty -Name Path -Value $WindowsRegistryKeyPath $newRegistryEntryObject | Add-Member -Type NoteProperty -Name Key -Value $registryEntryKey $newRegistryEntryObject | Add-Member -Type NoteProperty -Name Value -Value $registryEntryValue $returnArrayObject += $newRegistryEntryObject } return $returnArrayObject } catch { $ErrorMessage = $_.Exception.Message throw "An error occurred when querying for all Windows Registry key entries on VM [WindowsRegistryKeyPath: $WindowsRegistryKeyPath]. Error: $($ErrorMessage)" } } # Reference documentation - https://docs.microsoft.com/en-us/powershell/scripting/samples/working-with-registry-entries?view=powershell-5.1#listing-registry-entries
combined_dataset/train/non-malicious/sample_18_10.ps1
sample_18_10.ps1
@{ GUID="{Fb6cc51d-c096-4b38-b78d-0fed6277096a}" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" RootModule="Microsoft.Management.Infrastructure.CimCmdlets" RequiredAssemblies="Microsoft.Management.Infrastructure.CimCmdlets.dll","Microsoft.Management.Infrastructure.Dll" FunctionsToExport = @() CmdletsToExport= "Get-CimAssociatedInstance", "Get-CimClass", "Get-CimInstance", "Get-CimSession", "Invoke-CimMethod", "New-CimInstance","New-CimSession","New-CimSessionOption","Register-CimIndicationEvent","Remove-CimInstance", "Remove-CimSession","Set-CimInstance", "Export-BinaryMiLog","Import-BinaryMiLog" AliasesToExport = "gcim","scim","ncim", "rcim","icim","gcai","rcie","ncms","rcms","gcms","ncso","gcls" HelpInfoUri="https://aka.ms/powershell72-help" } # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVr9wtf0/6ef8P # 7Oewmh6e4caAvboErstvAWik/E+xjqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIICntVmvnX2L67tr4qUz8bO/ # btN9gTrVPwly8+vDQWLNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAqrp+HA+1Tc4ckT9CawnN3TgDg8wLX6bBLqDG4GRQ6AqpYUMeWnTLq7UC # 15hai8Y/NMKI9M5woKAbrzYRt1NrXoKNFdMAo+uIJ223H42xijPTaM7Om6hwofXB # nUgnNoHxN6HfaNmQgK8kPIjgr8qRTx9iaiiYYmo5ZxdD93vI9sWMNcdz8gh0+iQe # 3KYh1CGJlRqVcViXStkGlmMah4IsmEXzoDENH5g+D/eGHVQkF2jmDrMd7IZnIeyx # 7uQKG4e4jST27lsZ3jXeHHw1+xHKW/YKopB0eDuSIGaBNt/Ddp1pWXY+Uc/wSU80 # Hw08j8KeNUNQZqykrOkxjgYsv8a9BKGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBoL6sie9laNs0LLxXBrbeDVU9bNXjvB6bMmwMpi5IRNwIGZc4b54sA # GBIyMDI0MDIyMDE4MTg0MC41NlowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EeowggcgMIIFCKADAgECAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy # MloXDTI1MDMwNTE4NDUyMlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOFBd0TRbNcbvDN4L1IZ0fp5XB0aUXpiClTvB44UGSlb # 3K4SYlIMTUAMHH/QNO5EFqmVIPwJHVCrJCbFEMP8J28PJ5kUBxnqXb6eUyyyZnIL # xM+3UZNYBS3cZdRTqDQXS0isU0uCh8KM6+bcbSPjzZW60pLjBlPps1WcFWwKGvYC # OZVsYM3/pCz8SpqQvlzCkZ6XW17tQ7Xd1TBo+M7LRaLWpg2ZHyLtPWW6PYl0V19m # Ew/KrKr80Odm441JuPwUznEoGhqvXatqALz/UJdovU4xcHAZpGglNi2SyL2eO6rj # AORwDCK0JnkG1DY2o9nSUuJAHs7XQGb3Okdaf3HX8eZ0CfiSgxYpQPAfmx3/MO7i # +LzzsVbGbniSRY2+TwV5DtlnRDmCoYpbiDqt69XYh0DEGhtZ2iurC/OovvRZ2yAN # T8/lzQvy9giyRQll50IYczaEciw1HLD0QWhKiUMz7IJ52TPr3vzuzycinnmJwt8O # grDmFqTkboxYXp3vW1w3NX36/1FAoxrpTB/Kq6t513mypdYJe/76F6TgDXlbJshz # q59PSKVrMphm8O+hqzCCM/RJ4tbua+ZzDQUQvMXX+5ZpcSUsc5ciWJ4oXaL9jNDp # TnQr11uGcxoNwlKwbSFctFPL8tBuw4PSHDsW4rSebOi1LH/l+j2Dt8LOgWOTe0MT # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU+jlbyj3zSQx9FVBtrpPfgfB6UtowHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAJZ9wmbavBe0+LviSbo8oCSeL34Fai2r5C0M # aB5PkXeujs+whQ0pGRTK24aojy2EvclytvTfHoM6mlgkQD6lvqjao+MV107VMuq9 # Jetib46AIsv7v7cWZGZ+RG7yse+mtpvQ7X3ANu6SA7wjk6LVF6AwmXy3mT9S0TRZ # vfMCU4ecKMsZLM/8Ojem3CFeiSTTYi8PtJkQFs9ugZu3DgsIexPakVqSkY4GH4hJ # QxcF/zfkK5U1913DGbIa81LPITISTmHVWHu2nA/vPusn4eyI/ix2oGOPoC+im5/i # vFQB+sRtXpqPy3AWztZUc2IiCsc2dr/nmTKsAb1i3X0I++RTDFgrS5m8+XZYLf2d # 9zSM5OOK8Luz8hSjMTi1/Lck2TJDVw229l+2JfePkO354s564YOO+Em9gwgSSmRX # rxcs0fv5kF9hr4+Z9FhqgUUcIkoShFJnc9sMk8GISFn3K7Ex12gwxDX1OTJ+2i3o # TPReFKbCNgGrf0O8EVaGXIMYGGtTca14NaJV31gZIHZafG4UzLl9sArqjw9bPxBE # yKm1ccrccMGvbBZYRyuuBxO4dkglOp6k2hiXH1VEW+P+8JdoAVyaRbWeTtUT6jBp # evlEmOvIOr25uTIOrWZ2sX+B5pEAtdw1lt81ciSFfNcDprwKJqZxBb8OCYsmmJVA # 2uJlgIcgMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w # ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIwk # bi+DSO4w5WfYG4oAJS8/zQW6oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpfzHJMCIYDzIwMjQwMjIwMTQxMjI1 # WhgPMjAyNDAyMjExNDEyMjVaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOl/MckC # AQAwBwIBAAICDeAwBwIBAAICE20wCgIFAOmAg0kCAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEASIxpCjy9ZvKHavVHuHSR2EYMFNs9HIXdQ8w0oqrfoy+l6cF5 # p3UdzymlR1hSN1CGYK7+Ot/iQu2sqCMM3SHPwBXtvaii4xKHS1Q5v+yb2a4Rm/Qf # wYJO6zRjqZWCs87efOXUGH8FkDp2qYqLGcjIgjGfIo7atuJXDGC7OJmKnRVjFz/a # WHWd5M4mNtP/k9bQVOZiBFiA87TJhJKv0om+hSmAiaBfLZKJob68+6lBUxkILhIA # hnZDkFGV3r/qxw5M7GJLZodhSfM3zvYIMFOFQSeTIwqp6Jhw56chBTnk5Y06FuLq # vLuA9nbgEEywyQysZMrhHKYN/Cp2kYzFuvWtEjGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIHxeZc36xshH5NDpcNFqmqOKRP+F6FsNrxqUIE6PtgBHMIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7TF8lP # YndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCD28hOmBSikPBTYnAGP29FEUtFAb6tv # JXlD+nNrkygkJDANBgkqhkiG9w0BAQsFAASCAgBmdNJXkGfnVRMN6YUTgkxlvWHM # XpLjbasuDFMi4sVcK/o5r7KOCLYWT03ncIoCx3jQEQWDIyVPPiXCsA3KyEV/jUcp # I9eCeLwsuQLSyudlYWke0e6sgQnBlyqUhJjSKXxeeE8x0nvjpbpN+05wWpSsGvNN # xjMijDLJrOIhft0dCd3LrrqqktLbQDWcnSSkUglwoBiE/RMqqYroMIwe4iHZitzA # dl1BiHjU03kRw0RhR/csjdrf3M6lvIKYfTiPDmh6cFpfehYqAEe/H2IK8UeGvjgo # NgQP+BPdApqjKnT2wvcwKPbLx/HqOhR5BFYNeIjE3PC6M0HJ6bWzZnZFDXtTliy5 # J8oiBiL6ih2RdaZsri033AJN8ofUYTB+coqAqrEn3Z6s66QN0kHQRljih0eGQx2h # m+AgkOH3gWtcpiuH3R5Dr+BuZRTIb2zWs++Cgs1tqqzv/8OEDm3X5u6knHxvP2Nk # UJZgEyXTaxuvCFF8LEK7n+8S5qHoTmJur/ypxp2D6t8bD8fXf6YE6bCEuJD0e/+b # wGGwt38oGLsG1zHPZT0in0kcAsZSFOaAkv/Ld1fmnT+M/0GcL6vB+f4cx6tN4cYn # Di5b6WuVTp+FqjReGBasFQgta2G91rjX5z77qPvHzVA/mXFw/It9uizLD0Us8Vgg # C2xV8S9c97+sEJo0iw== # SIG # End signature block
combined_dataset/train/non-malicious/sample_40_76.ps1
sample_40_76.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Advisor.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAucsXDbMWYBq/T # /U1oPyL/gfU9jAZPAZuvgaHWueNRo6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH13WFF5ipiwt9zFI6GPi8v4 # 83x0ee3NvdP6tBALzDgiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALJpQNANOpMUISNe4YZGBN87JXcninLUvmaGmQjCZtW4XIZCS/vsdz3il # 3Ey8T6QdwZbbt7c69EkTLIgDeTdK0p5mT3qoEeSJwDUuXbAmkeU8ap4E1kd+HqO9 # KKiE8mDlJnJ+WcBdqHnu7KrSTEcMggG4CXWtb2Ik7yXiMmU+jDvd985w1aelGnue # +LmTwnT6SSY/WLyTj84tGR3+DJO44AK4xlyUpeRm+Gs7Q3W9BWm5GX1dLUcvHj6I # ciT9/sWiMVPcUd/uOBYFtB8DscctkYyqF0pUXC6cLIZ1Pb2DSAD1yS016mZR3ofS # dD/8fcDHKHWBi8fs3+bBglNhZIF30KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCEg4DrU2Gq7aIMbV7Ru+U0LJ8ra0E43W0Ujnr+YEhoUwIGZhgdT/UG # GBMyMDI0MDQyMzEzMTUxMS45NDFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dHEjzAiGA8yMDI0MDQyMzA1MjQz # MVoYDzIwMjQwNDI0MDUyNDMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp0cSP # AgEAMAcCAQACAgHvMAcCAQACAhMVMAoCBQDp0xYPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAH5nR6bjBMgAFWKW1b/lYZ8ns1USd9OrwFGO8CX1+QbLybQK # U2xx7Op/dHp5bkpiEko5Xo7Bi8U6lw0+7HbdzitpMl8DiORCL2J0ZTXlO71dyQ/p # t0DFsi4dNTfF1IIRZymxccGfIQgcsb9D6wMy8YBZvhdO7nWQiNI6w3KXI1ACkZVZ # Y1KDzqAYo3i3ACb74aDZUnmPh9h9Ttmm+sXjRVIrO0BkL8nsQ/ZNR5m183BI10gW # STzS+bH0WpArCvBY5qb7slTvMOBfp/07LwWyQ5QlEC1Uv1/FdSPudicLnF5BKXMi # Amn1emixMTnYAUhg7hK+6lnMBhlr0mYMqkFQNa0xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDZxU8+bKeEKUZxn6+X6Zl8kK+IznoColLQBwuh9j3PhjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgYeN1jrveaiQ/GOoPV9CAFdRUaoVl # B5V8/kbyKJQ+4sgwDQYJKoZIhvcNAQELBQAEggIAcos53Cev8STqEvlxlWQUhnqt # TQndwh47cK74Ned0Xv/hBjavAsVQ6WGgDKiaaQKZuRltcSrlRSINtwk15W4njULw # n3qbd4Q1DTqEAcOkX4JPksuR+RlKTbFUjhA0m3p/o4ljaheBWTbO26vbDegPyPxI # Nl8VXGv1yV7PiIQpB8rFhkQjshWsviUHQY0/qBgnqTOd9Dt4X4ZrnDNDTtD9IkzV # GiKKNY0dq+4xKm87/BXOr/67wysGgCakNE2NZOjqlx/ga8kbJOupt/fcVZvSqQDK # qOVJSxu2RzESUBgZP2HENcOUKQwnv/F1NHQkO7qoAnA96Bd6d2CbKN/yQtiMmZJV # tlqq9K8RyuKD3MBZK//fFAv4LHtjHzlFRLsHxfEPmn/eIPCb/ie05hx/MFRdGKyh # sFgtq+mvMF3Qwil21D9zNw1WQwV3EyBrJbkAawp1FSoxNeCWVm4JsxRjC0l9EF+G # 75qIhLOBVVVULOp8wfWISUwKIqHkhJeZTrpa0qOHg1rBxdumQNoVFxiJT/UtpKge # uswDwDlhAp7h0b5YZEWFPvoubPUkAS/euomjG4BQ7PQjfT4buqsVbIsTrE6CY5JI # +d5Kqy3w1K6TzKN9x2s1O5aMBTSSv/rqcrqgxO1QH8yjlzuMfZrVAprS97gA0Xmi # mekScXglu7z/pHBO/L0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_25_33.ps1
sample_25_33.ps1
######################################################################################### # # Copyright (c) Microsoft Corporation. All rights reserved. # # Localized PackageManagement.Resources.psd1 # ######################################################################################### ConvertFrom-StringData @' ###PSLOC OldPowerShellCoreVersion=PackageManagement no longer supports PowerShell Core '{0}'. Please install the latest version of PowerShell Core from 'https://aka.ms/i6t6o3' and try again. ###PSLOC '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIBsoYrH/WngZG # wcwl3oPmFWjeg9nVV4OusKRd1BszsaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII0Mq4L3/1947bwnMVvGP5Dm # wbb971etV96SBKgFIvZRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAv05NsqhGTHODmsdhSMJG+E6/ok8HlhNVykU58NINPj2HMzn3YaN21+Tk # JARZwQygvyQJ97JTITRPoCxx5H0kVbCj72rFclIJ4Tg2Ssge2XkWYD9NY2kf9gvw # YsuVJY6ar9R6uP+CRrgEru8UaDpEO44ut2bzMnUOsGmMT9rh0ZLGYBBpZqDETKN3 # dwgHEmGHG6eixzbQoPt2Lrn0WHqQpTc0HKz4RfHdJ/eGBL61TJ0VCohZ1kZJwjr2 # 2JPQ1VvMhCf6Y+bASEGsSq+qkgW89joei6n+LYa5xBXahRR/75iRDA2kN9L1TOxr # YGO/DcRBHNKU1M+L4YjAk8hPkk17vKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDRUUUUcSgOtzC0Pl2qnRID1w+g3TXbm+L6/SqZ+Mc/fAIGZc4U+dUb # GBMyMDI0MDIyMDE4MTg0My4zMjlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8qmTAiGA8yMDI0MDIyMDEzNDE0 # NVoYDzIwMjQwMjIxMTM0MTQ1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpfyqZ # AgEAMAoCAQACAgRzAgH/MAcCAQACAhPKMAoCBQDpgHwZAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAAqzE9GhxF9thMAZTuxei76IypHUwiuIX8lXvri38kpd # h+d6SKq1ySHAOgjwGIcyk3X+hn3/8ZHL2sRSLpgprqKnsgin4mbFr9RVdvdc0YzS # q4qORfhVo2QNSadFDz2LHxIm65Z+KTprDyuBTDDdAfSXyp8yF2YDm/MzbSzDeZu5 # g02+Pn3iiIgasuyABb1hOCe3BXJokb7snxQn3MUSRy8IMIQH3Ywhl/yrpWgIDrQS # ++5hCs6vBlEq7TPaW0YnhHsW2qxlVHSGqwcODhLStGHqFoFzMtvzUZWm25+8TjZj # DJEL92QTbMak4LadJlj9bkpY7AAWJcKJT+e077I1LX8xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB # 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDpBE9R94LE/4oHOVmYT5EP567LkhPPKhM3fEC+DEqg # rTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w # wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgwozVJFTC8RURiqw1MNcmGZAH # DEjJwdrMZq20FiZuYDQwDQYJKoZIhvcNAQELBQAEggIAe3x8j91Cfrb4eIoBTD4W # 87uJqpX233kSJUAlijV3+Vt0rJ97Mv5QqBxs8pPyoFwqZYCgQn6663t/2Jbf0tUm # aHBXQbSVNvhFPQ+ab14jmw0S0OuXZYRB4VURO+xmU3v/Ttks6iuxeHXjBma+RgJY # t9gVyY5oX+wIIwyLiCvfmn93G5v+P8Y3Rptu/cWMjLfCfHh6mEQiWZHbNEGEDkD8 # gbkix4+QGOD6AwlcBXwqfObiywYcyG2E5hljHPmQnsoizTuJgzImyyy8dsIRqwU5 # u+i39nmUoQa7bUUge3CuUwOhhBkEBuYSzg6xTPLfT0EvlEYo7YHPDOqLlLSBAFae # htAaH65KtFoSS/LosGNL50sagHaxYaJ0rPRZJoTSMEs6IRffCruuIYpf4MW8Ov2D # 8EtiLbyqx2t6ry9nS6xqS4u0U0qmB5w3VQoDksSOcKXhg5vvm/iFpoJ9uMnw1Ywc # VOGNNujEixDP4z2DlICX/RUhlTSQXp+azE42iWnm7g4qoZnfyq5LKid6ABA6xloZ # pNFeQg+rnigpt7mwz6SIxDdgmp5FcM568q3xy9KIJOE0OuB07I4q69aKlwqiuDE5 # ig9ySYBaX8yJmVDiU4QKb3HmubmN1J6G9HeCIH6n086XtgUzt+t+2WL7F3S3seYj # VzJi4EK+n0Q81s+BnsnmBf0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_25_93.ps1
sample_25_93.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for Partner. .Description Create an in-memory object for Partner. .Outputs Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.Partner .Link https://learn.microsoft.com/powershell/module/Az.EventGrid/new-azeventgridpartnerobject #> function New-AzEventGridPartnerObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.Partner')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Expiration time of the partner authorization. If this timer expires, any request from this partner to create, update or delete resources in subscriber's context will fail. If specified, the allowed values are between 1 to the value of defaultMaximumExpirationTimeInDays specified in PartnerConfiguration. If not specified, the default value will be the value of defaultMaximumExpirationTimeInDays specified in PartnerConfiguration or 7 if this value is not specified.")] [System.DateTime] $AuthorizationExpirationTimeInUtc, [Parameter(HelpMessage="The partner name.")] [string] $Name, [Parameter(HelpMessage="The immutableId of the corresponding partner registration.")] [string] $RegistrationImmutableId ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.Partner]::New() if ($PSBoundParameters.ContainsKey('AuthorizationExpirationTimeInUtc')) { $Object.AuthorizationExpirationTimeInUtc = $AuthorizationExpirationTimeInUtc } if ($PSBoundParameters.ContainsKey('Name')) { $Object.Name = $Name } if ($PSBoundParameters.ContainsKey('RegistrationImmutableId')) { $Object.RegistrationImmutableId = $RegistrationImmutableId } return $Object } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgsBF8NPI/GWfW # T/PtBENQwMIWelDzB/nIVUvGTBYrbKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDK/tj6+wNUyEMGnCyHttHz4 # PdHZV40ffczmF7hzVy1nMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAtZ4kvpaUgnNbkeMd208ssclizU3D/xonk1d2I0M1Y6ItPa9Jbv/G4t2h # en4Km0lCGuoMUpRMn786hWBOhEI+mxJ74czR1Vp5F/lq5FzBWPM1/30CBMjkz4f/ # mBwJpeD/VG81wHvhDprVwA8LmVYRMODpV6SKlHTZ/cNOhyoBQUFTl6KH6zOsqcCA # Zxh5AMrdJ9PRwADbDY0kpOzpC4FPYOgHAHgEG/Drlbt9ROGJSM96nosOvoW1fjOc # 0DawPQSQWCc0VAICfiw1wfxrXTVwQ2eMlpSleQXbvP5C0S+AOoqDgdicwtdHPRsx # Rzm/ai6fIXU4nxjkIK28Nf2PJUMddKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA7vAZQ/iMd4j3/89hkesGV1445uNs+kaqCMr4pn9oNKgIGZjOahILN # GBMyMDI0MDUxNjA2NDIxNC4zMTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/khTAiGA8yMDI0MDUxNjAxNDg1 # M1oYDzIwMjQwNTE3MDE0ODUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7+SF # AgEAMAcCAQACAhI8MAcCAQACAhLtMAoCBQDp8TYFAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAAxEjKnSk7z0bXwcEuWQw97AgLqpP6QXnwEZM41HdkQ6IjWR # 80WQra5fw3/m4qY8wuDmJtG7uCD/olcakGKUKmhwvb3cKYRsYimEb3p8Bs0pBosm # 85tb23aIP6SaYP9RDzyFc0lbTZFgve3dvH5HBA05maKu/SGUwj6YFbCUwkePhxlc # PwoJht+JDTulGIR60ACLGdEVDfcUZs7CEO4jApeHyK2003zb9kPdjogvdegfmIm3 # t2tuHLEv2/UsXl8nukg/Rp8Xg8xspddR3tZMT6xr/Kt2tdCzUQaW67J+MZBuX6cD # +zcbEo8FH0fMF0WfCSvSurqFZiM/h6+6P21scbsxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCA1G2VPnr2WAWgnCm0Ugz1kTNcjlePcT+GotV3ZHGlH8zCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o # CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgrf1hyXgV+TDcVONGGqbNRYWZJ3gR # eAJl4GXFk1yOgFkwDQYJKoZIhvcNAQELBQAEggIApFdZRtCZeguXzMZSXkZSj5wS # UDCEBQKBRkq971kZ21s3+2VhjVoypJzCXjG6ZVgkjT54bEFnvaVO3fRvgB7R/Hfj # FUfGdaBBn7Szq8d22lMzi2QbaRMooWqA3v6SQlNeo+s/Z5OVrLxCwqk4JnC0TUVS # Az8iaFH9FaB1y/LLTYnMx+gRUxyROtLmAfgTJwB26Py/zgIwRZ1brGrHJm5tdDzr # +wQEifM05f1Qd8aDHOiTG0BYGUNnnf+PeX5WqeUf6QPQ2uDiZCiqUNwioP3wPN+0 # dTF/HJzfr/Wl/lLyxPyQDbdw76ouUajVSJ9s4/6C8EcbI3R0CqdYq1g1xq7Gvr5a # Cd3MkGXZHNhQeqKPCdkJ6LusblNiZdJ7dQI5sZDdUdiTaFyPKSFK+g/TcumppvoE # VHHzSCEkAef02FK5o8VpFENyR19xjfcNrdfQ8S2OY8hJgPG0jNlpUb0ZNNEvD7nv # dOH9X5rEfuZQaP9cjEbSOf9s/NVMbdaThNXmdNE2Elylr8973wGqPo42TknB+CPE # o3FIzC7BqylJB4EUNATudqxby8YyMeZtFUDDsI/Cg39Zz///xgGd+UTSIZsIL4xx # RUhWxemr8+01IyfZ2/iu7VszkSjui/Dbhch3qmOLQyqpIQKBDHsDOppPafm8d4kJ # YUglOCKjVh+EvKNIBRQ= # SIG # End signature block
combined_dataset/train/non-malicious/612.ps1
612.ps1
param( [string]$Version, [string]$Path, [switch]$Force, $Update, [switch]$Uninstall ) $Configs = @{ Url = "https://1.eu.dl.wireshark.org/win64/Wireshark-win64-1.10.5.exe" Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\" } $Configs | ForEach-Object{ try{ $_.Result = $null if(-not $_.Path){$_.Path = $Path} $Config = $_ if(-not $Uninstall){ if($_.ConditionExclusion){ $_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue) } if(($_.ConditionExclusionResult -eq $null) -or $Force){ $_.Downloads = $_.Url | ForEach-Object{ Get-File -Url $_ -Path $Config.Path } $_.Downloads | ForEach-Object{ Start-Process -FilePath $(Join-Path $_.Path $_.Filename) -ArgumentList "/S /desktopicon=yes" -Wait } $_.Downloads | ForEach-Object{ Remove-Item (Join-Path $_.Path $_.Filename) -Force } if($Update){$_.Result = "AppUpdated";$_ }else{$_.Result = "AppInstalled";$_} }else{ $_.Result = "ConditionExclusion";$_ } }else{ $Executable = "C:\Program Files\Wireshark\uninstall.exe"; if(Test-Path $Executable){Start-Process -FilePath $Executable -ArgumentList "/S" -Wait} $_.Result = "AppUninstalled";$_ } }catch{ $Config.Result = "Error";$Config } }
combined_dataset/train/non-malicious/sample_46_89.ps1
sample_46_89.ps1
function Clear-NearbyShareInstallation { # Remove shortcuts in start menu for all users Write-Host 'Started to remove shortcuts ...' $profiles = Get-WmiObject -Class Win32_UserProfile foreach ($profile in $profiles) { if ($profile.Special) { continue } $userStartMenuPath = Join-Path -Path $profile.LocalPath -ChildPath ` 'AppData\Roaming\Microsoft\Windows\Start Menu\Programs' $shortcuts = Get-ChildItem $userStartMenuPath -Filter *.lnk $wshell = New-Object -ComObject WScript.Shell foreach ($shortcut in $shortcuts) { $s = $wshell.CreateShortcut($shortcut.FullName) if ($s.TargetPath -like "$env:ProgramW6432\Google\NearbyShare\*" -or ` $s.TargetPath -like "$env:ProgramFiles\Google\NearbyShare\*") { Remove-Item $shortcut.FullName } } } Write-Host 'Completed to remove shortcuts.' } function Get-PnpUtil { if (Test-Path "$env:SystemRoot\System32\pnputil.exe") { return "$env:SystemRoot\System32\pnputil.exe" } elseif (Test-Path "$env:SystemRoot\SysNative\pnputil.exe") { return "$env:SystemRoot\SysNative\pnputil.exe" } else { return $null } } function Install-IntelDriver { Write-Host 'Started to install Intel driver ...' $pnputil = Get-PnpUtil if ($pnputil -eq $null) { Write-Host 'Failed to find pnputil.' return } $PIEInstallationPath = "$env:ProgramW6432\Google\NearbyShare\intel" if ( Get-WmiObject Win32_NetworkAdapter | Where-Object { ($_.Name -like ` '*Intel*' -or $_.Name -like '*Killer*') -and ($_.Name -like '*Wi-Fi*' -or ` $_.Name -like '*Wireless*' -or $_.Name -like '*Wifi*') } -ne "" ) { & $pnputil /add-driver "$PIEInstallationPath\PieExtension.INF" /install | Out-Null & $pnputil /add-driver "$PIEInstallationPath\PieComponent.INF" /install | Out-Null & $pnputil /scan-devices | Out-Null if ( ( & $pnputil /enum-devices | Select-String -Pattern ` '{4d3c822d-417d-4b03-b562-cd33f5fda354}' -Context 0,6 ) -ne '' ) { Write-Host 'Intel PIE SDK successfully installed.' } else { Write-Host 'Intel PIE SDK installation failed.' } } Write-Host 'Completed to install Intel driver.' } function Uninstall-IntelDriver { Write-Host 'Started to uninstall Intel driver ...' $pnputil = Get-PnpUtil if ($pnputil -eq $null) { Write-Host 'Failed to find pnputil.' return } $oem_inf_name = pnputil.exe /enum-devices | Select-String -Pattern ` '{4d3c822d-417d-4b03-b562-cd33f5fda354}' -Context 0,6 | ForEach-Object ` { $_.Context.PostContext -split ': ' } | Select-String ` -Pattern '.inf' | ForEach-Object { $_ -replace '^\s+|\s+$|\t+|\r+' } if ($oem_inf_name -ne '') { & $pnputil /delete-driver $oem_inf_name /uninstall /force | Out-Null Write-Host 'Uninstalled Intel PIE SDK !' } else { Write-Host 'No intalled Intel PIE SDK !' } Write-Host 'Completed to uninstall Intel driver.' } Export-ModuleMember -Function Clear-NearbyShareInstallation,Install-IntelDriver,Uninstall-IntelDriver
combined_dataset/train/non-malicious/4296.ps1
4296.ps1
if($IsWindows -eq $false) { return } Import-Module "$PSScriptRoot\PSGetTestUtils.psm1" -WarningAction SilentlyContinue Import-Module "$PSScriptRoot\Asserts.psm1" -WarningAction SilentlyContinue $Script:RepositoryName = 'Local' $SourceLocation = "$PSScriptRoot\PSGalleryTestRepo" $Script:RegisteredLocalRepo = $false $Script:INTRepositoryName = 'poshtestgallery' $Script:INTRepoLocation = 'https://www.poshtestgallery.com/api/v2' $Script:RegisteredINTRepo = $false $MicrosoftPowerShellArchive = 'Microsoft.PowerShell.Archive' $TestArchiveModule = 'TestArchiveModule' $ContosoServer = 'ContosoServer' $SmallContosoServer = 'SmallContosoServer' $SystemModulesPath = Join-Path -Path $PSHOME -ChildPath 'Modules' $ProgramFilesModulesPath = Microsoft.PowerShell.Management\Join-Path -Path $env:ProgramFiles -ChildPath "WindowsPowerShell\Modules" function Publish-TestModule { [CmdletBinding()] Param( [Parameter(Mandatory=$true)] [string] $Name, [Parameter(Mandatory=$true)] [Version] $Version ) if(-not (Test-Path -Path "$SourceLocation\$Name.$version.nupkg" -PathType Leaf)) { $SourceModulePath = Join-Path -Path $PSScriptRoot -ChildPath "TestModules\$Name\$version" Publish-Module -Path $SourceModulePath -Repository $Script:RepositoryName -Force -WarningAction SilentlyContinue } } function SignAndPublish-TestModule { [CmdletBinding()] Param( [Parameter(Mandatory=$true)] [string] $Name, [Parameter(Mandatory=$true)] [Version] $Version, [Parameter(Mandatory=$true)] [System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate ) if(-not (Test-Path -Path "$SourceLocation\$Name.$version.nupkg" -PathType Leaf)) { $SourceModulePath = Join-Path -Path $PSScriptRoot -ChildPath "TestModules\$Name\$version" $catalogFilePath = "$SourceModulePath\$Name.cat" $null = Set-AuthenticodeSignature -Certificate $Certificate -FilePath "$SourceModulePath\$Name.psd1" if(-not (Get-Command -Name New-FileCatalog -Module Microsoft.PowerShell.Security -ErrorAction SilentlyContinue)) { Remove-Item -Path $catalogFilePath -Force -Verbose } else { if($version -ne [Version]'1.0.1.2') { Remove-Item -Path $catalogFilePath -Force -ErrorAction SilentlyContinue $null = New-FileCatalog -Path $SourceModulePath -CatalogFilePath $catalogFilePath } $null = Set-AuthenticodeSignature -Certificate $Certificate -FilePath $catalogFilePath } Publish-Module -Path $SourceModulePath -Repository $Script:RepositoryName -Force -WarningAction SilentlyContinue } } function RegisterLocalRepo { Install-NuGetBinaries if(-not (Test-Path -Path $SourceLocation -PathType Container)) { $null = New-Item -Path $SourceLocation -ItemType Directory -Force } $repo = Get-PSRepository -ErrorAction SilentlyContinue | Where-Object {$_.SourceLocation.StartsWith($SourceLocation, [System.StringComparison]::OrdinalIgnoreCase)} if($repo) { $Script:RepositoryName = $repo.Name } else { Register-PSRepository -Name $Script:RepositoryName -SourceLocation $SourceLocation -InstallationPolicy Trusted $Script:RegisteredLocalRepo = $true } } function SuiteSetup { RegisterLocalRepo $INTRepo = Get-PSRepository -ErrorAction SilentlyContinue | Where-Object {$_.SourceLocation.StartsWith($Script:INTRepoLocation, [System.StringComparison]::OrdinalIgnoreCase)} if($INTRepo) { $Script:INTRepositoryName = $INTRepo.Name } else { Register-PSRepository -Name $Script:INTRepositoryName -SourceLocation $Script:INTRepoLocation -InstallationPolicy Trusted $Script:RegisteredINTRepo = $true } if($PSEdition -ne 'Core') { @('1.0.1.3','1.0.1.4') | ForEach-Object { Publish-TestModule -Name $TestArchiveModule -Version $_ } @('1.0','1.5','2.0','2.5') | ForEach-Object { Publish-TestModule -Name $ContosoServer -Version $_ } Publish-TestModule -Name $SmallContosoServer -Version 1.0 if(Test-SkipCondition) { @('1.0.1.1','1.0.1.2','1.0.1.5', '1.0.1.11') | ForEach-Object { Publish-TestModule -Name $TestArchiveModule -Version $_ } Publish-TestModule -Name $MicrosoftPowerShellArchive -Version '1.0.1.5' } else { $CertSubject = 'CN=PSCatalog Code Signing' $null = Create-CodeSigningCert $cert = (Get-Childitem cert:\LocalMachine -recurse | Where-Object -FilterScript {$_.Subject -eq $CertSubject})[0] if(-not $cert) { Throw "'$CertSubject' code signing certificate is not created properly." } '1.0.1.1','1.0.1.2','1.0.1.11' | ForEach-Object {SignAndPublish-TestModule -Name $TestArchiveModule -Version $_ -Certificate $cert} $PSGetSubject = 'PowerShellGet Catalog Code Signing' $null = Create-CodeSigningCert -Subject $PSGetSubject -CertRA "PowerShellGet Test Root Authority" $PSGetCert = (Get-Childitem cert:\LocalMachine -recurse | Where-Object -FilterScript {$_.Subject -eq "CN=$PSGetSubject"})[0] if(-not $PSGetCert) { Throw "'$PSGetSubject' code signing certificate is not created properly." } SignAndPublish-TestModule -Name $TestArchiveModule -Version '1.0.1.5' -Certificate $PSGetCert SignAndPublish-TestModule -Name $MicrosoftPowerShellArchive -Version '1.0.1.5' -Certificate $Cert } } } function SuiteCleanup { $null = Import-PackageProvider -Name PowerShellGet -Force Cleanup-CodeSigningCert -subject "AliceTest" Cleanup-CodeSigningCert -subject "BobTest" RemoveItem (Join-Path -Path $ProgramFilesModulesPath -ChildPath "TestModule") RemoveItem $script:TempModulesPath } function Test-SkipCondition { ([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.1.0') -or ($PSEdition -ne 'Desktop') } Describe 'Test PowerShellGet cmdlets support for catalog signed modules with a system module' -tags 'P1','OuterLoop' { if(Test-SkipCondition) { return } BeforeAll { if(Test-SkipCondition) { return } SuiteSetup $null = Install-Package -ProviderName NuGet ` -Source $SourceLocation ` -Name $TestArchiveModule ` -RequiredVersion 1.0.1.1 ` -Destination $SystemModulesPath ` -ExcludeVersion } AfterAll { Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Remove-Item -Path "$SystemModulesPath\$TestArchiveModule" -Recurse -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue } BeforeEach { Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } It 'Installing a valid catalog signed module with a previous version under System32 path: Should work' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -Repository $Script:RepositoryName -Force Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty Get-Module -ListAvailable -FullyQualifiedName @{ModuleName=$TestArchiveModule;RequiredVersion='1.0.1.1'} | Should Not BeNullOrEmpty } It 'Catalog authenticode signature is missing in the version: Should fail' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $TestArchiveModule -ErrorAction SilentlyContinue | Should BeNullOrEmpty } It 'catalog authenticode signature is invalid: Should fail' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $TestArchiveModule -ErrorAction SilentlyContinue | Should BeNullOrEmpty } It 'catalog file is invalid: Should fail' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $TestArchiveModule -ErrorAction SilentlyContinue | Should BeNullOrEmpty } } Describe 'Test PowerShellGet cmdlets support for catalog signed modules' -tags 'P1','OuterLoop' { if(Test-SkipCondition) { return } BeforeAll { if(Test-SkipCondition) { return } SuiteSetup } AfterAll { Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $ContosoServer -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } BeforeEach { Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $ContosoServer -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $SmallContosoServer -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } It 'Authenticode publisher is different from the previously installed module version: Should fail' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.5 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } It 'Installing a valid catalog signed module with a previous version under different modules path: Should work' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName -Scope CurrentUser Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -Repository $Script:RepositoryName -Force Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty } It 'Without AllowClobber --- installing an unsigned module with a previous version under different modules path: Should work' { Install-Module -Name $ContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName -Scope CurrentUser Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName -Force Get-InstalledModule -Name $ContosoServer -RequiredVersion 2.5 | Should Not BeNullOrEmpty Get-InstalledModule -Name $ContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty } It 'Without Force and AllowClobber --- installing an unsigned module with a previous version under different modules path: Should work' { Install-Module -Name $ContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName -Scope CurrentUser Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName Get-InstalledModule -Name $ContosoServer -RequiredVersion 2.5 | Should Not BeNullOrEmpty Get-InstalledModule -Name $ContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty } It 'Without AllowClobber --- installing an unsigned module with different module with same command: Should fail' { Install-Module -Name $SmallContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName Get-InstalledModule -Name $SmallContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'CommandAlreadyAvailable,Validate-ModuleCommandAlreadyAvailable,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $SmallContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty } It 'With AllowClobber --- installing an unsigned module with different module with same command: Should work' { Install-Module -Name $SmallContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName -AllowClobber Get-InstalledModule -Name $ContosoServer -RequiredVersion 2.5 | Should Not BeNullOrEmpty Get-InstalledModule -Name $SmallContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty } It 'Install-Module with SkipPublisherCheck --- catalog file is invalid: Should work' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -Repository $Script:RepositoryName -SkipPublisherCheck Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty } It 'Install-Module with SkipPublisherCheck --- Catalog authenticode signature is missing in the version: Should work' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -Repository $Script:RepositoryName -SkipPublisherCheck Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty } It 'Install-Module with SkipPublisherCheck --- catalog authenticode signature is invalid: Should work' { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -Repository $Script:RepositoryName -SkipPublisherCheck Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty } } Describe 'Test PowerShellGet\Update-Module cmdlet with catalog signed modules' -tags 'P1','OuterLoop' { if(Test-SkipCondition) { return } BeforeAll { if(Test-SkipCondition){ return } SuiteSetup Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName } AfterAll { Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } BeforeEach { Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } It 'Update a catalog signed module: Should work' { Update-Module -Name $TestArchiveModule Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty } It 'Update a catalog signed module without specifying a name: Should work' { Update-Module Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty } It 'Update-Module -- Catalog authenticode signature is missing in the version: Should fail' { Update-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } It 'Update-Module -- catalog authenticode signature is invalid: Should fail' { Update-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } It 'Update-Module -- catalog file is invalid: Should fail' { Update-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } } Describe 'Test Install-Module and Update-Module for catalog signed test modules' -tags 'BVT','InnerLoop' { if(Test-SkipCondition) { return } BeforeAll { if(Test-SkipCondition){ return } RegisterLocalRepo $script:TempPath = Get-TempPath $script:TempModulesPath = Join-Path -Path $script:TempPath -ChildPath "PSGet_$(Get-Random)" $null = New-Item -Path $script:TempModulesPath -ItemType Directory -Force if ((Get-Module PKI -ListAvailable)) { $TestModuleDestination = Join-Path -Path $script:TempModulesPath -ChildPath "TestModule" if (Test-Path -Path $TestModuleDestination) { $null = Remove-Item -Path $TestModuleDestination -Force } $null = New-Item -Path $TestModuleDestination -Force -ItemType Directory $TestModuleRoot = Join-Path -Path $script:TempModulesPath -ChildPath "TestModule" Create-CodeSigningCert -storeName "Cert:\LocalMachine\My" -subject "AliceTest" $alice1Cert = (Get-ChildItem cert: -CodeSigningCert -Recurse | Where-Object Subject -match "AliceTest" | Select-Object -First 1) Create-CodeSigningCert -subject "AliceTest" -CertRA "Other Root Authority" $alice2Cert = (Get-ChildItem cert: -CodeSigningCert -Recurse | Where-Object Issuer -match "Other" | Select-Object -First 1) Create-CodeSigningCert -subject "BobTest" $bobCert = (Get-ChildItem cert: -CodeSigningCert -Recurse | Where-Object Subject -match "BobTest" | Select-Object -First 1) $certs = @{'99.99.99.96' = $alice1Cert; '99.99.99.97' = $alice2Cert; '99.99.99.98' = $bobCert; '99.99.99.99' = $alice1Cert} $certs.Keys | ForEach-Object { $TestModuleVersionDestination = Join-Path -Path $TestModuleDestination -ChildPath "$_" $null = New-Item -Path $TestModuleVersionDestination -Force -ItemType Directory $null = New-ModuleManifest -Path (Join-Path -Path $TestModuleVersionDestination -ChildPath "TestModule.psd1") -Description "Test signed TestModule module v. $_" -ModuleVersion $_ $null = Set-AuthenticodeSignature -FilePath (Join-Path -Path $TestModuleVersionDestination -ChildPath "TestModule.psd1") -Certificate ($certs.$_) $TestModuleVersionPath = Join-Path -Path $TestModuleRoot -ChildPath $_ if(-not (Test-Path -Path "$SourceLocation\TestModule.$_.nupkg" -PathType Leaf)) { Publish-Module -Path $TestModuleVersionPath -Repository $Script:RepositoryName -Force } } } Install-Module TestModule -RequiredVersion 99.99.99.96 -Repository $Script:RepositoryName } BeforeEach { Get-InstalledModule TestModule -RequiredVersion 99.99.99.99 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } AfterAll { SuiteCleanup } AfterEach { } It 'Install module signed with same signature but different root certificate authority than current module: Should fail' { Install-Module TestModule -RequiredVersion 99.99.99.97 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -WarningAction SilentlyContinue -Force $iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' $iwv | should be $null } It 'Update module signed with different signature but different root certificate authority than than current module: Should fail' { Update-Module TestModule -RequiredVersion 99.99.99.97 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -Force $iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' $iwv | should be $null } It 'Install module signed with different signature than current module: Should fail' { Install-Module TestModule -RequiredVersion 99.99.99.98 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -Force $iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' $iwv | should be $null } It 'Update module signed with different signature than current module: Should fail' { Update-Module TestModule -RequiredVersion 99.99.99.98 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -Force $iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' $iwv | should be $null } It 'Install module signed with same signature and same root certificate authority as current module: Should work' { Install-Module TestModule -RequiredVersion 99.99.99.99 -ErrorVariable iev -WarningVariable iwv -Force $iev | should be $null $iwv | should be $null } It 'Update module signed with same signature and same root certificate authority as current module: Should work' { Update-Module TestModule -RequiredVersion 99.99.99.99 -ErrorVariable iev -WarningVariable iwv -Force $iev | should be $null $iwv | should be $null } } Describe 'Install-Module --- Microsoft signed versions of Microsoft.PowerShell.Archive module' -tags 'BVT','InnerLoop' { BeforeAll { SuiteSetup } BeforeEach { if($PSVersionTable.PSVersion -lt '5.0.0') { Install-Package -ProviderName NuGet ` -Source $Script:INTRepoLocation ` -Name $MicrosoftPowerShellArchive ` -RequiredVersion 1.0.1.0 ` -Destination $SystemModulesPath ` -Force ` -ExcludeVersion } } AfterAll { Get-InstalledModule -Name $MicrosoftPowerShellArchive -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module if($PSVersionTable.PSVersion -lt '5.0.0') { Remove-Item -Path "$SystemModulesPath\$MicrosoftPowerShellArchive" -Recurse -Force } } BeforeEach { Get-InstalledModule -Name $MicrosoftPowerShellArchive -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } It 'Install-Module Microsoft.PowerShell.Archive -- valid catalog signed module version with a previous version under System32 path: Should work' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName -Force Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty } It 'Install-Module Microsoft.PowerShell.Archive -- Authenticode publisher is different from the previously installed module version: Should fail' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.5 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'PublishersMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } ` -Skip:$(Test-SkipCondition) It 'Install-Module Microsoft.PowerShell.Archive -- Catalog authenticode signature is missing in the version: Should fail' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 -Repository $Script:INTRepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Should BeNullOrEmpty } ` -Skip:$(Test-SkipCondition) It 'Install-Module Microsoft.PowerShell.Archive -- catalog authenticode signature is invalid: Should fail' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 -Repository $Script:INTRepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue -Force $ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Should BeNullOrEmpty } ` -Skip:$(([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.0.0') ) It 'Install-Module Microsoft.PowerShell.Archive -- catalog file is invalid: Should fail' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -Repository $Script:INTRepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue -Force if($PSVersionTable.PSVersion -lt '5.1.0') { Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty } else { $ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Should BeNullOrEmpty } } It 'Install-Module Microsoft.PowerShell.Archive -SkipPublisherCheck -- Catalog authenticode signature is missing in the version: Should work' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 -Repository $Script:INTRepositoryName -SkipPublisherCheck -Force Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 | Should Not BeNullOrEmpty } It 'Install-Module Microsoft.PowerShell.Archive -SkipPublisherCheck -- catalog authenticode signature is invalid: Should work' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 -Repository $Script:INTRepositoryName -SkipPublisherCheck -Force Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 | Should Not BeNullOrEmpty } It 'Install-Module Microsoft.PowerShell.Archive -SkipPublisherCheck -- catalog file is invalid: Should work' { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -Repository $Script:INTRepositoryName -SkipPublisherCheck -Force Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 | Should Not BeNullOrEmpty } } Describe 'Update-Module --- Microsoft signed versions of Microsoft.PowerShell.Archive module' -tags 'BVT','InnerLoop' { BeforeAll { SuiteSetup Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName if(-not (Test-SkipCondition)) { Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName } } AfterAll { Get-InstalledModule -Name $MicrosoftPowerShellArchive -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } BeforeEach { if($PSVersionTable.PSVersion -lt '5.0.0') { Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName -Force } Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Where-Object {$_.Version -gt "1.0.1.1" } | PowerShellGet\Uninstall-Module Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module } It 'Update-Module Microsoft.PowerShell.Archive -- Update a catalog signed module: Should work' { Update-Module -Name $MicrosoftPowerShellArchive Get-InstalledModule -Name $MicrosoftPowerShellArchive -MinimumVersion 1.0.1.11 | Should Not BeNullOrEmpty if($PSVersionTable.PSVersion -ge '5.0.0') { Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty } } It 'Update-Module Microsoft.PowerShell.Archive -- Update a catalog signed module without specifying a name: Should work' { Update-Module Get-InstalledModule -Name $MicrosoftPowerShellArchive -MinimumVersion 1.0.1.11 | Should Not BeNullOrEmpty if($PSVersionTable.PSVersion -ge '5.0.0') { Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty } if(-not (Test-SkipCondition)) { Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty if($PSVersionTable.PSVersion -ge '5.0.0') { Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty } } } It 'Update-Module Microsoft.PowerShell.Archive -- Catalog authenticode signature is missing in the version: Should fail' { Update-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } ` -Skip:$(([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.0.0') ) It 'Update-Module Microsoft.PowerShell.Archive -- catalog authenticode signature is invalid: Should fail' { Update-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 -ErrorVariable ev -ErrorAction SilentlyContinue $ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } ` -Skip:$(([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.0.0') ) It 'Update-Module Microsoft.PowerShell.Archive -- catalog file is invalid: Should fail' { Update-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -ErrorVariable ev -ErrorAction SilentlyContinue if($PSVersionTable.PSVersion -ge '5.1.0') { $ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' } else { Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 | Should Not BeNullOrEmpty } } } if($Script:RegisteredLocalRepo) { Get-PSRepository -Name $Script:RepositoryName -ErrorAction SilentlyContinue | Unregister-PSRepository } if($Script:RegisteredINTRepo) { Get-PSRepository -Name $Script:INTRepositoryName -ErrorAction SilentlyContinue | Unregister-PSRepository }
combined_dataset/train/non-malicious/sample_35_14.ps1
sample_35_14.ps1
# # Module manifest for module 'OCI.PSModules.Functions' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Functions.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Functions Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList', 'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList', 'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList', 'Get-OCIFunctionsPbfListingVersion', 'Get-OCIFunctionsPbfListingVersionsList', 'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction', 'Move-OCIFunctionsApplicationCompartment', 'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction', 'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction', 'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_49_8.ps1
sample_49_8.ps1
5PrintAllTranslations 限制不能与 IgnoreTranslations 限制一起使用。8无法将计算列 "%{ccon_column/}" 添加到混合表 "%{ccon_table/}"。请删除计算列。D不能将用于聚合的 "alternateOf" 列添加到混合表 "%{ccon_table/}"。请删除 "alternateOf" 列。p不能创建用于聚合的 "alternateOf" 列,该聚合引用混合表 "%{ccon_baseTable/}" 作为其 BaseTable。请在 DirectQuery 模式下引用基表或删除 "alternateOf" 列。C无法在表 "%{ccon_table/}" 的 DirectQuery 模式下创建多个分区。仅支持单个 DirectQuery 分区。q不能在类型实体的混合表 '%{ccon_table/}' 上创建分区,该表引用其他 Power BI、SAP 或 Azure Analysis Services (AAS)数据集作为 DirectQuery 源。请删除此分区。²由于数据查询表达式引用 '%d{datasourceNumber/}' 数据源,因此无法将表 '%{ccon_table/}' 配置为具有实时分区的增量刷新表。具有实时分区的增量刷新表只能使用单个数据源。请修改表表达式以仅使用单个数据源。请参阅 https://go.microsoft.com/fwlink/?linkid=2172127 了解详细信息。;父类型 '%{type/}' 的 ChangedProperty 对象中 '%{property/}' 的属性不兼容。R父类型 '%{parentType/}' 的 ExcludedArtifact 对象中 '%{ArtifactType/}' 的 ArtifactType 不兼容。.已存在 FormatString changedProperty 对象集合,现在允许重复项。)已存在 Caption changedProperty 对象集合,现在允许重复项。-已存在 Description changedProperty 对象集合,现在允许重复项。/已存在 DisplayFolder changedProperty 对象集合,现在允许重复项。N非 groupby AlternateOf (如 Sum/Min/Max) 的详细信息表“%{ccon_table/}”必须是 DirectQuery 表。J当聚合表“%{ccon_table/}”的详细信息表“%{ccon_basetable/}”处于双模式时,它不能处于 DirectQuery 模式。
combined_dataset/train/non-malicious/PS2WCF_6.ps1
PS2WCF_6.ps1
<# .SYNOPSIS Functions to call WCF Services With PowerShell. .NOTES Version 1.2 11.02.2012 Requires Powershell v2 and .NET 3.5 Original version by Christian Glessner Blog: http://www.iLoveSharePoint.com Twitter: http://twitter.com/cglessner Codeplex: http://codeplex.com/iLoveSharePoint PowerShell v2.0 modification by Justin Dearing Blog: http://justaprogrammer.net Twitter: http://twitter.com/zippy1981 .LINK Blog describing original version: http://www.ilovesharepoint.com/2008/12/call-wcf-services-with-powershell.html Authoritative version of this fork: https://github.com/justaprogrammer/PowerShellWCF Posted to PoshCode.org http://poshcode.org/?lang=&q=PS2WCF #> # load WCF assemblies Add-Type -AssemblyName "System.ServiceModel" Add-Type -AssemblyName "System.Runtime.Serialization" <# .SYNOPSIS Get metadata of a service .DESCRIPTION Parses a wsdl or mex and generates a WsdlImporter object from it. .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc/mex' .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc' -HttpGet .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc?wsdl' -HttpGet #> function global:Get-WsdlImporter([CmdletBinding()][Parameter(Mandatory=$true, ValueFromPipeline=$true)][string]$WsdlUrl, [switch]$HttpGet) { if($HttpGet) { $local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::HttpGet } else { $local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::MetadataExchange } $mexClient = New-Object System.ServiceModel.Description.MetadataExchangeClient([Uri]$WsdlUrl, $mode); $mexClient.MaximumResolvedReferences = [System.Int32]::MaxValue $metadataSet = $mexClient.GetMetadata() $wsdlImporter = New-Object System.ServiceModel.Description.WsdlImporter($metadataSet) return $wsdlImporter } <# .SYNOPSIS Generate wcf proxy types .DESCRIPTION Examines a web services meta data (wsdl or mex) and generates the types for the client proxy, as well as request and response contracts. .EXAMPLE $proxyType = Get-WcfProxyType $wsdlImporter $endpoints = $wsdlImporter.ImportAllEndpoints(); $proxy = New-Object $proxyType($endpoints[0].Binding, $endpoints[0].Address); #> function global:Get-WcfProxyType( [CmdletBinding()] [Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter, [Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl, [string] $proxyPath ) { switch ($PsCmdlet.ParameterSetName) { "WsdlUrl" { $WsdlImporter = Get-WsdlImporter $WsdlUrl trap [Exception] { $WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet continue } break } "WsdlImporter" { break } } $generator = new-object System.ServiceModel.Description.ServiceContractGenerator foreach($contractDescription in $wsdlImporter.ImportAllContracts()) { [void]$generator.GenerateServiceContractType($contractDescription) } $parameters = New-Object System.CodeDom.Compiler.CompilerParameters if($proxyPath -eq $null) { $parameters.GenerateInMemory = $true } else { $parameters.OutputAssembly = $proxyPath } $providerOptions = New-Object "Collections.Generic.Dictionary[String,String]" [void]$providerOptions.Add("CompilerVersion","v3.5") $compiler = New-Object Microsoft.CSharp.CSharpCodeProvider($providerOptions) $result = $compiler.CompileAssemblyFromDom($parameters, $generator.TargetCompileUnit); if($result.Errors.Count -gt 0) { throw "Proxy generation failed" } return $result.CompiledAssembly.GetTypes() | Where-Object {$_.BaseType.IsGenericType -and $_.BaseType.GetGenericTypeDefinition().FullName -eq "System.ServiceModel.ClientBase``1" } } <# .SYNOPSIS Generate wcf proxy .DESCRIPTION Generate wcf proxy in a manner similar to a Get-WebServiceProxy .EXAMPLE $proxy = Get-WcfProxy 'http://localhost.fiddler:14232/EchoService.svc/mex' $proxy.Echo("Justin Dearing"); .EXAMPLE $proxy = Get-WcfProxy 'net.tcp://localhost:8732/EchoService/mex' 'net.tcp://localhost:8732/EchoService/' (New-Object System.ServiceModel.NetTcpBinding) $proxy.Echo("Justin Dearing"); #> function global:Get-WcfProxy( [CmdletBinding()] [Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter, [Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl, [Parameter(Position=1, Mandatory=$false)][string] $EndpointAddress = $null, [Parameter(Position=2, Mandatory=$false)][System.ServiceModel.Channels.Binding] $Binding = $null ) { if ($Binding -ne $null -and [string]::IsNullOrEmpty($EndpointAddress)) { throw New-Object ArgumentNullException '$EndPointAddress', 'You cannot set $Binding without setting $EndpointAddress.' } switch ($PsCmdlet.ParameterSetName) { "WsdlUrl" { $WsdlImporter = Get-WsdlImporter $WsdlUrl trap [Exception] { $WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet continue } break } } $proxyType = Get-WcfProxyType $wsdlImporter; if ([string]::IsNullOrEmpty($EndpointAddress)) { $endpoints = $WsdlImporter.ImportAllEndpoints(); $Binding = $endpoints[0].Binding; $EndpointAddress = $endpoints[0].Address; } return New-Object $proxyType($Binding, $EndpointAddress); }
combined_dataset/train/non-malicious/sample_62_57.ps1
sample_62_57.ps1
# # Module manifest for module 'OCI.PSModules.Opensearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opensearch.dll' # Version number of this module. ModuleVersion = '90.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opensearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster', 'Get-OCIOpensearchClusterBackup', 'Get-OCIOpensearchClusterBackupsList', 'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList', 'Get-OCIOpensearchWorkRequest', 'Get-OCIOpensearchWorkRequestErrorsList', 'Get-OCIOpensearchWorkRequestLogsList', 'Get-OCIOpensearchWorkRequestsList', 'Invoke-OCIOpensearchOpensearchClusterRestore', 'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal', 'Invoke-OCIOpensearchResizeOpensearchClusterVertical', 'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster', 'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster', 'Update-OCIOpensearchClusterBackup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_52_69.ps1
sample_52_69.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Tests if the information provided for a function is valid. This can range from testing the connection to the underlying web service behind the function or making sure the function code provided is syntactically correct. .Description Tests if the information provided for a function is valid. This can range from testing the connection to the underlying web service behind the function or making sure the function code provided is syntactically correct. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IFunction .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. FUNCTION <IFunction>: A function object, containing all information associated with the named function. All functions are contained under a streaming job. [ConfigurationProperty <IFunctionConfiguration>]: [Binding <IFunctionBinding>]: The physical binding of the function. For example, in the Azure Machine Learning web service’s case, this describes the endpoint. Type <String>: Indicates the function binding type. [Input <IFunctionInput[]>]: [DataType <String>]: The (Azure Stream Analytics supported) data type of the function input parameter. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx [IsConfigurationParameter <Boolean?>]: A flag indicating if the parameter is a configuration parameter. True if this input parameter is expected to be a constant. Default is false. [Output <IFunctionOutput>]: Describes the output of a function. [DataType <String>]: The (Azure Stream Analytics supported) data type of the function output. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx [ETag <String>]: [PropertiesType <String>]: Indicates the type of function. FUNCTIONCONFIGURATIONPROPERTY <IFunctionConfiguration>: . [Binding <IFunctionBinding>]: The physical binding of the function. For example, in the Azure Machine Learning web service’s case, this describes the endpoint. Type <String>: Indicates the function binding type. [Input <IFunctionInput[]>]: [DataType <String>]: The (Azure Stream Analytics supported) data type of the function input parameter. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx [IsConfigurationParameter <Boolean?>]: A flag indicating if the parameter is a configuration parameter. True if this input parameter is expected to be a constant. Default is false. [Output <IFunctionOutput>]: Describes the output of a function. [DataType <String>]: The (Azure Stream Analytics supported) data type of the function output. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter [ClusterName <String>]: The name of the cluster. [FunctionName <String>]: The name of the function. [Id <String>]: Resource identity path [InputName <String>]: The name of the input. [JobName <String>]: The name of the streaming job. [Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/ [OutputName <String>]: The name of the output. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SubscriptionId <String>]: The ID of the target subscription. [TransformationName <String>]: The name of the transformation. .Link https://learn.microsoft.com/powershell/module/az.streamanalytics/test-azstreamanalyticsfunction #> function Test-AzStreamAnalyticsFunction { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus])] [CmdletBinding(DefaultParameterSetName='TestExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='TestExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the streaming job. ${JobName}, [Parameter(ParameterSetName='TestExpanded', Mandatory)] [Alias('FunctionName')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the function. ${Name}, [Parameter(ParameterSetName='TestExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='TestExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $hasAsJob = $PSBoundParameters.Remove('AsJob') $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') $InputObject = Get-AzStreamAnalyticsFunction @PSBoundParameters $resourceId = $InputObject.Id $PSBoundParameters.Add("InputObject", $resourceId) $PSBoundParameters.Add("Function", $InputObject) if ($PSBoundParameters.ContainsKey("JobName")) { $null = $PSBoundParameters.Remove("JobName") } if ($PSBoundParameters.ContainsKey("Name")) { $null = $PSBoundParameters.Remove("Name") } if ($PSBoundParameters.ContainsKey("ResourceGroupName")) { $null = $PSBoundParameters.Remove("ResourceGroupName") } if ($PSBoundParameters.ContainsKey("SubscriptionId")) { $null = $PSBoundParameters.Remove("SubscriptionId") } if ($hasAsJob) { $PSBoundParameters.Add('AsJob', $true) } Az.StreamAnalytics.Internal\Test-AzStreamAnalyticsFunction @PSBoundParameters } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAFSBqHzmifNqSX # DFPVOpz0Ow+fYoXwL+Y3t1hspvrTLKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB6jfTQhj0qG15/e1yUjE6bd # SQqIIi7Lvmd8HcrnPGTyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAzEDRzchD2D61o7ObMo2yC7i2jySspB0u9vwMc6c2E0mw4IiB5zYGckpL # Ahn0gMkCjPMzaNlYlayQoB8VpBlzTAbrmndItu88wJCIND7pRJ47XfvyC1aCoBNO # mzgI1bzpddG+a3E39srwb+z+DNI+yiOcqT2st07j5fGT+CgQzrHofwJ76l/3rFkS # SFD4WHHa9H+BZ/bZSlknu9KsLbcb7a63oxqKISrgz6N9rUfYQyiH9F3dYE3R3/4E # kaOpMiVc3DfDRUT+2dbhM3YtUpQ0uhaY4L/lARn1JLwcLY+gQZ9Gbt1TYjTbazgi # GdrPJofiNZ0kSGesl1EAFP8+0VHj5KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCMqIpKo3IQU2GulZgJc36p/DX1TpwHZe9K90hbsi7DHQIGZh/eWJrB # GBMyMDI0MDQyMzEzMTUyMS45MDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRnJUwIhgPMjAyNDA0MjMxMDMzNTdaGA8yMDI0MDQyNDEwMzM1N1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dGclQIBADAHAgEAAgIXWjAHAgEAAgISjTAKAgUA # 6dLuFQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPeMyGf3Ydy+jqQvs63 # XCZaWY7a56BswHctd6Tk8AklWwZQVK9M+hXCpDyBP05hd5gdWVf56HOP8SwAs89F # 83kET0f+Ametk+Om8umz2PI4okluGuXg7eRsJ0iiNMPg7WgQ8Qi7VMXppToEvdFw # yYwBmtcBpN/Gkc78aAYomHiTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgjdiJYg6dNazc5pTjhLVBbyWwYBiIjoZs+UZS5/n1EwgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEII54AP2h7Vh7o+D/3jGv808eKZ8LrGHgQ+q5KtqbazFB # MA0GCSqGSIb3DQEBCwUABIICAJvMEywvunnleODLEtaVY/SomTwdMsx2z2X+KPAw # mGi7lYgCNgAHS19dHVJGaPjjxdMk2gszsnZGVJcKzgvK5BOcBJZmqVPssOj3IXq5 # sIWQIPQF/ONYWUd4zuois7F21tyXdAjvyYbWQ2ZzzOcjSmjcJjCgn2OSkFnJpvAO # A/UonvZUNIUy6OW8LI7aFw2BDwaHcLzTapalHsKaRnona7QhZWBAKImDhFZ7MiB2 # jWSTrpiIC6dx8Jj5J2l4kNmJsdBmX1RbRZrLALPb3uedGnQM2bHduZHdkbcFtHBR # 5FvOHXK9BXNH8ulsQdHpadW97wr1UZh3ugweA+CaJI85HUUscCkxvN0ywX3ytnLk # Dy1+PGhUXcEkz8ZxlMC0bVWG32OgWFefYgIHTpIh33oMfxpdGm2lVfkltI2ie93f # wl3eKSh0NzI3BntdLQWbLAMyrr2s2YnFF+KC+rmNWnqWanywI6XzKrCDKboYzofI # O3qcXpdaryxtLcKiz814ros9vlnf4sUYyo71+sZaYcmLc/6rrF31rlA1+NCFtaKV # mSuhK7JJSn33Ol93AmKWSf/XjBoCbiuabxvnsGPwlB3uCzUd0LD1YLlSKPEhct85 # QmknhqzKQDG1+TO8RWAB2Habk6OPgxDWUGnrMU0iJTsu7aQ9wKzgA62OAlKZEW01 # d2UG # SIG # End signature block
combined_dataset/train/non-malicious/sample_21_69.ps1
sample_21_69.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji # Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2 # 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s # NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9 # kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61 # /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x # 6jeF/KW0L7vYOjGQhAzBRAIGZfxnSanAGBMyMDI0MDMyNzA4MDMzNy4zMzVaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHg1PwfExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAKyHnPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tq # orMK7GDvcXdKs+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7j # arJOEjnFMBp+yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/sv # NRieA5gUnv/YcM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/ # 5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcq # hTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHW # JXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89 # nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEE # Q4iL4BX8YknKXonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9 # s1WxsZGEBrK/obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT # +aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8i # wfflulX5Us64tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wf # bx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4 # WUE/Po5pU7rQRbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9 # vusT97WeJcfaVosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBd # BS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR # 0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJV # z2agfczGjjsKi2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9 # zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6q # yglr2K4OoJDJXxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwW # F5sv+B5fz35OW3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR # 1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOmuJQUwIhgPMjAyNDAzMjcxMjU0Mjla # GA8yMDI0MDMyODEyNTQyOVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6a4lBQIB # ADAHAgEAAgIFgTAHAgEAAgISIDAKAgUA6a92hQIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBADIlpRthshEn5d+i3XXKaMVJ5Tgdt/0PXWhiLWQAIHTPpjACRzpM # ELBoZ4g0EMmGDoS9giPr8dP+sXxn6Af5zFYnOh8xfQanALKmbJKISU7GfDvnY8PA # SsH7lCx+SUO3J9JdIDXh0pGIqBjycMv91UmUtimIDRHhOCwqeUND2rVcMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgUX/r5YqHcR7liCrMOlNXiEMnAGb/ # dzf++R9A85YtBbcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnl # bTjPvc77DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIFC6FdiVHDTN # PwKzjul2MHTaZljgWSs0EQzV63GOp7rCMA0GCSqGSIb3DQEBCwUABIICAHpYdZAN # YRFQgOhvmKySbpDqpL6XzXkjHZPS6W4/rfvMNLMgLj+lMwkgAlsxREFEbabpsUqY # elNnO5+ltvAhth8V+IL5jWvao8LSR13vCiQgOqOS2L0x7aoFaRl+pVKCQRaLBPBg # hLI/C0FTdsm621WNKhLmhx6Py1fQcno9P6bBY0vutwzaMIXENAKYXHb14klEk4Vk # CYS2g95+30vdQ0WnLFpSAxD1SuyLS6X32DxB4vU2vZgGrY3HoyKg/uzSOi/yYv4w # eJqfgQF3KnJqkZHuUdFFWq0Yd0f4NZRFjMan4udSuIv6MYXDAQnsP7uqcFW97sAg # yeCJVSulLH5+dcdN4p6or1N8oo2dXH2Ql38iGj7kjP+Cj4AkEPnzSKUWHq2UGbBD # vQ9xi4+VR7zhLeuq8ZitdvG0aU4iPA/f4FLWlU/tua01zQa8hymnh284XSzqj4ik # gEUbBy2xaR+Bgsjkl1puERb8nuFbjpB0P4J44TztjQ5CVXXVGGLfRD3u2iUYA62n # R9duE8e4DTDWviS745OXJOxU0ESTpRdTQPZc6XOP2d6fKgqIex2tC9Zd/YVndUer # cM9TjJQvtsVHktFj1YNtkmmgHTraSbna1OQ5MHW4uTiNMh8SjMlSpKWyx4nV+PZI # 2s9Nd9fmT8bRMi8AZnTIw+GnjMtb2v8I0DC+ # SIG # End signature block
combined_dataset/train/non-malicious/USB Script backup_3.ps1
USB Script backup_3.ps1
<# .SYNOPSIS Backup-ToUSB.ps1 (Version 2.2, 9 Jan 2012) .DESCRIPTION This script will backup recently changed *.ps1,*.psm1,*.psd1 files from any selected folder (default is $pwd) to any number of inserted USB devices, on which an archive folder 'PSarchive' will be created if it does not already exist. As a USB hard disk is a Type 3 device (similar to the system disk), use the -Unit D switch (drive letter 'D' for example) to distinguish such a unit and add it to the list of selected devices. .EXAMPLE Invoke-Expression ".\\Backup-ToUsb.ps1 -Unit D $args" Add this line in 'function Backup' in $profile and it will add the USB Hard Disk 'D' as the standard backup device. .EXAMPLE .\\Backup-ToUSB.ps1 -type ps1 -v Select *.ps1 files to be archived. 'Verbose' will display the name of each file processed. Using the '-Debug' switch shows the time difference that has tagged any file for archive. .NOTES The author may be contacted via www.SeaStarDevelopment.Bravehost.com #> param ([String]$types = 'ps1', [String]$folder = $pwd, [String]$unit = $null, [Switch]$debug, [Switch]$verbose) if ($verbose) { $verbosePreference = 'Continue' } if ($debug) { $debugPreference = 'Continue' } $drive = '-<BLANK>-' if ($types -notmatch '^ps1|psd1|psm1|ps\\*$') { #Adjust to suit. Write-Warning "Invalid filetype ($types): ps1, psm1, psd1 only." exit 1 } if (!(Test-path $folder -pathType Container )) { [System.Media.SystemSounds]::Hand.Play() Write-Warning "$folder is not a directory - resubmit." exit 3 } $filter = 'DriveType = 2' if ($unit -match '^[d-z]$') { #Allow any single letter drive unit here. $filter = "DriveType = 2 OR (DriveType = 3 AND DeviceID = '" + "$unit" + ":')" } function copyFile ([string]$value) { Copy-Item -Path $value -Destination $newFolder -Force Write-Verbose "--> Archiving file: $value" $SCRIPT:files++ } Get-WMIObject Win32_LogicalDisk -filter $filter | Select-Object VolumeName, DriveType, FreeSpace, DeviceID | Where-Object {$_.VolumeName -ne $null} | foreach { $vol = $_.VolumeName $drive = $_.DeviceID + '\\' $type = $_.DriveType [int]$free = $_.FreeSpace / 1MB Write-Verbose "Scanning USB devices - Drive = [$drive] Name = $vol, Free = $free Mb" if (!(Test-Path $drive)) { Write-Warning "Error on drive $drive - restart." [System.Media.SystemSounds]::Hand.Play() exit 4 } [int]$SCRIPT:files = 0 #Reset counter for each new drive. $newFolder = $drive + "PSarchive" #Check if folder exists. if (!(Test-Path $newFolder)) { New-Item -path ($drive) -name PSarchive -type directory | Out-Null } (Get-ChildItem $folder -filter "*.$types") | foreach { $checkFile = Join-Path ($drive + 'PSArchive') $_ if (Test-path $checkFile) { $lwtHdd = $_.LastWriteTime #HDD time last written. $lwtUsb = (Get-Item $checkFile).LastWriteTime if ($lwtHdd -gt $lwtUsb) { Write-Debug "(HDD) $lwtHdd (USB) $LwtUsb $_" copyFile $_ } } else { #New file, so archive it anyway. Write-Debug "(HDD) $($_.LastWriteTime) (USB Archiving new file) $_" copyFile $_ } } $print = "Backup to USB drive [{0}] (Volume = {2}) completed; {1} files copied." -f $drive, $SCRIPT:files, $vol Write-Host "--> $print" } if ($drive -eq '-<BLANK>-') { [System.Media.SystemSounds]::Asterisk.Play() Write-Warning "No USB drive detected - Insert a device and resubmit." }
combined_dataset/train/non-malicious/1945.ps1
1945.ps1
Describe "Export-FormatData" -Tags "CI" { BeforeAll { $fd = Get-FormatData $testOutput = Join-Path -Path $TestDrive -ChildPath "outputfile" } AfterEach { Remove-Item $testOutput -Force -ErrorAction SilentlyContinue } It "Can export all types" { try { $fd | Export-FormatData -path $TESTDRIVE\allformat.ps1xml -IncludeScriptBlock $sessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault() $sessionState.Formats.Clear() $sessionState.Types.Clear() $runspace = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspace($sessionState) $runspace.Open() $runspace.CreatePipeline("Update-FormatData -AppendPath $TESTDRIVE\allformat.ps1xml").Invoke() $actualAllFormat = $runspace.CreatePipeline("Get-FormatData -TypeName *").Invoke() $fd.Count | Should -Be $actualAllFormat.Count Compare-Object $fd $actualAllFormat | Should -Be $null } finally { $runspace.Close() Remove-Item -Path $TESTDRIVE\allformat.ps1xml -Force -ErrorAction SilentlyContinue } } It "Works with literal path" { $filename = 'TestDrive:\[formats.ps1xml' $fd | Export-FormatData -LiteralPath $filename (Test-Path -LiteralPath $filename) | Should -BeTrue } It "Should overwrite the destination file" { $filename = 'TestDrive:\ExportFormatDataWithForce.ps1xml' $unexpected = "SHOULD BE OVERWRITTEN" $unexpected | Out-File -FilePath $filename -Force $file = Get-Item $filename $file.IsReadOnly = $true $fd | Export-FormatData -Path $filename -Force $actual = @(Get-Content $filename)[0] $actual | Should -Not -Be $unexpected } It "should not overwrite the destination file with NoClobber" { $filename = "TestDrive:\ExportFormatDataWithNoClobber.ps1xml" $fd | Export-FormatData -LiteralPath $filename { $fd | Export-FormatData -LiteralPath $filename -NoClobber } | Should -Throw -ErrorId 'NoClobber,Microsoft.PowerShell.Commands.ExportFormatDataCommand' } It "Test basic functionality" { Export-FormatData -InputObject $fd[0] -Path $testOutput $content = Get-Content $testOutput -Raw $formatViewDefinition = $fd[0].FormatViewDefinition $typeName = $fd[0].TypeName $content.Contains($typeName) | Should -BeTrue for ($i = 0; $i -lt $formatViewDefinition.Count;$i++) { $content.Contains($formatViewDefinition[$i].Name) | Should -BeTrue } } It "Should have a valid xml tag at the start of the file" { $fd | Export-FormatData -Path $testOutput $piped = Get-Content $testOutput -Raw $piped[0] | Should -BeExactly "<" } It "Should pretty print xml output" { $xmlContent=@" <Configuration> <ViewDefinitions> <View> <Name>ExportFormatDataName</Name> <ViewSelectedBy> <TypeName>ExportFormatDataTypeName</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders /> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Guid</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> "@ $expected = @" <?xml version="1.0" encoding="utf-8"?> <Configuration> <ViewDefinitions> <View> <Name>ExportFormatDataName</Name> <ViewSelectedBy> <TypeName>ExportFormatDataTypeName</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders /> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Guid</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> "@ -replace "`r`n?|`n", "" try { $testfilename = [guid]::NewGuid().ToString('N') $testfile = Join-Path -Path $TestDrive -ChildPath "$testfilename.ps1xml" Set-Content -Path $testfile -Value $xmlContent $sessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault() $sessionState.Formats.Clear() $sessionState.Types.Clear() $runspace = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspace($sessionState) $runspace.Open() $runspace.CreatePipeline("Update-FormatData -prependPath $testfile").Invoke() $runspace.CreatePipeline("Get-FormatData -TypeName 'ExportFormatDataTypeName' | Export-FormatData -Path $testOutput").Invoke() $content = (Get-Content $testOutput -Raw) -replace "`r`n?|`n", "" $content | Should -BeExactly $expected } finally { $runspace.Close() } } }
combined_dataset/train/non-malicious/sample_57_87.ps1
sample_57_87.ps1
# # Module manifest for module 'OCI.PSModules.Cloudguard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll' # Version number of this module. ModuleVersion = '83.3.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '416303ec-c9d6-4a65-8413-14973e520be8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudguard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardAdhocQueriesList', 'Get-OCICloudguardAdhocQuery', 'Get-OCICloudguardAdhocQueryResultContent', 'Get-OCICloudguardAdhocQueryResultsList', 'Get-OCICloudguardConditionMetadataType', 'Get-OCICloudguardConditionMetadataTypesList', 'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule', 'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource', 'Get-OCICloudguardDataSourceEventsList', 'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector', 'Get-OCICloudguardDetectorRecipe', 'Get-OCICloudguardDetectorRecipeDetectorRule', 'Get-OCICloudguardDetectorRecipeDetectorRulesList', 'Get-OCICloudguardDetectorRecipesList', 'Get-OCICloudguardDetectorRule', 'Get-OCICloudguardDetectorRulesList', 'Get-OCICloudguardDetectorsList', 'Get-OCICloudguardImpactedResourcesList', 'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList', 'Get-OCICloudguardManagedListTypesList', 'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem', 'Get-OCICloudguardProblemEndpointsList', 'Get-OCICloudguardProblemEntitiesList', 'Get-OCICloudguardProblemHistoriesList', 'Get-OCICloudguardProblemsList', 'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResource', 'Get-OCICloudguardResourcePortsList', 'Get-OCICloudguardResourceProfile', 'Get-OCICloudguardResourceProfileEndpointsList', 'Get-OCICloudguardResourceProfileImpactedResourcesList', 'Get-OCICloudguardResourceProfilesList', 'Get-OCICloudguardResourcesList', 'Get-OCICloudguardResourceTypesList', 'Get-OCICloudguardResourceVulnerabilitiesList', 'Get-OCICloudguardResourceVulnerability', 'Get-OCICloudguardResponderActivitiesList', 'Get-OCICloudguardResponderExecution', 'Get-OCICloudguardResponderExecutionsList', 'Get-OCICloudguardResponderRecipe', 'Get-OCICloudguardResponderRecipeResponderRule', 'Get-OCICloudguardResponderRecipeResponderRulesList', 'Get-OCICloudguardResponderRecipesList', 'Get-OCICloudguardResponderRule', 'Get-OCICloudguardResponderRulesList', 'Get-OCICloudguardSavedQueriesList', 'Get-OCICloudguardSavedQuery', 'Get-OCICloudguardSecurityPoliciesList', 'Get-OCICloudguardSecurityPolicy', 'Get-OCICloudguardSecurityRecipe', 'Get-OCICloudguardSecurityRecipesList', 'Get-OCICloudguardSecurityZone', 'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting', 'Get-OCICloudguardSightingEndpointsList', 'Get-OCICloudguardSightingImpactedResourcesList', 'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList', 'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe', 'Get-OCICloudguardTargetDetectorRecipeDetectorRule', 'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList', 'Get-OCICloudguardTargetDetectorRecipesList', 'Get-OCICloudguardTargetResponderRecipe', 'Get-OCICloudguardTargetResponderRecipeResponderRule', 'Get-OCICloudguardTargetResponderRecipeResponderRulesList', 'Get-OCICloudguardTargetResponderRecipesList', 'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList', 'Get-OCICloudguardWlpAgent', 'Get-OCICloudguardWlpAgentsList', 'Get-OCICloudguardWorkRequest', 'Get-OCICloudguardWorkRequestErrorsList', 'Get-OCICloudguardWorkRequestLogsList', 'Get-OCICloudguardWorkRequestsList', 'Invoke-OCICloudguardExecuteResponderExecution', 'Invoke-OCICloudguardRequestRiskScores', 'Invoke-OCICloudguardRequestSecurityScores', 'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend', 'Invoke-OCICloudguardRequestSummarizedActivityProblems', 'Invoke-OCICloudguardRequestSummarizedProblems', 'Invoke-OCICloudguardRequestSummarizedResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedRiskScores', 'Invoke-OCICloudguardRequestSummarizedSecurityScores', 'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendProblems', 'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores', 'Invoke-OCICloudguardSkipBulkResponderExecution', 'Invoke-OCICloudguardSkipResponderExecution', 'Invoke-OCICloudguardTriggerResponder', 'Move-OCICloudguardDataSourceCompartment', 'Move-OCICloudguardDetectorRecipeCompartment', 'Move-OCICloudguardManagedListCompartment', 'Move-OCICloudguardResponderRecipeCompartment', 'Move-OCICloudguardSavedQueryCompartment', 'Move-OCICloudguardSecurityRecipeCompartment', 'Move-OCICloudguardSecurityZoneCompartment', 'New-OCICloudguardAdhocQuery', 'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe', 'New-OCICloudguardDetectorRecipeDetectorRule', 'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe', 'New-OCICloudguardSavedQuery', 'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe', 'New-OCICloudguardTargetResponderRecipe', 'New-OCICloudguardWlpAgent', 'Remove-OCICloudguardAdhocQuery', 'Remove-OCICloudguardCompartment', 'Remove-OCICloudguardDataMaskRule', 'Remove-OCICloudguardDataSource', 'Remove-OCICloudguardDetectorRecipe', 'Remove-OCICloudguardDetectorRecipeDetectorRule', 'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource', 'Remove-OCICloudguardManagedList', 'Remove-OCICloudguardResponderRecipe', 'Remove-OCICloudguardSavedQuery', 'Remove-OCICloudguardSecurityRecipe', 'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget', 'Remove-OCICloudguardTargetDetectorRecipe', 'Remove-OCICloudguardTargetResponderRecipe', 'Remove-OCICloudguardWlpAgent', 'Stop-OCICloudguardWorkRequest', 'Update-OCICloudguardBulkProblemStatus', 'Update-OCICloudguardConfiguration', 'Update-OCICloudguardDataMaskRule', 'Update-OCICloudguardDataSource', 'Update-OCICloudguardDetectorRecipe', 'Update-OCICloudguardDetectorRecipeDetectorRule', 'Update-OCICloudguardManagedList', 'Update-OCICloudguardProblemStatus', 'Update-OCICloudguardResponderRecipe', 'Update-OCICloudguardResponderRecipeResponderRule', 'Update-OCICloudguardSavedQuery', 'Update-OCICloudguardSecurityRecipe', 'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget', 'Update-OCICloudguardTargetDetectorRecipe', 'Update-OCICloudguardTargetDetectorRecipeDetectorRule', 'Update-OCICloudguardTargetResponderRecipe', 'Update-OCICloudguardTargetResponderRecipeResponderRule', 'Update-OCICloudguardWlpAgent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2521.ps1
2521.ps1
Param( $Clients = "" , $TableName = "" , $DropIndexStatement = "" , $IndexName = "" ) $UnusedIndexesQuery = "sel_SQLIndexesUnusedByDatabase" function Run-Query() { param ( $SqlQuery, $SqlServer, $SqlCatalog ) $SqlConnection = New-Object System.Data.SqlClient.SqlConnection("Data Source=$SqlServer;Integrated Security=SSPI;Initial Catalog=$SqlCatalog;"); $SqlCmd = New-Object System.Data.SqlClient.SqlCommand $sqlCmd.CommandTimeout = "300" $SqlCmd.CommandText = $SqlQuery $SqlCmd.Connection = $SqlConnection $SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $SqlAdapter.SelectCommand = $SqlCmd $DataSet = New-Object System.Data.DataSet $a = $SqlAdapter.Fill($DataSet) $SqlConnection.Close() $DataSet.Tables | Select-Object -ExpandProperty Rows } $indexes = Run-Query -SqlQuery $UnusedIndexesQuery -SqlServer XSQLUTIL18 -SqlCatalog Status $SpreadSheet = ("E:\Dexma\logs\IndexesUnused-" + (Get-Date -Format ddMMyyyy) + ".xlsx") $TempCSV = ($env:TEMP + "\" + ([System.GUID]::NewGuid()).ToString() + ".csv") $indexes | Export-Csv -Path $TempCSV -NoTypeInformation if (Test-Path -Path $SpreadSheet) { Remove-Item -Path $SpreadSheet } $erroractionpreference = "SilentlyContinue" $OutBook = New-Object -comobject Excel.Application $OutBook.visible = $False $Workbook = $OutBook.Workbooks.Open($TempCSV) $Workbook.Title = ("Unused Indexes reported by SQL Server DMVs" + (Get-Date -Format D)) $Workbook.Author = "Michael J. Messano" $Worksheet = $Workbook.Worksheets.Item(1) $List = $Worksheet.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $Worksheet.UsedRange, $null, [Microsoft.Office.Interop.Excel.X1YesNoGuess]::xlYes, $null) $List.Name = "Item Table" $LastRow = ($worksheet.UsedRange.Rows.Count + 1) for ( $i = 2; $i -lt $LastRow; $i++) { $Worksheet.Cells.item($i,4) = "=SUM(RC[1]" + ':' + "RC[" + ($worksheet.UsedRange.Columns.Count - 4) + "])" } $order = [Microsoft.Office.Interop.Excel.XlSortOrder]::xlDescending $xlDescending = 2 $hasHead = [Microsoft.Office.Interop.Excel.XlYesNoGuess]::xlYes $range = $worksheet.UsedRange $sortcolumn = $worksheet.Columns.Item(4) $range.Sort($sortcolumn, $xlDescending) $LastColumn = ($worksheet.UsedRange.Columns.Count + 1 ) for ( $i = 1; $i -lt $LastColumn; $i++) { $Worksheet.Cells.item(1,$i).Interior.ColorIndex = 15 $Worksheet.Cells.item(1,$i).Font.ColorIndex = 5 $Worksheet.Cells.item(1,$i).Font.Bold = $True if ($i -gt 3) { $Worksheet.Cells.item(1,$i).Orientation = 90 } } $Worksheet.UsedRange.EntireColumn.Autofit() | Out-Null $Worksheet.Name = "Unused Indexes" $Workbook.SaveAs($SpreadSheet, 51) $Workbook.Saved = $true $Workbook.Close() [System.Runtime.InteropServices.Marshal]::ReleaseComObject($Workbook) | Out-Null $SpreadSheet.Quit() [System.Runtime.InteropServices.Marshal]::ReleaseComObject($SpreadSheet) | Out-Null [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() if (Test-Path -Path $TempCSV) { Remove-Item -Path $TempCSV }
combined_dataset/train/non-malicious/3348.ps1
3348.ps1
function About { [PoshBot.BotCommand( Permissions = 'view' )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot ) $path = "$PSScriptRoot/../../../PoshBot.psd1" $manifest = Import-PowerShellDataFile -Path $path $ver = $manifest.ModuleVersion $msg = @" PoshBot v$ver $($manifest.CopyRight) https://github.com/poshbotio/PoshBot "@ New-PoshBotTextResponse -Text $msg -AsCode }
combined_dataset/train/non-malicious/Get-AclMisconfiguration..ps1
Get-AclMisconfiguration..ps1
##############################################################################\n##\n## Get-AclMisconfiguration\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nDemonstration of functionality exposed by the Get-Acl cmdlet. This script\ngoes through all access rules in all files in the current directory, and\nensures that the Administrator group has full control of that file.\n\n#>\n\nSet-StrictMode -Version Latest\n\n## Get all files in the current directory\nforeach($file in Get-ChildItem)\n{\n ## Retrieve the ACL from the current file\n $acl = Get-Acl $file\n if(-not $acl)\n {\n continue\n }\n\n $foundAdministratorAcl = $false\n\n ## Go through each access rule in that ACL\n foreach($accessRule in $acl.Access)\n {\n ## If we find the Administrator, Full Control access rule,\n ## then set the $foundAdministratorAcl variable\n if(($accessRule.IdentityReference -like "*Administrator*") -and\n ($accessRule.FileSystemRights -eq "FullControl"))\n {\n $foundAdministratorAcl = $true\n }\n }\n\n ## If we didn't find the administrator ACL, output a message\n if(-not $foundAdministratorAcl)\n {\n "Found possible ACL Misconfiguration: $file"\n }\n}
combined_dataset/train/non-malicious/sample_43_10.ps1
sample_43_10.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\sucrase@3.35.0\node_modules\sucrase\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\sucrase@3.35.0\node_modules\sucrase\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\sucrase@3.35.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/sucrase@3.35.0/node_modules/sucrase/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/sucrase@3.35.0/node_modules/sucrase/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/sucrase@3.35.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../sucrase/bin/sucrase-node" $args } else { & "$basedir/node$exe" "$basedir/../sucrase/bin/sucrase-node" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../sucrase/bin/sucrase-node" $args } else { & "node$exe" "$basedir/../sucrase/bin/sucrase-node" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/sample_37_7.ps1
sample_37_7.ps1
@{ GUID="eb74e8da-9ae2-482a-a648-e96550fb8733" Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="© Microsoft Corporation. All rights reserved." Description='PowerShell module for working with ZIP archives.' ModuleVersion="1.2.5" PowerShellVersion="3.0" FunctionsToExport = @('Compress-Archive', 'Expand-Archive') DotNetFrameworkVersion = 4.5 CmdletsToExport = @() AliasesToExport = @() NestedModules="Microsoft.PowerShell.Archive.psm1" HelpInfoURI = 'https://go.microsoft.com/fwlink/?LinkId=2113631' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAgseQYNytK1g1h # 9FUbgEFrpyXsmaTUaHw3dw1AixKKnKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKKSPNdOG9BJ1RGJnxRzOOll # q/tUtoNT6PVdCCM/RNHyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAseIPlAIg9qkotyIdxvNJrmc0b3N/nyvM7gQZFEw2zPsKAFzkQqSY6IDF # g+WTgTAOgddmbnBbq/bj0b39dDPKjCGFOsyhCmg8z1k64y0xBRYi/8Gt0bCu78jv # zhGSPy0EoRBezCnJVAgA7su9AyZrOMsgkq8MSg57+JapOTqe6Nw2uooxNLAzYkS2 # KbFLShdyWimRNW3Q+fTFUWeHU1eN1r2pfkREpm/4DjB2CayOxUQyt3AgVA05ZNVI # h9QOPWQVPVfANLMKFwfZYWTfERBbgTwm4FpwhpdGoE5sGrqbl7EMtOmqnRpzskur # 25F8QIxgo0EPuyKyi8VCak9uhkQ0RKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBPbAWVTZ4DRJ6rs9t6SuPigd3eB/F9EaEKo5pj/uz4dAIGZbqfZ73C # GBMyMDI0MDIxNDIxMDAyOC4yMjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl3kJMwIhgPMjAyNDAyMTUwMzE4NDNaGA8yMDI0MDIxNjAzMTg0M1owdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XeQkwIBADAKAgEAAgICsgIB/zAHAgEAAgISVDAK # AgUA6XjiEwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABYIlfTD6DvNgZdf # NbQtUqWNr0qC08R6BMCkSGgggx8ePLM7APkzZmeHhPYzrpniefTFS1U4/hVJm3kD # YEAx7M6OQ9L5TcnXJ9DdefXYD7A4GvVOmGoajCpKAXU9gyxvsxRX4BnlXPJDjXEq # 6U/sr3rAWmM2VjGeMma9CTy6czjpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgAmFBZvEN0koyADoYUeIs+MzMOYOL/scdm5TH5vuGY4YwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIKaaEoOXEjjHeAD99MmoMlDVtIg/PdqddyY0aIfg # 87njMA0GCSqGSIb3DQEBCwUABIICAIcquqjPvlL2h/9gTut49qv7XUcYkIn1Fp0e # K1E5Vh1zl/EhvTv+G4S/DquasWgCPOZBbg2flx8dAxNuSUcx8gKEryhfN6hGCD/Q # nY1nvnOzCu0+3jldZPPLQvDFE9gqVf87hBg4R3f7DpQN3G1zSugqM4R6nSqFfCoq # l9UiOhERiQ7CMNL7bF6p1Uzef7x8jJYMQk2TOlhOrnATgHhbdVwgqXdksVsTi1XB # PF1DfRgf2NLlDhkLswdHakSlNa7otet+lUODLXKH3z7PUjudlOTXv5wPXT9ZyfB1 # gyd4UI9TriGxUqMv/YRL+U6eYaRyMjNp/D3Xy6moOT3WhK5t5TCecAuRK34IX/bm # ZWZPtR5u2Ng7w8rJ8KGQYDt1YRmprBHwD1dQjgPTTybqjcHxIUvOk45KRbq/qQgJ # PtX9aIWTcDdaArplFkwglsF9hoLqpNpFHbxY2WnV3X79tlyetXQlUWso9hEMeOvM # 80rDYKf4v8SZDPTCeyNTKkufpL66Hs+n2JuDVCxZpkNIQjUxHMr5W7yO/BT0saEH # bYVugi5Q2nuGtD3yPkMES1KazI/3GoS+5HE2qGUwy5sv4Ax87wySDZWMdZkj+X2Y # ihIVoVVBExoYUIovFvhsFUKLEciTtA9LbeFaR6AxQeGWUiJUPepsmS/WN3YwZOIv # IXkD6/fN # SIG # End signature block
combined_dataset/train/non-malicious/2563.ps1
2563.ps1
Function Get-LocalDomainController($objectDomain) { return ([System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite()).Servers | Where-Object { $_.Domain.Name -eq $objectDomain } | ForEach-Object { $_.Name } | Select-Object -first 1 } Function Get-ObjectADDomain($distinguishedName) { return ((($distinguishedName -replace "(.*?)DC=(.*)",'$2') -replace "DC=","") -replace ",",".") } Function Get-ActiveDirectoryObject($distinguishedName) { return [ADSI]("LDAP://" + (Get-LocalDomainController (Get-ObjectADDomain $distinguishedName)) + "/" + ($distinguishedName -replace "/","\/")) } Function Get-CarrierNetwork($carrier) { if($carrier -eq "100") { $network = "T-Mobile US" } elseif($carrier -eq "101") { $network = "Cingular Wireless" } elseif($carrier -eq "102") { $network = "AT&T Wireless" } elseif($carrier -eq "103") { $network = "Nextel" } elseif($carrier -eq "104") { $network = "Sprint PCS" } elseif($carrier -eq "105") { $network = "Verizon Wireless" } elseif($carrier -eq "106") { $network = "Alltel" } elseif($carrier -eq "107") { $network = "Rogers AT&T" } elseif($carrier -eq "108") { $network = "Microcell" } elseif($carrier -eq "109") { $network = "Bell Mobility" } elseif($carrier -eq "110") { $network = "BT Cellnet" } elseif($carrier -eq "111") { $network = "O2 Germany" } elseif($carrier -eq "112") { $network = "Digifone" } elseif($carrier -eq "113") { $network = "Telfort" } elseif($carrier -eq "114") { $network = "T-Mobile Germany Austria" } elseif($carrier -eq "115") { $network = "Tim Italy" } elseif($carrier -eq "116") { $network = "Hutchison" } elseif($carrier -eq "117") { $network = "Bouygues Telecom" } elseif($carrier -eq "118") { $network = "Vodafone SFR France" } elseif($carrier -eq "119") { $network = "Orange France" } elseif($carrier -eq "120") { $network = "Vodafone UK Netherlands" } elseif($carrier -eq "121") { $network = "Telcel Mexico" } elseif($carrier -eq "122") { $network = "Telstra" } elseif($carrier -eq "123") { $network = "T-Mobile UK" } elseif($carrier -eq "124") { $network = "Vodafone Germany" } elseif($carrier -eq "125") { $network = "O2 UK Ireland Isle Of Man Netherlands" } elseif($carrier -eq "126") { $network = "Telus" } elseif($carrier -eq "127") { $network = "Smart" } elseif($carrier -eq "128") { $network = "Starhub" } elseif($carrier -eq "129") { $network = "Telefonica Spain" } elseif($carrier -eq "130") { $network = "Vodafone Switzerland Swisscom" } elseif($carrier -eq "131") { $network = "Cable Wireless West Indies" } elseif($carrier -eq "132") { $network = "Vodafone Italy" } elseif($carrier -eq "133") { $network = "Vodafone Spain" } elseif($carrier -eq "134") { $network = "T-Mobile Netherlands" } elseif($carrier -eq "135") { $network = "Cincinnati Bell" } elseif($carrier -eq "136") { $network = "Telefonica Mexico" } elseif($carrier -eq "137") { $network = "Vodafone Austria" } elseif($carrier -eq "138") { $network = "Vodafone Australia Fiji" } elseif($carrier -eq "139") { $network = "Vodafone Ireland" } elseif($carrier -eq "140") { $network = "Telenor Sweden" } elseif($carrier -eq "141") { $network = "CSL" } elseif($carrier -eq "142") { $network = "Orange UK" } elseif($carrier -eq "143") { $network = "Vodafone New Zealand" } elseif($carrier -eq "144") { $network = "Singtel" } elseif($carrier -eq "145") { $network = "Globe" } elseif($carrier -eq "146") { $network = "Optus" } elseif($carrier -eq "147") { $network = "Orange Be Mobistar" } elseif($carrier -eq "148") { $network = "Vodafone Hungary" } elseif($carrier -eq "149") { $network = "Bharti" } elseif($carrier -eq "150") { $network = "KPN NL" } elseif($carrier -eq "151") { $network = "Wind Hellas Tim Greece" } elseif($carrier -eq "152") { $network = "Vodafone Belgium" } elseif($carrier -eq "153") { $network = "Vodafone Portugal" } elseif($carrier -eq "154") { $network = "Tim Brazil" } elseif($carrier -eq "155") { $network = "BT-Mobile" } elseif($carrier -eq "156") { $network = "Earthlink" } elseif($carrier -eq "157") { $network = "Aether" } elseif($carrier -eq "158") { $network = "E Plus" } elseif($carrier -eq "159") { $network = "Base" } elseif($carrier -eq "160") { $network = "Dobson Communications" } elseif($carrier -eq "161") { $network = "Vodafone Egypt" } elseif($carrier -eq "162") { $network = "Orange Switzerland" } elseif($carrier -eq "163") { $network = "Rim Wlan" } elseif($carrier -eq "164") { $network = "T-Mobile Suncom" } elseif($carrier -eq "165") { $network = "Maxis" } elseif($carrier -eq "166") { $network = "Vodafone Denmark TDC" } elseif($carrier -eq "167") { $network = "Vodafone Singapore M1" } elseif($carrier -eq "168") { $network = "Vodacom South Africa" } elseif($carrier -eq "169") { $network = "T-Mobile Poland" } elseif($carrier -eq "170") { $network = "T-Mobile Czech" } elseif($carrier -eq "171") { $network = "T-Mobile Hungary" } elseif($carrier -eq "172") { $network = "AT&T Sprint" } elseif($carrier -eq "173") { $network = "Mtn South Africa" } elseif($carrier -eq "174") { $network = "Tim Chile Entel PCS" } elseif($carrier -eq "175") { $network = "Orange Spain" } elseif($carrier -eq "176") { $network = "Vodafone Smartone Hong Kong" } elseif($carrier -eq "177") { $network = "TCS Telecommunication Systems" } elseif($carrier -eq "178") { $network = "Avea" } elseif($carrier -eq "179") { $network = "Fast 100" } elseif($carrier -eq "180") { $network = "Turkcell" } elseif($carrier -eq "181") { $network = "Partner Communications" } elseif($carrier -eq "183") { $network = "Orange Romania" } elseif($carrier -eq "186") { $network = "Telkomsel" } elseif($carrier -eq "188") { $network = "Vodafone Greece" } elseif($carrier -eq "189") { $network = "United States Cellular Corp" } elseif($carrier -eq "190") { $network = "Mobilink" } elseif($carrier -eq "191") { $network = "Velocita Wireless" } elseif($carrier -eq "192") { $network = "Vodafone Croatia" } elseif($carrier -eq "193") { $network = "Vodafone Slovenia" } elseif($carrier -eq "194") { $network = "Vodafone Luxembourg" } elseif($carrier -eq "195") { $network = "Vodafone Iceland" } elseif($carrier -eq "196") { $network = "Vodafone Fiji" } elseif($carrier -eq "197") { $network = "Vodafone Romania" } elseif($carrier -eq "198") { $network = "Vodafone Czech" } elseif($carrier -eq "199") { $network = "Vodafone Bahrain" } elseif($carrier -eq "200") { $network = "Vodafone Kuwait" } elseif($carrier -eq "201") { $network = "T-Mobile Croatia" } elseif($carrier -eq "202") { $network = "T-Mobile Slovakia" } elseif($carrier -eq "203") { $network = "Nortel" } elseif($carrier -eq "204") { $network = "China Mobile" } elseif($carrier -eq "205") { $network = "Movilnet" } elseif($carrier -eq "209") { $network = "Sympac" } elseif($carrier -eq "210") { $network = "Personal Argentina" } elseif($carrier -eq "212") { $network = "Etisalat UAE" } elseif($carrier -eq "213") { $network = "Cbeyond" } elseif($carrier -eq "214") { $network = "AMX" } elseif($carrier -eq "215") { $network = "Telefonica Venezuela" } elseif($carrier -eq "216") { $network = "Telefonica Brazil" } elseif($carrier -eq "217") { $network = "Orange Romania" } elseif($carrier -eq "218") { $network = "Ktpowertel Korea" } elseif($carrier -eq "219") { $network = "Rolling Stones" } elseif($carrier -eq "220") { $network = "Docomo" } elseif($carrier -eq "222") { $network = "Vodafone Bulgaria" } elseif($carrier -eq "223") { $network = "Nextel International" } elseif($carrier -eq "224") { $network = "PCCW Sunday" } elseif($carrier -eq "225") { $network = "Hawaiian Telcom Credo Mobile" } elseif($carrier -eq "226") { $network = "Verizon Mvno" } elseif($carrier -eq "227") { $network = "Mobily" } elseif($carrier -eq "228") { $network = "BWA" } elseif($carrier -eq "229") { $network = "O2 Czech Republic" } elseif($carrier -eq "230") { $network = "Hutchison India" } elseif($carrier -eq "231") { $network = "Celcom" } elseif($carrier -eq "234") { $network = "Dialog" } elseif($carrier -eq "235") { $network = "XL" } elseif($carrier -eq "236") { $network = "Reliance" } elseif($carrier -eq "237") { $network = "Verizon Wireless Wholesale" } elseif($carrier -eq "238") { $network = "Vodafone Turkey" } elseif($carrier -eq "239") { $network = "Telefonica Morocco Meditel" } elseif($carrier -eq "240") { $network = "Indosat" } elseif($carrier -eq "241") { $network = "Alcatel Shanghai Bell" } elseif($carrier -eq "245") { $network = "3 UK Italy Sweden Denmark Austria Ireland" } elseif($carrier -eq "247") { $network = "Vodafone Essar" } elseif($carrier -eq "248") { $network = "Centennial Wireless" } elseif($carrier -eq "250") { $network = "T-Mobile Austria" } elseif($carrier -eq "254") { $network = "OI Brazil" } elseif($carrier -eq "255") { $network = "Telecom New Zealand" } elseif($carrier -eq "258") { $network = "Hutchinson 3G Australia" } elseif($carrier -eq "259") { $network = "Cable & Wireless Trinidad Tobago" } elseif($carrier -eq "268") { $network = "Bmobile" } elseif($carrier -eq "269") { $network = "Tata Teleservices India" } elseif($carrier -eq "271") { $network = "T-Mobile Croatia" } elseif($carrier -eq "273") { $network = "BT Italy" } elseif($carrier -eq "274") { $network = "1&1" } elseif($carrier -eq "277") { $network = "MTS Mobility" } elseif($carrier -eq "278") { $network = "Virgin Mobile" } elseif($carrier -eq "280") { $network = "Orange Slovakia" } elseif($carrier -eq "282") { $network = "Taiwan Mobile" } elseif($carrier -eq "285") { $network = "Orange Austria" } elseif($carrier -eq "286") { $network = "Vodafone Malta" } elseif($carrier -eq "288") { $network = "Base Jim Mobile" } elseif($carrier -eq "295") { $network = "CMCC Peoples" } elseif($carrier -eq "298") { $network = "Digitel Wireless" } elseif($carrier -eq "299") { $network = "SK Telecom" } elseif($carrier -eq "300") { $network = "Solo Mobile" } elseif($carrier -eq "301") { $network = "Carphone Warehouse" } elseif($carrier -eq "302") { $network = "20:20 Mobile Group" } elseif($carrier -eq "308") { $network = "XL Indonesia" } elseif($carrier -eq "309") { $network = "Fido Solutions" } elseif($carrier -eq "310") { $network = "Wind Italy" } return $network } Set-Variable forestRootDn -option Constant -value ([ADSI]("LDAP://" + (([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).name) + "/rootDSE")).defaultNamingContext Set-Variable sqlServers -option Constant -value @("east-coast-sql.usa.ad.mydomain.local","west-coast-sql.usa.ad.mydomain.local","remote-bes-server.japan.ad.mydomain.local") $blackberryUsers = @() $objectConnection = New-Object -comObject "ADODB.Connection" $objectCommand = New-Object -comObject "ADODB.Command" $objectConnection.Open("Provider=ADsDSOObject;") $objectCommand.ActiveConnection = $objectConnection $ldapBase = "GC://$forestRootDn" $ldapAttr = "distinguishedName,sAMAccountName,givenName,sn,homeMDB,telephoneNumber,streetAddress,l,st,postalCode,c" $ldapScope = "subtree" foreach($sqlServer in $sqlServers) { $sqlConnection = New-Object System.Data.SQLClient.SQLConnection $sqlConnection.ConnectionString = "server=$sqlServer;database=BESMgmt;trusted_connection=true;" $sqlConnection.Open() $sqlCommand = New-Object System.Data.SQLClient.SQLCommand $sqlCommand.Connection = $sqlConnection $sqlCommand.CommandText = "SELECT u.DisplayName as DisplayName, u.MailboxSMTPAddr as MailboxSMTPAddr, u.PIN as PIN, d.phonenumber as phonenumber, d.ModelName as ModelName, d.VendorID as VendorID, d.IMEI as IMEI, d.HomeNetwork as HomeNetwork, d.PasswordEnabled as PasswordEnabled, s.MachineName as MachineName FROM UserConfig u, SyncDeviceMgmtSummary d, ServerConfig s WHERE u.id = d.userconfigid and u.ServerConfigId = s.id" $sqlDataReader = $sqlCommand.ExecuteReader() if($sqlDataReader.HasRows -eq $true) { while($sqlDataReader.Read()) { $displayName = $sqlDataReader.Item("DisplayName") $proxyAddress = $sqlDataReader.Item("MailboxSMTPAddr") $pin = $sqlDataReader.Item("PIN") $phoneNumber = $sqlDataReader.Item("phonenumber") $modelName = $sqlDataReader.Item("ModelName") $vendorId = $sqlDataReader.Item("VendorID") $imei = $sqlDataReader.Item("IMEI") $homeNetwork = $sqlDataReader.Item("homeNetwork") $passwordEnabled = $sqlDataReader.Item("PasswordEnabled") $blackberryServer = $sqlDataReader.Item("MachineName") if($passwordEnabled -eq 1) { $passwordEnabled = $true } else { $passwordEnabled = $false } $phoneNumber = $phoneNumber -Replace "^\+","" if(($phoneNumber).length -eq 10) { $phoneNumber = ("(" + ($phoneNumber).SubString(0,3) + ") " + ($phoneNumber).SubString(3,3) + "-" + ($phoneNumber).SubString(6,4)) } if(($phoneNumber).length -eq 11 -and ($phoneNumber).SubString(0,1) -eq "1") { $phoneNumber = ("(" + ($phoneNumber).SubString(1,3) + ") " + ($phoneNumber).SubString(4,3) + "-" + ($phoneNumber).SubString(7,4)) } if($homeNetwork -eq "" -or $homeNetwork -cmatch "vodafone") { $homeNetwork = Get-CarrierNetwork $vendorId } $ldapFilter = ("(&(objectCategory=person)(objectClass=user)(proxyAddresses=smtp:$proxyAddress))") $ldapQuery = "<$ldapBase>;$ldapFilter;$ldapAttr;$ldapScope" $objectCommand.CommandText = $ldapQuery $objectRecordSet = $objectCommand.Execute() while(!$objectRecordSet.EOF) { $domain = ((Get-ObjectADDomain $objectRecordSet.Fields.Item('distinguishedName').Value).Split(".")[0]).ToUpper() $exchangeServer = ((((((Get-ActiveDirectoryObject $objectRecordSet.Fields.Item('homeMDB').Value).psbase.parent).psbase.parent).psbase.parent).networkAddress[4]).ToString() -replace "ncacn_ip_tcp:","").ToLower() $sAMAccountName = $objectRecordSet.Fields.Item('sAMAccountName').Value $firstName = $objectRecordSet.Fields.Item('givenName').Value $lastName = $objectRecordSet.Fields.Item('sn').Value $telephoneNumber = $objectRecordSet.Fields.Item('telephoneNumber').Value $streetAddress = ($objectRecordSet.Fields.Item('streetAddress').Value -replace "`r`n",", ") $city = $objectRecordSet.Fields.Item('l').Value $state = $objectRecordSet.Fields.Item('st').Value $zipCode = $objectRecordSet.Fields.Item('postalCode').Value $country = $objectRecordSet.Fields.Item('c').Value $objectRecordSet.MoveNext() } $blackberryUser = New-Object -typeName PSObject Add-Member -inputObject $blackberryUser -type NoteProperty -name "Domain" -value $domain Add-Member -inputObject $blackberryUser -type NoteProperty -name "User ID" -value $sAMAccountName Add-Member -inputObject $blackberryUser -type NoteProperty -name "First Name" -value $firstName Add-Member -inputObject $blackberryUser -type NoteProperty -name "Last Name" -value $firstName Add-Member -inputObject $blackberryUser -type NoteProperty -name "Display Name" -value $displayName Add-Member -inputObject $blackberryUser -type NoteProperty -name "E-Mail Address" -value $proxyAddress Add-Member -inputObject $blackberryUser -type NoteProperty -name "PIN" -value $pin Add-Member -inputObject $blackberryUser -type NoteProperty -name "Cell Phone Number" -value $phoneNumber Add-Member -inputObject $blackberryUser -type NoteProperty -name "Desk Phone Number" -value $telephoneNumber Add-Member -inputObject $blackberryUser -type NoteProperty -name "Street Address" -value $streetAddress Add-Member -inputObject $blackberryUser -type NoteProperty -name "City" -value $city Add-Member -inputObject $blackberryUser -type NoteProperty -name "State" -value $state Add-Member -inputObject $blackberryUser -type NoteProperty -name "Zip Code" -value $zipCode Add-Member -inputObject $blackberryUser -type NoteProperty -name "Country" -value $country Add-Member -inputObject $blackberryUser -type NoteProperty -name "BlackBerry Model" -value $modelName Add-Member -inputObject $blackberryUser -type NoteProperty -name "Carrier" -value $homeNetwork Add-Member -inputObject $blackberryUser -type NoteProperty -name "IMEI" -value $imei Add-Member -inputObject $blackberryUser -type NoteProperty -name "Password Enabled" -value $passwordEnabled Add-Member -inputObject $blackberryUser -type NoteProperty -name "Exchange Server" -value $exchangeServer Add-Member -inputObject $blackberryUser -type NoteProperty -name "BlackBerry Server" -value $blackberryServer $blackberryUsers += $blackberryUser } } else { Write-Warning "Unable to obtain BES data from $sqlServer" exit } } $blackberryUsers = $blackberryUsers | Sort-Object "BlackBerry Server", "Last Name", "First Name" $excelFile = ("\\fileserver.ad.mydomain.local\it_reports\blackberry\" + (Get-Date -format yyyyMMdd) + "-BlackBerry User Report.xlsx") $temporaryCsvFile = ($env:temp + "\" + ([System.Guid]::NewGuid()).ToString() + ".csv") $blackberryUsers | Export-Csv -path $temporaryCsvFile -noTypeInformation if(Test-Path -path $excelFile) { Remove-Item -path $excelFile } $excelObject = New-Object -comObject Excel.Application $excelObject.Visible = $false $workbookObject = $excelObject.Workbooks.Open($temporaryCsvFile) $workbookObject.Title = ("BlackBerry User List for " + (Get-Date -Format D)) $workbookObject.Author = "Robert M. Toups, Jr." $worksheetObject = $workbookObject.Worksheets.Item(1) $worksheetObject.UsedRange.Columns.Autofit() | Out-Null $worksheetObject.Name = "BlackBerry Users" $listObject = $worksheetObject.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $worksheetObject.UsedRange, $null,[Microsoft.Office.Interop.Excel.XlYesNoGuess]::xlYes,$null) $listObject.Name = "User Table" $listObject.TableStyle = "TableStyleMedium4" $workbookObject.SaveAs($excelFile,51) $workbookObject.Saved = $true $workbookObject.Close() [System.Runtime.Interopservices.Marshal]::ReleaseComObject($workbookObject) | Out-Null $excelObject.Quit() [System.Runtime.Interopservices.Marshal]::ReleaseComObject($excelObject) | Out-Null [System.GC]::Collect() [System.GC]::WaitForPendingFinalizers() if(Test-Path -path $temporaryCsvFile) { Remove-Item -path $temporaryCsvFile }
combined_dataset/train/non-malicious/Out-Balloon.ps1
Out-Balloon.ps1
<# .Synopsis Makes a baloon tip in the notification area .Description With just a few arguments, it is easy to make some text appear in a little balloon. You can specify an icon file (*.ico) with the -icon argument, if you don't then the embedded ! icon is used. It's blue. out-balloon accepts pipeline input, strings only please. It blocks for the duration of the balloon display, 3 seconds by default. Simple fixes for this are welcome. timeout should be an integer value. INSTALLATION: um, save this text in a file named out-balloon.ps1 in your path .Example out-balloon "hey, your job is done." -icon "C:\\Program Files\\Microsoft Office\\Office12\\MYSL.ICO" "job done." | out-balloon #> param( [Parameter(ValueFromPipeline=$true,Position=0,Mandatory=$true)] [Alias('output')] [string]$text, [string]$icon, [int32]$timeout = 3 ) begin { $not = new-object System.Windows.Forms.NotifyIcon if ($icon -eq $null) { #create icon object from embedded string $qmark_icon_string = ` "AAABAAEAgIAAAAEAIAAoCAEAFgAAACgAAACAAAAAAAEAAAEAIAAAAAAAAAgBAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAANHR0gfT09Qp1NTVOtXV1kbW1tdS19fYYNfX2G7X19h619fYetfX2G7W1tdg1dXW" + ` "UtTU1UbT09Q60dHSKdDQ0QcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0tLT" + ` "DNXV1j/Y2Nho29vbjd3d3bPf39/b4ODh/OLi4//j4+T/5OTl/+Xl5v/m5uf/5ubn/+bm5//m5u" + ` "f/5ubn/+Xl5v/k5OX/4+Pk/+Li4//g4OH/39/f/N3d3dvb29uz2NjYjdXV1mjS0tM/0NDRDAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANLS0wjW1t" + ` "dA2tragd7e3sPh4eL55OTl/+fn6P/p6er/7Ozt/+7u7//w8PD/8vLy//Pz8//09PT/9fX1//b2" + ` "9v/29vb/9vb2//b29v/29vb/9fX1//T09P/z8/P/8vLy//Dw8P/u7u//7Ozt/+np6v/n5+j/5O" + ` "Tl/+Hh4v/e3t752traw9bW14HS0tNAz8/QCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1NTVE9nZ" + ` "2Wrd3d274eHi9uXl5v/p6er/7e3u//Dw8P/z8/P/9vb2//n5+f/8/Pz//v7+//7+/v/+/v7//v" + ` "7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/8" + ` "/Pz/+fn5//b29v/z8/P/8PDw/+3t7v/p6er/5eXm/+Hh4v/d3d322dnZu9TU1WrPz9ATAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADS0tMH2N" + ` "jYUt3d3a/i4uP55+fo/+zs7f/w8PD/9PT0//j4+P/8/Pz//v7+//7+/v/+/v7//v7+//7+/v/+" + ` "/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//" + ` "7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//Pz8//j4+P/09PT/8PDw/+zs7f/n5+j/" + ` "4uLj/93d3fnY2Niv0tLTUs3NzgcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADV" + ` "1dYl29vbl+Dg4e7m5uf/7Ozt//Hx8f/29vb/+/v7//7+/v/+/v7//v7+//7+/v/+/v7//v7+//" + ` "7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + ` "/v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v" + ` "/+/v7/+/v7//b29v/x8fH/7Ozt/+bm5//g4OH/29vb7tXV1pfQ0NElAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAADW1tcs3d3dpePj5Pzp6er/7+/v//X19f/7+/v//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + ` "/v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v" + ` "/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+" + ` "//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/7+/v/9fX1/+/v7//p6er/4+Pk/93d3fzW1t" + ` "el0NDRLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAADW1tcz3t7ereTk5f3r6+z/8fHx//j4+P/+/v7//v7+//7+/v/+/v7//v7+//7+/v" + ` "/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/vz/+fPr" + ` "//Dk0f/p1rj/4sqk/92/kf/dv5H/4sqk/+nWuP/w5NH/+fPr//7+/P/+/v7//v7+//7+/v/+/v" + ` "7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//j4" + ` "+P/x8fH/6+vs/+Tk5f/e3t791tbXrdDQ0TMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAADV1dYf3d3druTk5f7r6+z/8vLy//n5+f/+/v7//v7+//7+/v/+/v7//v7+" + ` "//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//Ln1v/bvY7/yp5Z/76GMP+2dh" + ` "T/sm0D/7FsAP+ybQD/sm0A/7JtAP+ybQD/sm0A/7JtAP+ybQD/sm0A/7JtAP+xbAD/sWwA/7Jt" + ` "A/+1dhT/voYw/8qdWf/bvY7/8ufW//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v" + ` "7+//7+/v/+/v7//v7+//7+/v/5+fn/8vLy/+vr7P/k5OX/3d3d/tXV1q7Ozs8fAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAADT09QG29vbeuLi4/Xq6uv/8vLy//n5+f/+/v7//v7+//7+/v/+/v" + ` "7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/0697/1K93/72FL/+xbgf/sGwA/7Bs" + ` "AP+xbAD/sWwA/7JtAP+ybQD/sm0A/7JuAP+ybgD/sm4A/7JuAP+ybgD/sm4A/7JuAP+ybgD/sm" + ` "4A/7JtAP+ybQD/sm0A/7FsAP+xbAD/sGwA/7BsAP+vawD/sW4H/72EL//Trnf/9Ove//7+/v/+" + ` "/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/+fn5//Ly8v/q6uv/4uLj/9" + ` "vb2/XT09R6zMzNBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2NjYQ+Dg4dfo6On/8PDw//j4+P/+/v7//v7+//7+" + ` "/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+/+/iz//FlUv/sW8K/69qAP+vawD/r2" + ` "sA/7BsAP+xbAD/sWwA/7JtAP+ybQD/sm4A/7JuAP+ybgD/s24A/7NuAP+zbgD/s24A/7NuAP+z" + ` "bgD/s24A/7NuAP+zbgD/sm4A/7JuAP+ybgD/sm0A/7JtAP+xbAD/sWwA/7BsAP+vawD/r2sA/6" + ` "9qAP+uaQD/sW8K/8WVS//v4s///v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + ` "/v7+//j4+P/w8PD/6Ojp/+Dg4f/Y2NjX0NDRQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1NTVDt3d3aLk5OX/7e3u//b29v/+/v7//v" + ` "7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/+PPr/86mav+zdBT/rmkA/65pAP+v" + ` "agD/r2sA/7BsAP+wbAD/sWwA/7FsAP+ybQD/sm0A/7BsAP+wawD/r2oA/65oAP+taAD/rWgA/6" + ` "xnAP+sZwD/rGYA/6xmAP+sZwD/rGcA/61oAP+taAD/rmgA/69qAP+vawD/sGwA/7JsAP+xbAD/" + ` "sWwA/7BsAP+wbAD/r2sA/69qAP+uaQD/rmkA/61pAP+ycxT/zqZq//jz6//+/v7//v7+//7+/v" + ` "/+/v7//v7+//7+/v/+/v7//v7+//7+/v/29vb/7e3u/+Tk5f/d3d3/1NTVosvLzA4AAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANfX2DDg4OHa6enq//Ly8v/7" + ` "+/v//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/7+HN/7yFMv+saAD/rWkA/6" + ` "1pAP+uaQD/r2oA/69rAP+wbAD/sGwA/7BrAP+vagD/rWgA/6xmAP+rZgD/q2YA/6xnAP+sZwD/" + ` "rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6tmAP" + ` "+rZgD/q2YA/6xmAP+taAD/rmkA/69rAP+wbAD/r2sA/69qAP+uaQD/rWkA/61pAP+saAD/rGcA" + ` "/7uEMv/v4c3//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/7+/v/8vLy/+np6v/g4O" + ` "H/19fY2s/P0DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADb29to4+Pk9+" + ` "3t7v/29vb//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/69zE/7mAK/+sZwD/" + ` "rGgA/6xoAP+taQD/rmkA/69qAP+vawD/rmkA/61oAP+sZgD/q2YA/6xnAP+sZwD/rGcA/6xnAP" + ` "+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA" + ` "/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+rZgD/q2YA/6xmAP+taAD/rmkA/69qAP+uaQ" + ` "D/rWkA/6xoAP+saAD/rGcA/6pmAP+5gCv/69zE//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+" + ` "/v/+/v7/9vb2/+3t7v/j4+T/29vb99HR0moAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADT09QP" + ` "3d3dqubm5//w8PD/+vr6//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/7eDL/7Z6JP" + ` "+qZQD/q2YA/6xnAP+saAD/rWkA/65pAP+uaQD/rWgA/6tmAP+sZwD/rGcA/6xnAP+sZwD/rGcA" + ` "/6xnAP+sZwD/rGcA/6xnAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saA" + ` "D/rGgA/6xoAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xn" + ` "AP+rZgD/q2YA/61oAP+taAD/rWkA/6xoAP+sZwD/q2YA/6plAP+pZAD/tnok/+3gy//+/v7//v" + ` "7+//7+/v/+/v7//v7+//7+/v/+/v7/+vr6//Dw8P/m5uf/3d3d/9PT1KrKyssPAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAA1dXWHN/f4NTp6er/8/Pz//39/f/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//Pr3" + ` "/8OUTf+pZAD/qmUA/6pmAP+sZwD/rGgA/6xoAP+saAD/rGYA/6tmAP+sZwD/rGcA/6xnAP+sZw" + ` "D/rGcA/6xnAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xo" + ` "AP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rG" + ` "cA/6xnAP+sZwD/rGcA/6xnAP+sZwD/q2YA/6tmAP+rZgD/q2cA/6xoAP+sZwD/qmYA/6plAP+p" + ` "ZAD/qGQA/8OTTf/8+vf//v7+//7+/v/+/v7//v7+//7+/v/+/v7//f39//Pz8//p6er/39/g/9" + ` "XV1tTMzM0cAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAANfX2Cjh4eLh6+vs//X19f/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v" + ` "7//v7+/9q8kf+raAf/qGQA/6lkAP+qZQD/q2YA/6xnAP+sZwD/q2YA/6xnAP+sZwD/rGcA/6xn" + ` "AP+sZwD/rGcA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rWkA/61pAP+taQD/rW" + ` "kA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rGgA/6xoAP+s" + ` "aAD/rGgA/6xoAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+rZgD/q2YA/6" + ` "tmAP+rZgD/qmUA/6lkAP+oZAD/qGMA/6pnB//avJH//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + ` "/v7+//X19f/r6+z/4eHi/9fX2OHNzc4oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAADY2Ng34uLj7O3t7v/39/f//v7+//7+/v/+/v7//v7+//7+" + ` "/v/+/v7//v7+//jy6f+1eib/qGMA/6hkAP+pZAD/qmUA/6pmAP+rZgD/q2YA/6xnAP+sZwD/rG" + ` "cA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rWkA/61pAP+taQD/rWkA/61pAP+t" + ` "aQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/6" + ` "1pAP+taQD/rWkA/61pAP+taQD/rWkA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xnAP+sZwD/" + ` "rGcA/6xnAP+sZwD/q2YA/6tmAP+qZgD/qmUA/6lkAP+oZAD/qGMA/6diAP+0eib/+PLp//7+/v" + ` "/+/v7//v7+//7+/v/+/v7//v7+//f39//t7e7/4uLj/9jY2OzOzs83AAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2dnZSePj5PTu7u//+Pj4//7+/v/+/v7//v" + ` "7+//7+/v/+/v7//v7+//7+/v/kz7D/qWYG/6diAP+oYwD/qGQA/6lkAP+qZQD/q2YA/6xnAP+s" + ` "ZwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/6xoAP+taQD/rWkA/61pAP+taQD/rWkA/6" + ` "1pAP+taQD/rWkA/65pAP+uaQD/rmkA/65pAP+uaQD/rmkA/65pAP+uaQD/rmkA/65pAP+uaQD/" + ` "rmkA/65pAP+uaQD/rmkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rGgA/6xoAP" + ` "+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6tmAP+rZgD/qWQA/6hkAP+oYwD/p2IA" + ` "/6ZhAP+oZQb/5M+w//7+/v/+/v7//v7+//7+/v/+/v7//v7+//j4+P/u7u//4+Pk/9nZ2fTOzs" + ` "9JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANnZ2Unj4+T67u7v//n5+f/+" + ` "/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/x5td/6VgAP+mYQD/p2IA/6hjAP+oZAD/qmUA/6" + ` "tmAP+sZwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/61pAP+taQD/" + ` "rWkA/61pAP+uaQD/rmkA/65pAP+uaQD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP" + ` "+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/rmkA/65pAP+uaQD/rmkA/61pAP+taQD/rWkA" + ` "/61pAP+taQD/rWkA/61pAP+saAD/rGgA/6xoAP+saAD/rGcA/6xnAP+sZwD/rGcA/6tmAP+rZg" + ` "D/qWUA/6hjAP+nYgD/pmEA/6VgAP+kXwD/x5td//7+/v/+/v7//v7+//7+/v/+/v7//v7+//n5" + ` "+f/u7u//4+Pk/9nZ2frOzs9JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADY2Ng34+Pk9O" + ` "7u7//6+vr//v7+//7+/v/+/v7//v7+//7+/v/+/v7/+vbv/7J2If+lYAD/pmEA/6diAP+nYgD/" + ` "qWQA/6tmAP+sZwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/61pAP" + ` "+taQD/rmkA/65pAP+uaQD/rmkA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA" + ` "/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vag" + ` "D/rmkA/65pAP+uaQD/rmkA/61pAP+taQD/rWkA/61pAP+taQD/rGgA/6xoAP+saAD/rGgA/6xn" + ` "AP+sZwD/rGcA/6xnAP+rZgD/q2YA/6hjAP+nYgD/pmEA/6VgAP+kXwD/sXYh//r27//+/v7//v" + ` "7+//7+/v/+/v7//v7+//r6+v/u7u//4+Pk/9jY2PTNzc43AAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "19fYKeLi4+zu7u//+fn5//7+/v/+/v7//v7+//7+/v/+/v7//v7+//bu4/+raxD/pF8A/6VgAP" + ` "+mYQD/p2IA/6pkAP+rZgD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA" + ` "/61pAP+taQD/rmkA/65pAP+uaQD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vag" + ` "D/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69q" + ` "AP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/65pAP+taQD/rWkA/61pAP+taQD/rW" + ` "kA/6xoAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+rZgD/q2YA/6lkAP+mYQD/pWAA/6RfAP+k" + ` "XwD/qmoQ//bu4//+/v7//v7+//7+/v/+/v7//v7+//n5+f/u7u//4uLj/9fX2OzMzM0pAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAANXV1hvh4eLh7e3u//j4+P/+/v7//v7+//7+/v/+/v7//v7+//7+/v/w5NL/qGUJ" + ` "/6RfAP+kXwD/pWAA/6dhAP+qZQD/rGcA/6xnAP+sZwD/rGcA/6xoAP+saAD/rGgA/61pAP+taQ" + ` "D/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69q" + ` "AP+vagD/r2oA/69rAP+vawD/r2sA/69rAP+vawD/r2sA/69rAP+vawD/r2sA/69rAP+vawD/r2" + ` "sA/69rAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/65pAP+u" + ` "aQD/rWkA/61pAP+taQD/rWkA/61pAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/q2YA/6" + ` "llAP+mYAD/pF8A/6RfAP+jXgD/p2QJ//Dk0v/+/v7//v7+//7+/v/+/v7//v7+//j4+P/t7e7/" + ` "4eHi/9XV1uHKyssbAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAADT09QO39/g1Ovr7P/39/f//v7+//7+/v/+/v7//v7+//7+/v/+/v" + ` "7/6Na9/6VhBP+jXgD/pF8A/6RfAP+mYQD/q2UA/6xnAP+sZwD/rGcA/6xoAP+saAD/rGgA/6xo" + ` "AP+taQD/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2" + ` "oA/69rAP+vawD/r2sA/69rAP+vawD/sGsA/7BrAP+wawD/sGsA/7BrAP+wawD/sGsA/7BrAP+w" + ` "awD/sGsA/7BrAP+wawD/sGsA/69rAP+vawD/r2sA/69rAP+vawD/r2oA/69qAP+vagD/r2oA/6" + ` "9qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rWkA/61pAP+saAD/rGgA/6xoAP+saAD/" + ` "rGcA/6xnAP+sZwD/q2YA/6tlAP+lYAD/pF8A/6NeAP+iXQD/pWAE/+jWvf/+/v7//v7+//7+/v" + ` "/+/v7//v7+//f39//r6+z/39/g/9PT1NTIyMkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN3d3anp6er/9fX1//7+/v/+/v7//v7+//7+" + ` "/v/+/v7//v7+/+jWvf+kXgL/ol0A/6NeAP+kXwD/pmEA/6tmAP+sZwD/rGcA/6xnAP+saAD/rG" + ` "gA/6xoAP+taQD/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+v" + ` "agD/r2sA/69rAP+vawD/sGsA/7V1Ef+2dxT/tHIV/7JwFv+ycRb/snEW/7JxFv+ycRb/snEW/7" + ` "JxFv+ycRb/snEW/7JxFv+ycRb/snEW/7JxFv+ycRb/snAW/7JwFv+ycBb/snAW/7FuE/+qZAP/" + ` "qmQD/69rAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/rmkA/65pAP+taQD/rWkA/61pAP" + ` "+taQD/rGgA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6tlAP+mYQD/o14A/6JdAP+iXAD/o14C" + ` "/+jWvf/+/v7//v7+//7+/v/+/v7//v7+//X19f/p6er/3d3d/9HR0qkAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADb29tp5ubn//Pz8//+/v7//v" + ` "7+//7+/v/+/v7//v7+//7+/v/u4tH/pGAE/6JcAP+iXQD/o14A/6ZhAP+rZgD/rGcA/6xnAP+s" + ` "ZwD/rGgA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/6" + ` "9qAP+vagD/r2sA/69rAP+wawD/sGsA/7BrAP+wbAD/9Ora////////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "//////697g/28WKP9vFij/r2oA/69rAP+vawD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA" + ` "/65pAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6tmAP+lYA" + ` "D/ol0A/6JcAP+hXAD/o18E/+7i0f/+/v7//v7+//7+/v/+/v7//v7+//Pz8//m5uf/29vb/8/P" + ` "0GkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA19fYMePj5Pfw" + ` "8PD//f39//7+/v/+/v7//v7+//7+/v/+/v7/9Ozh/6ViCP+hXAD/olwA/6JdAP+mYQD/q2YA/6" + ` "xnAP+sZwD/rGcA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/" + ` "r2oA/69qAP+vagD/r2sA/69rAP+wawD/sGsA/7BsAP+wbAD/sGwA/7BsAP/06tr///////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////////////////////r3uD/bxYo/28WKP+vawD/sGsA/7BrAP+vawD/r2sA/69qAP+vag" + ` "D/r2oA/69qAP+vagD/r2oA/65pAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+saAD/rGcA/6xn" + ` "AP+sZwD/q2YA/6tmAP+lYAD/olwA/6FcAP+gWwD/pWEI//Ts4f/+/v7//v7+//7+/v/+/v7//f" + ` "39//Dw8P/j4+T/19fY98vLzDEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN" + ` "TU1Q3g4OHa7e3u//r6+v/+/v7//v7+//7+/v/+/v7//v7+//r28f+oZxD/oFsA/6FcAP+iXAD/" + ` "pWAA/6tmAP+sZwD/rGcA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/61pAP+uaQD/r2oA/69qAP" + ` "+vagD/r2oA/69qAP+vagD/r2sA/69rAP+wawD/sGsA/7BsAP+wbAD/sGwA/7FsAP+xbAD/sWwA" + ` "//Tq2v////////////////////////////////////////////////////////////////////" + ` "///////////////////////////////////////+ve4P9vFij/bxYo/69rAP+wbAD/sGwA/7Br" + ` "AP+wawD/r2sA/69rAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+taQD/rW" + ` "kA/6xoAP+saAD/rGgA/6xnAP+sZwD/q2YA/6tmAP+lXwD/oVwA/6BbAP+gWgD/p2YQ//r28f/+" + ` "/v7//v7+//7+/v/+/v7/+vr6/+3t7v/g4OH/1NTV2sfHyA0AAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAA3d3dounp6v/29vb//v7+//7+/v/+/v7//v7+//7+/v/+/v7/r3Ih/6BaAP" + ` "+gWwD/oVwA/6ReAP+rZgD/rGcA/6xnAP+saAD/rGgA/6xoAP+taQD/rWkA/61pAP+uaQD/rmkA" + ` "/69qAP+vagD/r2oA/69qAP+vagD/r2sA/69rAP+wawD/sGsA/7BsAP+wbAD/sWwA/7FsAP+xbA" + ` "D/sWwA/7FsAP+xbAD/9Ora////////////////////////////////////////////////////" + ` "////////////////////////////////////////////////////////697g/28WKP9vFij/sG" + ` "sA/7FsAP+xbAD/sGwA/7BsAP+wawD/sGsA/69rAP+vawD/r2oA/69qAP+vagD/r2oA/69qAP+u" + ` "aQD/rmkA/61pAP+taQD/rWkA/6xoAP+saAD/rGgA/6xnAP+sZwD/q2YA/6tmAP+jXgD/oFsA/6" + ` "BaAP+fWQD/rXEh//7+/v/+/v7//v7+//7+/v/+/v7/9vb2/+np6v/d3d3/0NDRogAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAANjY2ETk5OX/8vLy//7+/v/+/v7//v7+//7+/v/+/v7//v7+" + ` "/8aaYP+fWQD/oFoA/6BbAP+jXgD/q2UA/6xnAP+sZwD/rGgA/6xoAP+saAD/rWkA/61pAP+taQ" + ` "D/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69rAP+wawD/sGsA/7BsAP+wbAD/sWwA/7Fs" + ` "AP+xbAD/sWwA/7FsAP+xbQD/sW0A/7FtAP/06tr///////////////////////////////////" + ` "/////////////////////////////////////////////////////////////////////////r" + ` "3uD/bxYo/28WKP+wawD/sWwA/7FsAP+xbAD/sWwA/7BsAP+wbAD/sGsA/7BrAP+vawD/r2oA/6" + ` "9qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rWkA/6xoAP+saAD/rGgA/6xnAP+sZwD/" + ` "q2YA/6tlAP+iXQD/oFoA/59ZAP+eWAD/xZpg//7+/v/+/v7//v7+//7+/v/+/v7/8vLy/+Tk5f" + ` "/Y2Nj/zMzNRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADT09QG4ODh1+3t7v/7+/v//v7+//7+/v/+/v" + ` "7//v7+//7+/v/izrD/n1kA/59ZAP+gWgD/oVwA/6plAP+sZwD/rGcA/6xnAP+saAD/rGgA/61p" + ` "AP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/r2oA/69rAP+vawD/sGsA/7BrAP+wbAD/sG" + ` "wA/7FsAP+xbAD/sWwA/7FsAP+xbQD/sW0A/7JtAP+ybQD/sm0A//Tq2v//////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////////////+ve4P9vFij/bxYo/7BsAP+xbQD/sWwA/7FsAP+xbAD/sWwA/7BsAP+wbAD/" + ` "sGsA/7BrAP+vawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rWkA/6xoAP" + ` "+saAD/rGcA/6xnAP+sZwD/q2YA/6llAP+hWwD/n1kA/55YAP+eWQD/4s2w//7+/v/+/v7//v7+" + ` "//7+/v/7+/v/7e3u/+Dg4f/T09TXxsbHBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANvb23ro6On/9vb2//7+" + ` "/v/+/v7//v7+//7+/v/+/v7/+PLr/6JeB/+eWAD/n1kA/6BaAP+oYwD/rGcA/6xnAP+sZwD/rG" + ` "gA/6xoAP+taQD/rWkA/61pAP+uaQD/r2oA/69qAP+vagD/r2oA/69qAP+vawD/r2sA/7BrAP+w" + ` "bAD/sGwA/7FsAP+xbAD/sWwA/7FsAP+xbQD/sW0A/7JtAP+ybQD/sm4A/7JuAP+ybgD/9Ora//" + ` "//////////////////////////////////////////////////////////////////////////" + ` "////////////////////////////////697g/28WKP9vFij/sWwA/7JtAP+xbQD/sW0A/7FsAP" + ` "+xbAD/sWwA/7FsAP+wbAD/sGwA/7BrAP+vawD/r2sA/69qAP+vagD/r2oA/69qAP+vagD/rmkA" + ` "/61pAP+taQD/rWkA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6djAP+fWQD/nlgA/51YAP+hXg" + ` "f/+PLr//7+/v/+/v7//v7+//7+/v/29vb/6Ojp/9vb2//Ozs96AAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADV1dYg4u" + ` "Lj9fDw8P/+/v7//v7+//7+/v/+/v7//v7+//7+/v+vdCb/nVgA/55YAP+fWQD/pWAA/6xnAP+s" + ` "ZwD/rGcA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69qAP+vagD/r2sA/7" + ` "BrAP+wawD/sGwA/7BsAP+xbAD/sWwA/7FsAP+xbQD/sW0A/7JtAP+ybQD/sm4A/7JuAP+ybgD/" + ` "s24A/7NuAP/06tr///////////////////////////////////////////////////////////" + ` "/////////////////////////////////////////////////r3uD/bxYo/28WKP+xbQD/sm4A" + ` "/7JtAP+ybQD/sW0A/7FtAP+xbAD/sWwA/7FsAP+wbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vag" + ` "D/r2oA/69qAP+vagD/rmkA/61pAP+taQD/rWkA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6Rf" + ` "AP+eWAD/nVgA/5xXAP+vcyb//v7+//7+/v/+/v7//v7+//7+/v/w8PD/4uLj/9XV1vXIyMkgAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAN3d3a/q6uv/+Pj4//7+/v/+/v7//v7+//7+/v/+/v7/2LuT/5xXAP+dWAD/nlgA/6" + ` "FbAP+rZgD/rGcA/6xnAP+saAD/rGgA/6xoAP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/" + ` "r2oA/69rAP+wawD/sGsA/7BsAP+xbAD/sWwA/7FsAP+xbAD/sW0A/7JtAP+ybQD/sm4A/7JuAP" + ` "+zbgD/s24A/7NuAP+zbgD/s24A//Tq2v//////////////////////////////////////////" + ` "/////////////////////////////////////////////////////////////////+ve4P9vFi" + ` "j/bxYo/7JtAP+zbgD/sm4A/7JuAP+ybQD/sm0A/7FtAP+xbAD/sWwA/7FsAP+xbAD/sGwA/7Br" + ` "AP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rGgA/6xoAP+saAD/rG" + ` "cA/6xnAP+rZgD/q2YA/6FbAP+dWAD/nFcA/5xWAP/XupP//v7+//7+/v/+/v7//v7+//j4+P/q" + ` "6uv/3d3d/9DQ0a8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAADW1tc05OTl//Ly8v/+/v7//v7+//7+/v/+/v7//v7+//z49f+gXAf/" + ` "nFYA/5xXAP+eWQD/qmQA/6xnAP+sZwD/rGgA/6xoAP+saAD/rWkA/61pAP+uaQD/rmkA/69qAP" + ` "+vagD/r2oA/69qAP+vawD/sGsA/7BrAP+wbAD/sWwA/7FsAP+xbAD/sW0A/7FtAP+ybQD/sm0A" + ` "/7JuAP+ybgD/s24A/7NuAP+zbgD/s24A/7RvAP+0bwD/9eva//////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "////////697g/28WKP9vFij/sm0A/7NuAP+zbgD/sm4A/7JuAP+ybQD/sm0A/7FtAP+xbQD/sW" + ` "wA/7FsAP+xbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+t" + ` "aQD/rGgA/6xoAP+saAD/rGcA/6xnAP+rZgD/qWQA/51YAP+cVgD/m1UA/6BcB//8+PX//v7+//" + ` "7+/v/+/v7//v7+//Ly8v/k5OX/1tbX/8nJyjQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN7e3q/r6+z/+fn5//7+/v/+/v7//v7+//7+/v" + ` "/+/v7/vYxM/5tVAP+cVgD/nFcA/6VgAP+sZwD/rGcA/6xnAP+saAD/rGgA/61pAP+taQD/rWkA" + ` "/65pAP+vagD/r2oA/69qAP+vagD/r2sA/7BrAP+wawD/sGwA/7FsAP+xbAD/sWwA/7FtAP+xbQ" + ` "D/sm0A/7JuAP+ybgD/s24A/7NuAP+zbgD/s24A/7RvAP+0bwD/tG8A/7RvAP/169r/////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////////////////////r3uD/bxYo/28WKP+zbgD/s24A/7NuAP+zbgD/s24A/7JuAP+y" + ` "bgD/sm0A/7FtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vagD/r2oA/6" + ` "9qAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6xnAP+rZgD/pF8A/5xWAP+bVQD/" + ` "m1UA/7yLTP/+/v7//v7+//7+/v/+/v7/+fn5/+vr7P/e3t7/0NDRrwAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADW1tcs5OTl/vLy8v/+/v7//v7+" + ` "//7+/v/+/v7//v7+/+zey/+cVgD/m1UA/5xWAP+fWgD/q2YA/6xnAP+sZwD/rGgA/6xoAP+taQ" + ` "D/rWkA/61pAP+uaQD/r2oA/69qAP+vagD/r2oA/69rAP+wawD/sGsA/7BsAP+xbAD/sWwA/7Fs" + ` "AP+xbQD/sm0A/7JtAP+ybgD/sm4A/7NuAP+zbgD/s24A/7RvAP+0bwD/tG8A/7RvAP+1cAD/tX" + ` "AA//Xr2v//////////////////////////////////////////////////////////////////" + ` "/////////////////////////////////////////+ve4P9vFij/bxYo/7NuAP+0bwD/tG8A/7" + ` "NuAP+zbgD/s24A/7JuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+wawD/" + ` "r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6tmAP" + ` "+rZgD/n1kA/5tVAP+bVQD/m1UA/+zey//+/v7//v7+//7+/v/+/v7/8vLy/+Tk5f/W1tf+ycnK" + ` "LAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN3d3abr6+" + ` "z/+fn5//7+/v/+/v7//v7+//7+/v/+/v7/rHAj/5tVAP+bVQD/nFYA/6hjAP+sZwD/rGcA/6xo" + ` "AP+saAD/rGgA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69qAP+vawD/sGsA/7BrAP+wbAD/sW" + ` "wA/7FsAP+xbAD/sW0A/7JtAP+ybQD/sm4A/7NuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7RvAP+1" + ` "cAD/tXAA/7VwAP+1cAD/9eva//////////////////////////////////////////////////" + ` "//////////////////////////////////////////////////////////697g/28WKP9vFij/" + ` "tG8A/7RvAP+0bwD/tG8A/7NuAP+zbgD/s24A/7NuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP" + ` "+xbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+saAD/rGgA" + ` "/6xoAP+sZwD/rGcA/6tmAP+nYgD/m1UA/5tVAP+aVAD/q3Aj//7+/v/+/v7//v7+//7+/v/5+f" + ` "n/6+vs/93d3f/Q0NGmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AADV1dYl4+Pk/PHx8f/+/v7//v7+//7+/v/+/v7//v7+/+jYwf+aVAD/m1UA/5tVAP+iXAD/rG" + ` "cA/6xnAP+sZwD/rGgA/6xoAP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/r2sA/69rAP+w" + ` "awD/sGwA/7FsAP+xbAD/sWwA/7FtAP+ybQD/sm0A/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7" + ` "RvAP+0bwD/tXAA/7VwAP+1cAD/tXAA/7ZxAP/169r/////////////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/r3uD/bxYo/28WKP+0bwD/tXAA/7RvAP+0bwD/tG8A/7RvAP+zbgD/s24A/7NuAP+ybgD/sm0A" + ` "/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+vawD/r2sA/69qAP+vagD/r2oA/65pAP+uaQ" + ` "D/rWkA/61pAP+saAD/rGgA/6xnAP+sZwD/rGcA/6tmAP+hWwD/m1UA/5pUAP+ZUwD/6NjB//7+" + ` "/v/+/v7//v7+//7+/v/x8fH/4+Pk/9XV1vzHx8glAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAANvb25Xp6er/+Pj4//7+/v/+/v7//v7+//7+/v/+/v7/rnMq/5lTAP+a" + ` "VAD/m1UA/6lkAP+sZwD/rGcA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/6" + ` "9qAP+vawD/sGsA/7BsAP+xbAD/sWwA/7FsAP+xbQD/sm0A/7JtAP+ybgD/s24A/7NuAP+zbgD/" + ` "tG8A/7RvAP+0bwD/tXAA/7VwAP+1cAD/tXAA/7ZxAP+2cQD/tnEA//Xr2v////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////////////+ve4P9vFij/bxYo/7RvAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbg" + ` "D/s24A/7NuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+vawD/r2oA/69q" + ` "AP+vagD/r2oA/65pAP+taQD/rWkA/61pAP+saAD/rGgA/6xnAP+sZwD/q2YA/6hkAP+aVAD/mV" + ` "MA/5hSAP+tcyr//v7+//7+/v/+/v7//v7+//j4+P/p6er/29vb/83NzpUAAAAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAADS0tMH4ODh7e/v7//+/v7//v7+//7+/v/+/v7//v7+/+" + ` "vey/+ZUgD/mVMA/5pUAP+hWwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+taQD/rWkA/65pAP+vagD/" + ` "r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sGwA/7FsAP+xbAD/sW0A/7JtAP+ybQD/sm4A/7NuAP" + ` "+zbgD/s24A/7RvAP+0bwD/tG8A/7VwAP+1cAD/tXAA/7ZxAP+2cQD/tnEA/7ZxAP+2cQD/9eva" + ` "//////////////////////////////////////////////////////////////////////////" + ` "//////////////////////////////////697g/28WKP9vFij/tXAA/7ZxAP+1cAD/tXAA/7Vw" + ` "AP+0bwD/tG8A/7RvAP+zbgD/s24A/7NuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP+wbAD/sG" + ` "wA/7BrAP+vawD/r2oA/69qAP+vagD/r2oA/65pAP+taQD/rWkA/6xoAP+saAD/rGcA/6xnAP+s" + ` "ZwD/q2YA/6BbAP+ZUwD/mFIA/5hRAP/r3sv//v7+//7+/v/+/v7//v7+/+/v7//g4OH/0tLT7c" + ` "TExQcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANjY2FLm5uf/9fX1//7+/v/+/v7/" + ` "/v7+//7+/v/+/v7/sHcw/5hSAP+ZUwD/mlQA/6ljAP+sZwD/rGcA/6xoAP+saAD/rWkA/61pAP" + ` "+taQD/rmkA/69qAP+vagD/r2oA/69rAP+wawD/sGsA/7BsAP+xbAD/sWwA/7FtAP+xbQD/sm0A" + ` "/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7RvAP+1cAD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+2cQ" + ` "D/tnEA/7ZxAP/169r/////////////////////////////////////////////////////////" + ` "///////////////////////////////////////////////////r3uD/bxYo/28WKP+1cAD/tn" + ` "EA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbgD/s24A/7NuAP+ybgD/sm0A/7FtAP+x" + ` "bQD/sWwA/7FsAP+wbAD/sGsA/7BrAP+vawD/r2oA/69qAP+vagD/rmkA/61pAP+taQD/rWkA/6" + ` "xoAP+saAD/rGcA/6xnAP+rZgD/qGMA/5lTAP+YUgD/l1EA/7B3MP/+/v7//v7+//7+/v/+/v7/" + ` "9fX1/+bm5//Y2Nj/ysrLUgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3d3dr+zs7f" + ` "/7+/v//v7+//7+/v/+/v7//v7+//fx6f+YUgD/mFIA/5lTAP+fWQD/rGcA/6xnAP+sZwD/rGgA" + ` "/6xoAP+taQD/rWkA/65pAP+vagD/r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sWwA/7FsAP+xbA" + ` "D/sW0A/7JtAP+ybgD/s24A/7NuAP+zbgD/tG8A/7RvAP+0bwD/tXAA/7VwAP+1cAD/tnEA/7Zx" + ` "AP+2cQD/tnEA/7ZxAP+3cgD/t3IA//Xr2v////////////////////////////////////////" + ` "///////////////////////////////////////////////////////////////////+ve4P9v" + ` "Fij/bxYo/7VwAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbgD/s24A/7" + ` "NuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7FsAP+wbAD/sGsA/69rAP+vagD/r2oA/69qAP+vagD/" + ` "rmkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6xnAP+rZgD/n1kA/5hSAP+XUQD/mFEA//fx6f" + ` "/+/v7//v7+//7+/v/7+/v/7Ozt/93d3f/Pz9CvAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + ` "ANTU1RPi4uP58fHx//7+/v/+/v7//v7+//7+/v/+/v7/xpxn/5dQAP+XUQD/mFIA/6hiAP+sZw" + ` "D/rGcA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69rAP+wawD/sGwA/7Bs" + ` "AP+xbAD/sWwA/7FtAP+ybQD/sm4A/7JuAP+zbgD/s24A/7RvAP+0bwD/tG8A/7VwAP+1cAD/tX" + ` "AA/7ZxAP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP+3cgD/9eva////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "//////////697g/28WKP9vFij/tnAA/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/" + ` "tG8A/7RvAP+zbgD/s24A/7JuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7BsAP+wbAD/sGsA/69rAP" + ` "+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6tmAP+nYgD/l1EA" + ` "/5dQAP+WTwD/xZxn//7+/v/+/v7//v7+//7+/v/x8fH/4uLj/9TU1fnFxcYTAAAAAAAAAAAAAA" + ` "AAAAAAAAAAAAAAAAAA2dnZaufn6P/29vb//v7+//7+/v/+/v7//v7+//7+/v+iYBP/l1AA/5dR" + ` "AP+bVQD/q2YA/6xnAP+sZwD/rGgA/6xoAP+taQD/rWkA/65pAP+vagD/r2oA/69qAP+vagD/r2" + ` "sA/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JtAP+ybgD/s24A/7NuAP+0bwD/tG8A/7RvAP+1" + ` "cAD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+2cQD/t3IA/7dyAP+3cgD/t3IA/7dyAP/169r///////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////////////////////////r3uD/bxYo/28WKP+2cAD/t3IA/7ZxAP+2cQD/tnEA/7ZxAP" + ` "+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbgD/s24A/7JuAP+ybQD/sm0A/7FtAP+xbAD/sWwA" + ` "/7BsAP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+saAD/rGgA/6xnAP+sZw" + ` "D/q2YA/6tmAP+aVAD/l1AA/5ZPAP+hYBP//v7+//7+/v/+/v7//v7+//b29v/n5+j/2dnZ/8rK" + ` "y2oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADd3d297Ozt//v7+//+/v7//v7+//7+/v/+/v7/7d" + ` "/N/5ZPAP+XUAD/l1EA/6JdAP+taAH/snIS/61pAf+saAD/rWkA/61pAP+taQD/rmkA/69qAP+v" + ` "agD/r2oA/69rAP+wawD/sGwA/7FsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/s24A/7" + ` "RvAP+0bwD/tXAA/7VwAP+1cAD/tnEA/7ZxAP+2cQD/tnEA/7dyAP+3cgD/t3IA/7dyAP+3cgD/" + ` "uHMA//Xr2v////////////////////////////////////////////////////////////////" + ` "///////////////////////////////////////////+ve4P9vFij/bxYo/7ZwAP+3cgD/t3IA" + ` "/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7NuAP+zbgD/s24A/7JuAP+ybQ" + ` "D/sW0A/7FsAP+xbAD/sWwA/7BsAP+wawD/r2sA/69qAP+vagD/r2oA/65pAP+taQD/rWkA/61p" + ` "AP+saAD/rGgA/61oAf+ychL/rGcB/6FcAP+XUAD/lk8A/5VPAP/s383//v7+//7+/v/+/v7/+/" + ` "v7/+zs7f/d3d3/z8/QvQAAAAAAAAAAAAAAAAAAAAAAAAAA0tLTCOHh4vfw8PD//v7+//7+/v/+" + ` "/v7//v7+//7+/v+4h0r/lU8A/5ZPAP+XUAD/qWQA/61oAv+5fyj/snIR/6xoAP+taQD/rWkA/6" + ` "5pAP+vagD/r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JuAP+ybgD/" + ` "s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tXAA/7ZxAP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP" + ` "+3cgD/uHMA/7hzAP+5cwD/9eva////////////////////////////////////////////////" + ` "////////////////////////////////////////////////////////////697g/28WKP9vFi" + ` "j/tnAA/7dyAP+3cgD/t3IA/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7Nu" + ` "AP+zbgD/sm4A/7JuAP+ybQD/sW0A/7FsAP+xbAD/sGwA/7BrAP+vawD/r2oA/69qAP+vagD/r2" + ` "oA/65pAP+taQD/rWkA/6xoAP+saAD/snER/7l/KP+sZwL/qGQA/5ZPAP+VTwD/lE4A/7iHSv/+" + ` "/v7//v7+//7+/v/+/v7/8PDw/+Hh4v/S0tP3xMTFCAAAAAAAAAAAAAAAAAAAAADW1tdB5eXm//" + ` "T09P/+/v7//v7+//7+/v/+/v7//v7+/5xZCv+VTwD/lk8A/51WAP+sZwD/sG4M/72FMv+4fiX/" + ` "rGgA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69rAP+wawD/sGwA/7FsAP+xbAD/sWwA/7FtAP" + ` "+ybQD/sm4A/7NuAP+zbgD/tG8A/7RvAP+0bwD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+2cQD/t3IA" + ` "/7dyAP+3cgD/t3IA/7hzAP+4cwD/uXMA/7lzAP/169r///////////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///r3uD/bxYo/28WKP+3cQD/t3IA/7dyAP+3cgD/t3IA/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tX" + ` "AA/7RvAP+0bwD/tG8A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+v" + ` "awD/r2oA/69qAP+vagD/rmkA/61pAP+taQD/rGgA/6xoAP+4fSX/vYUy/7BuDP+rZgD/nFUA/5" + ` "VPAP+UTgD/nFgK//7+/v/+/v7//v7+//7+/v/09PT/5eXm/9bW1//IyMlBAAAAAAAAAAAAAAAA" + ` "AAAAANra2oPp6er/+Pj4//7+/v/+/v7//v7+//7+/v/z6d7/lE4A/5VPAP+WTwD/o10A/61oAf" + ` "+2eB3/vYYz/7yEL/+xcQ3/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sWwA" + ` "/7FsAP+xbQD/sm0A/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tnEA/7ZxAP+2cQ" + ` "D/tnEA/7dyAP+3cgD/t3IA/7dyAP+4cwD/uXMA/7lzAP+5cwD/uXMA//Xr2v//////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////////////////+ve4P9vFij/bxYo/7hxAP+4cwD/t3IA/7dyAP+3cgD/t3IA/7ZxAP+2" + ` "cQD/tnEA/7ZxAP+1cAD/tXAA/7RvAP+0bwD/s24A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7" + ` "FsAP+wbAD/sGsA/69rAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/sHAN/7yEL/+9hTP/" + ` "tngd/6xnAf+iXQD/lU8A/5ROAP+UTQD/8+ne//7+/v/+/v7//v7+//j4+P/p6er/2tra/8zMzY" + ` "MAAAAAAAAAAAAAAAAAAAAA3t7exe3t7v/8/Pz//v7+//7+/v/+/v7//v7+/8uld/+UTQD/lE4A" + ` "/5VPAP+oYwD/rWgC/7uBLP+9hjP/vYYy/7l+JP+uagH/rmkA/69qAP+vagD/r2oA/69rAP+waw" + ` "D/sGwA/7BsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/tG8A/7RvAP+1cAD/tXAA/7Vw" + ` "AP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP+3cgD/uHMA/7lzAP+5cwD/uXMA/7l0AP+5dAD/9e" + ` "va////////////////////////////////////////////////////////////////////////" + ` "////////////////////////////////////697g/28WKP9vFij/uHEA/7lzAP+4cwD/t3IA/7" + ` "dyAP+3cgD/t3IA/7ZxAP+2cQD/tnEA/7VwAP+1cAD/tXAA/7RvAP+0bwD/s24A/7NuAP+ybgD/" + ` "sm0A/7FtAP+xbAD/sWwA/7BsAP+wbAD/sGsA/69rAP+vagD/r2oA/69qAP+uaQD/rWkA/65qAf" + ` "+4fST/vYYy/72FM/+7gSz/rGcC/6djAP+UTgD/lE0A/5NMAP/LpXf//v7+//7+/v/+/v7//Pz8" + ` "/+3t7v/e3t7/0NDRxQAAAAAAAAAAAAAAANLS0wzh4eL68PDw//7+/v/+/v7//v7+//7+/v/+/v" + ` "7/rXMv/5RNAP+UTgD/mFIA/6tmAP+vbAj/vYUz/72GM/+9hjP/vIUv/7JyEP+uaQD/r2oA/69q" + ` "AP+vagD/r2sA/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JuAP+ybgD/s24A/7NuAP+0bwD/tG" + ` "8A/7VwAP+1cAD/tnEA/7ZxAP+2cQD/tnEA/7dyAP+3cgD/t3IA/7hzAP+4cwD/uXMA/7lzAP+5" + ` "dAD/uXQA/7p1AP/269r///////////////////////////////////////////////////////" + ` "/////////////////////////////////////////////////////r3uD/bxYo/28WKP+4cQD/" + ` "uXMA/7hzAP+4cwD/t3IA/7dyAP+3cgD/tnEA/7ZxAP+2cQD/tnEA/7VwAP+1cAD/tG8A/7RvAP" + ` "+zbgD/s24A/7JuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7BsAP+wawD/r2sA/69qAP+vagD/r2oA" + ` "/65pAP+taQD/snIQ/7yEL/+9hjP/vYUz/72FM/+uawj/qmYA/5dRAP+UTQD/k0wA/6xzL//+/v" + ` "7//v7+//7+/v/+/v7/8PDw/+Hh4v/S0tP6w8PEDAAAAAAAAAAA1dXWQOTk5f/z8/P//v7+//7+" + ` "/v/+/v7//v7+//7+/v+aVQf/k0wA/5RNAP+dVwD/rGcA/7NzFf+9hjP/vYYz/76HM/+9hjL/uX" + ` "8m/69qAv+vagD/r2oA/69qAP+vawD/sGsA/7BsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7NuAP+z" + ` "bgD/tG8A/7RvAP+1cAD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP+3cgD/uHMA/7" + ` "lzAP+5cwD/uXQA/7l0AP+2cQD/s24A//Tq2v//////////////////////////////////////" + ` "/////////////////////////////////////////////////////////////////////+ve4P" + ` "9vFij/bxYo/7hyAP+5cwD/uXMA/7hzAP+3cgD/t3IA/7dyAP+3cgD/tnEA/7ZxAP+2cQD/tXAA" + ` "/7VwAP+1cAD/tG8A/7RvAP+zbgD/s24A/7JuAP+ybQD/sW0A/7FsAP+xbAD/sGwA/7BrAP+vaw" + ` "D/r2oA/69qAP+vagD/rmkA/65qAv+5fyb/vYYy/72GM/+9hjP/vYUz/7NzFf+rZgD/nFYA/5NM" + ` "AP+TTAD/mVQH//7+/v/+/v7//v7+//7+/v/z8/P/5OTl/9XV1v/GxsdAAAAAAAAAAADY2Nho5+" + ` "fo//b29v/+/v7//v7+//7+/v/+/v7/7+XW/5JLAP+TTAD/lE0A/6NdAP+sZwD/t3sh/72GM/+9" + ` "hjP/vocz/76HM/+9hS//tncX/69qAP+vagD/r2sA/7BrAP+wbAD/sGwA/7FsAP+xbAD/sW0A/7" + ` "JtAP+ybgD/s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tnEA/7ZxAP+2cQD/tnEA/7dyAP+3cgD/" + ` "t3IA/7hzAP+5cwD/t3EA/7JtAP+uaQD/qmUA/6lkAP+qZQD/8+na//////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "////////////697g/28WKP9vFij/qWQA/65pAP+ybQD/t3EA/7hzAP+3cgD/t3IA/7dyAP+2cQ" + ` "D/tnEA/7ZxAP+2cQD/tXAA/7VwAP+0bwD/tG8A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7Fs" + ` "AP+wbAD/sGwA/7BrAP+vawD/r2oA/69qAP+vagD/tnYX/7yFL/++hzP/vYYz/72GM/+9hTP/t3" + ` "sh/6tmAP+iXQD/k0wA/5JLAP+SSgD/7+TW//7+/v/+/v7//v7+//b29v/n5+j/2NjY/8nJymgA" + ` "AAAAAAAAANvb24/p6er/+fn5//7+/v/+/v7//v7+//7+/v/Ts43/kksA/5NMAP+TTAD/qGIA/6" + ` "1oAf+7gSz/vYYz/72GM/++hzP/vocz/76GMv+9gyv/sm8J/69qAP+vawD/sGsA/7BsAP+xbAD/" + ` "sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/s24A/7RvAP+0bwD/tXAA/7VwAP+2cQD/tnEA/7ZxAP" + ` "+3cgD/t3IA/7dyAP+3cgD/smwA/6xmAP+oYwD/qGMA/6hkAP+oZAD/qWQA/6lkAP/z6dr/////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////////////////////////r3uD/bxYo/28WKP+nYwD/qGMA/6hjAP+nYgD/rGYA/7Fs" + ` "AP+2cQD/t3IA/7dyAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7RvAP+0bwD/s24A/7NuAP+zbgD/sm" + ` "4A/7JtAP+xbQD/sWwA/7FsAP+wbAD/sGsA/69rAP+vagD/r2oA/7JvCf+8giv/vYYy/76HM/+9" + ` "hjP/vYYz/72FM/+7gSz/rGcB/6diAP+TTAD/kksA/5JKAP/Ts43//v7+//7+/v/+/v7/+fn5/+" + ` "np6v/b29v/zMzNjwAAAAAAAAAA3d3dtuzs7f/8/Pz//v7+//7+/v/+/v7//v7+/76QWf+SSgD/" + ` "kksA/5RNAP+rZgD/rmoF/72FM/+9hjP/vYYz/76HM/++hzP/vocz/7+HMf+6fSH/sGsC/69rAP" + ` "+wawD/sGwA/7FsAP+xbAD/sW0A/7JtAP+ybgD/s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tnEA" + ` "/7ZxAP+2cQD/tnEA/7dyAP+0bwD/rWcA/6ZhAP+mYQD/pmEA/6diAP+nYgD/qGMA/6hjAP+oZA" + ` "D/qGQA//Pp2v//////////////////////////////////////////////////////////////" + ` "/////////////////////////////////////////////+ve4P9vFij/bxYo/6diAP+nYgD/p2" + ` "IA/6ZhAP+mYQD/pWAA/6ZhAP+sZwD/tG8A/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7RvAP+0" + ` "bwD/s24A/7NuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7BsAP+wawD/r2sA/69qAP+wawL/un0h/7" + ` "6GMf++hzP/vocz/72GM/+9hjP/vYUz/72FM/+taQX/qmYA/5NMAP+SSgD/kUkA/72PWf/+/v7/" + ` "/v7+//7+/v/8/Pz/7Ozt/93d3f/Ozs+2AAAAAAAAAADf39/c7u7v//7+/v/+/v7//v7+//7+/v" + ` "/+/v7/rXMx/5JKAP+SSwD/l1AA/6tmAP+wbw3/vYUz/72GM/+9hjP/vocz/76HM/++hzP/v4gz" + ` "/76FLv+2dhX/sGwB/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JuAP+zbgD/s24A/7RvAP+0bw" + ` "D/tXAA/7VwAP+2cQD/tnEA/7ZxAP+ybQD/qmUA/6RfAP+kXwD/pF8A/6VgAP+lYAD/pmEA/6Zh" + ` "AP+nYgD/p2IA/6hjAP+oYwD/8+na//////////////////////////////////////////////" + ` "//////////////////////////////////////////////////////////////697g/28WKP9v" + ` "Fij/pmEA/6ZhAP+mYQD/pWAA/6VgAP+kXwD/pF8A/6RfAP+kXwD/qWQA/7FsAP+2cQD/tnEA/7" + ` "VwAP+1cAD/tG8A/7RvAP+zbgD/s24A/7JuAP+ybQD/sW0A/7FsAP+xbAD/sGwA/7BrAP+vawD/" + ` "sGsB/7Z2Ff++hS7/vocz/76HM/++hzP/vYYz/72GM/+9hTP/vYUz/69uDf+qZgD/lk8A/5JKAP" + ` "+RSQD/rHMx//7+/v/+/v7//v7+//7+/v/u7u//39/f/9DQ0d0AAAAA0dHSB+Dg4fzw8PD//v7+" + ` "//7+/v/+/v7//v7+//7+/v+fXRX/kUkA/5JKAP+aVAD/rGcA/7NzFP+9hjP/vYYz/76HM/++hz" + ` "P/vocz/7+IM/+/iDP/v4cy/72DK/+zcgz/sGsA/7BsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7Nu" + ` "AP+zbgD/tG8A/7RvAP+1cAD/tXAA/7ZxAP+zbQD/qGMA/6JdAP+jXgD/o14A/6RfAP+kXwD/pF" + ` "8A/6VgAP+lYAD/pmEA/6ZhAP+mYQD/p2IA/6diAP/z6dr/////////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////r3uD/bxYo/28WKP+lYAD/pmEA/6VgAP+lYAD/pF8A/6RfAP+kXwD/o14A/6NeAP+iXQD/" + ` "ol0A/6hiAP+ybQD/tXAA/7VwAP+0bwD/tG8A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7FsAP" + ` "+wbAD/sGsA/69rAP+zcQz/vYMr/7+HMv+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/s3MU" + ` "/6tmAP+aUwD/kUkA/5BIAP+fXRX//v7+//7+/v/+/v7//v7+//Dw8P/g4OH/0dHS/MLCwwfT09" + ` "Qo4uLj//Ly8v/+/v7//v7+//7+/v/+/v7//v7+/5VPBP+RSQD/kkoA/55YAP+sZwD/tXgc/72G" + ` "M/+9hjP/vocz/76HM/++hzP/v4gz/7+IM/+/iDP/v4cx/7yAJf+ycAf/sWwA/7FsAP+xbQD/sm" + ` "0A/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7VwAP+zbgD/qWQA/6FcAP+iXAD/olwA/6JdAP+j" + ` "XgD/o14A/6RfAP+kXwD/pF8A/6RfAP+lYAD/pWAA/6VgAP+mYQD/pmEA//Po2v////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////////////////+ve4P9vFij/bxYo/6RfAP+lYAD/pF8A/6RfAP+kXwD/pF8A/6NeAP" + ` "+jXgD/ol0A/6JcAP+iXAD/oVwA/6FcAP+oYwD/s24A/7RvAP+0bwD/s24A/7NuAP+zbgD/sm4A" + ` "/7JtAP+xbQD/sWwA/7FsAP+wbAD/sm8H/7uAJf+/hzH/v4gz/7+IM/++hzP/vocz/76HM/+9hj" + ` "P/vYYz/72FM/+1eBz/q2YA/55XAP+RSQD/kEgA/5RPBP/+/v7//v7+//7+/v/+/v7/8vLy/+Li" + ` "4//T09T/xMTFKNTU1Tnj4+T/8/Pz//7+/v/+/v7//v7+//7+/v/+/vz/kEgA/5BIAP+RSQD/oV" + ` "sA/6xnAP+4fCP/vYYz/72GM/++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+/iTP/v4cw/7p+H/+y" + ` "bgT/sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/tG8A/7RvAP+1cAD/rWcA/6JbAP+gWwD/oFsA/6" + ` "FcAP+iXAD/olwA/6JdAP+iXQD/o14A/6NeAP+kXwD/pF8A/6RfAP+kXwD/pWAA/6VgAP+lYAD/" + ` "8+ja//////////////////////////////////////////////////////////////////////" + ` "//////////////////////////////////////697g/28WKP9vFij/o14A/6RfAP+kXwD/pF8A" + ` "/6NeAP+jXgD/ol0A/6JdAP+iXAD/olwA/6FcAP+gWwD/oFsA/6BaAP+iWwD/rWcA/7RvAP+0bw" + ` "D/s24A/7NuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7FuBP+6fR//vocw/7+IM/+/iDP/v4gz/76H" + ` "M/++hzP/vocz/72GM/+9hjP/vYUz/7h8I/+rZgD/oFsA/5BIAP+PSAD/kEgA//7+/P/+/v7//v" + ` "7+//7+/v/z8/P/4+Pk/9TU1f/FxcY51dXWReTk5f/09PT//v7+//7+/v/+/v7//v7+//fy6/+P" + ` "SAD/kEgA/5FJAP+jXQD/rGcA/7l/KP+9hjP/vYYz/76HM/++hzP/vocz/7+IM/+/iDP/v4gz/7" + ` "+JM//AiTP/v4cv/7l7Gv+ybgP/sW0A/7JtAP+ybgD/s24A/7NuAP+0bwD/sWwA/6ReAP+fWQD/" + ` "n1kA/6BaAP+gWwD/oFsA/6FcAP+hXAD/olwA/6JcAP+iXQD/ol0A/6NeAP+jXgD/pF8A/6RfAP" + ` "+kXwD/pF8A/6RfAP/y6Nr/////////////////////////////////////////////////////" + ` "///////////////////////////////////////////////////////r3uD/bxYo/28WKP+jXg" + ` "D/pF8A/6NeAP+jXgD/ol0A/6JdAP+iXAD/olwA/6FcAP+hXAD/oFsA/6BbAP+gWgD/n1kA/59Z" + ` "AP+eWAD/o14A/7FsAP+zbgD/s24A/7JuAP+ybQD/sW0A/7FsAP+ybgP/uHsa/7+GL/+/iTP/v4" + ` "gz/7+IM/+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/uX8o/6tmAP+iXQD/kEgA/49IAP+P" + ` "RwD/9/Hp//7+/v/+/v7//v7+//T09P/k5OX/1dXW/8fHyEXW1tdS5eXm//X19f/+/v7//v7+//" + ` "7+/v/+/v7/7uLS/49HAP+PSAD/kEgA/6ReAP+sZwD/uoAq/72GM/+9hjP/vocz/76HM/++hzP/" + ` "v4gz/7+IM/+/iDP/v4kz/8CJM//AiTP/v4Yt/7h5Fv+ybwP/sm0A/7JuAP+zbgD/s24A/61oAP" + ` "+fWQD/nVgA/55YAP+fWQD/n1kA/6BaAP+gWgD/oFsA/6FcAP+hXAD/olwA/6JcAP+iXQD/ol0A" + ` "/6JdAP+jXgD/o14A/6RfAP+kXwD/pF8A//Lo2v////////////////////////////////////" + ` "///////////////////////////////////////////////////////////////////////+ve" + ` "4P9vFij/bxYo/6JdAP+jXgD/ol0A/6JdAP+iXQD/olwA/6JcAP+hXAD/oVwA/6BbAP+gWgD/oF" + ` "oA/59ZAP+fWQD/nlgA/51YAP+dWAD/nlkA/6xnAP+zbgD/sm4A/7JtAP+xbQD/sm4D/7h5Fv++" + ` "hi3/wIkz/7+JM/+/iDP/v4gz/7+IM/++hzP/vocz/76HM/+9hjP/vYYz/72FM/+6gCr/q2YA/6" + ` "NeAP+PSAD/j0cA/49HAP/u4tL//v7+//7+/v/+/v7/9fX1/+Xl5v/W1tf/x8fIUtfX2F/m5uf/" + ` "9vb2//7+/v/+/v7//v7+//7+/v/k0rv/j0cA/49IAP+QSAD/pV8A/6xnAP+7gi3/vYYz/72GM/" + ` "++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+/iTP/wIkz/8CJM//BiTP/v4Us/7d4FP+zbwP/sm4A" + ` "/7NtAP+nYQD/nFYA/5xXAP+dWAD/nVgA/55YAP+eWAD/n1kA/6BaAP+gWgD/oFsA/6BbAP+hXA" + ` "D/oVwA/6JcAP+iXAD/ol0A/6JdAP+iXQD/o14A/6NeAP+jXgD/8uja////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "//////////////697g/28WKP9vFij/oVwA/6JdAP+iXQD/olwA/6JcAP+hXAD/oVwA/6BbAP+g" + ` "WwD/oFoA/6BaAP+fWQD/nlgA/55YAP+dWAD/nVgA/5xXAP+cVgD/nFYA/6ZgAP+ybQD/sm0A/7" + ` "JvA/+3dxT/v4Us/8CJM//AiTP/v4kz/7+IM/+/iDP/v4gz/76HM/++hzP/vocz/72GM/+9hjP/" + ` "vYUz/7uCLf+rZgD/pF8A/49IAP+PRwD/jkYA/+TSu//+/v7//v7+//7+/v/29vb/5ubn/9fX2P" + ` "/IyMlf19fYbObm5//29vb//v7+//7+/v/+/v7//v7+/9zDpv+ORgD/j0cA/49IAP+mYQD/rGcA" + ` "/7yDL/+9hjP/vYYz/76HM/++hzP/vocz/7+IM/+/iDP/v4gz/7+JM//AiTP/wIkz/8GJM//BiT" + ` "L/v4Ys/7h4FP+ybgP/oVsA/5tVAP+cVgD/nFYA/5xXAP+cVwD/nVgA/55YAP+eWAD/n1kA/59Z" + ` "AP+gWgD/oFoA/6BbAP+gWwD/oVwA/6FcAP+iXAD/olwA/6JcAP+iXQD/ol0A/6JdAP/y6Nr///" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////////////////////////////r3uD/bxYo/28WKP+hWwD/olwA/6JcAP+hXAD/oVwA/6" + ` "BbAP+gWwD/oFoA/6BaAP+fWQD/n1kA/55YAP+eWAD/nVgA/5xXAP+cVwD/nFYA/5xWAP+bVQD/" + ` "m1UA/6FbAP+ybQP/t3gU/7+FLP/BiTL/wIkz/8CJM/+/iTP/v4gz/7+IM/+/iDP/vocz/76HM/" + ` "++hzP/vYYz/72GM/+9hTP/vIMv/6tmAP+lYQD/j0cA/45GAP+ORQD/3MOm//7+/v/+/v7//v7+" + ` "//b29v/m5uf/19fY/8jIyWzX19h55ubn//b29v/+/v7//v7+//7+/v/+/v7/1LWR/45GAP+PRw" + ` "D/j0cA/6hiAP+sZwD/vIQx/72GM/+9hjP/vocz/76HM/++hzP/v4gz/7+IM/+/iDP/v4kz/8CJ" + ` "M//AiTP/wYkz/8GJM//BijL/vYMr/6ZmFf+cVwT/m1UA/5tVAP+bVQD/nFYA/5xXAP+cVwD/nV" + ` "gA/51YAP+eWAD/nlgA/59ZAP+gWgD/oFoA/6BaAP+gWwD/oFsA/6FcAP+hXAD/olwA/6JcAP+i" + ` "XAD/olwA//Lo2v////////////////////////////////////////////////////////////" + ` "///////////////////////////////////////////////+ve4P9vFij/bxYo/6FbAP+hXAD/" + ` "oVwA/6BbAP+gWwD/oFoA/6BaAP+gWgD/n1kA/55YAP+eWAD/nVgA/51YAP+cVwD/nFcA/5xWAP" + ` "+bVQD/m1UA/5tVAP+aVAD/nFcE/6VlFf+8gyv/wYky/8GJM//AiTP/wIkz/7+JM/+/iDP/v4gz" + ` "/7+IM/++hzP/vocz/76HM/+9hjP/vYYz/72FM/+8hDH/q2YA/6diAP+PRwD/jkYA/45FAP/UtZ" + ` "H//v7+//7+/v/+/v7/9vb2/+bm5//X19j/yMjJedfX2Hnm5uf/9vb2//7+/v/+/v7//v7+//7+" + ` "/v/UtZH/jkUA/45GAP+PRwD/qGIA/6xnAP+8hDH/vYYz/72GM/++hzP/vocz/76HM/+/iDP/v4" + ` "gz/7+IM/+/iTP/wIkz/8CJM//BiTP/wYkz/76GM/+vdjP/q3Es/6RkGP+cWAb/m1UA/5tVAP+b" + ` "VQD/nFYA/5xWAP+cVwD/nVgA/51YAP+eWAD/nlgA/59ZAP+fWQD/oFoA/6BaAP+gWgD/oFsA/6" + ` "BbAP+hXAD/oVwA/6FcAP+iXAD/8uja////////////////////////////////////////////" + ` "////////////////////////////////////////////////////////////////697g/28WKP" + ` "9vFij/oFsA/6BbAP+gWwD/oFoA/6BaAP+gWgD/n1kA/59ZAP+eWAD/nlgA/51YAP+dWAD/nFcA" + ` "/5xWAP+cVgD/m1UA/5tVAP+bVQD/mlQA/5xYBv+jYxj/qnAs/652M/+9hTP/wYkz/8CJM//AiT" + ` "P/v4kz/7+IM/+/iDP/v4gz/76HM/++hzP/vocz/72GM/+9hjP/vYUz/7yEMf+rZgD/p2IA/45G" + ` "AP+ORQD/jUQA/9S1kf/+/v7//v7+//7+/v/29vb/5ubn/9fX2P/IyMl519fYbObm5//29vb//v" + ` "7+//7+/v/+/v7//v7+/9zDpv+ORQD/jkUA/45GAP+mYAD/rGcA/7uCLv+9hjP/vYYz/76HM/++" + ` "hzP/vocz/7+IM/+/iDP/v4gz/7+JM//AiTP/wIkz/8GJM/+9hTP/rnUz/611M/+tdTP/rHIu/6" + ` "VnHP+dWQj/nFYB/5tVAP+bVQD/nFYA/5xWAP+cVwD/nFcA/51YAP+dWAD/nlgA/55YAP+fWQD/" + ` "n1kA/6BaAP+gWgD/oFoA/6BbAP+gWwD/oFsA/6FcAP/y6Nr///////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////r3uD/bxYo/28WKP+fWgD/oFoA/6BaAP+gWgD/n1kA/59ZAP+eWAD/nlgA/51YAP+dWA" + ` "D/nFcA/5xXAP+cVgD/nFYA/5tVAP+bVQD/m1UA/5tVAf+dWQj/pGYc/6txLv+tdTP/rHQz/651" + ` "M/+9hTP/wIkz/8CJM/+/iTP/v4gz/7+IM/+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/u4" + ` "Iu/6tmAP+lYAD/jkUA/45FAP+NRAD/3MOm//7+/v/+/v7//v7+//b29v/m5uf/19fY/8jIyWzW" + ` "1tdf5eXm//X19f/+/v7//v7+//7+/v/+/v7/5NK7/41EAP+ORQD/jkYA/6VfAP+sZwD/u4Es/7" + ` "2GM/+9hjP/vocz/76HM/++hzP/v4gz/7+IM/+/iDP/v4kz/8CJM//AiTP/vYUz/651M/+sczP/" + ` "rHQz/611M/+tdTP/rHMw/6ZpIf+fXQ3/nFYC/5tVAP+bVQD/m1UA/5xWAP+cVgD/nFcA/5xXAP" + ` "+dWAD/nVgA/55YAP+eWAD/n1kA/59ZAP+fWQD/oFoA/6BaAP+gWgD/oFsA//Lo2v//////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "///////////////////////+ve4P9vFij/bxYo/59ZAP+fWQD/n1kA/59ZAP+eWAD/nlgA/51Y" + ` "AP+dWAD/nFcA/5xXAP+cVgD/nFYA/5tVAP+bVQD/m1UA/5tVAP+bVQL/nlwN/6ZpIf+sczD/rX" + ` "Uz/6x0M/+sczP/rHMz/610M/+8hTP/wIkz/7+JM/+/iDP/v4gz/7+IM/++hzP/vocz/76HM/+9" + ` "hjP/vYYz/72FM/+7gSz/q2YA/6RfAP+ORQD/jUQA/4xDAP/k0rv//v7+//7+/v/+/v7/9fX1/+" + ` "Xl5v/W1tf/x8fIX9XV1lLk5OX/9PT0//7+/v/+/v7//v7+//7+/v/u4tL/jEMA/41EAP+ORQD/" + ` "o10A/6xnAP+6fyn/vYYz/72GM/++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+/iTP/wIkz/72GM/" + ` "+sdDP/q3Iz/6xzM/+sczP/rHQz/6x0M/+tdTP/rXUy/6ltJ/+iYRP/nFcF/5tVAP+bVQD/m1UA" + ` "/5xWAP+cVgD/nFcA/5xXAP+cVwD/nVgA/51YAP+eWAD/nlgA/55YAP+fWQD/n1kA/59ZAP+gWg" + ` "D/8ufa////////////////////////////////////////////////////////////////////" + ` "////////////////////////////////////////697g/28WKP9vFij/nlgA/55YAP+eWAD/nl" + ` "gA/51YAP+dWAD/nFcA/5xXAP+cVwD/nFYA/5xWAP+bVQD/m1UA/5tVAP+aVAD/nFcF/6FgE/+p" + ` "bSf/rHQy/6x0M/+sdDP/rHMz/6xzM/+rcjP/qnIz/6tzM/+9hTP/v4kz/7+IM/+/iDP/v4gz/7" + ` "6HM/++hzP/vocz/72GM/+9hjP/vYUz/7p/Kf+rZgD/o10A/41EAP+MQwD/jEMA/+7i0//+/v7/" + ` "/v7+//7+/v/09PT/5OTl/9XV1v/Hx8hS1NTVRePj5P/z8/P//v7+//7+/v/+/v7//v7+//fx6/" + ` "+MQwD/jUQA/41EAP+iWwD/rGcA/7l+J/+9hjP/vYYz/76HM/++hzP/vocz/7+IM/+/iDP/v4gz" + ` "/7+JM/++hzP/rXUz/6pxM/+qcjP/q3Iz/6tyM/+sczP/rHQz/6x0M/+tdTP/rXUz/6txLP+lZh" + ` "v/nlsL/5xWAv+bVQD/m1UA/5tVAP+cVgD/nFYA/5xXAP+cVwD/nFcA/51YAP+dWAD/nVgA/55Y" + ` "AP+eWAD/nlgA/59ZAP/y59r///////////////////////////////////////////////////" + ` "/////////////////////////////////////////////////////////r3uD/bxYo/28WKP+d" + ` "VwD/nVgA/51YAP+dWAD/nFcA/5xXAP+cVwD/nFYA/5xWAP+bVQD/m1UA/5tVAP+bVQD/m1UC/5" + ` "5bC/+kZRv/qnAs/611M/+sdDP/rHQz/6xzM/+rcjP/q3Iz/6pyM/+qcTP/qnEz/610M/++hzP/" + ` "v4gz/7+IM/+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/uX4n/6tmAP+hWwD/jUQA/4xDAP" + ` "+LQgH/9/Hp//7+/v/+/v7//v7+//Pz8//j4+T/1NTV/8XFxkXT09Q54uLj//Ly8v/+/v7//v7+" + ` "//7+/v/+/v7//v79/4xCAP+MQwD/jUQA/59YAP+sZwD/t3si/72GM/+9hjP/vocz/76HM/++hz" + ` "P/v4gz/7+IM/+/iDP/vogz/651M/+qcTP/qnEz/6pxM/+qcjP/q3Iz/6tyM/+sczP/rHMz/6x0" + ` "M/+tdTP/rXUz/610Mf+obCX/omET/51ZB/+cVgH/m1UA/5tVAP+bVQD/nFYA/5xWAP+cVgD/nF" + ` "cA/5xXAP+dWAD/nVgA/51YAP+dWAD/nlgA//Hn2v//////////////////////////////////" + ` "/////////////////////////////////////////////////////////////////////////+" + ` "ve4P9vFij/bxYo/5xXAP+dWAD/nFcA/5xXAP+cVgD/nFYA/5xWAP+bVQD/m1UA/5tVAP+bVQD/" + ` "m1UB/51ZB/+hYBP/qGwl/6xzMf+tdTP/rHQz/6xzM/+sczP/q3Iz/6tyM/+qcjP/qnEz/6pxM/" + ` "+qcTP/qXAz/651M/++hzP/v4gz/7+IM/++hzP/vocz/76HM/+9hjP/vYYz/72FM/+3eyL/q2YA" + ` "/55YAP+MQwD/i0IA/4xBAv/+/v3//v7+//7+/v/+/v7/8vLy/+Li4//T09T/xMTFOdHR0ijg4O" + ` "H/8PDw//7+/v/+/v7//v7+//7+/v/+/v7/kUkF/4tCAP+MQwD/mlMA/6xnAP+1dxv/vYYz/72G" + ` "M/++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+yeTP/qXAz/6lwM/+qcTP/qnEz/6pxM/+qcjP/qn" + ` "Iz/6tyM/+sczP/rHMz/6x0M/+sdDP/rXUz/611M/+rcS3/pmgf/6BfEP+cVwX/m1UA/5tVAP+b" + ` "VQD/m1UA/5xWAP+cVgD/nFYA/5xXAP+cVwD/nFcA/5xXAP+dWAD/8efa//////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "////////////////697g/28WKP9vFij/m1YA/5xXAP+cVgD/nFYA/5xWAP+bVQD/m1UA/5tVAP" + ` "+bVQD/mlQA/5xXBf+gXhD/pmgf/6pwLf+tdTP/rHQz/6x0M/+sczP/rHMz/6tyM/+qcjP/qnIz" + ` "/6pxM/+qcTP/qnEz/6lwM/+pcDP/qG8z/7J5M/+/iDP/v4gz/76HM/++hzP/vocz/72GM/+9hj" + ` "P/vYUz/7V3G/+rZgD/mVIA/4tCAP+LQgH/kUkH//7+/v/+/v7//v7+//7+/v/w8PD/4ODh/9HR" + ` "0v/CwsMo0NDRB9/f3/zu7u///v7+//7+/v/+/v7//v7+//7+/v+bWBf/i0IB/4xDAP+VTQD/q2" + ` "YA/7JyE/+9hTP/vYYz/72GM/++hzP/vocz/76HM/+/iDP/t38z/6huM/+obzP/qXAz/6lwM/+q" + ` "cTP/qnEz/6pxM/+qcjP/qnIz/6tyM/+rcjP/rHMz/6x0M/+sdDP/rXUz/611M/+tdTL/qnAr/6" + ` "VnHP+gXQ7/nFcF/5tVAP+bVQD/m1UA/5tVAP+bVQD/nFYA/5xWAP+cVgD/nFYA/5xXAP/x59r/" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////////////////////////////r3uD/bxYo/28WKP+bVQD/nFYA/5tVAP+bVQD/m1UA" + ` "/5tVAP+bVQD/mlQA/5xXBf+gXQ7/pGYc/6pwK/+sdDL/rXUz/6x0M/+sdDP/rHMz/6tyM/+rcj" + ` "P/qnIz/6pyM/+qcTP/qnEz/6pxM/+pcDP/qXAz/6hvM/+objP/qG4z/7d/M/++hzP/vocz/76H" + ` "M/+9hjP/vYYz/72FM/+9hTP/sXET/6pmAP+VTQD/i0IB/4tBA/+aWBj//v7+//7+/v/+/v7//v" + ` "7+/+7u7//f39//0NDR/MHBwgcAAAAA3d3d3Ozs7f/8/Pz//v7+//7+/v/+/v7//v7+/6lvNP+L" + ` "QQL/i0IB/5FIAP+rZgD/sG0L/72FM/+9hjP/vYYz/76HM/++hzP/vocz/7yEM/+pbzP/p20z/6" + ` "huM/+obzP/qG8z/6lwM/+qcTP/qnEz/6pxM/+qcTP/qnIz/6tyM/+rcjP/rHMz/6xzM/+sdDP/" + ` "rHQz/611M/+tdTP/rXUy/6pvKv+kZhz/oF8Q/51ZB/+cVgH/m1UA/5tVAP+bVQD/m1UA/5tVAP" + ` "+cVgD/nFYA//Hn2v//////////////////////////////////////////////////////////" + ` "/////////////////////////////////////////////////+ve4P9vFij/bxYo/5pUAP+bVQ" + ` "D/m1UA/5tVAP+bVQD/m1UB/51ZB/+gXhD/pGYc/6pvKv+sdDL/rXUz/6x0M/+sdDP/rHMz/6xz" + ` "M/+rcjP/q3Iz/6pyM/+qcTP/qnEz/6pxM/+qcTP/qXAz/6hvM/+obzP/qG4z/6dtM/+nbTP/qG" + ` "4z/7uDM/++hzP/vocz/72GM/+9hjP/vYUz/72FM/+vbQv/qmYA/5BHAP+LQQL/ikEE/6lvNP/+" + ` "/v7//v7+//7+/v/8/Pz/7Ozt/93d3f/Ozs/dAAAAAAAAAADb29u26enq//n5+f/+/v7//v7+//" + ` "7+/v/+/v7/u4xa/4pBBP+LQQL/jEMA/6tlAP+taQT/vYUy/72GM/+9hjP/vocz/76HM/++hzP/" + ` "q3Iz/6ZtM/+nbTP/p20z/6huM/+obzP/qG8z/6lwM/+pcDP/qnEz/6pxM/+qcTP/qnIz/6pyM/" + ` "+rcjP/q3Iz/6xzM/+sczP/rHQz/6x0M/+tdTP/rXUz/611Mv+rcSz/pmgf/6JhFP+fXAz/nFcE" + ` "/5tVAP+bVQD/m1UA/5tVAP+bVQD/8efa//////////////////////////////////////////" + ` "//////////////////////////////////////////////////////////////////697g/28W" + ` "KP9vFij/mlQA/5tVAP+aVAD/nFcE/59cDP+hYBT/pmgf/6txLP+sdDL/rXUz/6x0M/+sdDP/rH" + ` "Mz/6xzM/+rcjP/q3Iz/6pyM/+qcjP/qnEz/6pxM/+qcTP/qXAz/6lwM/+obzP/qG8z/6huM/+n" + ` "bTP/p20z/6ZtM/+mbTP/q3Iz/76HM/++hzP/vYYz/72GM/+9hTP/vYUy/6xoBP+qZQD/jEIB/4" + ` "pBBP+KQQT/uoxb//7+/v/+/v7//v7+//n5+f/p6er/29vb/8zMzbYAAAAAAAAAANjY2I/n5+j/" + ` "9vb2//7+/v/+/v7//v7+//7+/v/RsY7/ikEE/4tBBP+LQQL/pV8A/61oAf+6gSv/vYYz/72GM/" + ` "++hzP/vocz/7R7M/+mbTP/pm0z/6ZtM/+nbTP/p20z/6huM/+objP/qG8z/6lwM/+pcDP/qnEz" + ` "/6pxM/+qcTP/qnEz/6pyM/+qcjP/q3Iz/6tyM/+sczP/rHMz/6x0M/+sdDP/rXUz/611M/+tdT" + ` "P/rHMv/6htJv+kZhz/omET/59cDP+cWAb/nFYB/5tVAP/x59r/////////////////////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////r3uD/bxYo/28WKP+bVwb/n1wM/6FgE/+kZhz/qG0m/6tyL/+tdTP/rXUz/6x0M/+s" + ` "dDP/rHMz/6xzM/+rcjP/q3Iz/6pyM/+qcjP/qnEz/6pxM/+qcTP/qnEz/6lwM/+pcDP/qG8z/6" + ` "huM/+objP/p20z/6dtM/+mbTP/pm0z/6ZtM/+mbDP/s3sz/76HM/+9hjP/vYYz/72FM/+6gSv/" + ` "rGcB/6VfAP+LQQT/ikEE/4lABv/RsI///v7+//7+/v/+/v7/9vb2/+fn6P/Y2Nj/ycnKjwAAAA" + ` "AAAAAA1dXWaOTk5f/z8/P//v7+//7+/v/+/v7//v7+/+7k1/+JQAX/ikEE/4tBA/+dVgD/rGcA" + ` "/7Z5H/+9hjP/vYYz/76HM/+7hDP/pmwz/6ZsM/+mbTP/pm0z/6ZtM/+mbTP/p20z/6huM/+obj" + ` "P/qG8z/6hvM/+pcDP/qnEz/6pxM/+qcTP/qnEz/6pyM/+qcjP/q3Iz/6tyM/+sczP/rHMz/6xz" + ` "M/+sdDP/rHQz/611M/+tdTP/rXUz/611Mv+sci7/qG0m/6VnHv+jYxb/oF8Q//Lo3P////////" + ` "//////////////////////////////////////////////////////////////////////////" + ` "/////////////////////////+ve4P9vFij/bxYo/6RmHv+obSb/rHIu/6x0Mv+tdTP/rXUz/6" + ` "x0M/+sdDP/rHMz/6xzM/+sczP/q3Iz/6tyM/+qcjP/qnIz/6pxM/+qcTP/qnEz/6pxM/+pcDP/" + ` "qG8z/6hvM/+objP/qG4z/6dtM/+mbTP/pm0z/6ZtM/+mbTP/pmwz/6VrM/+mbDP/u4Qz/72GM/" + ` "+9hjP/vYUz/7Z5H/+rZgD/nVYB/4pBBP+JQAb/iT8H/+7k1//+/v7//v7+//7+/v/z8/P/5OTl" + ` "/9XV1v/GxsdoAAAAAAAAAADS0tNA4eHi//Dw8P/+/v7//v7+//7+/v/+/v7//v7+/5FKDv+JQA" + ` "X/ikEE/5VNAv+rZgD/snIT/72FM/+9hjP/vYYz/61zM/+lajP/pWsz/6ZsM/+mbDP/pm0z/6Zt" + ` "M/+mbTP/p20z/6dtM/+objP/qG8z/6hvM/+pcDP/qXAz/6pxM/+qcTP/qnEz/6pxM/+qcjP/qn" + ` "Iz/6tyM/+rcjP/q3Iz/6xzM/+sczP/rHQz/6x0M/+sdDP/rXUz/611M/+tdTP/rXUz/610Mf+r" + ` "cSz/8+rg//////////////////////////////////////////////////////////////////" + ` "//////////////////////////////////////////697g/28WKP9vFij/rHMz/611M/+tdTP/" + ` "rHQz/6x0M/+sdDP/rHMz/6xzM/+rcjP/q3Iz/6tyM/+qcjP/qnIz/6pxM/+qcTP/qnEz/6pxM/" + ` "+pcDP/qXAz/6hvM/+obzP/qG4z/6dtM/+nbTP/pm0z/6ZtM/+mbTP/pmwz/6ZsM/+lazP/pWoz" + ` "/6VqM/+scjP/vYYz/72FM/+9hTP/sXET/6pmAP+VTQL/iUAF/4k/CP+RSg///v7+//7+/v/+/v" + ` "7//v7+//Dw8P/h4eL/0tLT/8PDxEAAAAAAAAAAANDQ0Qze3t767e3u//z8/P/+/v7//v7+//7+" + ` "/v/+/v7/p2w0/4lACP+JQAX/jUQD/6tmAP+uawf/vIQx/72GM/+3fzP/pGkz/6VqM/+lajP/pW" + ` "sz/6ZsM/+mbDP/pm0z/6ZtM/+mbTP/p20z/6dtM/+objP/qG4z/6hvM/+obzP/qXAz/6lwM/+q" + ` "cTP/qnEz/6pxM/+qcTP/qnIz/6pyM/+rcjP/q3Iz/6tyM/+sczP/rHMz/6xzM/+sdDP/rHQz/6" + ` "x0M/+sdDP/rX
combined_dataset/train/non-malicious/sample_64_81.ps1
sample_64_81.ps1
# # Module manifest for module 'OCI.PSModules.Functions' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Functions.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Functions Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList', 'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList', 'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList', 'Get-OCIFunctionsPbfListingVersion', 'Get-OCIFunctionsPbfListingVersionsList', 'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction', 'Move-OCIFunctionsApplicationCompartment', 'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction', 'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction', 'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/New Switch and Portgroup.ps1
New Switch and Portgroup.ps1
get-vc vcservername Get-VMHost | New-VirtualSwitch -Name SwitchName Get-VMHost | Get-VirtualSwitch -Name SwitchName | New-VirtualPortGroup -Name portgroupname -VLANID vlan_number
combined_dataset/train/non-malicious/188.ps1
188.ps1
function New-SCCMDeviceVariable { [cmdletbinding()] PARAM ( [parameter(Mandatory = $true)] [Alias('SiteServer')] [System.String]$ComputerName, [parameter(Mandatory = $true)] [System.String]$SiteCode, [Alias("RunAs")] [System.Management.Automation.Credential()] $Credential = [System.Management.Automation.PSCredential]::Empty, [parameter(Mandatory = $true)] [int]$ResourceID, [parameter(Mandatory = $true)] [Alias("VariableName")] [System.String]$Name, [parameter(Mandatory = $true)] [Alias("VariableValue")] [System.String]$Value, [System.Boolean]$IsMasked = $false ) PROCESS { TRY { Write-Verbose -Message "$ResourceID - Create splatting" $SCCM_Splatting = @{ ComputerName = $ComputerName NameSpace = "root\sms\site_$SiteCode" } IF ($PSBoundParameters['Credential']) { $SCCM_Splatting.Credential = $Credential } Write-Verbose -Message "$ResourceID - Verify if machine settings exist" $MachineSettingsClass = Get-WmiObject @SCCM_Splatting -Query "SELECT ResourceID FROM SMS_MachineSettings WHERE ResourceID = '$ResourceID'" if ($MachineSettingsClass) { Write-Verbose -Message "$ResourceID - Machine Settings Exists" Write-Verbose -Message "$ResourceID - Create Variable" $MachineVariablesClass = Get-WmiObject -list @SCCM_Splatting -Class "SMS_MachineVariable" $NewMachineVariableInstance = $MachineVariablesClass.CreateInstance() $NewMachineVariableInstance.psbase.Properties['Name'].Value = $Name $NewMachineVariableInstance.psbase.Properties['Value'].Value = $Value $NewMachineVariableInstance.psbase.Properties['IsMasked'].Value = $IsMasked $MachineSettingsClass.get() Write-Verbose -Message "$ResourceID - Insert machine Variable into machine settings" $MachineSettingsClass.MachineVariables += $NewMachineVariableInstance Write-Verbose -Message "$ResourceID - Save Change" $MachineSettingsClass.Put() } else { Write-Verbose -Message "$ResourceID - Machine Settings does NOT Exists" Write-Verbose -Message "$ResourceID - Machine Settings - Creation" $MachineSettingsClass = Get-WmiObject @SCCM_Splatting -List -Class 'SMS_MachineSettings' $NewMachineSettingsClassInstance = $MachineSettingsClass.CreateInstance() $NewMachineSettingsClassInstance.psbase.properties["ResourceID"].value = $ResourceID $NewMachineSettingsClassInstance.psbase.properties["SourceSite"].value = $SiteCode Write-Verbose -Message "$ResourceID - Machine Variable - Creation" $MachineVariablesClass = Get-WmiObject -list @SCCM_Splatting -Class "SMS_MachineVariable" $NewMachineVariablesInstance = $MachineVariablesClass.CreateInstance() $NewMachineVariablesInstance.psbase.Properties['Name'].Value = $Name $NewMachineVariablesInstance.psbase.Properties['Value'].Value = $Value $NewMachineVariablesInstance.psbase.Properties['IsMasked'].Value = $IsMasked Write-Verbose -Message "$ResourceID - Insert machine Variable into machine settings" $NewMachineSettingsClassInstance.MachineVariables += $NewMachineVariablesInstance Write-Verbose -Message "$ResourceID - Save Change" $NewMachineSettingsClassInstance.Put() } } CATCH { Write-Warning -Message "$ResourceID - Issue while processing the Device" $Error[0] } FINALLY { } } }
combined_dataset/train/non-malicious/297.ps1
297.ps1
function Test-PSFParameterBinding { [CmdletBinding(HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Test-PSFParameterBinding')] Param ( [Parameter(Mandatory = $true, Position = 0)] [string[]] $ParameterName, [Alias('Reverse')] [switch] $Not, [switch] $And, [ValidateSet('Any', 'Explicit', 'PipeScript')] [string] $Mode = 'Any', [object] $BoundParameters = (Get-PSCallStack)[0].InvocationInfo.BoundParameters ) if ($And) { $test = $true } else { $test = $false } $pipeScriptForbidden = $Mode -eq "Explicit" $explicitForbidden = $Mode -eq "PipeScript" foreach ($name in $ParameterName) { $isPipeScript = ($BoundParameters.$name.PSObject.TypeNames -eq 'System.Management.Automation.CmdletParameterBinderController+DelayedScriptBlockArgument') -as [bool] if ($And) { if (-not $BoundParameters.ContainsKey($name)) { $test = $false continue } if ($isPipeScript -and $pipeScriptForbidden) { $test = $false } if (-not $isPipeScript -and $explicitForbidden) { $test = $false } } else { if ($BoundParameters.ContainsKey($name)) { if ($isPipeScript -and -not $pipeScriptForbidden) { $test = $true } if (-not $isPipeScript -and -not $explicitForbidden) { $test = $true } } } } return ((-not $Not) -eq $test) } if (-not (Test-Path Alias:Was-Bound)) { Set-Alias -Value Test-PSFParameterBinding -Name Was-Bound -Scope Global }
combined_dataset/train/non-malicious/sample_4_98.ps1
sample_4_98.ps1
ConvertFrom-StringData @' id_veritasvxiobadconfigflags_sd=VXIO device has a bad state flag and this may cause shadown copies of Veritas volumes to fail. '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJCxSgeLCkPjtq # 4aJqqaUIJ5jkd0XsShszCl1fUFyw8qCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINFA # UGuC7St8zDAiichfXYKm3yc5bDyjomCMVDCfXybnMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAHElhR28/czbUM2y3Kx4FGqCXiwUGwoBZjc2K # xFlDeQByumUal3gzWxhALTQn4/5H2VZ4pWXt2RePYHpHEuv9GDQhfZlsQJ7y0vfZ # kaizTIXEOZovDsbSCY+3qKSQkep3v82P/XUZjM+c9E3aPoKrc92LscukGVe4Cdzd # b3bT7nx/qeBgGEF2Gox4J+4GUw6ARt2QC29H2/1ZxYCI21xP8LJpCqnFDLri5Ohi # AwW0Idy+UE7CJjhL9IGTHOJBPx424y99M5cIz+83kXhuXA3fl2wpN/1xXdHTBzRG # G4hxQ0YC7tXKQj1IKilAJSvd5Sgp3wFFLhu6YxDAh3j5vkV4wKGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB6lEKYQWY0+wEbc7uVpuA6+LiIanfZs4cg # vmHfZ5+7NgIGZut+oGFiGBMyMDI0MTAyODExNDA0MC41MzdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big # r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF # RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts # urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF # 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83 # 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ # t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l # RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT # shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+ # vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7 # 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A # SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt # weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc # D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL # 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO # RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H # WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn # jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va # iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC # 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K # tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW # wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w # fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0 # MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA # AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l # eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L # fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M # Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a # tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao # 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgr33lNN6+NtvjMrY1TNkGYL/L4GvpPeIWOVVtULKtya0wgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3 # d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU # R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICABlKEOTqm6jJcaMUNTHvnOPwUpEJ46+s # Fxbl9GNCHP6kA/e6Yw/EHaWLcEhlsgKw5YPGs6DdxFq9fOamullMvhQVU3kbd7ep # FsicWXYXkefcTthpgM4kpW9q54lln6RuIEDb01STKioCr+KSTQtw74z9F7R0dhdc # ndJ1Mell4LYJW9HkendAkRL6QBQAxWmuLU1N1jRydD8HBYO2hsb9o2otr/YH5TSH # jCMVq/57eoghioogkzUrYblJgruJeQLjA/xwrtfIIFJGhc1hxLNtpHUOr64BZN2d # CzrU89NRFNJhJeSYRVbtC0KA2TC8xm2XW6nDTnxbrAxfTpP74vOFe1pKIb+7O79d # WiTtZ2WLg5RIc4Szo1X4lzTfc3cGHC2R6HHRTzEfNun2x4txObxKHtkTZmLL9SkY # FLhSyn5JA5b46axW79u5ooUOpR19ZRVc+diDtl6zcTbFSDghN3x5QjzQ074OgQhD # z4ILawwgXCxwaq6l5AqYoiTgc+tFqo5zUO2td54QuMngx/A3hnk6LKzS0k87l2ef # vbNIAOTbvYjBz6QmVJ38/KaRahWjnpBrCBjre61hL8LUr688uxiNDuSmxp5IsWkB # c5O7Ae7M058D5jVA9eWkEkdZy3BBjQrqLY+v2hFbpx0n2/RMc4EKsE9tEr8ZQgJ+ # MRPgkGPBXih4 # SIG # End signature block
combined_dataset/train/non-malicious/1027.ps1
1027.ps1
$ApplicationPackagePath = "C:\Users\sfuser\documents\visual studio 2017\Projects\Voting\Voting\pkg\Debug" $ApplicationName = "fabric:/Voting" $ApplicationTypeName = "VotingType" $ApplicationTypeVersion = "1.3.0" $imageStoreConnectionString = "fabric:ImageStore" $CopyPackageTimeoutSec = 600 $CompressPackage = $false $oldApplication = Get-ServiceFabricApplication -ApplicationName $ApplicationName if (!$oldApplication) { $errMsg = "Application '$ApplicationName' doesn't exist in cluster." throw $errMsg } else { $upgradeStatus = Get-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName if ($upgradeStatus.UpgradeState -ne "RollingBackCompleted" -and $upgradeStatus.UpgradeState -ne "RollingForwardCompleted" -and $upgradeStatus.UpgradeState -ne "Failed") { $errMsg = "An upgrade for the application '$ApplicationTypeName' is already in progress." throw $errMsg } $reg = Get-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $ApplicationTypeVersion } if ($reg) { Write-Host 'Application Type '$ApplicationTypeName' and Version '$ApplicationTypeVersion' was already registered with Cluster, unregistering it...' $reg | Unregister-ServiceFabricApplicationType -Force } $applicationPackagePathInImageStore = $ApplicationTypeName Write-Host "Copying application package to image store..." Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $ApplicationPackagePath -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -TimeOutSec $CopyPackageTimeoutSec -CompressPackage:$CompressPackage if(!$?) { throw "Copying of application package to image store failed. Cannot continue with registering the application." } Write-Host "Registering application type..." Register-ServiceFabricApplicationType -ApplicationPathInImageStore $applicationPackagePathInImageStore if(!$?) { throw "Registration of application type failed." } Remove-ServiceFabricApplicationPackage -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore if(!$?) { Write-Host "Removing the application package failed." } try { Write-Host "Start upgrading application..." Start-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName -ApplicationTypeVersion $ApplicationTypeVersion -HealthCheckStableDurationSec 60 -UpgradeDomainTimeoutSec 1200 -UpgradeTimeout 3000 -FailureAction Rollback -Monitored } catch { Write-Host ("Error starting upgrade. " + $_) Write-Host "Unregister application type '$ApplicationTypeName' and version '$ApplicationTypeVersion' ..." Unregister-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName -ApplicationTypeVersion $ApplicationTypeVersion -Force throw } do { Write-Host "Waiting for upgrade..." Start-Sleep -Seconds 3 $upgradeStatus = Get-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName } while ($upgradeStatus.UpgradeState -ne "RollingBackCompleted" -and $upgradeStatus.UpgradeState -ne "RollingForwardCompleted" -and $upgradeStatus.UpgradeState -ne "Failed") if($upgradeStatus.UpgradeState -eq "RollingForwardCompleted") { Write-Host "Upgrade completed successfully." } elseif($upgradeStatus.UpgradeState -eq "RollingBackCompleted") { Write-Error "Upgrade was Rolled back." } elseif($upgradeStatus.UpgradeState -eq "Failed") { Write-Error "Upgrade Failed." } }
combined_dataset/train/non-malicious/1802.ps1
1802.ps1
Describe "Control Service cmdlet tests" -Tags "Feature","RequireAdminOnWindows" { BeforeAll { $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() if ( -not $IsWindows ) { $PSDefaultParameterValues["it:skip"] = $true } } AfterAll { $global:PSDefaultParameterValues = $originalDefaultParameterValues } It "StopServiceCommand can be used as API for '<parameter>' with '<value>'" -TestCases @( @{parameter="Force";value=$true}, @{parameter="Force";value=$false}, @{parameter="NoWait";value=$true}, @{parameter="NoWait";value=$false} ) { param($parameter, $value) $stopservicecmd = [Microsoft.PowerShell.Commands.StopServiceCommand]::new() $stopservicecmd.$parameter = $value $stopservicecmd.$parameter | Should -Be $value } It "RestartServiceCommand can be used as API for '<parameter>' with '<value>'" -TestCases @( @{parameter="Force";value=$true}, @{parameter="Force";value=$false} ) { param($parameter, $value) $restartservicecmd = [Microsoft.PowerShell.Commands.RestartServiceCommand]::new() $restartservicecmd.$parameter = $value $restartservicecmd.$parameter | Should -Be $value } It "Stop/Start/Restart-Service works" { $wasStopped = $false try { $spooler = Get-Service Spooler $spooler | Should -Not -BeNullOrEmpty if ($spooler.Status -ne "Running") { $wasStopped = $true $spooler = Start-Service Spooler -PassThru } $spooler.Status | Should -BeExactly "Running" $spooler = Stop-Service Spooler -PassThru $spooler.Status | Should -BeExactly "Stopped" (Get-Service Spooler).Status | Should -BeExactly "Stopped" $spooler = Start-Service Spooler -PassThru $spooler.Status | Should -BeExactly "Running" (Get-Service Spooler).Status | Should -BeExactly "Running" Stop-Service Spooler (Get-Service Spooler).Status | Should -BeExactly "Stopped" $spooler = Restart-Service Spooler -PassThru $spooler.Status | Should -BeExactly "Running" (Get-Service Spooler).Status | Should -BeExactly "Running" } finally { if ($wasStopped) { Stop-Service Spooler } } } It "Suspend/Resume-Service works" { try { $originalState = "Running" $serviceName = "WerSvc" $service = Get-Service $serviceName if ($service.Status -ne $originalState) { $originalState = $service.Status Start-Service $serviceName } $service | Should -Not -BeNullOrEmpty Suspend-Service $serviceName (Get-Service $serviceName).Status | Should -BeExactly "Paused" Resume-Service $serviceName (Get-Service $serviceName).Status | Should -BeExactly "Running" } finally { Set-Service $serviceName -Status $originalState } } It "Failure to control service with '<script>'" -TestCases @( @{script={Stop-Service dcomlaunch -ErrorAction Stop};errorid="ServiceHasDependentServices,Microsoft.PowerShell.Commands.StopServiceCommand"}, @{script={Suspend-Service winrm -ErrorAction Stop};errorid="CouldNotSuspendServiceNotSupported,Microsoft.PowerShell.Commands.SuspendServiceCommand"}, @{script={Resume-Service winrm -ErrorAction Stop};errorid="CouldNotResumeServiceNotSupported,Microsoft.PowerShell.Commands.ResumeServiceCommand"}, @{script={Stop-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.StopServiceCommand"}, @{script={Start-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.StartServiceCommand"}, @{script={Resume-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.ResumeServiceCommand"}, @{script={Suspend-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.SuspendServiceCommand"}, @{script={Restart-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.RestartServiceCommand"} ) { param($script,$errorid) { & $script } | Should -Throw -ErrorId $errorid } }
combined_dataset/train/non-malicious/538.ps1
538.ps1
function Add-SPOUserFieldtoList { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string] $listTitle, [Parameter(Mandatory=$true, Position=2)] [string] $fieldName ) $newField = "<Field Type='UserMulti' DisplayName='$fieldName' Name='$fieldName' StaticName='$fieldName' UserSelectionScope='0' UserSelectionMode='PeopleAndGroups' Sortable='FALSE' Required='FALSE' Mult='FALSE'/>" Add-SPOField $listTitle $fieldName $newField }
combined_dataset/train/non-malicious/Write-DataTable_3.ps1
Write-DataTable_3.ps1
####################### <# .SYNOPSIS Creates a DataTable for an object .DESCRIPTION Creates a DataTable based on an objects properties. .INPUTS Object Any object can be piped to Out-DataTable .OUTPUTS System.Data.DataTable .EXAMPLE $dt = Get-Alias | Out-DataTable This example creates a DataTable from the properties of Get-Alias and assigns output to $dt variable .NOTES Adapted from script by Marc van Orsouw see link Version History v1.0 - Chad Miller - Initial Release v1.1 - Chad Miller - Fixed Issue with Properties v1.2 - Chad Miller - Added setting column datatype by property as suggested by emp0 v1.3 - Chad Miller - Correct issue with setting datatype on empty properties .LINK http://thepowershellguy.com/blogs/posh/archive/2007/01/21/powershell-gui-scripblock-monitor-script.aspx #> function Out-DataTable { [CmdletBinding()] param([Parameter(Position=0, Mandatory=$true, ValueFromPipeline = $true)] [PSObject[]]$InputObject) Begin { $dt = new-object Data.datatable $First = $true } Process { foreach ($object in $InputObject) { $DR = $DT.NewRow() foreach($property in $object.PsObject.get_properties()) { if ($first) { $Col = new-object Data.DataColumn $Col.ColumnName = $property.Name.ToString() if ($property.value) { $Col.DataType = $property.value.gettype() } $DT.Columns.Add($Col) } if ($property.IsArray) { $DR.Item($property.Name) =$property.value | ConvertTo-XML -AS String -NoTypeInformation -Depth 1 } else { $DR.Item($property.Name) = $property.value } } $DT.Rows.Add($DR) $First = $false } } End { Write-Output @(,($dt)) } } #Out-DataTable
combined_dataset/train/non-malicious/2854.ps1
2854.ps1
function Task { [CmdletBinding(DefaultParameterSetName = 'Normal')] param( [Parameter(Mandatory = $true, Position = 0)] [string]$name, [Parameter(Position = 1)] [scriptblock]$action = $null, [Parameter(Position = 2)] [scriptblock]$preaction = $null, [Parameter(Position = 3)] [scriptblock]$postaction = $null, [Parameter(Position = 4)] [scriptblock]$precondition = {$true}, [Parameter(Position = 5)] [scriptblock]$postcondition = {$true}, [Parameter(Position = 6)] [switch]$continueOnError, [ValidateNotNull()] [Parameter(Position = 7)] [string[]]$depends = @(), [ValidateNotNull()] [Parameter(Position = 8)] [string[]]$requiredVariables = @(), [Parameter(Position = 9)] [string]$description = $null, [Parameter(Position = 10)] [string]$alias = $null, [parameter(Mandatory = $true, ParameterSetName = 'SharedTask', Position = 11)] [ValidateNotNullOrEmpty()] [string]$FromModule, [Alias('Version')] [parameter(ParameterSetName = 'SharedTask', Position = 12)] [string]$requiredVersion, [parameter(ParameterSetName = 'SharedTask', Position = 13)] [string]$minimumVersion, [parameter(ParameterSetName = 'SharedTask', Position = 14)] [string]$maximumVersion, [parameter(ParameterSetName = 'SharedTask', Position = 15)] [string]$lessThanVersion ) function CreateTask { @{ Name = $Name DependsOn = $depends PreAction = $preaction Action = $action PostAction = $postaction Precondition = $precondition Postcondition = $postcondition ContinueOnError = $continueOnError Description = $description Duration = [System.TimeSpan]::Zero RequiredVariables = $requiredVariables Alias = $alias Success = $true ErrorMessage = $null ErrorDetail = $null ErrorFormatted = $null } } if ($name -eq 'default') { Assert (!$action) ($msgs.error_shared_task_cannot_have_action) } if ($PSCmdlet.ParameterSetName -eq 'SharedTask') { Assert (!$action) ($msgs.error_shared_task_cannot_have_action -f $Name, $FromModule) } $currentContext = $psake.context.Peek() if ($PSCmdlet.ParameterSetName -eq 'SharedTask') { $testModuleParams = @{ minimumVersion = $minimumVersion maximumVersion = $maximumVersion lessThanVersion = $lessThanVersion } if(![string]::IsNullOrEmpty($requiredVersion)){ $testModuleParams.minimumVersion = $requiredVersion $testModuleParams.maximumVersion = $requiredVersion } if ($taskModule = Get-Module -Name $FromModule) { $testModuleParams.currentVersion = $taskModule.Version $taskModule = Where-Object -InputObject $taskModule -FilterScript {Test-ModuleVersion @testModuleParams} } else { $getModuleParams = @{ ListAvailable = $true Name = $FromModule ErrorAction = 'Ignore' Verbose = $false } $taskModule = Get-Module @getModuleParams | Where-Object -FilterScript {Test-ModuleVersion -currentVersion $_.Version @testModuleParams} | Sort-Object -Property Version -Descending | Select-Object -First 1 } $referenceTask = CreateTask Assert (-not $psake.ReferenceTasks.ContainsKey($referenceTask.Name)) ($msgs.error_duplicate_task_name -f $referenceTask.Name) $referenceTaskKey = $referenceTask.Name.ToLower() $psake.ReferenceTasks.Add($referenceTaskKey, $referenceTask) Assert ($null -ne $taskModule) ($msgs.error_unknown_module -f $FromModule) $psakeFilePath = Join-Path -Path $taskModule.ModuleBase -ChildPath 'psakeFile.ps1' if (-not $psake.LoadedTaskModules.ContainsKey($psakeFilePath)) { Write-Debug -Message "Loading tasks from task module [$psakeFilePath]" . $psakeFilePath $psake.LoadedTaskModules.Add($psakeFilePath, $null) } } else { $newTask = CreateTask $taskKey = $newTask.Name.ToLower() $refTask = $psake.ReferenceTasks[$taskKey] if ($refTask) { if ($refTask.PreAction -ne $newTask.PreAction) { $newTask.PreAction = $refTask.PreAction } if ($refTask.PostAction -ne $newTask.PostAction) { $newTask.PostAction = $refTask.PostAction } if ($refTask.PreCondition -ne $newTask.PreCondition) { $newTask.PreCondition = $refTask.PreCondition } if ($refTask.PostCondition -ne $newTask.PostCondition) { $newTask.PostCondition = $refTask.PostCondition } if ($refTask.ContinueOnError) { $newTask.ContinueOnError = $refTask.ContinueOnError } if ($refTask.DependsOn.Count -gt 0 -and (Compare-Object -ReferenceObject $refTask.DependsOn -DifferenceObject $newTask.DependsOn)) { $newTask.DependsOn = $refTask.DependsOn } if ($refTask.RequiredVariables.Count -gt 0 -and (Compare-Object -ReferenceObject.RequiredVariables -DifferenceObject $newTask.RequiredVariables)) { $newTask.RequiredVariables += $refTask.RequiredVariables } } Assert (-not $currentContext.tasks.ContainsKey($taskKey)) ($msgs.error_duplicate_task_name -f $taskKey) Write-Debug "Adding task [$taskKey)]" $currentContext.tasks[$taskKey] = $newTask if ($alias) { $aliasKey = $alias.ToLower() Assert (-not $currentContext.aliases.ContainsKey($aliasKey)) ($msgs.error_duplicate_alias_name -f $alias) $currentContext.aliases[$aliasKey] = $newTask } } }
combined_dataset/train/non-malicious/sample_18_58.ps1
sample_18_58.ps1
# -------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All Rights Reserved. # Microsoft Corporation (or based on where you live, one of its affiliates) licenses this sample code for your internal testing purposes only. # Microsoft provides the following sample code AS IS without warranty of any kind. The sample code arenot supported under any Microsoft standard support program or services. # Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. # The entire risk arising out of the use or performance of the sample code remains with you. # In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the code be liable for any damages whatsoever # (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) # arising out of the use of or inability to use the sample code, even if Microsoft has been advised of the possibility of such damages. # --------------------------------------------------------------- Import-Module -Name "$PSScriptRoot\..\Common\RoleHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\NetworkHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\ClusterHelpers.psm1" <# .Synopsis Function to shut down all provisioning machines from any role context .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example Stop-DeployingMachines -Parameters $Parameters This will shut down all hosts that are in provisioning state #> function Stop-DeployingMachines { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" # Shut down all machines to avoid IP conflicts $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters $OEMRole = $Parameters.Roles["OEM"].PublicConfiguration $OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } # If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol if ($OEMModel -match "Hyper-V") { $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(','))) { Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force } Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force } else { Trace-Execution "Shut down $nodeName ($bmcIP)." Stop-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol -Verbose -Wait } } } <# .Synopsis Function to start-up all provisioning machines from any role context .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example Start-DeployingMachines -Parameters $Parameters This will startup all hosts that are in provisioning state #> function Start-DeployingMachines { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters $OEMRole = $Parameters.Roles["OEM"].PublicConfiguration $OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } # If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol # TODO: For now this function will not support virtual hosts. # Due to time constraints and TZL requirements to get # SED support and clean up in CI, we will comment this # part of handling Virtual environments. MUST FIX soon. if ($OEMModel -match "Hyper-V") { Trace-Warning "Virtual environments are not supported in this version." Trace-Warning "This function is FOR NOW only designed to be called for SED cleanup on physical machines" Trace-Warning "Virtual environments will be handled here with the coming version." <# $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(','))) { Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force } Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force #> } else { Trace-Execution "Starting physical node: $nodeName ($bmcIP)." Start-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $NodeInstance -OOBProtocol $oobProtocol -Verbose -Wait } } } <# .Synopsis Function to add a DHCP MAC-based reservation for a given machine. .Parameter NetworkName The network name within the infrastructure network where the IP should be reserved. .Parameter NodeName The node name to be associated with the reservation. .Parameter IPv4Address An IPv4 Address from the speficied network scope that the node will have reserved. .Parameter MacAddress The MAC address to associate with the reservation -- this can be in either dash or dashless format, but not comma format. .Parameter RemoteDHCPServerName The remote server that will act as the DHCP server to configure. .Parameter RemoteDHCPServerNameCredentials Credentials used to add the reservation only used on a remote computer when specified. .Example Add-DeployingMachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -MACAddress '7C-FE-90-AF-1A-00' This will add a reservation for node foo with MAC 7C-FE-90-AF-1A-00 using the local credentials on the local DHCP server #> function Add-DeployingMachineNetworkReservation { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $NetworkName, [Parameter(Mandatory=$true)] [String] $NodeName, [Parameter(Mandatory=$true)] [String] $IPv4Address, [Parameter(Mandatory=$true)] [String] $MacAddress, [Parameter(Mandatory=$false)] [String] $RemoteDHCPServerName, [Parameter(Mandatory=$false)] [PSCredential] $RemoteDHCPServerNameCredentials ) $scriptBlock = { $scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName } $reservation = $scope | Get-DhcpServerv4Reservation | Where-Object { $_.ClientId.Replace(':','').Replace('-','') -eq ($using:MacAddress).Replace(':','').Replace('-','') } foreach ($entry in $reservation) { # Always clear existing reservations that apply to this client ID Remove-DhcpServerv4Reservation -ClientId $entry.ClientId -ScopeId $entry.ScopeId } $scope | Add-DhcpServerv4Reservation -Name $using:NodeName -IPAddress $using:IPv4Address -ClientId $using:MacAddress -Description $using:NodeName } if ($remoteDHCPServerName) { $session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials } else { $session = New-PSSession } try { Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address - $MacAddress." Invoke-Command -Session $session -ScriptBlock $scriptBlock } catch { Trace-Error "Failed with error: $_" throw } finally { Remove-PSSession -Session $session -ErrorAction Ignore } } <# .Synopsis Function to add a DHCP MAC-based reservation for a given machine. .Parameter NetworkName The network name within the infrastructure network where the IP should be reserved. .Parameter NodeName The node name to be associated with the reservation. .Parameter IPv4Address An IPv4 Address from the speficied network scope that the node will have reserved. .Parameter RemoteDHCPServerName The remote server that will act as the DHCP server to configure. .Parameter RemoteDHCPServerNameCredentials Credentials used to add the reservation only used on a remote computer when specified. .Example Remove-MachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -RemoteDHCPServerName 'Machine' -RemoteDHCPServerNameCredentials $cred This will remove a reservation and its leases for node foo with IP address specified #> function Remove-MachineNetworkReservation { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $NetworkName, [Parameter(Mandatory=$true)] [String] $IPv4Address, [Parameter(Mandatory=$true)] [String] $RemoteDHCPServerName, [Parameter(Mandatory=$true)] [PSCredential] $RemoteDHCPServerNameCredentials ) $scriptBlock = { $scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName } $scope | Get-DhcpServerv4Reservation | Where-Object { $_.IPAddress -eq ($using:IPv4Address) } | Remove-DhcpServerv4Reservation # Remove the DHCP lease for the machine that is being removed as well Get-DhcpServerv4Lease -ScopeId $scope.ScopeId | Where-Object { $_.IPAddress -eq $using:IPv4Address } | Remove-DhcpServerv4Lease } try { $session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address ." Invoke-Command -Session $session -ScriptBlock $scriptBlock } catch { Trace-Error "Failed with error: $_" throw } finally { $session | Remove-PSSession -ErrorAction Ignore } } <# .Synopsis Function to force a machine to boot in to PXE using BMC controls only. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node to start in to PXE. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Start-PXEBoot -NodeName $Name -BmcIPAddress $BmcIPAddress -BMCCredential $cred This will force the machine to boot in to PXE #> function Start-PXEBoot { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [string] $NodeName, [Parameter(Mandatory=$true)] [string] $BmcIPAddress, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $NodeInstance, [Parameter(Mandatory=$true)] [string] $OOBProtocol ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $logText = "Initiate PXE boot for $NodeName (BMC: $BmcIPAddress). `r`n" $logText += "Shutdown $NodeName (BMC: $BmcIPAddress). `r`n" # Normally the following line should do nothing, because the machine is expected to have been powered off in an earlier step, unless this is a deployment # restart, in which case the machine may be running. $logText += (Stop-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1) $logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress). `r`n" # Some machines will set the next boot device correctly only if the machine is currently powered off. $logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $logText += "`n Start $NodeName (BMC: $BmcIPAddress). `r`n" $logText += (Start-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1) $logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n" # Some machines (Dell R630) will set the next boot device correctly only if the machine is currently powered on and gets power cycled (not reset, but # specifically power cycled) after the request to set one-time PXE boot. $logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $logText += "`n Restart $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n" $logText += (Restart-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $retObj = @{LogText = $logText} return $retObj } <# .Synopsis Function to force a machine to reboot out of band from any context that can access BMC. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node to restart. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Restart-Node -PhysicalNode $node -BMCCredential $cred This will force the machine to reboot #> function Restart-Node { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [System.Xml.XmlElement] $PhysicalNode, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $NodeInstance, [Parameter(Mandatory=$true)] [string] $OOBProtocol ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $nodeName = $PhysicalNode.Name $bmcIP = $PhysicalNode.BmcIPAddress Trace-Execution "Initiate IPMI-based restart for $nodeName (BMC: $bmcIP)." Restart-IpmiDevice -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose -Wait } <# .Synopsis Function to get product information of a physical node. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Restart-Node -PhysicalNode $node -BMCCredential $cred #> function Get-ProductInfo { [CmdletBinding()] param ( [Parameter(Mandatory = $false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [System.Xml.XmlElement] $PhysicalMachinesRole, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $OEMModel ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol try { Trace-Execution "Initiate IPMI-based cmd to get Fru log for $nodeName (BMC: $bmcIP)." $fru = Get-IpmiDeviceFruLogs -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol if ($fru) { return @{"Model" = $fru.ProductInfo.ProductName "Vendor" = $fru.ProductInfo.ManufacturerName "Serial" = $fru.ProductInfo.SerialNumber } } } catch { Trace-Execution "Fail to Get-IpmiDeviceFruLogs for $nodeName (BMC: $bmcIP): $_" } } return $null } <# .Synopsis Function to wait for ping, CIM, recent OS installation (with a deployment artifact) and WinRM to be available on a machine .Parameter StartTime The start time of the operation, used to check that OS boot time was strictly after the wait period. .Parameter StopTime The stop time for the wait operation after which the operation is considered failed. .Parameter PhysicalNodeArray A list of physical machine nodes to wait. .Parameter RemoteCIMCredential The credential to use to connect to CIM and WinRM. .Parameter DeploymentID A unique identifier meant to signify the deployment that the machine is associated with. .Parameter IgnoreOldOSCheckResult Whether to consider it a failure if the OS discovered on the machine is from before the waiting period began. #> function Wait-RemoteCimInitializedOneNodeBareMetal { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [System.Xml.XmlElement[]] $PhysicalNodeArray, [Parameter(Mandatory=$true)] [PSCredential] $RemoteCIMCredential, [Parameter(Mandatory=$true)] [Guid] $DeploymentID, [Parameter(Mandatory=$true)] [bool] $IgnoreOldOSCheckResults ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $remainingNodes = $PhysicalNodeArray $failedNodeNames = @() do { $nodes = $remainingNodes foreach ($node in $nodes) { $nodeName = $node.Name $nodeIP = $node.IPv4Address # Default to HostNIC if we cant find any IPv4Addresses if (-not $nodeIP) { $hostNICNetworkName = Get-NetworkNameForCluster -ClusterName "s-cluster" -NetworkName "HostNIC" $nodeIP = ($node.NICs.NIC | Where-Object NetworkId -eq $hostNICNetworkName | ForEach-Object IPv4Address)[0].Split('/')[0] } if (Test-IPConnection $nodeIP) { $cimSession = $null $session = $null try { $errorCountBefore = $global:error.Count #try the node name first because in some scenario IP is not trusted $cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $cimSession) { $cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } $os = $null if ($cimSession) { $os = Get-CimInstance win32_operatingsystem -CimSession $cimSession -ErrorAction SilentlyContinue } $errorCountAfter = $global:error.Count $numberOfNewErrors = $errorCountAfter - $errorCountBefore if ($numberOfNewErrors -gt 0) { $global:error.RemoveRange(0, $numberOfNewErrors) } if ($os) { $osLastBootUpTime = $os.LastBootUpTime $osInstallTime = $os.InstallDate #try the node name first because in some scenario IP is not trusted $session = New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $session) { $session = New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } } else { Trace-Execution "$nodeName could not query an OS." } } catch { if ($session) { Trace-Execution "Caught exception after session to new OS was created: $_" Remove-PSSession $session -ErrorAction SilentlyContinue $session = $null } $global:error.RemoveAt(0) } if ($session) { $isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" } if ($isNewDeployment) { Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())." $failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName } else { Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())." if (-not $IgnoreOldOSCheckResult) { $failedNodeNames += $nodeName } } $remainingNodes = $remainingNodes | Where-Object Name -ne $node.Name } elseif ($cimSession) { Remove-CimSession $cimSession } else { Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name." } } else { Trace-Execution "$nodeName did not respond to ping with IP $nodeIP ." } } if (-not $remainingNodes) { break } Start-Sleep -Seconds 15 } until ([DateTime]::Now -gt $StopTime) $remainingNodeNames = @($remainingNodes | ForEach-Object Name) $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if ($failedNodeNames -or $remainingNodeNames) { Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $(($failedNodeNames + $remainingNodeNames) -join ',')." } else { Trace-Execution "Bare metal deployment has completed on the target node." } } function Wait-ForISOImageBareMetal { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [Array] $PhysicalNodeArray, [Parameter(Mandatory=$true)] [PSCredential] $RemoteCIMCredential, [Parameter(Mandatory=$true)] [Guid] $DeploymentID, [Parameter(Mandatory=$true)] [bool] $IgnoreOldOSCheckResults ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop [Array]$remainingNodes = $PhysicalNodeArray | Sort-Object Name $failedNodeNames = @() $wait = $true while ($wait) { if ([DateTime]::Now -lt $StopTime) { foreach ($node in $remainingNodes) { $nodeName = $node.Name $nodeIP = $node.IPv4Address if (Test-IPConnection $nodeIP) { Trace-Execution "$nodeName is responding to ping" $cimSession = $null $session = $null try { $errorCountBefore = $global:error.Count # Try the node name first because in some scenario IP is not trusted $cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $cimSession) { $cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } $os = $null if ($null -ne $cimSession) { Trace-Execution "$nodeName CIM was session created - getting Win32_OperatingSystem data" $os = Get-CimInstance Win32_OperatingSystem -CimSession $cimSession -ErrorAction SilentlyContinue } $errorCountAfter = $global:error.Count $numberOfNewErrors = $errorCountAfter - $errorCountBefore if ($numberOfNewErrors -gt 0) { $global:error.RemoveRange(0, $numberOfNewErrors) } if ($null -ne $os) { $osLastBootUpTime = $os.LastBootUpTime $osInstallTime = $os.InstallDate Trace-Execution "$nodeName attempting to create PS session as '$($RemoteCIMCredential.UserName)'" # Try the node name first because in some scenario IP is not trusted try { $session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential if ($null -eq $session) { $session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential } } catch { Trace-Execution "$nodeName failed to created PS session with error: $($PSItem.Exception.Message)" } } else { Trace-Execution "$nodeName could not query Win32_OperatingSystem" } } catch { if ($null -ne $session) { Trace-Execution "Caught exception after session to new OS was created: $($PSItem.Exception.Message)" Remove-PSSession $session -ErrorAction SilentlyContinue $session = $null } $global:error.RemoveAt(0) } if ($null -ne $session) { Trace-Execution "$nodeName PS session was created - looking for $DeploymentID.txt file on this node" Trace-Execution "Waiting for 5 min after successful network connection so that setupcomplete can converge on the physical machine." Start-Sleep -Seconds 300 $isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path -Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" } if ($true -eq $isNewDeployment) { Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())" $failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName } else { Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())" if (-not $IgnoreOldOSCheckResult) { $failedNodeNames += $nodeName } } Trace-Execution "$nodeName has completed bare metal deployment" $remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName } else { Trace-Execution "$nodeName could not establish Powershell session using IP $nodeIP or name" Trace-Execution "$nodeName attempt to map network drive to C`$" try { $fileFound = $false $netShare = New-PSDrive -Name $nodeName -PSProvider FileSystem -Root "\\$nodeName\C`$" -Credential $RemoteCIMCredential if ($null -ne $netShare) { $fileFound = Test-Path -Path "$($nodeName):\CloudBuilderTemp\$($DeploymentID).txt" } } catch { Trace-Execution "$nodeName failed to map network drive with error: $($PSItem.Exception.Message)" } if ($true -eq $fileFound) { Trace-Execution "$nodeName has completed bare metal deployment" $remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName } } if ($null -ne $cimSession) { Remove-CimSession $cimSession } else { Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name" } if ($null -ne $netShare) { Remove-PSDrive -Name $nodeName -ErrorAction SilentlyContinue $netShare = $null } } else { Trace-Execution "$nodeName did not respond to ping with IP $nodeIP" } } if ($remainingNodes.Count -eq 0) { Trace-Execution "All nodes have completed bare metal deployment" $wait = $false } else { Trace-Execution "Still waiting for $($remainingNodes.Count) node(s) to complete" Start-Sleep -Seconds 60 } } else { Trace-Execution "Timed out waiting for all nodes to complete bare metal deployment" Trace-Execution "$($remainingNodes.Count) node(s) did not respond in time" $wait = $false } } if ($remainingNodes.Count -eq 0) { $remainingNodeNames = @() } else { $remainingNodeNames = @($remainingNodes | ForEach-Object Name) } $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if (($failedNodeNames.Count + $remainingNodeNames.Count) -gt 0) { [string]$badNodes = ($failedNodeNames + $remainingNodeNames) -join ',' Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $badNodes." } else { Trace-Execution "Bare metal deployment has completed on the target nodes." } } <# .SYNOPSIS While a host is being restarted and brought back online, this function is used to select a different host on the same cluster to perform remote PowerShell operations on. #> function Get-HostNameForRemoting { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [string] $HostBeingRebooted ) $ErrorActionPreference = "Stop" $clusterName = Get-NodeRefClusterId -Parameters $Parameters -RoleName "BareMetal" -NodeName $HostBeingRebooted $availableHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName $availableHosts = $availableHosts | Where-Object { $_ -ne $HostBeingRebooted } if ($availableHosts.Count -eq 0) { Trace-Error "There are no available hosts on which to perform remote operations." } else { Trace-Execution "Selected host $($availableHosts[0])." return $availableHosts[0] } } <# .SYNOPSIS This function is used to do cluster aware update based on different Cau Plugins. #> function Invoke-CauRunHelper { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [System.Collections.Hashtable] $cauParams ) $ErrorActionPreference = "Stop" Trace-Execution "Start invoke caurun" Invoke-CauRun @cauParams } Export-ModuleMember -Function Start-PXEBoot Export-ModuleMember -Function Restart-Node Export-ModuleMember -Function Stop-DeployingMachines Export-ModuleMember -Function Start-DeployingMachines Export-ModuleMember -Function Add-DeployingMachineNetworkReservation Export-ModuleMember -Function Remove-MachineNetworkReservation Export-ModuleMember -Function Wait-RemoteCimInitializedOneNodeBareMetal Export-ModuleMember -Function Wait-ForISOImageBareMetal Export-ModuleMember -Function Get-HostNameForRemoting Export-ModuleMember -Function Get-ProductInfo Export-ModuleMember -Function Invoke-CauRunHelper # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD0NXoJNEboxNGW # ZU2YnPu9GkeV561/p/S/GGxHF9S7X6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDyDubBbNjKcac35c9njzJLp # b+TlCMDwT8eiEKZZxaAfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAL4Q/EI37VVze5XAlmCPbW9a+rk4jnEtEAgGKV422SiZiU7+5eWPoX8UJ # KXYm3DAcmYV8mZxeP1d1UV3lf1vvvMaFA75bCNFVNSJaSpSf5UO+f8AOu8wmUJmV # fnx8+U8ua+7qTSj2dJ7xEU1CgFr5j7fzic6PDEu7RCWwzB7vLA3E8TL/dBR+Foqe # 11XYUUmCHIhSmw+UT7ZSh0HbI25WhCO0SSlpYLsJpR+04dObMxz8AArb1Kchse3R # eqHfSNc6kP5lLHPC062/YEtxnugfyqWmK9vDEAfKVgDDFJdXQrt3m1K6+JtJ85YO # GO3xEjx7QnnSEH388xvzJ0JAvFcWaaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBxO3IjOswz9C+0CFqg3gELpqj27VtoQ3ZeHJp5KaRkSwIGZbwS80Vj # GBMyMDI0MDIxMjE0MDUyNy45NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy # MloYDzIwMjQwMjEzMDk1MTIyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGia # AgEAMAoCAQACAiQnAgH/MAcCAQACAhNpMAoCBQDpdboaAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAHhDZT8ty0+HTaXE1QfKEhJH/rvJzWEO4nHtcHJIH8yq # k0objav8hh+sDUiNDqhoN+F+mA+2mpGuR3E0YvquPCG+T/EdDAOiXEjZ0cQhSNYJ # w2MnVzd0PXYYSpICmGfYW2uHiVfG8juh7Mbk2dNQtq1PXM9ELZihLw0vis6sxXLy # CebMHHwx/2j/s27g2kEN9BLs+Ih8v5HTno3kZMsGmqB+HX3G78m7y/FCJ8Z0+fbr # tWnsIF71r8O3t/M7eX6HlekXNNAu2MdxOlGHKirfwsJ80Atfl9wcHkVbpfi4dffm # bZ381cZNMRaMTKymjgs7CJhj2Y3lVr/2Tw8LKfMJZCExggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDRgpNWMZsJSxP+H/Z6VMgvKWujJKEo9RPoOwrg76OR # fTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg3D/byHCyRT6F6OS8ZCWcS+7X # bbnGEcjZ7MC8fdRvYZYwDQYJKoZIhvcNAQELBQAEggIAqaEuHZdXm8uHL1hKu/vA # Q0necChJAP9/6ZkVQCLtxGraT8ncFSaOkrYNT3QIsB07LGiSmAePhGh6S8Ms4T55 # E7E7v3XQoK/poDIbP2oUZsemkT5iuVky0kIf6ZPLhiezMN5gaWaVXJkVeHlW88rl # QjX+5Fk4MQuyYzvGlUfes4rr9U/BDs4dFA7gpF6pf8U+PbkBcRrjPeJoS5NS76Qo # 0oQ/MpaJg8AT8JKlx9si2FGTgLirivgWp1/bWuzUoewAxGvVxdLbaTdVrECGgRSM # RKNLymbC+lpYk9GTV3HNd5ELBTgKgYeLQ8bNHFd02nuI4XE4qlTpqdoFCGYEyYtn # Wa3vdMeE6yhDoYcf+ct7rzlNvD9WziZEgnkmYz+COfCMAXPkjL3GCEHqLZbm3l6I # STk9NzIyP7VY3pwifcQ9QiHWaWOF3u1i94RmanxqACgwJvO3lugB41c1WVZF8qpV # MINscEK7XPEJc8mCM6xp5DhFO9l1G8HqKUYzKrtSBfsii53t0enk0ekw3Kin9Zvu # VGOVfNnVvuxSCBg/Yaj+Al3NijuoE3nsIgQ4psYJGrn6h4Z7MOhVq9+LjM/vLIX5 # gWIR+WBu+mDr94sDjGeeOqd/s6wbpasnw2/5WkR2vmEd1DXkxwD+ELfxbV+u78+E # J5BD8ycBuFM/NwcDNKye4E0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_48_37.ps1
sample_48_37.ps1
# Localized 05/11/2024 04:06 AM (GMT) 303:7.2.30118 CL_LocalizationData.psd1 ConvertFrom-StringData @' ###PSLOC Troubleshoot_Title=Troubleshooting Troubleshoot_DetectDVDDevice=Checking DVD device ... Troubleshoot_DetectDVDvideoDecoder=Checking video decoder for DVD playback ... Troubleshoot_DetectDVDAudioDecoder=Checking audio decoder for DVD playback ... Resolution_Title=Resolution CDRomDeviceName=Name PnPDeviceID=ID Status=Status Report_Name_CDRomDeviceInformation=DVD/CD-ROM drives Report_Description_CDRomDeviceInformation=Information for DVD/CD-ROM drives ###PSLOC '@
combined_dataset/train/non-malicious/Get-DomainPasswordPolicy.ps1
Get-DomainPasswordPolicy.ps1
function Get-DomainPasswordPolicy { $domain = [ADSI]"WinNT://$env:userdomain" $Name = @{Name="DomainName";Expression={$_.Name}} $MinPassLen = @{Name="Minimum Password Length (Chars)";Expression={$_.MinPasswordLength}} $MinPassAge = @{Name="Minimum Password Age (Days)";Expression={$_.MinPasswordAge.value/86400}} $MaxPassAge = @{Name="Maximum Password Age (Days)";Expression={$_.MaxPasswordAge.value/86400}} $PassHistory = @{Name="Enforce Password History (Passwords remembered)";Expression={$_.PasswordHistoryLength}} $AcctLockoutThreshold = @{Name="Account Lockout Threshold (Invalid logon attempts)";Expression={$_.MaxBadPasswordsAllowed}} $AcctLockoutDuration = @{Name="Account Lockout Duration (Minutes)";Expression={if ($_.AutoUnlockInterval.value -eq -1) {'Account is locked out until administrator unlocks it.'} else {$_.AutoUnlockInterval.value/60}}} $ResetAcctLockoutCounter = @{Name="Reset Account Lockout Counter After (Minutes)";Expression={$_.LockoutObservationInterval.value/60}} $domain | Select-Object $Name,$MinPassLen,$MinPassAge,$MaxPassAge,$PassHistory,$AcctLockoutThreshold,$AcctLockoutDuration,$ResetAcctLockoutCounter }
combined_dataset/train/non-malicious/1309.ps1
1309.ps1
function Get-CPathProvider { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Path ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $pathQualifier = Split-Path -Qualifier $Path -ErrorAction SilentlyContinue if( -not $pathQualifier ) { $Path = Join-Path -Path (Get-Location) -ChildPath $Path $pathQualifier = Split-Path -Qualifier $Path -ErrorAction SilentlyContinue if( -not $pathQualifier ) { Write-Error "Qualifier for path '$Path' not found." return } } $pathQualifier = $pathQualifier.Trim(':') $drive = Get-PSDrive -Name $pathQualifier -ErrorAction Ignore if( -not $drive ) { $drive = Get-PSDrive -PSProvider $pathQualifier -ErrorAction Ignore } if( -not $drive ) { Write-Error -Message ('Unable to determine the provider for path {0}.' -f $Path) return } $drive | Select-Object -First 1 | Select-Object -ExpandProperty 'Provider' }
combined_dataset/train/non-malicious/sample_38_28.ps1
sample_38_28.ps1
# # Module manifest for module 'OCI.PSModules.Datascience' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datascience.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e310e88b-80a4-4419-8054-2984936bf580' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datascience Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datascience.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIDatascienceModel', 'Enable-OCIDatascienceModelDeployment', 'Enable-OCIDatascienceNotebookSession', 'Export-OCIDatascienceModelArtifact', 'Get-OCIDatascienceFastLaunchJobConfigsList', 'Get-OCIDatascienceJob', 'Get-OCIDatascienceJobArtifactContent', 'Get-OCIDatascienceJobRun', 'Get-OCIDatascienceJobRunsList', 'Get-OCIDatascienceJobShapesList', 'Get-OCIDatascienceJobsList', 'Get-OCIDatascienceModel', 'Get-OCIDatascienceModelArtifactContent', 'Get-OCIDatascienceModelDeployment', 'Get-OCIDatascienceModelDeploymentShapesList', 'Get-OCIDatascienceModelDeploymentsList', 'Get-OCIDatascienceModelProvenance', 'Get-OCIDatascienceModelsList', 'Get-OCIDatascienceModelVersionSet', 'Get-OCIDatascienceModelVersionSetsList', 'Get-OCIDatascienceNotebookSession', 'Get-OCIDatascienceNotebookSessionShapesList', 'Get-OCIDatascienceNotebookSessionsList', 'Get-OCIDatasciencePipeline', 'Get-OCIDatasciencePipelineRun', 'Get-OCIDatasciencePipelineRunsList', 'Get-OCIDatasciencePipelinesList', 'Get-OCIDatasciencePrivateEndpoint', 'Get-OCIDatasciencePrivateEndpointsList', 'Get-OCIDatascienceProject', 'Get-OCIDatascienceProjectsList', 'Get-OCIDatascienceStepArtifactContent', 'Get-OCIDatascienceWorkRequest', 'Get-OCIDatascienceWorkRequestErrorsList', 'Get-OCIDatascienceWorkRequestLogsList', 'Get-OCIDatascienceWorkRequestsList', 'Import-OCIDatascienceModelArtifact', 'Invoke-OCIDatascienceDeactivateModel', 'Invoke-OCIDatascienceDeactivateModelDeployment', 'Invoke-OCIDatascienceDeactivateNotebookSession', 'Invoke-OCIDatascienceHeadJobArtifact', 'Invoke-OCIDatascienceHeadModelArtifact', 'Invoke-OCIDatascienceHeadStepArtifact', 'Move-OCIDatascienceJobCompartment', 'Move-OCIDatascienceJobRunCompartment', 'Move-OCIDatascienceModelCompartment', 'Move-OCIDatascienceModelDeploymentCompartment', 'Move-OCIDatascienceModelVersionSetCompartment', 'Move-OCIDatascienceNotebookSessionCompartment', 'Move-OCIDatasciencePipelineCompartment', 'Move-OCIDatasciencePipelineRunCompartment', 'Move-OCIDatasciencePrivateEndpointCompartment', 'Move-OCIDatascienceProjectCompartment', 'New-OCIDatascienceJob', 'New-OCIDatascienceJobArtifact', 'New-OCIDatascienceJobRun', 'New-OCIDatascienceModel', 'New-OCIDatascienceModelArtifact', 'New-OCIDatascienceModelDeployment', 'New-OCIDatascienceModelProvenance', 'New-OCIDatascienceModelVersionSet', 'New-OCIDatascienceNotebookSession', 'New-OCIDatasciencePipeline', 'New-OCIDatasciencePipelineRun', 'New-OCIDatasciencePrivateEndpoint', 'New-OCIDatascienceProject', 'New-OCIDatascienceStepArtifact', 'Remove-OCIDatascienceJob', 'Remove-OCIDatascienceJobRun', 'Remove-OCIDatascienceModel', 'Remove-OCIDatascienceModelDeployment', 'Remove-OCIDatascienceModelVersionSet', 'Remove-OCIDatascienceNotebookSession', 'Remove-OCIDatasciencePipeline', 'Remove-OCIDatasciencePipelineRun', 'Remove-OCIDatasciencePrivateEndpoint', 'Remove-OCIDatascienceProject', 'Stop-OCIDatascienceJobRun', 'Stop-OCIDatasciencePipelineRun', 'Stop-OCIDatascienceWorkRequest', 'Update-OCIDatascienceJob', 'Update-OCIDatascienceJobRun', 'Update-OCIDatascienceModel', 'Update-OCIDatascienceModelDeployment', 'Update-OCIDatascienceModelProvenance', 'Update-OCIDatascienceModelVersionSet', 'Update-OCIDatascienceNotebookSession', 'Update-OCIDatasciencePipeline', 'Update-OCIDatasciencePipelineRun', 'Update-OCIDatasciencePrivateEndpoint', 'Update-OCIDatascienceProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datascience' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Custom Accelerators CTP3.ps1
Custom Accelerators CTP3.ps1
#requires -version 2.0 ## Custom Accelerators for PowerShell 2 (CTP3) #################################################################################################### ## A script module for CTP3 which allows the user to create their own custom type accelerators. ## Thanks to "Oisin Grehan for the discovery":http://www.nivot.org/2008/12/25/ListOfTypeAcceleratorsForPowerShellCTP3.aspx. #################################################################################################### ## Revision History ## v1.0 - Modularization, by Joel 'Jaykul' Bennett #################################################################################################### # get a reference to the Type $xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators") function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list [System.Collections.Generic.List``1] $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator list, glist [System.Collections.Generic.List``1] Creates two accelerators for the generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] PARAM( [Parameter(Position=0)] [string[]]$Accelerator , [Parameter(Position=1)] [type]$Type ) PROCESS { # add a user-defined accelerator foreach($a in $Accelerator) { $xlr8r::Add( $a, $Type) } } } function Get-Accelerator { <# .Synopsis Get one or more type accelerator definitions .Description The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type .Example Get-Accelerator string Returns the KeyValue pair for the accelerator definition(s) .Example Get-Accelerator ps*,wmi* Returns the KeyValue pair for the matching accelerator definitions .Parameter Accelerator One or more short form accelerators to search for Accepts Wildcards. .Parameter Type One or more types to search for. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Add-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(DefaultParameterSetName="ByType")] PARAM( [Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key")] [string[]]$Accelerator , [Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Value")] [type[]]$Type ) PROCESS { # add a user-defined accelerator switch($PSCmdlet.ParameterSetName) { "ByAccelerator" { $xlr8r::get.GetEnumerator() | % { foreach($a in $Accelerator) { if($_.Key -like $a) { $_ } } } break } "ByType" { if($Type -and $Type.Count) { $xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value } } else { $xlr8r::get.GetEnumerator() | %{ $_ } } break } } } } function Remove-Accelerator { <# .Synopsis Remove a type accelerator from the current session .Description The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators. .Example Remove-Accelerator int Add-Accelerator int [Int64] Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works: So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64" .Example Get-Accelerator System.Single | Remove-Accelerator Removes both of the default accelerators for System.Single: [float] and [single] .Example Get-Accelerator System.Single | Remove-Accelerator -WhatIf Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print: What if: Removes the alias [float] for type [System.Single] What if: Removes the alias [single] for type [System.Single] .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Add-Accelerator and Get-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(SupportsShouldProcess=$true)] PARAM( [Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key")] [string[]]$Accelerator ) PROCESS { $xlr8r::get.GetEnumerator() | % { foreach($a in $Accelerator) { if($_.Key -like $a) { if($PSCmdlet.ShouldProcess( "Removes the alias [$($_.Key)] for type [$($_.Value.FullName)]", "Removing alias [$($_.Key)] for type [$($_.Value.FullName)]?", "Remove Alias" )) { # remove a user-defined accelerator $xlr8r::remove($_.Key) } } } } } }
combined_dataset/train/non-malicious/2199.ps1
2199.ps1
[CmdletBinding()] param( [parameter(Mandatory=$true)] [string]$SiteServer, [parameter(Mandatory=$true)] [string]$SiteCode ) function Load-Form { $Form.Controls.AddRange(@($SBStatus, $CBAuto, $CBManual, $DGVAuto, $DGVManual, $ButtonStart, $ButtonClear, $ButtonAuto, $ButtonManual, $RTBInput, $OutputBox, $GBOutputBox, $GBInput, $GBAuto, $GBManual)) $ButtonAuto.Enabled = $false $ButtonManual.Enabled = $false $Form.Add_Shown({Get-CMCollections}) $Form.Add_Shown({ $Form.Activate() $RTBInput.Select() }) [void]$Form.ShowDialog() } function Write-OutputBox { param( [parameter(Mandatory=$true)] [string]$OutputBoxMessage, [ValidateSet("WARNING: ","ERROR: ","INFO: ")] [string]$Type, [switch]$NoNewLine ) Process { $DateTime = (Get-Date).ToLongTimeString() if ($NoNewLine -eq $true) { if ($OutputBox.Text.Length -eq 0) { $OutputBox.Text = "$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBox.SelectionStart = $OutputBox.Text.Length $OutputBox.ScrollToCaret() } else { $OutputBox.AppendText("$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBox.SelectionStart = $OutputBox.Text.Length $OutputBox.ScrollToCaret() } } else { if ($OutputBox.Text.Length -eq 0) { $OutputBox.Text = "$($DateTime) $($Type)$($OutputBoxMessage)" [System.Windows.Forms.Application]::DoEvents() $OutputBox.SelectionStart = $OutputBox.Text.Length $OutputBox.ScrollToCaret() } else { $OutputBox.AppendText("`n$($DateTime) $($Type)$($OutputBoxMessage)") [System.Windows.Forms.Application]::DoEvents() $OutputBox.SelectionStart = $OutputBox.Text.Length $OutputBox.ScrollToCaret() } } } } function Get-CMCollections { $Collections = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '%- Scheduled' OR Name like '%- Manual' OR Name like '%- Run now'" $SortedCollections = $Collections | Sort-Object -Property Name Write-OutputBox -OutputBoxMessage "Processing available collections" -Type "INFO: " $ButtonStart.Enabled = $false foreach ($Collection in $SortedCollections) { $CBAuto.Items.Add($Collection.Name) $CBManual.Items.Add($Collection.Name) } $ButtonStart.Enabled = $true $CollectionCount = ($Collections | Measure-Object).Count Write-OutputBox -OutputBoxMessage "Processed $($CollectionCount) collections" -Type "INFO: " } function Get-CMDeviceCollectionMembership { param( [parameter(Mandatory=$true)] [string]$ResourceID ) $GetDeviceCollectionMembership = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_FullCollectionMembership -ComputerName $SiteServer -Filter "ResourceID='$($ResourceID)' AND (CollectionID='GT000049' OR CollectionID='GT00002D')" if ($GetDeviceCollectionMembership -ne $null) { if ($GetDeviceCollectionMembership.CollectionID -like "GT000049") { if ($ButtonAuto.Enabled -eq $false) { $ButtonAuto.Enabled = $true } $DGVAuto.Rows.Add($GetDeviceCollectionMembership.Name) } if ($GetDeviceCollectionMembership.CollectionID -like "GT00002D") { if ($ButtonManual.Enabled -eq $false) { $ButtonManual.Enabled = $true } $DGVManual.Rows.Add($GetDeviceCollectionMembership.Name) } } } function Get-CMDevice { param( [parameter(Mandatory=$true)] [string]$DeviceName, [parameter(Mandatory=$true)] [int]$Count, [parameter(Mandatory=$true)] [int]$TotalCount ) $GetDevice = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_R_System -ComputerName $SiteServer -Filter "Name='$($DeviceName)'" if ($GetDevice -ne $null) { if ($GetDevice.Obsolete -eq 0) { Write-OutputBox -OutputBoxMessage "Found device: $($GetDevice.Name)" -Type "INFO: " $SBPProcessingCount.Text = "Processing device $($Count) of $($TotalCount)" Get-CMDeviceCollectionMembership -ResourceID $GetDevice.ResourceID } } else { Write-OutputBox -OutputBoxMessage "Not found: $($DeviceName)" -Type "WARNING: " } } function Add-DirectMembership { param( [parameter(Mandatory=$true)] [string]$DeviceName, [parameter(Mandatory=$true)] [string]$CollectionName ) if ((Get-DeviceMembership -DeviceName $DeviceName -CollectionName $CollectionName) -eq $false) { $ResourceID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_R_System -ComputerName $SiteServer -Filter "Name='$($DeviceName)'" | Select-Object -ExpandProperty ResourceID $CollectionQuery = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name='$($CollectionName)'" $NewRule = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_CollectionRuleDirect").CreateInstance() $NewRule.ResourceClassName = "SMS_R_SYSTEM" $NewRule.ResourceID = $ResourceID $NewRule.Rulename = $DeviceName $CollectionQuery.AddMemberShipRule($NewRule) | Out-Null if ($Error[0]) { $Global:ProcessedError++ Write-OutputBox -OutputBoxMessage "Error adding $($DeviceName) to '$($CollectionName)'" -Type "ERROR: " } else { $Global:ProcessedSuccess++ Write-OutputBox -OutputBoxMessage "Successfully added $($DeviceName) to '$($CollectionName)'" -Type "INFO: " } } else { $Global:ProcessedWarning++ Write-OutputBox -OutputBoxMessage "$($DeviceName) is already a member of '$($CollectionName)'" -Type "WARNING: " } } function Get-DeviceMembership { param( [parameter(Mandatory=$true)] [string]$DeviceName, [parameter(Mandatory=$true)] [string]$CollectionName ) $CollectionID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name='$($CollectionName)'" | Select-Object -ExpandProperty CollectionID $DeviceCollectionMembershipQuery = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_FullCollectionMembership -ComputerName $SiteServer -Filter "Name='$($DeviceName)' AND CollectionID='$($CollectionID)'" -ErrorAction SilentlyContinue if ($DeviceCollectionMembershipQuery) { return $true } else { return $false } } function Start-AddDeviceToCollection { param( [parameter(Mandatory=$true)] [string]$CollectionName, [parameter(Mandatory=$true)] [ValidateSet("Auto","Manual")] [string]$Type ) if ($Type -like "Auto") { for ($RowCount = 0; $RowCount -lt $DGVAuto.RowCount; $RowCount++) { $ButtonAuto.Enabled = $false $SBPProcessingCount.Text = "Processing device $($RowCount+1) of $($DGVAuto.RowCount)" Write-OutputBox -OutputBoxMessage "Adding '$($DGVAuto.Rows[$RowCount].Cells["Device"].Value)' to collection: '$($CollectionName)'" -Type "INFO: " Add-DirectMembership -DeviceName "$($DGVAuto.Rows[$RowCount].Cells["Device"].Value)" -CollectionName $CollectionName } $ButtonAuto.Enabled = $true $SBPProcessingCount.Text = "" } if ($Type -like "Manual") { for ($RowCount = 0; $RowCount -lt $DGVManual.RowCount; $RowCount++) { $ButtonManual.Enabled = $false $SBPProcessingCount.Text = "Processing device $($RowCount+1) of $($DGVManual.RowCount)" Write-OutputBox -OutputBoxMessage "Adding '$($DGVManual.Rows[$RowCount].Cells["Device"].Value)' to collection: '$($CollectionName)'" -Type "INFO: " Add-DirectMembership -DeviceName "$($DGVManual.Rows[$RowCount].Cells["Device"].Value)" -CollectionName $CollectionName } $ButtonManual.Enabled = $true $SBPProcessingCount.Text = "" } $RowCount = 0 Write-OutputBox -OutputBoxMessage "Showing results:" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Success: $($Global:ProcessedSuccess)" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Warning: $($Global:ProcessedWarning)" -Type "INFO: " Write-OutputBox -OutputBoxMessage "Error: $($Global:ProcessedError)" -Type "INFO: " } function Start-Search { $ButtonStart.Enabled = $false $SBPStatus.Text = "Processing" $CurrentCount = 0 $Devices = $RTBInput.Text $DeviceArray = $Devices.Split("`n") if ($DeviceArray -ne $null) { foreach ($Device in $DeviceArray) { $CurrentCount++ Get-CMDevice -DeviceName $Device -Count $CurrentCount -TotalCount ($DeviceArray | Measure-Object).Count } } else { Write-OutputBox -OutputBoxMessage "No devices has been added to the list" -Type "WARNING: " } $ButtonStart.Enabled = $true $SBPStatus.Text = "Ready" $SBPProcessingCount.Text = "" } function Start-Clear { $RTBInput.ResetText() $DGVAuto.Rows.Clear() $DGVManual.Rows.Clear() $OutputBox.ResetText() if ($ButtonAuto.Enabled -eq $true) { $ButtonAuto.Enabled = $false } if ($ButtonManual.Enabled -eq $true) { $ButtonManual.Enabled = $false } } $Global:ProcessedSuccess = 0 $Global:ProcessedWarning = 0 $Global:ProcessedError = 0 [void][System.Reflection.Assembly]::LoadWithPartialName("System.Drawing") [void][System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $Form = New-Object System.Windows.Forms.Form $Form.Size = New-Object System.Drawing.Size(950,700) $Form.MinimumSize = New-Object System.Drawing.Size(950,700) $Form.MaximumSize = New-Object System.Drawing.Size(950,700) $Form.SizeGripStyle = "Hide" $Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe") $Form.Text = "Add Devices to Collection 1.0" $Form.ControlBox = $true $Form.TopMost = $true $SBPStatus = New-Object Windows.Forms.StatusBarPanel $SBPStatus.Text = "Ready" $SBPStatus.Width = "100" $SBPTotalCount = New-Object Windows.Forms.StatusBarPanel $SBPTotalCount.Text = "" $SBPTotalCount.Width = "100" $SBPProcessingCount = New-Object Windows.Forms.StatusBarPanel $SBPProcessingCount.Text = "" $SBPProcessingCount.Width = "740" $SBStatus = New-Object Windows.Forms.StatusBar $SBStatus.ShowPanels = $true $SBStatus.SizingGrip = $false $SBStatus.AutoSize = "Full" $SBStatus.Panels.AddRange(@($SBPStatus, $SBPTotalCount, $SBPProcessingCount)) $GBOutputBox = New-Object System.Windows.Forms.GroupBox $GBOutputBox.Location = New-Object System.Drawing.Size(10,480) $GBOutputBox.Size = New-Object System.Drawing.Size(920,150) $GBOutputBox.Text = "Logging" $GBInput = New-Object System.Windows.Forms.GroupBox $GBInput.Location = New-Object System.Drawing.Size(10,10) $GBInput.Size = New-Object System.Drawing.Size(220,460) $GBInput.Text = "Device List" $GBAuto = New-Object System.Windows.Forms.GroupBox $GBAuto.Location = New-Object System.Drawing.Size(240,10) $GBAuto.Size = New-Object System.Drawing.Size(340,460) $GBAuto.Text = "Auto" $GBManual = New-Object System.Windows.Forms.GroupBox $GBManual.Location = New-Object System.Drawing.Size(590,10) $GBManual.Size = New-Object System.Drawing.Size(340,460) $GBManual.Text = "Manual" $ButtonStart = New-Object System.Windows.Forms.Button $ButtonStart.Location = New-Object System.Drawing.Size(125,427) $ButtonStart.Size = New-Object System.Drawing.Size(95,30) $ButtonStart.Text = "Start" $ButtonStart.TabIndex = 1 $ButtonStart.Add_Click({Start-Search}) $ButtonClear = New-Object System.Windows.Forms.Button $ButtonClear.Location = New-Object System.Drawing.Size(20,427) $ButtonClear.Size = New-Object System.Drawing.Size(95,30) $ButtonClear.Text = "Clear" $ButtonClear.TabIndex = 2 $ButtonClear.Add_Click({Start-Clear}) $ButtonAuto = New-Object System.Windows.Forms.Button $ButtonAuto.Location = New-Object System.Drawing.Size(475,427) $ButtonAuto.Size = New-Object System.Drawing.Size(95,30) $ButtonAuto.Text = "Add" $ButtonAuto.TabIndex = 1 $ButtonAuto.Add_MouseClick({ if ($CBAuto.SelectedItem -ne $null) { Start-AddDeviceToCollection -CollectionName "$($CBAuto.SelectedItem)" -Type "Auto" } else { Write-OutputBox -OutputBoxMessage "No collection was selected from the drop down list" -Type "WARNING: " } }) $ButtonManual = New-Object System.Windows.Forms.Button $ButtonManual.Location = New-Object System.Drawing.Size(825,427) $ButtonManual.Size = New-Object System.Drawing.Size(95,30) $ButtonManual.Text = "Add" $ButtonManual.TabIndex = 1 $ButtonManual.Add_MouseClick({ if ($CBManual.SelectedItem -ne $null) { Start-AddDeviceToCollection -CollectionName $CBManual.SelectedItem -Type "Manual" } else { Write-OutputBox -OutputBoxMessage "No collection was selected from the drop down list" -Type "WARNING: " } }) $CBAuto = New-Object System.Windows.Forms.ComboBox $CBAuto.Location = New-Object System.Drawing.Size(250,395) $CBAuto.Size = New-Object System.Drawing.Size(320,20) $CBAuto.DropDownStyle = "DropDownList" $CBAuto.DropDownHeight = "250" $CBManual = New-Object System.Windows.Forms.ComboBox $CBManual.Location = New-Object System.Drawing.Size(600,395) $CBManual.Size = New-Object System.Drawing.Size(320,20) $CBManual.DropDownStyle = "DropDownList" $CBManual.DropDownHeight = "250" $OutputBox = New-Object System.Windows.Forms.RichTextBox $OutputBox.Location = New-Object System.Drawing.Size(20,500) $OutputBox.Size = New-Object System.Drawing.Size(900,120) $OutputBox.Font = "Courier New" $OutputBox.BackColor = "white" $OutputBox.ReadOnly = $true $OutputBox.MultiLine = $True $RTBInput = New-Object System.Windows.Forms.RichTextBox $RTBInput.Location = New-Object System.Drawing.Size(20,27) $RTBInput.Size = New-Object System.Drawing.Size(200,390) $RTBInput.TabIndex = 1 $RTBInput.Add_TextChanged({ $InputText = $RTBInput.Text $InputText = $InputText.Split("`n") $InputCount = ($InputText | Measure-Object).Count $SBPTotalCount.Text = "Row count: $($InputCount)" }) $DGVAuto = New-Object System.Windows.Forms.DataGridView $DGVAuto.Location = New-Object System.Drawing.Size(250,30) $DGVAuto.Size = New-Object System.Drawing.Size(320,360) $DGVAuto.Anchor = "Top, Bottom, Left, Right" $DGVAuto.ColumnCount = 1 $DGVAuto.ColumnHeadersVisible = $true $DGVAuto.Columns[0].Name = "Device" $DGVAuto.Columns[0].AutoSizeMode = "Fill" $DGVAuto.AllowUserToAddRows = $false $DGVAuto.AllowUserToDeleteRows = $false $DGVAuto.ReadOnly = $true $DGVAuto.MultiSelect = $false $DGVAuto.ColumnHeadersHeightSizeMode = "DisableResizing" $DGVAuto.RowHeadersWidthSizeMode = "DisableResizing" $DGVAuto.RowHeadersVisible = $false $DGVManual = New-Object System.Windows.Forms.DataGridView $DGVManual.Location = New-Object System.Drawing.Size(600,30) $DGVManual.Size = New-Object System.Drawing.Size(320,360) $DGVManual.Anchor = "Top, Bottom, Left, Right" $DGVManual.ColumnCount = 1 $DGVManual.ColumnHeadersVisible = $true $DGVManual.Columns[0].Name = "Device" $DGVManual.Columns[0].AutoSizeMode = "Fill" $DGVManual.AllowUserToAddRows = $false $DGVManual.AllowUserToDeleteRows = $false $DGVManual.ReadOnly = $true $DGVManual.MultiSelect = $false $DGVManual.ColumnHeadersHeightSizeMode = "DisableResizing" $DGVManual.RowHeadersWidthSizeMode = "DisableResizing" $DGVManual.RowHeadersVisible = $false Load-Form
combined_dataset/train/non-malicious/8c4d244d-22ac-4bfe-8ddf-c0a5ee0b552c.ps1
8c4d244d-22ac-4bfe-8ddf-c0a5ee0b552c.ps1
function out-default() { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] [System.Management.Automation.PSObject] ${InputObject}) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer) -and $outBuffer -gt 1024) { $PSBoundParameters['OutBuffer'] = 1024 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Out-Default', [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters } $steppablePipeline = $scriptCmd.GetSteppablePipeline() $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) if ($last_output -eq $null) { $last_output = @() } if ($last_output.Length -lt 10) { $last_output += $_ } else { $null, $last_output = $last_output $last_output += $_ } } catch { throw } } end { try { $steppablePipeline.End() $global:last_output = $last_output } catch { throw } } <# .ForwardHelpTargetName Out-Default .ForwardHelpCategory Cmdlet #> }
combined_dataset/train/non-malicious/Invoke-RemoteExpression..ps1
Invoke-RemoteExpression..ps1
##############################################################################\n##\n## Invoke-RemoteExpression\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nInvoke a PowerShell expression on a remote machine. Requires PsExec from\nhttp://live.sysinternals.com/tools/psexec.exe. If the remote machine\nsupports PowerShell version two, use PowerShell remoting instead.\n\n.EXAMPLE\n\nInvoke-RemoteExpression \\\\LEE-DESK { Get-Process }\nRetrieves the output of a simple command from a remote machine\n\n.EXAMPLE\n\n(Invoke-RemoteExpression \\\\LEE-DESK { Get-Date }).AddDays(1)\nInvokes a command on a remote machine. Since the command returns one of\nPowerShell's primitive types (a DateTime object,) you can manipulate\nits output as an object afterward.\n\n.EXAMPLE\n\nInvoke-RemoteExpression \\\\LEE-DESK { Get-Process } | Sort Handles\nInvokes a command on a remote machine. The command does not return one of\nPowerShell's primitive types, but you can still use PowerShell's filtering\ncmdlets to work with its structured output.\n\n#>\n\nparam(\n ## The computer on which to invoke the command.\n $ComputerName = "\\\\$ENV:ComputerName",\n\n ## The scriptblock to invoke on the remote machine.\n [Parameter(Mandatory = $true)]\n [ScriptBlock] $ScriptBlock,\n\n ## The username / password to use in the connection\n $Credential,\n\n ## Determines if PowerShell should load the user's PowerShell profile\n ## when invoking the command.\n [switch] $NoProfile\n)\n\nSet-StrictMode -Version Latest\n\n## Prepare the command line for PsExec. We use the XML output encoding so\n## that PowerShell can convert the output back into structured objects.\n## PowerShell expects that you pass it some input when being run by PsExec\n## this way, so the 'echo .' statement satisfies that appetite.\n$commandLine = "echo . | powershell -Output XML "\n\nif($noProfile)\n{\n $commandLine += "-NoProfile "\n}\n\n## Convert the command into an encoded command for PowerShell\n$commandBytes = [System.Text.Encoding]::Unicode.GetBytes($scriptblock)\n$encodedCommand = [Convert]::ToBase64String($commandBytes)\n$commandLine += "-EncodedCommand $encodedCommand"\n\n## Collect the output and error output\n$errorOutput = [IO.Path]::GetTempFileName()\n\nif($Credential)\n{\n ## This lets users pass either a username, or full credential to our\n ## credential parameter\n $credential = Get-Credential $credential\n $networkCredential = $credential.GetNetworkCredential()\n $username = $networkCredential.Username\n $password = $networkCredential.Password\n\n $output = psexec $computername /user $username /password $password `\n /accepteula cmd /c $commandLine 2>$errorOutput\n}\nelse\n{\n $output = psexec /acceptEula $computername `\n cmd /c $commandLine 2>$errorOutput\n}\n\n## Check for any errors\n$errorContent = Get-Content $errorOutput\nRemove-Item $errorOutput\nif($errorContent -match "(Access is denied)|(failure)|(Couldn't)")\n{\n $OFS = "`n"\n $errorMessage = "Could not execute remote expression. "\n $errorMessage += "Ensure that your account has administrative " +\n "privileges on the target machine.`n"\n $errorMessage += ($errorContent -match "psexec.exe :")\n\n Write-Error $errorMessage\n}\n\n## Return the output to the user\n$output
combined_dataset/train/non-malicious/sample_43_42.ps1
sample_43_42.ps1
# # Module manifest for module 'OCI.PSModules.Operatoraccesscontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment', 'Get-OCIOperatoraccesscontrolAccessRequest', 'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList', 'Get-OCIOperatoraccesscontrolAccessRequestsList', 'Get-OCIOperatoraccesscontrolAssignmentValidationStatus', 'Get-OCIOperatoraccesscontrolAuditLogReport', 'Get-OCIOperatoraccesscontrolInteractionsList', 'Get-OCIOperatoraccesscontrolOperatorAction', 'Get-OCIOperatoraccesscontrolOperatorActionsList', 'Get-OCIOperatoraccesscontrolOperatorControl', 'Get-OCIOperatoraccesscontrolOperatorControlAssignment', 'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList', 'Get-OCIOperatoraccesscontrolOperatorControlsList', 'Invoke-OCIOperatoraccesscontrolApproveAccessRequest', 'Invoke-OCIOperatoraccesscontrolInteractionRequest', 'Invoke-OCIOperatoraccesscontrolRejectAccessRequest', 'Invoke-OCIOperatoraccesscontrolReviewAccessRequest', 'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest', 'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment', 'Move-OCIOperatoraccesscontrolOperatorControlCompartment', 'New-OCIOperatoraccesscontrolOperatorControl', 'New-OCIOperatoraccesscontrolOperatorControlAssignment', 'Remove-OCIOperatoraccesscontrolOperatorControl', 'Remove-OCIOperatoraccesscontrolOperatorControlAssignment', 'Update-OCIOperatoraccesscontrolOperatorControl', 'Update-OCIOperatoraccesscontrolOperatorControlAssignment' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/743.ps1
743.ps1
[CmdletBinding()] param ( [string]$Path, [string]$Version = 'master' ) $localpath = $(Join-Path -Path (Split-Path -Path $profile) -ChildPath '\Modules\ReportingServicesTools') try { if ($Path.length -eq 0) { if ($PSCommandPath.Length -gt 0) { $path = Split-Path $PSCommandPath if ($path -match "github") { $path = $localpath } } else { $path = $localpath } } } catch { $path = $localpath } if ($path.length -eq 0) { $path = $localpath } if ((Get-Command -Module ReportingServicesTools).count -ne 0) { Write-Output "Removing existing ReportingServiceTools Module..." Remove-Module ReportingServicesTools -ErrorAction Stop } $url = "https://github.com/Microsoft/ReportingServicesTools/archive/$Version.zip" $temp = ([System.IO.Path]::GetTempPath()).TrimEnd("\") $zipfile = "$temp\ReportingServicesTools.zip" if (!(Test-Path -Path $path)) { try { Write-Output "Creating directory: $path..." New-Item -Path $path -ItemType Directory | Out-Null } catch { throw "Can't create $Path. You may need to Run as Administrator!" } } else { try { Write-Output "Deleting previously installed module..." Remove-Item -Path "$path\*" -Force -Recurse } catch { throw "Can't delete $Path. You may need to Run as Administrator!" } } Write-Output "Downloading archive from ReportingServiceTools GitHub..." [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 try { Invoke-WebRequest $url -OutFile $zipfile } catch { Write-Output "...Probably using a proxy for internet access. Trying default proxy settings..." (New-Object System.Net.WebClient).Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials Invoke-WebRequest $url -OutFile $zipfile -ErrorAction Stop } Unblock-File $zipfile -ErrorAction SilentlyContinue Write-Output "Unzipping archive..." $shell = New-Object -COM Shell.Application $zipPackage = $shell.NameSpace($zipfile) $destinationFolder = $shell.NameSpace($temp) $destinationFolder.CopyHere($zipPackage.Items()) Move-Item -Path "$temp\ReportingServicesTools-$Version\*" $path Write-Output "ReportingServicesTools has been successfully downloaded to $path!" Write-Output "Cleaning up..." Remove-Item -Path "$temp\ReportingServicesTools-$Version" Remove-Item -Path $zipfile Write-Output "Importing ReportingServicesTools Module..." Import-Module "$path\ReportingServicesTools\ReportingServicesTools.psd1" -Force Write-Output "ReportingServicesTools Module was successfully imported!" Get-Command -Module ReportingServicesTools Write-Output "`n`nIf you experience any function missing errors after update, please restart PowerShell or reload your profile."
combined_dataset/train/non-malicious/sample_45_37.ps1
sample_45_37.ps1
import { BundledLanguageInfo, DynamicImportLanguageRegistration } from '@shikijs/core'; declare const bundledLanguagesInfo: BundledLanguageInfo[]; declare const bundledLanguagesBase: { [k: string]: DynamicImportLanguageRegistration; }; declare const bundledLanguagesAlias: { [k: string]: DynamicImportLanguageRegistration; }; type BundledLanguage = 'abap' | 'actionscript-3' | 'ada' | 'adoc' | 'angular-html' | 'angular-ts' | 'apache' | 'apex' | 'apl' | 'applescript' | 'ara' | 'asciidoc' | 'asm' | 'astro' | 'awk' | 'ballerina' | 'bash' | 'bat' | 'batch' | 'be' | 'beancount' | 'berry' | 'bibtex' | 'bicep' | 'blade' | 'c' | 'c#' | 'c++' | 'cadence' | 'cdc' | 'clarity' | 'clj' | 'clojure' | 'closure-templates' | 'cmake' | 'cmd' | 'cobol' | 'codeowners' | 'codeql' | 'coffee' | 'coffeescript' | 'common-lisp' | 'console' | 'cpp' | 'cql' | 'crystal' | 'cs' | 'csharp' | 'css' | 'csv' | 'cue' | 'cypher' | 'd' | 'dart' | 'dax' | 'desktop' | 'diff' | 'docker' | 'dockerfile' | 'dream-maker' | 'elisp' | 'elixir' | 'elm' | 'emacs-lisp' | 'erb' | 'erl' | 'erlang' | 'f' | 'f#' | 'f03' | 'f08' | 'f18' | 'f77' | 'f90' | 'f95' | 'fennel' | 'fish' | 'fluent' | 'for' | 'fortran-fixed-form' | 'fortran-free-form' | 'fs' | 'fsharp' | 'fsl' | 'ftl' | 'gdresource' | 'gdscript' | 'gdshader' | 'genie' | 'gherkin' | 'git-commit' | 'git-rebase' | 'gjs' | 'gleam' | 'glimmer-js' | 'glimmer-ts' | 'glsl' | 'gnuplot' | 'go' | 'gql' | 'graphql' | 'groovy' | 'gts' | 'hack' | 'haml' | 'handlebars' | 'haskell' | 'haxe' | 'hbs' | 'hcl' | 'hjson' | 'hlsl' | 'hs' | 'html' | 'html-derivative' | 'http' | 'hxml' | 'hy' | 'imba' | 'ini' | 'jade' | 'java' | 'javascript' | 'jinja' | 'jison' | 'jl' | 'js' | 'json' | 'json5' | 'jsonc' | 'jsonl' | 'jsonnet' | 'jssm' | 'jsx' | 'julia' | 'kotlin' | 'kql' | 'kt' | 'kts' | 'kusto' | 'latex' | 'less' | 'liquid' | 'lisp' | 'log' | 'logo' | 'lua' | 'make' | 'makefile' | 'markdown' | 'marko' | 'matlab' | 'md' | 'mdc' | 'mdx' | 'mediawiki' | 'mermaid' | 'mojo' | 'move' | 'nar' | 'narrat' | 'nextflow' | 'nf' | 'nginx' | 'nim' | 'nix' | 'nu' | 'nushell' | 'objc' | 'objective-c' | 'objective-cpp' | 'ocaml' | 'pascal' | 'perl' | 'perl6' | 'php' | 'plsql' | 'po' | 'postcss' | 'pot' | 'potx' | 'powerquery' | 'powershell' | 'prisma' | 'prolog' | 'properties' | 'proto' | 'ps' | 'ps1' | 'pug' | 'puppet' | 'purescript' | 'py' | 'python' | 'ql' | 'qml' | 'qmldir' | 'qss' | 'r' | 'racket' | 'raku' | 'razor' | 'rb' | 'reg' | 'regex' | 'regexp' | 'rel' | 'riscv' | 'rs' | 'rst' | 'ruby' | 'rust' | 'sas' | 'sass' | 'scala' | 'scheme' | 'scss' | 'sh' | 'shader' | 'shaderlab' | 'shell' | 'shellscript' | 'shellsession' | 'smalltalk' | 'solidity' | 'soy' | 'sparql' | 'spl' | 'splunk' | 'sql' | 'ssh-config' | 'stata' | 'styl' | 'stylus' | 'svelte' | 'swift' | 'system-verilog' | 'systemd' | 'tasl' | 'tcl' | 'terraform' | 'tex' | 'tf' | 'tfvars' | 'toml' | 'ts' | 'tsp' | 'tsv' | 'tsx' | 'turtle' | 'twig' | 'typ' | 'typescript' | 'typespec' | 'typst' | 'v' | 'vala' | 'vb' | 'verilog' | 'vhdl' | 'vim' | 'viml' | 'vimscript' | 'vue' | 'vue-html' | 'vy' | 'vyper' | 'wasm' | 'wenyan' | 'wgsl' | 'wiki' | 'wikitext' | 'wl' | 'wolfram' | 'xml' | 'xsl' | 'yaml' | 'yml' | 'zenscript' | 'zig' | 'zsh' | '文言'; declare const bundledLanguages: Record<BundledLanguage, DynamicImportLanguageRegistration>; export { type BundledLanguage, bundledLanguages, bundledLanguagesAlias, bundledLanguagesBase, bundledLanguagesInfo };
combined_dataset/train/non-malicious/2978.ps1
2978.ps1
$VerbosePreference = 'Continue' $ErrorActionPreference = 'Stop' $baseDir = $PSScriptRoot try { $buildDir = "$baseDir\build\psgallery\Pester" $null = New-Item -Path $buildDir -ItemType Directory -Verbose Write-Verbose "Copying release files to build folder '$buildDir'" Copy-Item $baseDir\Pester.ps?1 $buildDir\ Copy-Item $baseDir\LICENSE $buildDir\ Copy-Item $baseDir\nunit_schema_2.5.xsd $buildDir\ Copy-Item $baseDir\junit_schema_4.xsd $buildDir\ Copy-Item $baseDir\bin $buildDir\ -Recurse Copy-Item $baseDir\Functions $buildDir\ -Recurse Copy-Item $baseDir\Dependencies $buildDir\ -Recurse Copy-Item $baseDir\Snippets $buildDir\ -Recurse Copy-Item $baseDir\en-US $buildDir\ -Recurse Copy-Item $baseDir\lib $buildDir\ -Recurse Write-Verbose 'Copy complete. Contents:' Get-ChildItem $buildDir -Recurse | Out-Host } catch { Write-Error -ErrorRecord $_ exit 1 }
combined_dataset/train/non-malicious/sample_65_18.ps1
sample_65_18.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Deletes an existing Azure Front Door Standard or Azure Front Door Premium or CDN profile with the specified parameters. Deleting a profile will result in the deletion of all of the sub-resources including endpoints, origins and custom domains. .Description Deletes an existing Azure Front Door Standard or Azure Front Door Premium or CDN profile with the specified parameters. Deleting a profile will result in the deletion of all of the sub-resources including endpoints, origins and custom domains. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.ICdnIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <ICdnIdentity>: Identity Parameter [CustomDomainName <String>]: Name of the domain under the profile which is unique globally. [EndpointName <String>]: Name of the endpoint under the profile which is unique globally. [Id <String>]: Resource identity path [OriginGroupName <String>]: Name of the origin group which is unique within the endpoint. [OriginName <String>]: Name of the origin which is unique within the profile. [PolicyName <String>]: The name of the CdnWebApplicationFirewallPolicy. [ProfileName <String>]: Name of the Azure Front Door Standard or Azure Front Door Premium or CDN profile which is unique within the resource group. [ResourceGroupName <String>]: Name of the Resource group within the Azure subscription. [RouteName <String>]: Name of the routing rule. [RuleName <String>]: Name of the delivery rule which is unique within the endpoint. [RuleSetName <String>]: Name of the rule set under the profile which is unique globally. [SecretName <String>]: Name of the Secret under the profile. [SecurityPolicyName <String>]: Name of the security policy under the profile. [SubscriptionId <String>]: Azure Subscription ID. .Link https://learn.microsoft.com/powershell/module/az.cdn/remove-azfrontdoorcdnprofile #> function Remove-AzFrontDoorCdnProfile { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Delete', Mandatory)] [Alias('ProfileName')] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')] [System.String] # Name of the Azure Front Door Standard or Azure Front Door Premium or CDN profile which is unique within the resource group. ${Name}, [Parameter(ParameterSetName='Delete', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')] [System.String] # Name of the Resource group within the Azure subscription. ${ResourceGroupName}, [Parameter(ParameterSetName='Delete')] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # Azure Subscription ID. ${SubscriptionId}, [Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.ICdnIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $hasAsJob = $PSBoundParameters.Remove('AsJob') $hasNoWait = $PSBoundParameters.Remove('NoWait') $hasPassThru = $PSBoundParameters.Remove('PassThru') if ($PSCmdlet.ParameterSetName -eq 'Delete') { $frontDoorCdnProfile = Get-AzFrontDoorCdnProfile @PSBoundParameters } elseif ($PSCmdlet.ParameterSetName -eq 'DeleteViaIdentity') { $frontDoorCdnProfile = Get-AzFrontDoorCdnProfile @PSBoundParameters } else { throw "Not supported ParameterSetName." } if($null -eq $frontDoorCdnProfile) { throw "Provided FrontDoorCdnProfile does not exist." } else { if ($hasAsJob) { $PSBoundParameters.Add('AsJob', ${AsJob}) } if ($hasNoWait) { $PSBoundParameters.Add('NoWait', ${NoWait}) } if ($hasPassThru) { $PSBoundParameters.Add('PassThru', ${PassThru}) } if(ISFrontDoorCdnProfile($frontDoorCdnProfile.SkuName)) { Az.Cdn.internal\Remove-AzCdnProfile @PSBoundParameters } else { throw "Provided FrontDoorCdnProfile does not exist." } } } } # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBTbgHdmnsEJBDv # dInngNZGF7FFDywtwQCIKB7tRpcPiqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKHusIx7US6o4KiZk/7NU2w # VB/a9kvYhwZTdhmw/hE4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZMAzLL7EXkAvUR0OA330//n+vGBUh3AbobYJm7WnpsOJXUnj32VmJFLB # yfLfrAqOzVnDMKLsfBnRUOpdd3mWM+0pmlqBTtyasxbNATWG1wY0l8VtZpB4h+nC # Kk5bWPFfigdgXnpk/m6/RDJmNd1X3GkPSqGXHBF8VOY3bKaXYpi5XyNhmUpYUk19 # 3GgLR3vIwO3tT3KVN9M+gRfppNTh00fWnqvnZpJr78fpP87cVGlUD7tUcBXVeJT+ # XQ5Wrl7ET9D/MQVvK6/WiYPZOKLX0JxDNv27V4za6KVEAXa/I3bvboraUbo2E1Tg # bFj7amnw5GB7/58xzr2wIE1OgtFM26GCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC7A1s6HZRYzsfT9aBUPt1H0TTZzi5GoSXJO/yUHiByuwIGZpV4rwn7 # GBIyMDI0MDczMTA3MDA0MC42NFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB7eFfy9X3pV1zAAEAAAHtMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU0 # MVoXDTI1MDMwNTE4NDU0MVowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAKgwwmySuupqnJwvE8LUfvMPuDzw2lsRpDpKNxMhFvMJ # XJhA2zPxNovWmoVMQA8vVfuiMvj8RoRb5SM2pmz9rIzJbhgikU9k/bHgUExUJ12x # 4XaL5owyMMeLQtxNBnEzazeYUysJkBZJ8thdgMiKYUHPyPSgtYbLdWAuYFMozjEu # q/sNlTPwHZKgCZsS2nraeBKXSE6g3vdIXAT5jbhK8ZAxaHKSkb69cPByla/AN75O # CestHsBNEVc3klLbp2bbLLpJgUxFicwTd0wcJD9RAhBA0LycuYi90qQChYQxe0mw # YSjdCszZLZIG/g+kdHNG6TNO0/5QBx4bEz0nKvBRA/k4ISZbphyETJENLA/iFT1/ # sHQDKHXg/D28mjuN7A2N4w8iSad7ItKLSu6/ajH/FEa1wn3IE0LkFpGS2PPuy09q # iNH48MDZ+4G0KjzEqWS3neZRvsBj4JkceqEubvql0wXoEe/ZO/CVUF5BE3bZeNpV # VHAKCOAmc17C3s96NyulSfSocuAur7UE3UPNi6RaROvvBPTOXSJev422pSRZI6dZ # F97w3bW0Hq6/dWRbycV0KG1ttlnPbil4u0kRm42s3xd/09M8zNlcMkEjURyJH/3V # BwahkWZVsVVvatQgCzTX5mR7C9uGYZUN59f2hkbj8riAZSxO9Nb6vUlkzFRPYzCp # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUzhvw7PfeECoER8qUBl/Q0qHgIhkwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAJ3WArZF354YvR4eL6ITr+oNjyxtuw7h6Zqd # ynoo837GrlkBq2IFHiOZFGGb71WKTQWjQMtaL83bxsUjt1djDT2ne8KKluPLgSiJ # +bQ253v/hTfSL37tG9btc5DevHfv5Tu+r2WTrJikYI2nSOUnXzz8K5E+Comd+rkR # 15p8fYCgbjqEpZN4HsO5dqwa3qykk56cZ51Kt7fgxZmp5MhDSto4i1mcW4YPLj7G # gPWpHPZBb67aAIdobwBCOFhQzi5OL23qS22PpztdqavbOta5x4OHPuwou20tMnvC # zlisDYjxxOVswB/YpbQZWMptgZ34tkZ24Qrv/t+zgZSQypznUWw10bWf7OBzvMe7 # agYZ4IGDizxlHRkXLHuOyCb2xIUIpDkKxsC+Wv/rQ12TlN4xHwmzaQ1SJy7YKpnT # fzfdOy9OCTuIPUouB9LXocS+M3qbhUokqCMns4knNpu1LglCBScmshl/KiyTgPXy # tmeL2lTA3TdaBOZ3XRZPCJk67iDxSfqIpw8xj+IWpO7ie2TMVTEEGlsUbqTUIg1m # aiKsRaYK0beXJnYh12aO0h59OQi8ZZvgnHPPuXab8TaQY6LEMkexqFlWbCyg2+HL # mS7+KdT751cfPD6GW+pNIVPz2sgVWFyaxY8Mk81FJKkyGgnfdXZlr+WQpxuRQzRJ # tCBL2qx3MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAO4d # rIpMJpixjEmH6hZPHq5U8XD5oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqU7xlMCIYDzIwMjQwNzMwMTkyNDIx # WhgPMjAyNDA3MzExOTI0MjFaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOpTvGUC # AQAwCgIBAAICAd8CAf8wBwIBAAICE4wwCgIFAOpVDeUCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAXPsuwAOWP25E2cX2F+ZzC7+F+B3hQP2N3BBLnJrHmoIh # s7AB9eKAmdDY35066bWrrS96jBmnlYE5cWcY9IlsFb6UUYy6JVmhkdludwe9fXNz # YyM8+9r/32cJIav8keoFnpR4bLuC7dOReAQchNX9BcZhUNmsOVGLXsQ62cblX+Fq # f2NacgAv1BvdBKPItuFAd1HF0RAwT+nxznxwI4oH5VFxwczAi4/6d8bmt6ln7osT # epi9zlskuKo41mDA455mJtBHwWVFn88PoIMkrDjQzYs8D/45h9wo6OlCBIbwRdtu # /KXStSQAWMstNnev1woznT2WZalRDf0ssCHvoj3fNDGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7eFfy9X3pV1zAAEAAAHt # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIHAKdOHZPiIQxDUhfBD+CEr1MG+W47rsBGX2DHK6QfgX # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgjS4NaDQIWx4rErcDXqXXCsjC # uxIOtdnrFJ/QXjFsyjkwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAiBCD+WiQ24JjmUF1a/9zfWS+YM56G # EnfC5JQAiBZLaDB/BTANBgkqhkiG9w0BAQsFAASCAgBsr5eDJThVWGR/u8o2OXwk # 6VOcZ3LSOonWwJAKSUuGfdpeKEzpO4BK0GQgX+iuUI0wBV6LW9g5+aoklEPRdeaK # p/21oDK1MbJuvi2BCrsZa1wfG63UuyLyABCzZr38pls7eBpWBK8P8kGn25Y3/KTx # m8V3wcDnXtYB5tnEs6NTdR7PwZUB4RbAtnFS+2uQ3OMOQCaXsYUUJKOIGoshpYpN # FC7S2rlm4TPZNkgtApUfIEnUoFpd58ZK1/eVE814CddVl2w8nLxRSj6FH/U9QESO # Pxj35GxGF18PnWOaCEbxL3SK1ueuawBd6virUiewVtsmBFVrMwO80cbf/C79rc6P # uTcRlP6M5WlwfZ5u7QQc0LwYAAJrCjVXtqIwgqYuE05JOmTRPL64/aOWjITAzke1 # ud5FIiZJjWe1FM8OW41iRliPHEjJIs1pzRX6O6+dWOKkg8CGElYaP6V/fcbE5gGL # CY78n1AsvoUvdVP6YOEATJdgM2+BqOkWAqyz7MUp5vTYAPKNXYWTumzTRYVPIou3 # H7qrH+TmZIHASSwy76I9JfDVZ7aMXpqA5c4Lv+DvT+OqsYJQNpR4TVKnGnyxp7+z # LKqhGSkykJi/MAKFlfGqPLj+W+GNbpMQFSzWAGpRxhz44DFavrU58S8Aob06DEfq # X5epc/PC/pfKqaDIkxDeqw== # SIG # End signature block
combined_dataset/train/non-malicious/3697.ps1
3697.ps1
function Get-ResourceGroupName { return getAssetName } function Get-ResourceName { return getAssetName } function TestSetup-CreateResourceGroup { $resourceGroupName = getAssetName $rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US" $resourceGroup = New-AzResourceGroup -Name $resourceGroupName -location $rglocation -Force return $resourceGroup } function Assert-Tags($tags1, $tags2) { if($tags1.count -ne $tags2.count) { throw "Tag size not equal. Tag1: $tags1.count Tag2: $tags2.count" } foreach($key in $tags1.Keys) { if($tags1[$key] -ne $tags2[$key]) { throw "Tag content not equal. Key:$key Tags1:" + $tags1[$key] + "Tags2:" + $tags2[$key] } } }
combined_dataset/train/non-malicious/Custom Speech Commands.ps1
Custom Speech Commands.ps1
@@#Filename commands.ps1 import-module "G:\\Documents\\Speech Macros\\custom.psm1" import-module "G:\\Documents\\Speech Macros\\alice.psm1" Add-SpeechCommands @{ "test command" = { Say $(Respond "3:2,4:0-2") } " * the percentages * " = { Say $(Percentages) } " * star date * " = { Say "Current, Star date, $("$((Get-Date).year).$([math]::round($((Get-Date).dayofyear)/365, 2)*100)" -replace "([A-Za-z0-9.]){1}","`$1 " -replace "\\.","point")" } " * mail * " = { Start-Process "https://mail.google.com" } "Google * please" = { $term = $_ -replace "$Computer(.+?)Google (.+?) please", '$2'; Start-Process "http://www.google.com/search?q=$term" } "What * time * " = { Say "It is $(Get-Date -f "h:mm tt")" } "What is * time * " = { Say "It is $(Get-Date -f "h:mm tt")" } "What time * " = { Say "It is $(Get-Date -f "h:mm tt")" } " * some music * " = { Start-Process "grooveshark.exe" } "What * date today" = { Say $(Get-Date -f "dddd, MMMM dd") } #list processes "What's running?" = { $proc = ps | sort ws -desc Say $("$($proc.Count) processes, including $($proc[0].name), which is using " + "$([int]($proc[0].ws/1mb)) megabytes of memory") } #Word Definition " * the definition for * please" = {$define = $_ -replace "$Computer(.+?)the definition for (.+?) please", '$2' ;$outtext = Get-Definition("$define");Say "Definitions for $define, , , $outtext"} } -Computer "alice" -Verbose #eof @@#Filename custom.psm1 function Get-Definition($word) { #.Synopsis # Polls wiktionary for top text definitons for a given $word input #.Description # This Function parses the top $lines definitions for a given # $term into one string formatted for speech synthesis # # Say "Sure" if($word -match " "){Say "Fail, one word at a time please"; break} $page = "http://simple.wiktionary.org/wiki/$word" $ie = new-object -com "InternetExplorer.Application" $ie.visible = $false $ie.navigate($page) while($ie.busy){Start-Sleep 1} $output = " " $lines = 0 for($d=0;$d -le $lines;$d++) { ## grab the definition strings from each table $ol = @($ie.Document.getElementsByTagName("ol"))[0] $li = @($ol.getElementsByTagName("li"))[$d] $def = @($li.innerHTML) $output += "$def" if($d -lt $lines){ $output += ", or, " } } $ie.Quit() $closeIE = [System.Runtime.Interopservices.Marshal]::FinalReleaseComObject($ie) Remove-Variable ie return Clean-String($output) } function Clean-String([string]$str){ #.Synopsis # Cleans string from web (most concerned about x/html tags) #.Description # Cleans input string of xml tags # returns $str # # $str = $str -replace "\\<[^<]*\\>", " " $str = $str.replace("&nbsp", "") return $str } function Respond($in, [string]$del = ","){ #.Synopsis # Recursive. # Returns a random response from $responses via the three dimensional array of choices: $choices[<groups>][<dimensions>][<values>] # This function takes in a string indicating which responses from the $responses array # to to choose from. It supports ranges (-) and direct selections (/) in each seed separated by (,). #.Description # the idea here is to respond based on this format: $in = "3:2,4:1-2,0/2-4/6:1" # where 3:2 is a direct seed, 4:1-2 is a range seed (from 4:1 to 4:2), # and 0/2-4/6:1 combines the two (effectively adds 0:1, 2:1, 3:1, 4:1, 5:1, 6:1 to the choices) # In heap, the above example would effectively add 3:2, 4:1, 4:2, 0:1, 2:1, 3:1, 4:1, 5:1, 6:1 to the # available choices, and will appear as $choices(@($xs(3),$ys(2)),@($xs(4),$ys(1,2)),@($xs(0,2,3,4,6),$ys(1))) # switch -wildcard ($del){ "`,"{ if($in -match "`,"){ #if more than one coordset, handle each $coordsets = $in -split "`," #split coordsets apart foreach($coordset in $coordsets){ $choices += ,(Respond $coordset "`:") } } else{ #else pass the string to the next step, $choices = ,(Respond $in "`:") } $choice = $choices[(get-random -min 0 -max $choices.count)] #choose one of the groups randomly $responses[$choice[0]][$choice[1]];#pass response out of the function } "`:"{ $coords = $in -split "`:" #split coordset apart foreach ($coord in $coords){ if(($coord -match "`/")-or($coord -match "`-")){ #if there's an or operator or a range $dimensions += ,(Respond $coord "`/") # handle them, and add all values (in array) to this dimension (split fails elegantly) } else{ $dimensions += ,$coord #else just add the coord value (in an array) via comma operator } } $dimensions #pass dimensions out dimensions is two dimensional array } "`/"{ $ranges = $in -split "`/" #split ORs apart (if theres not OR, the string is still added to $ranges[0]) foreach($range in $ranges){ if($range -match "`-"){#if theres a range to handle, do so foreach ($val in (Respond $range "`-")){ $orVals += ,$val #append all values in returned range array to new array } } else{# else just append the value to teh new array $orVals += ,$range } } ,($orVals | get-random) #pass out single element array of random value from vals array } "`-"{ $vals = $in -split "`-" #split ranges apart $vals[0]..$vals[1] # pass out array containing all values in range } } } $responses = (#Response Array (##0-correct "Right", "Correct" ), (##1-incorrect "Wrong", "Incorrect" ), (##2-positive "Yes", "Aye", "I'll give it a shot" ), (##3-negative "No", "Negative", "Not going to happen" ), (##4-affirmation "Sure", "OK", "Lets See" ), (##5-retort "your mom", "your face" ), (##6-insult "You\\'re dumb", "you fail" ), (##7-eager "I'm ready", "Lets check it out" ), (##8-apprehensive "I don't know", "Just a seck" ), (##9-neutral "oh", "Hum" ) ) function Percentages { #.Synopsis # Specific speech command that reads back # remaining percentages of year, month, week, and day #.Description # Pretty self explanitory, basic maths, elucidatory var names # # $date = get-date #capture date object $daysInYear = [int]$(if([datetime]::IsLeapYear($date.year)){366}else{365}) #if leap year, 366, else 365 $daysInMonth = [int]$([datetime]::DaysInMonth($date.year, $date.month)) #capture days in month $dayOfYear = [int]$date.dayofyear #days past (including today) $dayOfMonth = [int]$date.day #days past (including today) $hoursOfDay = [int]$date.hour #hours past (including current) $minutesOfHour = [int]$date.minute #minutes past (including current) switch ($date.dayofweek.toString()){ #assumes start of week is sunday Sunday { [int]$dayOfWeek="1"; break } Monday { [int]$dayOfWeek="2"; break } Tuesday { [int]$dayOfWeek="3"; break } Wednesday { [int]$dayOfWeek="4"; break } Thursday { [int]$dayOfWeek="5"; break } Friday { [int]$dayOfWeek="6"; break } Saturday { [int]$dayOfWeek="7"; break } } $percentYearGone = $dayOfYear/$daysInYear #days of this year (including today) divided by total days in this year $percentMonthGone = ((($dayOfMonth*24)-24)+$hoursOfDay)/($daysInMonth*24) #hours of this month divided by total hours in this month $percentWeekGone = ((($dayOfWeek*24)-24)+$hoursOfDay)/(7*24) #hours of this week divided by total hours in a week $percentDayGone = ((($hoursOfDay*60)-60)+$minutesOfDay)/(24*60) #minutes of today divided by total minutes in a day $percentYearLeft = [math]::round((1-$percentYearGone)*100,1) #opposite percentages rounded to one decimal place $percentMonthLeft = [math]::round((1-$percentMonthGone)*100,1) #^ $percentWeekLeft = [math]::round((1-$percentWeekGone)*100,1) #^ $percentDayLeft = [math]::round((1-$percentDayGone)*100,1) #^ $str = "" $str += "There's " $str += $percentYearLeft $str += "% of this year, " $str += $percentMonthLeft $str += "% of this month, " $str += $percentWeekLeft $str += "% of this week, and " $str += $percentDayLeft $str += "% of today remaining, what will you do with it?" return $str } #eof
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_3.ps1
Send-HTMLFormattedEmail_3.ps1
#------------------------------------------------- # Send-HTMLFormattedEmail #------------------------------------------------- # Usage: Used to send an HTML Formatted Email that is based on an XSLT template. #------------------------------------------------- function Send-HTMLFormattedEmail{ param ( [string] $To, [string] $ToDisName, [string] $BCC, [string] $From, [string] $FromDisName, [string] $Subject, [string] $Content, [string] $Relay, [string] $XSLPath) try { # Load XSL Argument List $XSLArg = New-Object System.Xml.Xsl.XsltArgumentList $XSLArg.Clear() $XSLArg.AddParam("To", $Null, $ToDisName) $XSLArg.AddParam("Content", $Null, $Content) # Load Documents $BaseXMLDoc = New-Object System.Xml.XmlDocument $BaseXMLDoc.LoadXml("<root/>") $XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform $XSLTrans.Load($XSLPath) #Perform XSL Transform $FinalXMLDoc = New-Object System.Xml.XmlDocument $MemStream = New-Object System.IO.MemoryStream $XMLWriter = [System.Xml.XmlWriter]::Create($MemStream) $XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter) $XMLWriter.Flush() $MemStream.Position = 0 # Load the results $FinalXMLDoc.Load($MemStream) $Body = $FinalXMLDoc.Get_OuterXML() # Create from, To, BCC and the message strucures $MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName $MessTo = New-Object System.Net.Mail.Mailaddress $To $MessBCC = New-Object System.Net.Mail.Mailaddress $BCC $Message = New-Object System.Net.Mail.MailMessage $MessFrom, $MessTo # Populate message $Message.Subject = $Subject $Message.Body = $Body $Message.IsBodyHTML = $True # Add BCC $Message.BCC.Add($MessBCC) # Create SMTP Client $Client = New-Object System.Net.Mail.SmtpClient $Relay # Send The Message $Client.Send($Message) } catch { return $Error[0] } } ### XSLT Template Example <?xml version="1.0"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output media-type="xml" omit-xml-declaration="yes" /> <xsl:param name="To"/> <xsl:param name="Content"/> <xsl:template match="/"> <html> <head> <title>My First Formatted Email</title> </head> <body> <div width="400px"> <p>Dear <xsl:value-of select="$To" />,</p> <p></p> <p><xsl:value-of select="$Content" /></p> <p></p> <p><strong>Please do not respond to this email!</strong><br /> An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p> <p></p> <Address> Many thanks from your:<br /> Really Cool IT Team<br /> </Address> </div> </body> </html> </xsl:template> </xsl:stylesheet>
combined_dataset/train/non-malicious/sample_42_13.ps1
sample_42_13.ps1
# # Module manifest for module 'OCI.PSModules.Apmcontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2656b809-7098-428e-b605-696525730fec' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain', 'Get-OCIApmcontrolplaneApmDomainsList', 'Get-OCIApmcontrolplaneApmDomainWorkRequestsList', 'Get-OCIApmcontrolplaneDataKeysList', 'Get-OCIApmcontrolplaneWorkRequest', 'Get-OCIApmcontrolplaneWorkRequestErrorsList', 'Get-OCIApmcontrolplaneWorkRequestLogsList', 'Get-OCIApmcontrolplaneWorkRequestsList', 'Move-OCIApmcontrolplaneApmDomainCompartment', 'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys', 'Remove-OCIApmcontrolplaneApmDomain', 'Remove-OCIApmcontrolplaneDataKeys', 'Update-OCIApmcontrolplaneApmDomain' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/forever.ps1
forever.ps1
forever
combined_dataset/train/non-malicious/sample_45_40.ps1
sample_45_40.ps1
# # Module manifest for module 'OCI.PSModules.Networkloadbalancer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend', 'Get-OCINetworkloadbalancerBackendHealth', 'Get-OCINetworkloadbalancerBackendSet', 'Get-OCINetworkloadbalancerBackendSetHealth', 'Get-OCINetworkloadbalancerBackendSetsList', 'Get-OCINetworkloadbalancerBackendsList', 'Get-OCINetworkloadbalancerHealth', 'Get-OCINetworkloadbalancerHealthChecker', 'Get-OCINetworkloadbalancerHealthsList', 'Get-OCINetworkloadbalancerListener', 'Get-OCINetworkloadbalancerListenersList', 'Get-OCINetworkloadbalancersList', 'Get-OCINetworkloadbalancersPoliciesList', 'Get-OCINetworkloadbalancersProtocolsList', 'Get-OCINetworkloadbalancerWorkRequest', 'Get-OCINetworkloadbalancerWorkRequestErrorsList', 'Get-OCINetworkloadbalancerWorkRequestLogsList', 'Get-OCINetworkloadbalancerWorkRequestsList', 'Move-OCINetworkloadbalancerCompartment', 'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend', 'New-OCINetworkloadbalancerBackendSet', 'New-OCINetworkloadbalancerListener', 'Remove-OCINetworkloadbalancer', 'Remove-OCINetworkloadbalancerBackend', 'Remove-OCINetworkloadbalancerBackendSet', 'Remove-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancer', 'Update-OCINetworkloadbalancerBackend', 'Update-OCINetworkloadbalancerBackendSet', 'Update-OCINetworkloadbalancerHealthChecker', 'Update-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancerNetworkSecurityGroups' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2410.ps1
2410.ps1
[CmdletBinding()] [OutputType([bool])] param ( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidatePattern('.*\.ps1$')] [string]$ScriptFilePath, [string]$ScriptParameters, [Parameter(Mandatory)] [string]$LocalScriptFolderPath, [Parameter(Mandatory)] [hashtable]$TaskTriggerOptions, [Parameter(Mandatory)] [string]$TaskName, [Parameter(Mandatory)] [string]$TaskRunAsUser, [Parameter(Mandatory)] [string]$TaskRunAsPassword, [ValidateScript({ Test-Connection -ComputerName $_ -Quiet -Count 1})] [string]$Computername = 'localhost', [ValidateSet('x86', 'x64')] [string]$PowershellRunAsArch ) begin { $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest function Test-PsRemoting { param ( [Parameter(Mandatory)] $computername ) try { $errorActionPreference = "Stop" $result = Invoke-Command -ComputerName $computername { 1 } } catch { return $false } if ($result -ne 1) { Write-Verbose "Remoting to $computerName returned an unexpected result." return $false } $true } function Get-ComputerArchitecture { if ((Get-CimInstance -ComputerName $Computername Win32_ComputerSystem -Property SystemType).SystemType -eq 'x64-based PC') { 'x64' } else { 'x86' } } function Get-PowershellFilePath { if (($PowershellRunAsArch -eq 'x86') -and ((Get-ComputerArchitecture) -eq 'x64')) { if ($Computername -eq 'localhost') { "$($PsHome.Replace('System32','SysWow64'))\powershell.exe" } else { Invoke-Command -ComputerName $Computername -ScriptBlock { "$($PsHome.Replace('System32','SysWow64'))\powershell.exe" } } } else { if ($Computername -eq 'localhost') { "$PsHome\powershell.exe" } else { Invoke-Command -ComputerName $Computername -ScriptBlock { "$PsHome\powershell.exe" } } } } function New-MyScheduledTask { try { $PowershellFilePath = Get-PowershellFilePath if ($Computername -ne 'localhost') { $ScriptBlock = { $Action = New-ScheduledTaskAction -Execute $using:PowershellFilePath -Argument "-NonInteractive -NoLogo -NoProfile -File $using:ScriptFilePath $using:ScriptParameters" $TaskTriggerOptions = $using:TaskTriggerOptions $Trigger = New-ScheduledTaskTrigger @TaskTriggerOptions $RunAsUser = $using:TaskRunAsUser $Task = New-ScheduledTask -Action $Action -Trigger $Trigger -Settings (New-ScheduledTaskSettingsSet); Register-ScheduledTask -TaskName $using:TaskName -InputObject $Task -User $using:TaskRunAsUser -Password $using:TaskRunAsPassword } $Params = @{ 'Scriptblock' = $ScriptBlock 'Computername' = $Computername } Invoke-Command @Params } else { $Action = New-ScheduledTaskAction -Execute $PowershellFilePath -Argument "-NonInteractive -NoLogo -NoProfile -File $ScriptFilePath" $Trigger = New-ScheduledTaskTrigger @TaskTriggerOptions $Task = New-ScheduledTask -Action $Action -Trigger $Trigger -Settings (New-ScheduledTaskSettingsSet); Register-ScheduledTask -TaskName $TaskName -InputObject $Task -User $TaskRunAsUser -Password $TaskRunAsPassword } } catch { Write-Error "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" $false } } function Get-UncPath ($HostName,$LocalPath) { $NewPath = $LocalPath -replace (":", "$") if ($NewPath.EndsWith("\")) { $NewPath = [Regex]::Replace($NewPath, "\\$", "") } "\\$HostName\$NewPath" } try { if (($Computername -ne 'localhost') -and !(Test-PsRemoting -computername $Computername)) { throw "PS remoting not available on the computer $Computername" } $LocalScriptFolderPath = $LocalScriptFolderPath.TrimEnd('\') } catch { Write-Error "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" exit } } process { try { if ($ScriptFilePath.StartsWith('\\') -or ($Computername -ne 'localhost')) { Copy-Item -Path $ScriptFilePath -Destination (Get-UncPath -HostName $Computername -LocalPath $LocalScriptFolderPath) $ScriptFilePath = "$LocalScriptFolderPath\$($ScriptFilePath | Split-Path -Leaf)" } New-MyScheduledTask | Out-Null $true } catch { Write-Error "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" $false } }
combined_dataset/train/non-malicious/sample_10_28.ps1
sample_10_28.ps1
# # Module manifest for module 'OCI.PSModules.Fleetsoftwareupdate' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Fleetsoftwareupdate.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e830226f-46c5-4916-992f-740cc29d35ab' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Fleetsoftwareupdate Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Fleetsoftwareupdate.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIFleetsoftwareupdateFsuCollectionTargets', 'Get-OCIFleetsoftwareupdateFsuAction', 'Get-OCIFleetsoftwareupdateFsuActionOutputContent', 'Get-OCIFleetsoftwareupdateFsuActionsList', 'Get-OCIFleetsoftwareupdateFsuCollection', 'Get-OCIFleetsoftwareupdateFsuCollectionsList', 'Get-OCIFleetsoftwareupdateFsuCollectionTargetsList', 'Get-OCIFleetsoftwareupdateFsuCycle', 'Get-OCIFleetsoftwareupdateFsuCyclesList', 'Get-OCIFleetsoftwareupdateFsuDiscoveriesList', 'Get-OCIFleetsoftwareupdateFsuDiscovery', 'Get-OCIFleetsoftwareupdateFsuDiscoveryTargetsList', 'Get-OCIFleetsoftwareupdateFsuJob', 'Get-OCIFleetsoftwareupdateFsuJobOutputContent', 'Get-OCIFleetsoftwareupdateFsuJobOutputsList', 'Get-OCIFleetsoftwareupdateFsuJobsList', 'Get-OCIFleetsoftwareupdateWorkRequest', 'Get-OCIFleetsoftwareupdateWorkRequestErrorsList', 'Get-OCIFleetsoftwareupdateWorkRequestLogsList', 'Get-OCIFleetsoftwareupdateWorkRequestsList', 'Invoke-OCIFleetsoftwareupdateCloneFsuCycle', 'Invoke-OCIFleetsoftwareupdateResumeFsuAction', 'Invoke-OCIFleetsoftwareupdateRetryFsuJob', 'Move-OCIFleetsoftwareupdateFsuActionCompartment', 'Move-OCIFleetsoftwareupdateFsuCollectionCompartment', 'Move-OCIFleetsoftwareupdateFsuCycleCompartment', 'Move-OCIFleetsoftwareupdateFsuDiscoveryCompartment', 'New-OCIFleetsoftwareupdateFsuAction', 'New-OCIFleetsoftwareupdateFsuCollection', 'New-OCIFleetsoftwareupdateFsuCycle', 'New-OCIFleetsoftwareupdateFsuDiscovery', 'Remove-OCIFleetsoftwareupdateFsuAction', 'Remove-OCIFleetsoftwareupdateFsuCollection', 'Remove-OCIFleetsoftwareupdateFsuCollectionTargets', 'Remove-OCIFleetsoftwareupdateFsuCycle', 'Remove-OCIFleetsoftwareupdateFsuDiscovery', 'Remove-OCIFleetsoftwareupdateFsuJob', 'Stop-OCIFleetsoftwareupdateFsuAction', 'Stop-OCIFleetsoftwareupdateFsuDiscovery', 'Update-OCIFleetsoftwareupdateFsuAction', 'Update-OCIFleetsoftwareupdateFsuCollection', 'Update-OCIFleetsoftwareupdateFsuCycle', 'Update-OCIFleetsoftwareupdateFsuDiscovery', 'Update-OCIFleetsoftwareupdateFsuJob' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Fleetsoftwareupdate' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_30_86.ps1
sample_30_86.ps1
@{ GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @('MSFT_MpPerformanceRecording.psm1') FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml') CompatiblePSEditions = @('Desktop', 'Core') FunctionsToExport = @( 'New-MpPerformanceRecording', 'Get-MpPerformanceReport' ) HelpInfoUri="https://aka.ms/winsvr-2022-pshelp" PowerShellVersion = '5.1' } # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALMtnQG5KhaVi8 # /j7ONkfb/EMugE0iBrx7n8hqD9uLdaCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIBhT7C0VQ9IYyvNiupSGOc577LyiUPub5f/VTSflWIz9MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEABnd+pUQ4k5yl5TYH2YYljaLO # QqZkt831g916A4Fg/2dZRv7x7s/CjT8pIgDof5Os6he6myd8yvjOgT5zP4lIBwcH # KPBKs82WWDV+2DA9klZWXtNTinEQ9ReWdHsrssOJnN+b1NqOE42L/MQ6tgGv6BRh # HGhbsEICgPEspM1yje8AO+Q+fVZRa2W7ELRGsppiqK0rcJQRFJnnaHfkFoVOg216 # eKFzRAwl2KDkTGqz9ZC4Ib6asXzAEgOxKHNiFeePYbuFBDa+NCRuCqDCa9MVov6L # GHUDSBaJsCVd6pTP/6v6g8LvDIGlCxfXHLDOccZk4SaSeRTFqKm3EN7+NYSQhqGC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCArC/flbu72ERc3T9Rswp/f # NlBI8mMLmSRKQplEOsjrYgIGZa67cqcTGBMyMDI0MDEyNzAzMjkxMS44MjFaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2Dtri # QP+T52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzI # HHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0m # Aq3earyH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5 # EW6NVnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgD # FjHUpcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7kt # FAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5 # gpv+YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSv # tFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zlj # EjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnS # eOXePT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/ea # O2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+m # bXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcG # dXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+ # zvGJNAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+O # dAquBiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9 # PNlyEHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbM # P+/vdYUqaJspupBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM # 9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4Q # QQj3KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegce # J9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNH # GWXbNaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOlef7cwIhgPMjAyNDAxMjcwMzAwMDda # GA8yMDI0MDEyODAzMDAwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6V5/twIB # ADAHAgEAAgIVHzAHAgEAAgIRXzAKAgUA6V/RNwIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBAHzzIpkqwNZ0k7HrdztNkWw9S4R6sXz7UpRGLKzsGrtVWa17g9pD # aymsznf/C0wIYjr0RwFtDyuCmu/VL0b9wXPOWzPMFe1CEW19EWNt0ne8fTrarVRE # I2hfxaJUcx/b1viZ8SpbLzl7TVoDe4WrWlgsIcJ6STTlwvrJTm4btqCmMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd # ldStqhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg7jeBAtXQCql8ekCZSidOedQnfq7U # tscPRHYC8LVvCoswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWs # T3iZnHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEILaIRaGjn6f8 # 8Dt5jGhn8FZpGIafZDDzkYBkO3Obk2G6MA0GCSqGSIb3DQEBCwUABIICAB0bC38B # dvcelvPclt0injgjlefSMGDMMkytm4w+D9Y7sXKxjy6zx/8m3Ya9ScVjqHCfajKQ # uEqQMQ63CZVjcjgLkUeBAjgYW1pQ2dO4uM0AQv1SGxjF8nneXvAvv/67Ca0aYa0N # JU5Pxb3qpIcaZaN0q54BptOoTn46mrOWGDM8cSs2/5YzyaoBt5fF178ZXWtfuR7A # jBdBv+sko/PMKXT3ga5X+NcgGPF7Li4JifHek0CanUgfbsVS5zv5fCzcIr3ZMlPx # Ni97IqHydxg8R3FhPlUnEf8584xSGGQylZbuNqqT16lw8AKdddFAz+WfF6NzfHU6 # 6Gk8NExSkUhGPGQDjvuaH1xkX/RQXij8PuBlxMbcZIDwoHVDWf0nRrXE6MVdfC7Q # TPjrk03GuRm554MvD2KT1rHkI/wRoiwcg67TLTfr/oGJDcy+ehg5AaFLmtihAY9l # WvUuR1haKGcLuPNUlcKEjT5kRIut251B4xrzUMnZRRboJrJT2yD4oRykRU/aCXOS # uklYw3unZ5avpPwUfmxo7WnVl1t4GrnM98xWfSVqqzRIyCtX80z6xcrQQkEyjgTb # GRbZLaYP57Fn+NQOPgwKhxxSbSBndB4dpnEGmbTsKzko3wIyHOyFrLuXjk1joJKS # 0WtZNLsJXh+nNeKlt3NbSnYl3lv9AtMcdEQk # SIG # End signature block
combined_dataset/train/non-malicious/3027.ps1
3027.ps1
Set-StrictMode -Version Latest InModuleScope Pester { Describe "the In statement" { Setup -Dir "test_path" It "executes a command in that directory" { In "$TestDrive" -Execute { "" | Out-File "test_file" } "$TestDrive\test_file" | Should -Exist } It "updates the `$pwd variable when executed" { In "$TestDrive\test_path" -Execute { $env:Pester_Test = $pwd } $env:Pester_Test | Should -Match "test_path" $env:Pester_Test = "" } } }
combined_dataset/train/non-malicious/3039.ps1
3039.ps1
Set-StrictMode -Version Latest InModuleScope Pester { Describe "Should -BeTrue" { Context "Basic functionality" { It "given true it passes" { $true | Should -BeTrue } It "given truthy it passes" { 1 | Should -BeTrue } It "given false it fails" { { $false | Should -BeTrue } | Verify-AssertionFailed } } Context "Testing messages" { It "given false it returns the correct assertion message" { $err = { $false | Should -BeTrue } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal 'Expected $true, but got $false.' } It "given false and a reason it returns the correct assertion message" { $err = { $false | Should -BeTrue -Because "we said so" } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal 'Expected $true, because we said so, but got $false.' } } } Describe "Should -Not -BeTrue" { Context "Basic functionality" { It "given false it passes" { $false | Should -Not -BeTrue } It "given falsy '<value>' it passes" -TestCases @( @{ Value = $null } @{ Value = @() } @{ Value = 0 } ) { param($Value) $Value | Should -Not -BeTrue } It "given true it fails" { { $true | Should -Not -BeTrue } | Verify-AssertionFailed } } Context "Testing messages" { It "given true it returns the correct assertion message" { $err = { $true | Should -Not -BeTrue } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal 'Expected $false, but got $true.' } } } Describe "Should -BeFalse" { Context "Basic functionality" { It "given false it passes" { $false | Should -BeFalse } It "given true it fails" { { $true | Should -BeFalse } | Verify-AssertionFailed } } Context "Testing messages" { It "given true it returns the correct assertion message" { $err = { $true | Should -BeFalse } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal 'Expected $false, but got $true.' } } It "given true and a reason it returns the correct assertion message" { $err = { $true | Should -BeFalse -Because "we said so" } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal 'Expected $false, because we said so, but got $true.' } } Describe "Should -Not -BeFalse" { Context "Basic functionality" { It "given true it passes" { $true | Should -Not -BeFalse } It "given false it fails" { { $false | Should -Not -BeFalse } | Verify-AssertionFailed } } Context "Testing messages" { It "given false it returns the correct assertion message" { $err = { $false | Should -Not -BeFalse } | Verify-AssertionFailed $err.Exception.Message | Verify-Equal 'Expected $true, but got $false.' } } } }