full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/3549.ps1 | 3549.ps1 |
$resourceGroupName = "RecoveryServicesBackupTestRg";
$resourceName = "PsTestRsVault";
$policyName = "PsTestPolicy";
$defaultPolicyName = "DefaultPolicy";
$DefaultSnapshotDays = 2;
$UpdatedSnapShotDays = 5;
$oldResourceGroupName = "shracrg"
$oldVaultName = "shracsql"
$oldPolicyName = "iaasvmretentioncheck"
function Test-AzureVMPolicy
{
$location = Get-ResourceGroupLocation
$resourceGroupName = Create-ResourceGroup $location
try
{
$vault = Create-RecoveryServicesVault $resourceGroupName $location
$schedulePolicy = Get-AzRecoveryServicesBackupSchedulePolicyObject -WorkloadType AzureVM
Assert-NotNull $schedulePolicy
$retentionPolicy = Get-AzRecoveryServicesBackupRetentionPolicyObject -WorkloadType AzureVM
Assert-NotNull $retentionPolicy
$policyName = "newPolicy"
$policy = New-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Name $policyName `
-WorkloadType AzureVM `
-RetentionPolicy $retentionPolicy `
-SchedulePolicy $schedulePolicy
Assert-NotNull $policy
Assert-AreEqual $policy.Name $policyName
Assert-AreEqual $policy.SnapshotRetentionInDays $DefaultSnapshotDays
$oldVault = Get-AzRecoveryServicesVault -ResourceGroupName $oldResourceGroupName -Name $oldVaultName
$oldPolicy = Get-AzRecoveryServicesBackupProtectionPolicy -Name $oldPolicyName -VaultId $oldVault.ID
Assert-AreEqual $oldPolicy.RetentionPolicy.DailySchedule.DurationCountInDays 1
$policy = Get-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Name $policyName
Assert-NotNull $policy
Assert-AreEqual $policy.Name $policyName
$defaultPolicy = Get-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Name $defaultPolicyName
Assert-NotNull $defaultPolicy
Assert-AreEqual $defaultPolicy.Name $defaultPolicyName
Assert-True { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Saturday" }
Assert-True { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Thursday" }
Assert-False { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Sunday" }
Assert-False { $defaultPolicy.SchedulePolicy.ScheduleRunDays -contains "Friday" }
$schedulePolicy = Get-AzRecoveryServicesBackupSchedulePolicyObject -WorkloadType AzureVM
Assert-NotNull $schedulePolicy
$retentionPolicy = Get-AzRecoveryServicesBackupRetentionPolicyObject -WorkloadType AzureVM
Assert-NotNull $retentionPolicy
$policy.SnapshotRetentionInDays = $UpdatedSnapShotDays;
Set-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-RetentionPolicy $retentionPolicy `
-SchedulePolicy $schedulePolicy `
-Policy $policy
$policy = Get-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Name $policyName
Assert-AreEqual $policy.SnapshotRetentionInDays $UpdatedSnapShotDays
Remove-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Policy $policy `
-Force
}
finally
{
Cleanup-ResourceGroup $resourceGroupName
}
} |
combined_dataset/train/non-malicious/New-XVM_3.ps1 | New-XVM_3.ps1 | #Examples
<#
New-XVM -Name "WS2012-TestServer01" -SwitchName "Switch(192.168.2.0/24)" -VhdType NoVHD
New-XVM -Name "WS2012-TestServer02" -SwitchName "Switch(192.168.2.0/24)" -VhdType ExistingVHD -VhdPath 'D:\\vhds\\WS2012-TestServer02.vhdx'
New-XVM -Name "WS2012-TestServer03" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD
New-XVM -Name "WS2012-TestServer04" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -DiskType Fixed -DiskSize 1GB
New-XVM -Name "WS2012-TestServer05" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -DiskType Dynamic
New-XVM -Name "WS2012-TestServer06" -SwitchName "Switch(192.168.2.0/24)" -VhdType Differencing -ParentVhdPath 'D:\\vhds\\Windows Server 2012 RC Base.vhdx'
New-XVM -Name "WS2012-TestServer07" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -Configuration @{"MemoryStartupBytes"=1GB;"BootDevice"="LegacyNetworkAdapter"}
#>
Function New-XVM
{
[cmdletbinding()]
Param
(
[Parameter(Mandatory=$false,Position=1)]
[string]$ComputerName=$env:COMPUTERNAME,
[Parameter(Mandatory=$true,Position=2)]
[string]$Name,
[Parameter(Mandatory=$true,Position=3)]
[string]$SwitchName,
[Parameter(Mandatory=$true,Position=4)]
[ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")]
[string]$VhdType,
[Parameter(Mandatory=$false,Position=5)]
[hashtable]$Configuration
)
DynamicParam
{
Switch ($VhdType) {
"ExistingVHD" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "_AllParameterSets"
$attributes.Mandatory = $true
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("VhdPath",$vhdPath)
return $paramDictionary
break
}
"NewVHD" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "_AllParameterSets"
$attributes.Mandatory = $false
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("DiskType",$diskType)
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "_AllParameterSets"
$attributes.Mandatory = $false
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection)
$paramDictionary.Add("DiskSize",$diskSize)
return $paramDictionary
break
}
"Differencing" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "_AllParameterSets"
$attributes.Mandatory = $true
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("ParentVhdPath",$parentVhdPath)
return $paramDictionary
}
}
}
Begin
{
Try
{
$vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop
}
Catch
{
$PSCmdlet.ThrowTerminatingError($Error[0])
}
$defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath
}
Process
{
$validConfigNames = "MemoryStartupBytes","BootDevice"
$configParams = @()
Switch ($VhdType) {
"NoVHD" {
$newVhdPath = $null
}
"ExistingVHD" {
$newVhdPath = $vhdPath.Value
}
"NewVhd" {
if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"}
if (-not $diskSize.IsSet) {$diskSize.Value = 127GB}
$newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx"
Switch ($diskType.Value) {
"Fixed" {
$vhdFile = New-VHD -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop
}
"Dynamic" {
$vhdFile = New-VHD -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop
}
}
}
"Differencing" {
$newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx"
$vhdFile = New-VHD -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop
}
}
if ($vhdFile -ne $null) {
Try
{
$command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$($vhdFile.Path)'"
}
Catch
{
$PSCmdlet.WriteError($Error[0])
Remove-Item -Path $vhdFile.Path
}
} else {
$command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD"
}
if ($Configuration -ne $null) {
foreach ($configName in $Configuration.Keys.GetEnumerator()) {
if ($validConfigNames -contains $configName) {
$configParams += "-$configName" + " " + $Configuration[$configName]
}
}
$configParams = $configParams -join " "
}
if ($configParams.Count -eq 0) {
$command += " -ErrorAction Stop"
} else {
$command += " $configParams -ErrorAction Stop"
}
Invoke-Expression -Command $command
}
End {}
}
|
combined_dataset/train/non-malicious/4126.ps1 | 4126.ps1 |
param
(
[string]$WindowsRepository,
[string]$BIOSPassword,
[switch]$BIOS,
[switch]$Drivers,
[switch]$Applications,
[string]$WinPERepository
)
function Get-Architecture {
[CmdletBinding()][OutputType([string])]
param ()
$OSArchitecture = (Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture).OSArchitecture
Return $OSArchitecture
}
function Get-WindowsUpdateReport {
[CmdletBinding()][OutputType([xml])]
param ()
If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) {
$Executable = Get-ChildItem -Path "x:\DCU" -Filter dcu-cli.exe
$ReportFile = "x:\DCU\DriverReport.xml"
} else {
$Architecture = Get-Architecture
If ($Architecture -eq "32-Bit") {
$Executable = Get-ChildItem -Path $env:ProgramFiles"\Dell\CommandUpdate" -Filter dcu-cli.exe
} else {
$Executable = Get-ChildItem -Path ${env:ProgramFiles(x86)}"\Dell\CommandUpdate" -Filter dcu-cli.exe
}
If ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") {
$ReportFile = $WindowsRepository + "\" + "DriverReport.xml"
} else {
$ReportFile = $WindowsRepository + "DriverReport.xml"
}
}
If ((Test-Path -Path $ReportFile) -eq $true) {
Remove-Item -Path $ReportFile -Force -ErrorAction SilentlyContinue
}
$Switches = "/report" + [char]32 + $ReportFile
$ErrCode = (Start-Process -FilePath $Executable.FullName -ArgumentList $Switches -Wait -Passthru).ExitCode
If ((Test-Path -Path $ReportFile) -eq $true) {
[xml]$DriverList = Get-Content -Path $ReportFile
Return $DriverList
} else {
Return $null
}
}
function Get-WinPEUpdateReport {
[CmdletBinding()]
param ()
$ReportFile = $env:SystemDrive + "\DCU\DriversReport.xml"
If ((Test-Path $ReportFile) -eq $true) {
Remove-Item -Path $ReportFile -Force | Out-Null
}
$Executable = $env:SystemDrive + "\DCU\dcu-cli.exe"
$Switches = "/report" + [char]32 + $ReportFile
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode
If ((Test-Path -Path $ReportFile) -eq $true) {
[xml]$DriverList = Get-Content -Path $ReportFile
Return $DriverList
} else {
Return $null
}
}
function Update-Repository {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]$Updates
)
If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) {
If ($WinPERepository[$WinPERepository.Length - 1] -ne "\") {
$Repository = $WinPERepository + "\"
} else {
$Repository = $WinPERepository
}
} elseif ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") {
$Repository = $WindowsRepository + "\"
} else {
$Repository = $WindowsRepository
}
foreach ($Update in $Updates.Updates.Update) {
$UpdateRepository = $Repository + $Update.Release
$DownloadURI = $Update.file
$DownloadFileName = $UpdateRepository + "\" + ($DownloadURI.split("/")[-1])
If ((Test-Path $UpdateRepository) -eq $false) {
New-Item -Path $UpdateRepository -ItemType Directory -Force | Out-Null
}
If ((Test-Path $DownloadFileName) -eq $false) {
Invoke-WebRequest -Uri $DownloadURI -OutFile $DownloadFileName
}
}
}
function Update-Applicatons {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]$Updates
)
if ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") {
$Repository = $WindowsRepository + "\"
} else {
$Repository = $WindowsRepository
}
foreach ($Update in $Updates.Updates.Update) {
If ($Update.type -eq "Application") {
$UpdateFile = $Repository + $Update.Release + "\" + (($Update.file).split("/")[-1])
If ((Test-Path $UpdateFile) -eq $true) {
$Output = "Installing " + $Update.name + "....."
Write-Host $Output -NoNewline
$Switches = "/s"
$ErrCode = (Start-Process -FilePath $UpdateFile -ArgumentList $Switches -WindowStyle Minimized -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
}
}
}
}
function Update-BIOS {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]$Updates
)
If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) {
If ($WinPERepository[$WinPERepository.Length - 1] -ne "\") {
$Repository = $WinPERepository + "\"
} else {
$Repository = $WinPERepository
}
} elseif ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") {
$Repository = $WindowsRepository + "\"
} else {
$Repository = $WindowsRepository
}
foreach ($Update in $Updates.Updates.Update) {
If ($Update.type -eq "BIOS") {
$UpdateFile = $Repository + $Update.Release + "\" + (($Update.file).split("/")[-1])
If ((Test-Path $UpdateFile) -eq $true) {
$Output = "Installing " + $Update.name + "....."
Write-Host $Output -NoNewline
$Switches = "/s /p=" + $BIOSPassword
$ErrCode = (Start-Process -FilePath $UpdateFile -ArgumentList $Switches -WindowStyle Minimized -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 2) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
}
}
}
}
function Update-Drivers {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]$Updates
)
if ($WindowsRepository[$WindowsRepository.Length - 1] -ne "\") {
$Repository = $WindowsRepository + "\"
} else {
$Repository = $WindowsRepository
}
foreach ($Update in $Updates.Updates.Update) {
If ($Update.type -eq "Driver") {
$UpdateFile = $Repository + $Update.Release + "\" + (($Update.file).split("/")[-1])
$UpdateFile = Get-ChildItem -Path $UpdateFile
If ((Test-Path $UpdateFile) -eq $true) {
$Output = "Installing " + $Update.name + "....."
Write-Host $Output -NoNewline
$Switches = "/s"
$ErrCode = (Start-Process -FilePath $UpdateFile.Fullname -ArgumentList $Switches -WindowStyle Minimized -Passthru).ExitCode
$Start = Get-Date
Do {
$Process = (Get-Process | Where-Object { $_.ProcessName -eq $UpdateFile.BaseName }).ProcessName
$Duration = (Get-Date - $Start).TotalMinutes
} While (($Process -eq $UpdateFile.BaseName) -and ($Duration -lt 10))
If (($ErrCode -eq 0) -or ($ErrCode -eq 2) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code $ErrCode" -ForegroundColor Red
}
}
}
}
}
Clear-Host
If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) {
$Updates = Get-WinPEUpdateReport
} Else {
$Updates = Get-WindowsUpdateReport
}
$Updates.Updates.Update.Name
If ($Updates -ne $null) {
Update-Repository -Updates $Updates
}
If ((test-path -Path 'REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE\') -eq $true) {
Update-BIOS -Updates $Updates
} Else {
If (($Applications.IsPresent) -or ((!($Applications.IsPresent)) -and (!($BIOS.IsPresent)) -and (!($Drivers.IsPresent)))) {
Update-Applicatons -Updates $Updates
}
If (($BIOS.IsPresent) -or ((!($Applications.IsPresent)) -and (!($BIOS.IsPresent)) -and (!($Drivers.IsPresent)))) {
Update-BIOS -Updates $Updates
}
If (($Drivers.IsPresent) -or ((!($Applications.IsPresent)) -and (!($BIOS.IsPresent)) -and (!($Drivers.IsPresent)))) {
Update-Drivers -Updates $Updates
}
}
|
combined_dataset/train/non-malicious/TabExpansion for V2CTP_2.ps1 | TabExpansion for V2CTP_2.ps1 | ## Tab-Completion
#################
## For V2CTP3.
## This won't work on V1 and V2CTP and V2CTP2.
## Please dot souce this script file.
## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list.
##
## What this can do is:
##
## [datetime]::n<tab>
## [datetime]::now.d<tab>
## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell"
## $c = [ref]$a; $d = [ref]$b,$c
## $d[0].V<tab>[0][0].Get<tab>
## $d[1].V<tab>[0,0].tos<tab>
## $function:a<tab>
## $env:a<tab>
## [System.Type].a<tab>
## [datetime].Assembly.a<tab>
## ).a<tab> # shows System.Type properties and methods...
## #native command name expansion
## fsu<tab>
## #command option name expansion (for fsutil ipconfig net powershell only)
## fsutil <tab>
## ipconfig <tab>
## net <tab>
## powershell <tab>
## #TypeNames and Type accelerators expansion
## [Dec<tab>
## [system.Man<tab>.auto<tab>.p<tab>
## New-Object -TypeName IO.Dir<tab>
## New-Object System.win<tab>.for<tab>.bu<tab>
## #ProgIDs expansion
## New-Object -Com shel<tab>
## #Enum option expansion
## Set-ExecutionPolicy <tab>
## Set-ExecutionPolicy All<tab>
## Set-ExcusionPolisy -ex <tab>
## Get-TraceSource Inte<tab>
## iex -Errora <tab> -wa Sil<tab>
## #WmiClasses expansion
## Get-WmiObject -class Win32_<tab>
## gwmi __Instance<tab>
## #Encoding expansion
## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab>
## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab>
## #PSProvider name expansion
## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab>
## Get-PSProvider <tab>
## pwd -psp al<tab>
## #PSDrive name expansion
## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab>
## Get-PSDrive <tab>
## pwd -psd <tab>
## #PSSnapin name expansion
## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab>
## Get-Command -PSSnapin <tab>
## Remove-PSSnapin <tab>
## Get-PSSnapin M<tab>
## #Eventlog name and expansion
## Get-Eventlog -Log <tab>
## Get-Eventlog w<tab>
## #Eventlog's entrytype expansion
## Get-EventLog -EntryType <tab>
## Get-EventLog -EntryType Er<tab>
## Get-EventLog -Ent <tab>
## #Service name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab>
## New-Service -DependsOn <tab>
## New-Service -Dep e<tab>
## Get-Service -n <tab>
## Get-Service <tab>,a<tab>,p<tab>
## gsv <tab>
## #Service display name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab>
## Get-Service -Dis <tab>
## gsv -Dis <tab>,w<tab>,b<tab>
## #Cmdlet and Topic name expansion
## Get-Help [-Name] about_<tab>
## Get-Help <tab>
## #Category name expansion
## Get-Help -Category c<tab>,<tab>
## #Command name expansion
## Get-Command [-Name] <tab>
## Get-Command -Name <tab>
## gcm a<tab>,<tab>
## #Scope expansion
## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias
## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab>
## Clear-Variable -Scope G<tab>
## Set-Alias -s <tab>
## #Process name expansion
## [Get-Process | Stop-Process] [-Name] <tab>
## Stop-Process -Name <tab>
## Stop-Process -N pow<tab>
## Get-Process <tab>
## ps power<tab>
## #Trace sources expansion
## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab>
## #Trace -ListenerOption expansion
## [Set-TraceSource | Trace-Command] -ListenerOption <tab>
## Set-TraceSource -Lis <tab>,n<tab>
## #Trace -Option expansion
## [Set-TraceSource | Trace-Command] -Option <tab>
## Set-TraceSource -op <tab>,con<tab>
## #ItemType expansion
## New-Item -Item <tab>
## ni -ItemType d<tab>
## #ErrorAction and WarningAction option expansion
## CMDLET [-ErrorAction | -WarningAction] <tab>
## CMDLET -Errora s<tab>
## CMDLET -ea con<tab>
## CMDLET -wa <tab>
## #Continuous expansion with comma when parameter can treat multiple option
## # if there are spaces, occur display bug in the line
## # if strings contains '$' or '-', not work
## Get-Command -CommandType <tab>,<tab><tab>,cm<tab>
## pwd -psp <tab>,f<tab>,va<tab>
## Get-EventLog -EntryType <tab>,i<tab>,s<tab>
## #Enum expansion in method call expression
## # this needs one or more spaces after left parenthesis or comma
## $str = "day night"
## $str.Split( " ",<space>rem<tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR
## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success
## $type = [System.Type]
## $type.GetMembers(<space>Def<tab>
## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab>
## # this can do continuous enum expansion with comma and no spaces
## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>"
## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab>
## #Better '$_.' expansion when cmdlet output objects or method return objects
## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> }
## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB }
## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> }
## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" }
## $data = Get-Process
## $data[2,4,5] | % { $_.<tab>
## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type
## #Property name expansion by -Property parameter
## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object |
## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab>
## Select-Object -ExcludeProperty <tab>
## Select-Object -ExpandProperty <tab>
## gcm Get-Acl|select -exp Par<tab>
## ps |group na<tab>
## ls | ft A<tab>,M<tab>,L<tab>
## #Hashtable key expansion in the variable name and '.<tab>'
## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} }
## $hash.pow<tab>.pro<tab>
## #Parameter expansion for function, filter and script
## man -f<tab>
## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1
## .\\foobar.ps1 -<tab> -b<tab>
## #Enum expansion for function, filter and scripts
## # this can do continuous enum expansion with comma and no spaces
## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab>
## #Enum expansion for assignment expression
## #needs space(s) after '=' and comma
## #strongly-typed with -as operator and space(s)
## $ErrorActionPreference =<space><tab>
## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3
## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab>
## #Path expansion with variable and '\\' or '/'
## $PWD\\../../<tab>\\<tab>
## "$env:SystemDrive/pro<tab>/<tab>
## #Operator expansion which starts with '-'
## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2'
## 1..9 -co<tab> 5
## #Keyword expansion
## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } }
## #Variable name expansion (only global scope)
## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab>
## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab>
## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab>
## Tee-Object -Variable <tab>
## gv pro<tab>,<tab>
## Remove-Variable -Name out<tab>,<tab>,ps<tab>
## ... | ... | tee -v <tab>
## #Alias name expansion
## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab>
## Export-Alias -Name <tab>
## Get-Alias i<tab>,e<tab>,a<tab>
## epal -n for<tab>
## #Property name expansion with -groupBy parameter
## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab>
## ps | ft -g <tab>
## gcm | Format-Wide -GroupBy Par<tab>
## #Type accelerators expansion with no charactors
## [<tab>
## New-Object -typename <tab>
## New-Object <tab>
## # File glob expansion with '@'
## ls *.txt@<tab>
## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma
## ls * -Filter *.txt # 2 <tab> refactoring
## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern
## This can also use '^'(hat) or '~'(tilde) for Excluding
## ls <hat>*.txt@<tab>
## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma
## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring
## *.txt<tilde>foo*<tilde>bar*@<tab>
## ls file.txt # 1 <tab> expanding with comma
## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring
## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> )
## ls * -Filter * -Excluding foo*, bar*<Enter>
## #ls<tab>
## #1<tab>
## # Command buffer stack with ';'(semicolon)
## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1
## echo "PowerShell"<semicolon><tab> # push command2
## get-process<semicolon><tab> # push command3
## {COMMAND}<Enter> # execute another command
## get-process # Auto pop command3 from stack by LIFO
## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon)
## get-process; <semicolon><comma><tab>
## get-process; echo "PowerShell" # pop command2 from stack by LIFO
## # Function name expansion after 'function' or 'filter' keywords
## function cl<tab>
### Generate ProgIDs list...
if ( Test-Path $PSHOME\\ProgIDs.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\ProgIDs.txt
$_ProgID = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\")
$_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_subkey in $_HKCR.GetSubKeyNames() )
{
foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") )
{
if ($_i -ne $null)
{
$_ProgID.Add($_i.GetValue(""))
}
}
}
'$_ProgID was updated...' | Out-Host
$_ProgID = $_ProgID|sort -Unique
Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose
}
### Generate TypeNames list...
if ( Test-Path $PSHOME\\TypeNames.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\TypeNames.txt
$_TypeNames = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() )
{
foreach ( $_type in $_asm.GetTypes() )
{
$_TypeNames.Add($_type.FullName)
}
}
'$_TypeNames was updated...' | Out-Host
$_TypeNames = $_TypeNames | sort -Unique
Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose
}
if ( Test-Path $PSHOME\\TypeNames_System.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\TypeNames_System.txt
$_TypeNames_System = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.'
'$_TypeNames_System was updated...' | Out-Host
Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose
}
### Generate WMIClasses list...
if ( Test-Path $PSHOME\\WMIClasses.txt )
{
$_reader = New-Object IO.StreamReader $PSHOME\\WMIClasses.txt
$_WMIClasses = $_reader.ReadToEnd().Split("", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_reader.Close()
Remove-Variable _reader
}
else
{
$_WMIClasses = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_class in gwmi -List )
{
$_WMIClasses.Add($_class.Name)
}
$_WMIClasses = $_WMIClasses | sort -Unique
'$_WMIClasses was updated...' | Out-Host
Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose
}
[Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null
$global:_cmdstack = New-Object Collections.Stack
$global:_snapin = $null
$global:_TypeAccelerators = [type]::gettype("System.Management.Automation.TypeAccelerators")::get.keys | sort
iex (@'
function prompt {
if ($_cmdstack.Count -gt 0) {
$line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait($line)
}
'@ + @"
${function:prompt}
}
"@)
function Write-ClassNames ( $data, $i, $prefix='', $sep='.' )
{
$preItem = ""
foreach ( $class in $data -like $_opt )
{
$Item = $class.Split($sep)
if ( $preItem -ne $Item[$i] )
{
if ( $i+1 -eq $Item.Count )
{
if ( $prefix -eq "[" )
{
$suffix = "]"
}
elseif ( $sep -eq "_" )
{
$suffix = ""
}
else
{
$suffix = " "
}
}
else
{
$suffix = ""
}
$prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix
$preItem = $Item[$i]
}
}
}
function Get-PipeLineObject {
$i = -2
$property = $null
do {
$str = $line.Split("|")
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1]
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
if ( $_cmdlet -eq "?" )
{
$_cmdlet = "Where-Object"
}
$global:_exp = $_cmdlet
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Select-Object" -eq $_cmdlet )
{
if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' )
{
$property = $Matches[1] + ";" + $property
}
}
$i--
} while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet )
if ( $global:_forgci -eq $null )
{
$a = @(ls "Alias:\\")[0]
$e = @(ls "Env:\\")[0]
$f = @(ls "Function:\\")[0]
$h = @(ls "HKCU:\\")[0]
$v = @(ls "Variable:\\")[0]
$c = @(ls "cert:\\")[0]
$global:_forgci = gi $PSHOME\\powershell.exe |
Add-Member -Name CommandType -MemberType 'NoteProperty' -Value $f.CommandType -PassThru |
Add-Member -Name Definition -MemberType 'NoteProperty' -Value $a.Definition -PassThru |
Add-Member -Name Description -MemberType 'NoteProperty' -Value $a.Description -PassThru |
Add-Member -Name Key -MemberType 'NoteProperty' -Value $e.Key -PassThru |
Add-Member -Name Location -MemberType 'NoteProperty' -Value $c.Location -PassThru |
Add-Member -Name LocationName -MemberType 'NoteProperty' -Value $c.LocationName -PassThru |
Add-Member -Name Options -MemberType 'NoteProperty' -Value $a.Options -PassThru |
Add-Member -Name ReferencedCommand -MemberType 'NoteProperty' -Value $a.ReferencedCommand -PassThru |
Add-Member -Name ResolvedCommand -MemberType 'NoteProperty' -Value $a.ResolvedCommand -PassThru |
Add-Member -Name ScriptBlock -MemberType 'NoteProperty' -Value $f.ScriptBlock -PassThru |
Add-Member -Name StoreNames -MemberType 'NoteProperty' -Value $c.StoreNames -PassThru |
Add-Member -Name SubKeyCount -MemberType 'NoteProperty' -Value $h.SubKeyCount -PassThru |
Add-Member -Name Value -MemberType 'NoteProperty' -Value $e.Value -PassThru |
Add-Member -Name ValueCount -MemberType 'NoteProperty' -Value $h.ValueCount -PassThru |
Add-Member -Name Visibility -MemberType 'NoteProperty' -Value $a.Visibility -PassThru |
Add-Member -Name Property -MemberType 'NoteProperty' -Value $h.Property -PassThru |
Add-Member -Name ResolvedCommandName -MemberType 'NoteProperty' -Value $a.ResolvedCommandName -PassThru |
Add-Member -Name Close -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteSubKeyTree -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name DeleteValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Flush -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetSubKeyNames -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValueKind -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetValueNames -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsValidValue -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name OpenSubKey -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name SetValue -MemberType 'ScriptMethod' -Value {} -PassThru
}
if ( $global:_mix -eq $null )
{
$f = gi $PSHOME\\powershell.exe
$t = [type]
$s = ""
$global:_mix = `
Add-Member -InputObject (New-Object PSObject) -Name Mode -MemberType 'NoteProperty' -Value $f.Mode -PassThru |
Add-Member -Name Assembly -MemberType 'NoteProperty' -Value $t.Assembly -PassThru |
Add-Member -Name AssemblyQualifiedName -MemberType 'NoteProperty' -Value $t.AssemblyQualifiedName -PassThru |
Add-Member -Name Attributes -MemberType 'NoteProperty' -Value $f.Attributes -PassThru |
Add-Member -Name BaseType -MemberType 'NoteProperty' -Value $t.BaseType -PassThru |
Add-Member -Name ContainsGenericParameters -MemberType 'NoteProperty' -Value $t.ContainsGenericParameters -PassThru |
Add-Member -Name CreationTime -MemberType 'NoteProperty' -Value $f.CreationTime -PassThru |
Add-Member -Name CreationTimeUtc -MemberType 'NoteProperty' -Value $f.CreationTimeUtc -PassThru |
Add-Member -Name DeclaringMethod -MemberType 'NoteProperty' -Value $t.DeclaringMethod -PassThru |
Add-Member -Name DeclaringType -MemberType 'NoteProperty' -Value $t.DeclaringType -PassThru |
Add-Member -Name Exists -MemberType 'NoteProperty' -Value $f.Exists -PassThru |
Add-Member -Name Extension -MemberType 'NoteProperty' -Value $f.Extension -PassThru |
Add-Member -Name FullName -MemberType 'NoteProperty' -Value $f.FullName -PassThru |
Add-Member -Name GenericParameterAttributes -MemberType 'NoteProperty' -Value $t.GenericParameterAttributes -PassThru |
Add-Member -Name GenericParameterPosition -MemberType 'NoteProperty' -Value $t.GenericParameterPosition -PassThru |
Add-Member -Name GUID -MemberType 'NoteProperty' -Value $t.GUID -PassThru |
Add-Member -Name HasElementType -MemberType 'NoteProperty' -Value $t.HasElementType -PassThru |
Add-Member -Name IsAbstract -MemberType 'NoteProperty' -Value $t.IsAbstract -PassThru |
Add-Member -Name IsAnsiClass -MemberType 'NoteProperty' -Value $t.IsAnsiClass -PassThru |
Add-Member -Name IsArray -MemberType 'NoteProperty' -Value $t.IsArray -PassThru |
Add-Member -Name IsAutoClass -MemberType 'NoteProperty' -Value $t.IsAutoClass -PassThru |
Add-Member -Name IsAutoLayout -MemberType 'NoteProperty' -Value $t.IsAutoLayout -PassThru |
Add-Member -Name IsByRef -MemberType 'NoteProperty' -Value $t.IsByRef -PassThru |
Add-Member -Name IsClass -MemberType 'NoteProperty' -Value $t.IsClass -PassThru |
Add-Member -Name IsCOMObject -MemberType 'NoteProperty' -Value $t.IsCOMObject -PassThru |
Add-Member -Name IsContextful -MemberType 'NoteProperty' -Value $t.IsContextful -PassThru |
Add-Member -Name IsEnum -MemberType 'NoteProperty' -Value $t.IsEnum -PassThru |
Add-Member -Name IsExplicitLayout -MemberType 'NoteProperty' -Value $t.IsExplicitLayout -PassThru |
Add-Member -Name IsGenericParameter -MemberType 'NoteProperty' -Value $t.IsGenericParameter -PassThru |
Add-Member -Name IsGenericType -MemberType 'NoteProperty' -Value $t.IsGenericType -PassThru |
Add-Member -Name IsGenericTypeDefinition -MemberType 'NoteProperty' -Value $t.IsGenericTypeDefinition -PassThru |
Add-Member -Name IsImport -MemberType 'NoteProperty' -Value $t.IsImport -PassThru |
Add-Member -Name IsInterface -MemberType 'NoteProperty' -Value $t.IsInterface -PassThru |
Add-Member -Name IsLayoutSequential -MemberType 'NoteProperty' -Value $t.IsLayoutSequential -PassThru |
Add-Member -Name IsMarshalByRef -MemberType 'NoteProperty' -Value $t.IsMarshalByRef -PassThru |
Add-Member -Name IsNested -MemberType 'NoteProperty' -Value $t.IsNested -PassThru |
Add-Member -Name IsNestedAssembly -MemberType 'NoteProperty' -Value $t.IsNestedAssembly -PassThru |
Add-Member -Name IsNestedFamANDAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamANDAssem -PassThru |
Add-Member -Name IsNestedFamily -MemberType 'NoteProperty' -Value $t.IsNestedFamily -PassThru |
Add-Member -Name IsNestedFamORAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamORAssem -PassThru |
Add-Member -Name IsNestedPrivate -MemberType 'NoteProperty' -Value $t.IsNestedPrivate -PassThru |
Add-Member -Name IsNestedPublic -MemberType 'NoteProperty' -Value $t.IsNestedPublic -PassThru |
Add-Member -Name IsNotPublic -MemberType 'NoteProperty' -Value $t.IsNotPublic -PassThru |
Add-Member -Name IsPointer -MemberType 'NoteProperty' -Value $t.IsPointer -PassThru |
Add-Member -Name IsPrimitive -MemberType 'NoteProperty' -Value $t.IsPrimitive -PassThru |
Add-Member -Name IsPublic -MemberType 'NoteProperty' -Value $t.IsPublic -PassThru |
Add-Member -Name IsSealed -MemberType 'NoteProperty' -Value $t.IsSealed -PassThru |
Add-Member -Name IsSerializable -MemberType 'NoteProperty' -Value $t.IsSerializable -PassThru |
Add-Member -Name IsSpecialName -MemberType 'NoteProperty' -Value $t.IsSpecialName -PassThru |
Add-Member -Name IsUnicodeClass -MemberType 'NoteProperty' -Value $t.IsUnicodeClass -PassThru |
Add-Member -Name IsValueType -MemberType 'NoteProperty' -Value $t.IsValueType -PassThru |
Add-Member -Name IsVisible -MemberType 'NoteProperty' -Value $t.IsVisible -PassThru |
Add-Member -Name LastAccessTime -MemberType 'NoteProperty' -Value $f.LastAccessTime -PassThru |
Add-Member -Name LastAccessTimeUtc -MemberType 'NoteProperty' -Value $f.LastAccessTimeUtc -PassThru |
Add-Member -Name LastWriteTime -MemberType 'NoteProperty' -Value $f.LastWriteTime -PassThru |
Add-Member -Name LastWriteTimeUtc -MemberType 'NoteProperty' -Value $f.LastWriteTimeUtc -PassThru |
Add-Member -Name MemberType -MemberType 'NoteProperty' -Value $t.MemberType -PassThru |
Add-Member -Name MetadataToken -MemberType 'NoteProperty' -Value $t.MetadataToken -PassThru |
Add-Member -Name Module -MemberType 'NoteProperty' -Value $t.Module -PassThru |
Add-Member -Name Name -MemberType 'NoteProperty' -Value $t.Name -PassThru |
Add-Member -Name Namespace -MemberType 'NoteProperty' -Value $t.Namespace -PassThru |
Add-Member -Name Parent -MemberType 'NoteProperty' -Value $f.Parent -PassThru |
Add-Member -Name ReflectedType -MemberType 'NoteProperty' -Value $t.ReflectedType -PassThru |
Add-Member -Name Root -MemberType 'NoteProperty' -Value $f.Root -PassThru |
Add-Member -Name StructLayoutAttribute -MemberType 'NoteProperty' -Value $t.StructLayoutAttribute -PassThru |
Add-Member -Name TypeHandle -MemberType 'NoteProperty' -Value $t.TypeHandle -PassThru |
Add-Member -Name TypeInitializer -MemberType 'NoteProperty' -Value $t.TypeInitializer -PassThru |
Add-Member -Name UnderlyingSystemType -MemberType 'NoteProperty' -Value $t.UnderlyingSystemType -PassThru |
Add-Member -Name PSChildName -MemberType 'NoteProperty' -Value $f.PSChildName -PassThru |
Add-Member -Name PSDrive -MemberType 'NoteProperty' -Value $f.PSDrive -PassThru |
Add-Member -Name PSIsContainer -MemberType 'NoteProperty' -Value $f.PSIsContainer -PassThru |
Add-Member -Name PSParentPath -MemberType 'NoteProperty' -Value $f.PSParentPath -PassThru |
Add-Member -Name PSPath -MemberType 'NoteProperty' -Value $f.PSPath -PassThru |
Add-Member -Name PSProvider -MemberType 'NoteProperty' -Value $f.PSProvider -PassThru |
Add-Member -Name BaseName -MemberType 'NoteProperty' -Value $f.BaseName -PassThru |
Add-Member -Name Clone -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CompareTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Contains -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CopyTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Create -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateObjRef -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name CreateSubdirectory -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Delete -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name EndsWith -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name FindInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name FindMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetArrayRank -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetConstructor -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetConstructors -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetCustomAttributes -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetDefaultMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetDirectories -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetElementType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEnumerator -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEvent -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetEvents -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetField -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFields -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFiles -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetFileSystemInfos -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericArguments -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericParameterConstraints -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetGenericTypeDefinition -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterface -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterfaceMap -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMember -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMembers -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMethod -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetMethods -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetNestedType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetNestedTypes -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetObjectData -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetProperties -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetProperty -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name GetTypeCode -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IndexOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name InitializeLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Insert -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name InvokeMember -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsAssignableFrom -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsDefined -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsInstanceOfType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsNormalized -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name IsSubclassOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name LastIndexOf -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name LastIndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeArrayType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeByRefType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakeGenericType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MakePointerType -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name MoveTo -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Normalize -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name PadLeft -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name PadRight -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Refresh -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Remove -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Replace -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name SetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Split -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name StartsWith -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Substring -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToCharArray -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToLower -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToLowerInvariant -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToUpper -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name ToUpperInvariant -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Trim -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name TrimEnd -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name TrimStart -MemberType 'ScriptMethod' -Value {} -PassThru |
Add-Member -Name Chars -MemberType 'NoteProperty' -Value $s.Chars -PassThru
}
if ( "Add-Member" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Compare-Object" -eq $_cmdlet )
{
$global:_dummy = (Compare-Object 1 2)[0]
}
if ( "ConvertFrom-SecureString" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "ConvertTo-SecureString" -eq $_cmdlet )
{
$global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force
}
if ( "ForEach-Object" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Acl" -eq $_cmdlet )
{
$global:_dummy = Get-Acl
}
if ( "Get-Alias" -eq $_cmdlet )
{
$global:_dummy = (Get-Alias)[0]
}
if ( "Get-AuthenticodeSignature" -eq $_cmdlet )
{
$global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe
}
if ( "Get-ChildItem" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-Command" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-Content" -eq $_cmdlet )
{
$global:_dummy = (type $PSHOME\\profile.ps1)[0]
}
if ( "Get-Credential" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Culture" -eq $_cmdlet )
{
$global:_dummy = Get-Culture
}
if ( "Get-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( "Get-Event" -eq $_cmdlet )
{
$global:_dummy = (Get-Event)[0]
}
if ( "Get-EventLog" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-ExecutionPolicy" -eq $_cmdlet )
{
$global:_dummy = Get-ExecutionPolicy
}
if ( "Get-Help" -eq $_cmdlet )
{
$global:_dummy = Get-Help Add-Content
}
if ( "Get-History" -eq $_cmdlet )
{
$global:_dummy = Get-History -Count 1
}
if ( "Get-Host" -eq $_cmdlet )
{
$global:_dummy = Get-Host
}
if ( "Get-Item" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-ItemProperty" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Location" -eq $_cmdlet )
{
$global:_dummy = Get-Location
}
if ( "Get-Member" -eq $_cmdlet )
{
$global:_dummy = (1|Get-Member)[0]
}
if ( "Get-Module" -eq $_cmdlet )
{
$global:_dummy = (Get-Module)[0]
}
if ( "Get-PfxCertificate" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Process" -eq $_cmdlet )
{
$global:_dummy = ps powershell
}
if ( "Get-PSBreakpoint" -eq $_cmdlet )
{
$global:_dummy =
Add-Member -InputObject (New-Object PSObject) -Name Action -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Command -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Enabled -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name HitCount -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Id -MemberType 'NoteProperty' -Value '' -PassThru |
Add-Member -Name Script -MemberType 'NoteProperty' -Value '' -PassThru
}
if ( "Get-PSCallStack" -eq $_cmdlet )
{
$global:_dummy = Get-PSCallStack
}
if ( "Get-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Function
}
if ( "Get-PSProvider" -eq $_cmdlet )
{
$global:_dummy = Get-PSProvider FileSystem
}
if ( "Get-PSSnapin" -eq $_cmdlet )
{
$global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core
}
if ( "Get-Service" -eq $_cmdlet )
{
$global:_dummy = (Get-Service)[0]
}
if ( "Get-TraceSource" -eq $_cmdlet )
{
$global:_dummy = Get-TraceSource AddMember
}
if ( "Get-UICulture" -eq $_cmdlet )
{
$global:_dummy = Get-UICulture
}
if ( "Get-Variable" -eq $_cmdlet )
{
$global:_dummy = Get-Variable _
}
if ( "Get-WmiObject" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Group-Object" -eq $_cmdlet )
{
$global:_dummy = 1 | group
}
if ( "Measure-Command" -eq $_cmdlet )
{
$global:_dummy = Measure-Command {}
}
if ( "Measure-Object" -eq $_cmdlet )
{
$global:_dummy = Measure-Object
}
if ( "New-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Alias
}
if ( "New-TimeSpan" -eq $_cmdlet )
{
$global:_dummy = New-TimeSpan
}
if ( "Resolve-Path" -eq $_cmdlet )
{
$global:_dummy = $PWD
}
if ( "Select-String" -eq $_cmdlet )
{
$global:_dummy = " " | Select-String " "
}
if ( "Set-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( $property -ne $null)
{
foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) )
{
$global:_dummy = @($global:_dummy.$name)[0]
}
}
}
function TabExpansion {
param($line, $lastWord)
& {
function Write-Members ($sep='.')
{
Invoke-Expression ('$_val=' + $_expression)
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
$_method = [Management.Automation.PSMemberTypes] `
'Method,CodeMethod,ScriptMethod,ParameterizedProperty'
if ($sep -eq '.')
{
$params = @{view = 'extended','adapted','base'}
}
else
{
$params = @{static=$true}
}
if ( $_val -is [Hashtable] )
{
[Object[]]$_keys = $null
foreach ( $_name in $_val.Keys )
{
$_keys += `
New-Object Microsoft.PowerShell.Commands.MemberDefinition `
[int],$_name,"Property",0
}
}
if ( $_keys -ne $null )
{
$_members = [Object[]](Get-Member @params -InputObject $_val $_pat) + ($_keys | ? {$_.name -like $_pat})
} else {
$_members = (Get-Member @params -InputObject $_val $_pat)
}
foreach ($_m in $_members | Sort-Object membertype,name)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
$host.UI.RawUI.WindowTitle = "Windows PowerShell V2 (CTP2)" + $lastword
switch -regex ($lastWord)
{
# Handle property and method expansion at '$_'
'(^.*)(\\$_\\.)(\\w*)$' {
$_base = $matches[1]
$_expression = '$global:_dummy'
$_pat = $matches[3] + '*'
$global:_dummy = $null
Get-PipeLineObject
if ( $global:_dummy -eq $null )
{
if ( $global:_exp -match '^\\$.*\\(.*$' )
{
$type = ( iex $global:_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' )
{
$tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1]
$type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' )
{
$global:_dummy = @(iex $Matches[1])[0]
}
else
{
$global:_dummy = $global:_mix
}
}
Write-Members
break;
}
# Handle property and method expansion rooted at variables...
# e.g. $a.b.<tab>
'(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle simple property and method expansion on static members...
# e.g. [datetime]::n<tab>
'(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
Write-Members '::'
break;
}
# Handle complex property and method expansion on static members
# where there are intermediate properties...
# e.g. [datetime]::now.d<tab>
'(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' {
$_base = $matches[1] # everything before the expression
$_expression = $matches[2].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[5] + '*' # the member to look for...
Write-Members
break;
}
# Handle variable name expansion...
'(^.*\\$)(\\w+)$' {
$_prefix = $matches[1]
$_varName = $matches[2]
foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*'))
{
$_prefix + $_v.name
}
break;
}
# Handle env&function drives variable name expansion...
'(^.*\\$)(.*\\:)(\\w+)$' {
$_prefix = $matches[1]
$_drive = $matches[2]
$_varName = $matches[3]
if ($_drive -eq "env:" -or $_drive -eq "function:")
{
foreach ($_v in Get-ChildItem ($_drive + $_varName + '*'))
{
$_prefix + $_drive + $_v.name
}
}
break;
}
# Handle array's element property and method expansion
# where there are intermediate properties...
# e.g. foo[0].n.b<tab>
'(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$'
{
$_base = $matches[1]
$_expression = $matches[2].TrimEnd('.')
$_pat = $Matches[8] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle property and method expansion rooted at type object...
# e.g. [System.Type].a<tab>
'(^\\[(\\w|\\.)+\\])\\.(\\w*)$'
{
if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; }
$_expression = $Matches[1]
$_pat = $Matches[$matches.Count-1] + '*'
Write-Members
break;
}
# Handle complex property and method expansion on type object members
# where there are intermediate properties...
# e.g. [datetime].Assembly.a<tab>
'^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' {
$_expression = $matches[1].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[4] + '*' # the member to look for...
if ( $(iex $_expression) -eq $null ) { break; }
Write-Members
break;
}
# Handle property and method expansion rooted at close parenthes...
# e.g. (123).a<tab>
'^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' {
$_base = $Matches[1] + ")"
if ( $matches[3] -eq $null) { $_expression = '[System.Type]' }
else { $_expression = '[System.Type]' + $Matches[2] }
$_pat = $matches[4] + '*'
iex "$_expression | Get-Member $_pat | sort MemberType,Name" |
% {
if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" }
if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes }
else { $_base + $Matches[2] + "." + $_.Name + $parenthes }
}
break;
}
# Handle .NET type name expansion ...
# e.g. [Microsoft.PowerShell.Com<tab>
'^\\[((\\w+\\.?)*)$' {
$_opt = $matches[1] + '*'
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
}
else
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '['
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '['
}
break;
}
# Handle file/directory name which contains $env: variable
# e.g. $env:windir\\<tab>
'^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' {
$path = iex ('"' + $Matches[0] + '"')
if ( $Matches[2].Length -gt 1 )
{
$parent = Split-Path $path -Parent
$leaf = (Split-Path $path -Leaf) + '*'
}
else
{
$parent = $path
$leaf = '*'
}
if ( Test-Path $parent )
{
$i = $Matches[0].LastIndexOfAny("/\\")
$_base = $Matches[0].Substring(0,$i+1)
[IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') }
}
}
# Handle file glob expansion ...
# e.g. *.txt~about*@<tab>
'^(\\^?([^~]+))(~(.*))*@$' {
if ( $Matches[1] -notlike "^*" )
{
$include = $Matches[2] -replace '``','`'
if ( $Matches[3] )
{
$exclude = $Matches[3].Split("~", "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace '``','`'
}
}
else
{
$include = "*"
$exclude = $Matches[2] -replace '``','`'
}
$fse = [IO.Directory]::GetFileSystemEntries($PWD)
$fse = $fse -replace '.*[\\\\/]([^/\\\\]*)$','$1'
% -in ($fse -like $include) { $fse = $_; $exclude | % { $fse = $fse -notlike $_ } }
$fse = $fse -replace '^.*\\s.*$', ("'`$0'")
$fse = $fse -replace '([\\[\\]])', '``$1' -replace '^.*([\\[\\]]).*$', ("'`$0'")
$fse = $fse -replace "''", "'"
$OFS = ", "; "$fse"
$OFS = ", "; "* -Filter $include " + $(if($exclude){"-Exclude $exclude"})
$Matches[0].Substring(0, $Matches[0].Length-1)
break;
}
# Handle command buffer stack...
'(.*);(.?)$' {
$_base = $Matches[1]
if ( $Matches[2] -eq ":" -or $Matches[2] -eq "," )
{
if ( $_cmdstack.Count -gt 0 )
{
$_base + $global:_cmdstack.Pop()
}
else
{
""
}
}
elseif ( $Matches[2] -eq "" )
{
$global:_cmdstack.Push($line.SubString(0,$line.Length-1))
[System.Windows.Forms.SendKeys]::SendWait("{ESC}")
}
}
# Do completion on parameters...
'^-([\\w0-9]*)' {
$_pat = $matches[1] + '*'
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_command = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_command -match '\\{([^\\{\\}]*)$')
{
$_command = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_command -match '\\(([^()]*)$')
{
$_command = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_command = $_command.Trim().Split()[0]
# now get the info object for it...
$_command = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_command)[0]
# loop resolving aliases...
while ($_command.CommandType -eq 'alias')
{
$_command = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_command.Definition)[0]
}
if ( $_command -ne $null )
{
# expand the parameter sets and emit the matching elements
foreach ($_n in $_command.Parameters.Keys | sort)
{
if ($_n -like $_pat) { '-' + $_n }
}
}
else
{
"-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt",
"-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge",
"-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike",
"-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains",
"-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat"
}
break;
}
# Tab complete against history either #<pattern> or #<id>
'^#(\\w*)' {
$_pattern = $matches[1]
if ($_pattern -match '^[0-9]+$')
{
Get-History -ea SilentlyContinue -Id $_pattern | Foreach { $_.CommandLine }
}
else
{
$_pattern = '*' + $_pattern + '*'
Get-History | Sort-Object -Descending Id| Foreach { $_.CommandLine } | where { $_ -like $_pattern }
}
break;
}
# try to find a matching command...
default {
$lastex = [regex]::Split($line, '[|;]')[-1]
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' )
{
if ( $Matches[6] -ne $nul )
{
$brackets = "[]"
}
'['+ $global:_enum + $brackets + ']'
break;
}
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' )
{
$_pat = $Matches[7] + '*'
$_type = @(iex $Matches[1])[0].GetType()
if ( $_type.IsEnum )
{
$global:_enum = $_type.FullName
[Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"'
break;
}
}
$lastex = [regex]::Split($line, '[|;=]')[-1]
if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$')
{
'['+ $global:_enum + ']'
}
elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' )
{
$_method = $Matches[1]
if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" )
{
$continuous = $true
$_opt = $Matches[5] + '*'
$_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1'
$position = $Matches[1].Split(",").Length
}
else
{
$continuous = $false
$_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*"
$position = $Matches[3].Split(",").Length
}
if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null )
{
$tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }')
}
foreach ( $def in $_mdefs )
{
[void] ($def -match '\\((.*)\\)')
foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] )
{
if ($param -eq $null -or $param -eq "")
{
continue;
}
$type = $param.split()[0]
if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" )
{
continue;
}
$fullname = @($_typenames -like "*$type*")
foreach ( $name in $fullname )
{
if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum )
{
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1')
$output | sort
}
elseif ( ( $name -as [System.Type] ).IsEnum )
{
$global:_enum = $name
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"'
$output | sort
}
}
}
}
if ( $output -ne $null )
{
break;
}
}
if ( $line -match '(function|filter)\\s+(\\w*)$')
{
$_pat = 'function:\\' + $Matches[2] + '*'
Get-ChildItem $_pat| % { $_.Name }
break;
}
if ( $line[-1] -eq " " )
{
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource | % { $_.Name } | sort -Unique
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
$_WMIClasses
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process | % { $_.Name } | sort
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive | sort
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name )
{
Get-Help -Category all | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | gm -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line[-1] -eq " " )
{
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
$_cmdlet = $_cmdlet.Trim().Split()[0]
$_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0]
if ( $_cmdlet.Name -eq "powershell.exe" )
{
"-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive",
"-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort
break;
}
if ( $_cmdlet.Name -eq "fsutil.exe" )
{
"behavior query", "behavior set", "dirty query", "dirty set",
"file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew",
"fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics",
"hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create",
"quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query",
"reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange",
"usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort
break;
}
if ( $_cmdlet.Name -eq "net.exe" )
{
"ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ",
"HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ",
"SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort
break;
}
if ( $_cmdlet.Name -eq "ipconfig.exe" )
{
"/?", "/all", "/renew", "/release", "/flushdns", "/displaydns",
"/registerdns", "/showclassid", "/setclassid"
break;
}
}
if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' )
{
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2]
$_opt = $Matches[1].Split(" ,")[-1] + '*'
$_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length)
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
break;
}
if ( $_cmdlet.Name -like "*WMI*" )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSProvider" -eq $_cmdlet.Name )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line -match '(-(\\w+))\\s+([^-]*$)' )
{
$_param = $matches[2] + '*'
$_opt = $Matches[3].Split(" ,")[-1] + '*'
$_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length)
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
$_cmdlet = $_cmdlet.Trim().Split()[0]
$_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet)[0]
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet.Definition)[0]
}
if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" )
{
"SilentlyContinue", "Stop", "Continue", "Inquire" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name `
-and "groupBy" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or
"ErrorVariable" -like $_param -or "OutVariable" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name `
-and "Encoding" -like $_param)
{
"Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -like $_cmdlet.Name )
{
if ( "ComObject" -like $_param )
{
$_ProgID -like $_opt | % { $_ -replace '\\s','` ' }
break;
}
if ( "TypeName" -like $_param )
{
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt
}
else
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
}
break;
}
}
if ( "New-Item" -eq $_cmdlet.Name )
{
if ( "ItemType" -like $_param )
{
"directory", "file" -like $_opt
break;
}
}
if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name `
-and "PSProvider" -like $_param )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param)
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
}
if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias",
"New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" `
-contains $_cmdlet.Name -and "Scope" -like $_param )
{
"Global", "Local", "Script" -like $_opt
break;
}
if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Category" -like $_param )
{
"Alias", "Cmdlet", "Provider", "General", "FAQ",
"Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ }
break;
}
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "DisplayName" -like $_param )
{
Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') }
break;
}
}
if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param )
{
"Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
if ( "Class" -like $_param )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name -and "Property" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Select-Object" -eq $_cmdlet.Name )
{
if ( "ExcludeProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "ExpandProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
}
select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters |
? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } |
% { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ }
}
# parse the script...
$_tokens = [System.Management.Automation.PSParser]::Tokenize($line, [ref] $null)
if ($_tokens)
{
$_lastToken = $_tokens[$_tokens.count - 1]
if ($_lastToken.Type -eq 'Command')
{
$_cmd = $_lastToken.Content
# don't look for paths...
if ($_cmd.IndexOfAny('/\\') -eq -1)
{
# handle parsing errors - the last token string should be the last
# string in the line...
if ($lastword.substring($lastword.length-$_cmd.length) -eq $_cmd)
{
$_pat = $_cmd + '*'
$_base = $lastword.substring(0, $lastword.length-$_cmd.length)
"begin {", "break", "catch {", "continue", "data {", "do {", "dynamicparam (", "else {", "elseif (",
"end {", "exit", "filter ", "finally {", "for (", "foreach ", "from", "function ", "if (", "in ",
"param (", "process {", "return", "switch ", "throw ", "trap ", "try {", "until (", "while (" `
-like $_pat | % {'{0}{1}' -f $_base,$_ }
$ExecutionContext.InvokeCommand.GetCommandName($_pat,$true, $false) |
Sort-Object -Unique | ForEach-Object {'{0}{1}' -f $_base,$_ }
}
}
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_22_33.ps1 | sample_22_33.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for CspmMonitorGithubOffering.
.Description
Create an in-memory object for CspmMonitorGithubOffering.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering
.Link
https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgithubofferingobject
#>
function New-AzSecurityCspmMonitorGithubOfferingObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering')]
[CmdletBinding(PositionalBinding=$false)]
Param(
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGithubOffering]::New()
return $Object
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzcg19ntJ2Vm7n
# Nv4fpwbIBZeaYikalO0kGBD7E0awuKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIZp0STCH1uZvsGk3OK8X7CV
# ND6/KRrc5f3Ioitol4r3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAcTK/jPUAs9sI/OwnTpBofRko7MXKURYh26zQTT+hKfF5unrnSpRzUqfS
# MwcukwKd9gnVze1BzWjLoVtUa/K77J0AKP98juCHgCHY08grgIOuM49aUVOJp3dj
# +ivJoHOQ4K53Dz+3BYQ3qcCamWVc7+AFxKyputUpo4RnzhpQgxUpjfWo1Fj4wyCt
# pVts4+K99cccAYdcKXnIeldzZrW3osRxLqNNMQp2BLSabLu/MEnfgo/0ml6gaNw9
# OkqJW2X4GDIluwi0SIx/h3lbO4JLBbT+Um4pIeVeN0rqChUH8nCZHpRur7ZSnp0P
# qWuD3EatgES+aX/hJGVW1zlsODjchKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDBMeEzSZpQJAygmyqmF+bMz0E1jMu9AXfDOdKRfaDP9AIGZhf9t082
# GBMyMDI0MDQyMzEzMTUxNC42MzhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGk+zAiGA8yMDI0MDQyMzAzMDk0
# N1oYDzIwMjQwNDI0MDMwOTQ3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0aT7
# AgEAMAoCAQACAh2yAgH/MAcCAQACAhQBMAoCBQDp0vZ7AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAG3Tuff4zR8zcaVgTLUDfl0xfRocWtx6pvLTWn5lo6N9
# Ak/XTdyVZV3oFZBAbtKglmbTcLN40qFbmrGuTqIuiHb7JQZlTjW5F+EQgD7YsS4c
# wJ6YQVFrXtZDUB0EICL7yMptISLaBGXZPelWUJ7qLaIFu9jwk1lhSiJBBWtmOqXf
# qbtcuT8D1Y1cggfTZkt8vGF4GZRkEaQwd14QQKGm8fLz4WwtzneqbM0vXhNcJy6o
# Q/GCqSvXz1qE8em5Ym2ZtBL14QDm8x+/D8tLpZXCx6+AsR26NUgkkQjRyuEunW+c
# KSokVvA6lrCyTg8VerFU7w8xbfbO2/dRz4EkBrijI9MxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAMl6tnhI7PZeICr9DzjgcUslVHiA1hXyCveN2mt/IG
# DDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgkSVAVMCQP43gRUUZLldZpT1L
# MwzkyidT5GxFNcH73KkwDQYJKoZIhvcNAQELBQAEggIABo04ejpsA4GmDf5rZnsL
# Y8b2D0E5ase3yxCIVyC8kz2GC4yijYxwHPmobmCCrn+FnZn5bhcIV2HxaVahGUl8
# D8Si3C0xufxdQGWvtD+MRHkJDB9G74IK09UYpI7uOqCnQzCaC69vz39rMb02CYxs
# 8oGW6q5lXyAw5Y1v9dSrhSOvViW7pnGT+Zg6jq/+ZyoP1OXDYRm+/IMqe35zNucA
# TCEQq17wmkR4GQD9AJ7bReZxNkE2qvM/W1s0vzdqU0R5qlNFpGxqbINXrhEb+hO7
# 86cbDuZn7D3YKRLWWURTttSP1pUPRh+KmpO+HbVfwC2qr+zCODtvycHw7McZqhGi
# ZW1QPBuPuzopmBfgJIHRx8OYLYR8BLhzcc3vVZoXXyM4VP4ownyzDnKHMDJopI9V
# /qz4JVYjCPhu3n2WdYVa0jFv5xFuHrCt5K7XjY/y9dNOa+wcuwSJpDGUd+a6+rzw
# YYLv6cRHnQLANUpEbfGXtoSEWQKlxabNU1Jqw/1/Xad//lhIMWpQqSu07cqK8ror
# jlXe8KHjMJjQgufHYF1IgDlGHgvlfqUEaDwpQMIGnQcZinUcUFMmumFikpELbMnh
# IUzCmAeQbaZ9sK4thZ08OaJ8x1xmDdiWj3xgQz4ESBbh36fkkC7AVlcMzbqGvC/2
# OrQB++YUSRMm05JoorBhW/A=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1125.ps1 | 1125.ps1 |
& (Join-Path -Path $PSScriptRoot 'Initialize-CarbonTest.ps1' -Resolve)
function Assert-HostsFileContains
{
param(
[Parameter(ParameterSetName='ExactLine')]
$Line,
[Parameter(ParameterSetName='ConstructLine')]
[Net.IPAddress]
$IPAddress,
[Parameter(ParameterSetName='ConstructLine')]
$HostName,
[Parameter(ParameterSetName='ConstructLine')]
$Description,
$Path = $customHostsFile
)
if( $PSCmdlet.ParameterSetName -eq 'ConstructLine' )
{
$Line = '{0,-45} {1}' -f $IPAddress,$HostName
if( $Description )
{
$Line = "{0}`t
}
}
It ('should set entry {0}' -f $Line) {
$hostsFile = Read-File -Path $Path
$hostsFile | Where-Object { $_ -eq $Line } | Should Not BeNullOrEmpty
}
}
function New-TestHostsFile
{
param(
[Parameter(ValueFromPipeline=$true)]
[string]
$Line
)
begin
{
$testDrive = (Get-Item -Path 'TestDrive:').FullName
$path = Join-Path -Path $testDrive -ChildPath 'hosts'
}
process
{
$Line | Add-Content -Path $path
}
end
{
return $path
}
}
Describe 'Set-HostsEntry.when passed a new IPv6 address' {
$hostsPath = New-TestHostsFile
Set-HostsEntry -IPAddress 'cc1a:2078:ec06:4f32:8ea8:7119:663a:f2d2' -HostName 'ipv6' -Path $hostsPath
Assert-HostsFileContains -IPAddress 'cc1a:2078:ec06:4f32:8ea8:7119:663a:f2d2' -HostName 'ipv6' -Path $hostsPath
}
Describe 'Set-HostsEntry.when IPv6 address contains IP tunnel' {
$hostsPath = New-TestHostsFile
Set-HostsEntry -IPAddress '2001:4860:4860::8888:255.255.255.255' -HostName 'ipv6' -Path $hostsPath
Assert-HostsFileContains -IPAddress '2001:4860:4860::8888:255.255.255.255' -HostName 'ipv6' -Path $hostsPath
}
Describe 'Set-HostsEntry.when updating an existing IPv6 address' {
$hostsPath = New-TestHostsFile
Set-HostsEntry -IPAddress '2001:4860:4860::8888' -HostName 'ipv6' -Path $hostsPath
Set-HostsEntry -IPAddress '2001:4860:4860::8844' -HostName 'ipv6' -Path $hostsPath
Assert-HostsFileContains -IPAddress '2001:4860:4860::8844' -HostName 'ipv6' -Path $hostsPath
}
Describe 'Set-HostsEntry.when no path parameter provided' {
Mock -CommandName 'Write-File' -Verifiable -ModuleName 'Carbon'
Set-HostsEntry -IPAddress '5.6.7.8' -HostName 'example.com' -Description 'Customizing example.com'
It 'should operate on system hosts file by default' {
Assert-MockCalled -CommandName 'Write-File' -ModuleName 'Carbon' -ParameterFilter {
Write-Debug $Path
Write-Debug (Get-PathToHostsFile)
$Path -eq (Get-PathToHostsFile)
}
}
}
Describe 'Set-HostsEntry.when setting an existin IPv4 entry' {
$hostsFile = '1.2.3.4 example.com' | New-TestHostsFile
Set-HostsEntry -IPAddress '5.6.7.8' -HostName 'example.com' -Description 'Customizing example.com' -Path $hostsFile
Assert-HostsFileContains -IPAddress "5.6.7.8" -HostName 'example.com' -Description 'Customizing example.com' -Path $hostsFile
}
Describe 'Set-HostsEntry.when adding a new IPv4 entry' {
$hostsFile = New-TestHostsFile
$ip = '255.255.255.255'
$hostname = 'shouldaddnewhostsentry.example.com'
$description = 'testing if new hosts entries get added'
Set-HostsEntry -IPAddress $ip -Hostname $hostname -Description $description -Path $hostsFile
Assert-HostsFileContains -IPAddress $ip -HostName $hostname -Description $description -Path $hostsFile
}
Describe 'Set-HostsEntry.when an existing entry has a comment but is updated without a comment' {
$ip = '1.1.1.1'
$hostname = 'shouldremovecomment.example.com'
$hostsFile = "$ip $hostname
Set-HostsEntry -IPAddress $ip -HostName $hostname -Path $hostsFile
Assert-HostsFileContains -IPAddress $ip -HostName $hostname -Path $hostsFile
}
Describe 'Set-HostsEntry.when there are duplicate hostnames' {
$ip = '3.3.3.3'
$hostname = 'shouldcommentoutduplicates.example.com'
$line = "$ip $hostname"
$hostsFile = ($line,$line) | New-TestHostsFile
Set-HostsEntry -IPAddress $ip -HostName $hostname -Path $hostsFile
Assert-HostsFileContains -IPAddress $ip -HostName $hostname -Path $hostsFile
$commentedLine = '
Assert-HostsFileContains -Line $commentedLine -Path $hostsFile
It 'should comment out second duplicate' {
Get-Content -Path $hostsFile | Select-Object -Last 1 | Should Be $commentedLine
}
}
Describe 'Set-HostsEntry.when using -WhatIf switch' {
$hostsFile = New-TestHostsFile
Set-HostsEntry -IPAddress '127.0.0.1' -Hostname 'example.com' -WhatIf -Path $hostsFile
It 'should not update the hosts file' {
Get-Content -Path $hostsFile | Should BeNullOrEmpty
}
}
Describe 'Set-HostsEntry.when hosts file exists and is empty' {
$hostsFile = New-TestHostsFile
Remove-Item -Path $hostsFile
New-Item -Path $hostsFile -ItemType File
Set-HostsEntry -IPAddress '127.0.0.1' -Hostname 'example.com' -Path $hostsFile
Assert-HostsFileContains -IPAddress '127.0.0.1' -Hostname 'example.com' -Path $hostsFile
}
Describe 'Set-HostsEntry.when hosts file does not exist' {
$Global:Error.Clear()
$hostsFile = New-TestHostsFile
Remove-Item -Path $hostsFile
Set-HostsEntry -IPAddress '127.0.0.1' -Hostname 'example.com' -Path $hostsFile
It 'should not write any errors' {
$Global:Error | Should BeNullOrEmpty
}
It 'should create hosts file' {
$hostsFile | Should Exist
}
Assert-HostsFileContains -IPAddress '127.0.0.1' -HostName 'example.com' -Path $hostsFile
}
Describe 'Set-HostsEntry.when hosts file contains invalid entries' {
$hostsFile = 'Invalid Line' | New-TestHostsFile
Set-HostsEntry -IPAddress '4.3.2.1' -Hostname 'example.com' -Path $hostsFile
Assert-HostsFileContains -IPAddress '4.3.2.1' -HostName 'example.com' -Path $hostsFile
Assert-HostsFileContains -Line '
}
Describe 'Set-HostsEntry.when the hosts file is in use' {
$Global:Error.Clear()
$line1 = '0.3.2.1 example1.com'
$line2 = '0.6.7.8 example2.com'
$hostsFile = $line1,$line2 | New-TestHostsFile
$expectedHostsFile = @"
$line1
$line2
"@
Context 'the hosts file is locked for writing' {
$file = [IO.File]::Open($hostsFile, 'Open', 'Read', 'Read')
try
{
Set-HostsEntry '1.2.3.4' -HostName 'example.com' -Path $hostsFile -ErrorAction SilentlyContinue
}
finally
{
$file.Close()
}
It 'should write an error' {
$Global:Error.Count | Should Be 1
$Global:Error.Count | Should BeGreaterThan 0
$Global:Error | Should Match 'cannot access the file'
}
It 'should not modify the file' {
Get-Content -Raw -Path $hostsFile | Should Be $expectedHostsFile
}
}
Context 'the hosts file is locked for reading' {
$Global:Error.Clear()
$job = Start-Job -ScriptBlock {
$file = [IO.File]::Open($using:hostsFile, 'Open', 'Read', 'None')
Start-Sleep -Seconds 5
$file.Close()
}
try
{
do
{
Start-Sleep -Milliseconds 100
Write-Debug -Message ('Waiting for hosts file to get locked.')
}
while( (Get-Content -Raw -Path $hostsFile -ErrorAction Ignore) )
Set-HostsEntry '0.4.5.6' -HostName 'example1.com' -Path $hostsFile -ErrorAction SilentlyContinue
It 'should write error' {
$Global:Error.Count | Should BeGreaterThan 0
$Global:Error[0] | Should Match 'cannot access the file'
}
do
{
Start-Sleep -Milliseconds 100
Write-Debug -Message ('Waiting for hosts file to get unlocked.')
}
while( -not (Get-Content -Raw -Path $hostsFile -ErrorAction Ignore) )
It 'should not modify the file' {
$hostsFile = Get-Content -Raw -Path $hostsFile -ErrorAction Ignore | Should Be $expectedHostsFile
}
}
finally
{
$job | Wait-Job | Receive-Job | Out-String | Write-Debug
}
}
}
Describe 'Set-HostsEntry.when updating entries with descriptions' {
$hostsFile = New-TestHostsFile
Set-HostsEntry -IPAddress 127.0.0.1 -HostName 'test' -Description 'Test' -Path $hostsFile
Set-HostsEntry -IPAddress 127.0.0.1 -HostName 'test2' -Description 'Test2' -Path $hostsFile
Set-HostsEntry -IPAddress 127.0.0.1 -HostName 'test3' -Path $hostsFile
Assert-HostsFileContains -IPAddress "127.0.0.1" -HostName 'test' -Description 'Test' -Path $hostsFile
Assert-HostsFileContains -IPAddress "127.0.0.1" -HostName 'test2' -Description 'Test2' -Path $hostsFile
Assert-HostsFileContains -IPAddress "127.0.0.1" -HostName 'test3' -Path $hostsFile
}
Describe 'Set-HostsEntry.when the hosts file contains trailing empty lines' {
$line = @"
{0,-45} fubarsnafu
{0,-45} snafufubar
"@ -f '127.0.0.1'
$hostsFile = $line | New-TestHostsFile
Set-HostsEntry -IPAddress '127.0.0.1' -HostName 'fubarsnafu' -Path $hostsFile
It 'should trim trailing space' {
(Get-Content -Raw -Path $hostsFile).Trim("`r","`n") | Should Be $line.Trim()
}
} |
combined_dataset/train/non-malicious/sample_39_70.ps1 | sample_39_70.ps1 | # Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
#####################################################################################################
#
# Registers the WinRM endpoint for this instance of PowerShell.
#
# If the parameters '-PowerShellHome' were specified, it means that the script will be registering
# an instance of PowerShell from another instance of PowerShell.
#
# If no parameter is specified, it means that this instance of PowerShell is registering itself.
#
# Assumptions:
# 1. The CoreCLR and the PowerShell assemblies are side-by-side in $PSHOME
# 2. Plugins are registered by version number. Only one plugin can be automatically registered
# per PowerShell version. However, multiple endpoints may be manually registered for a given
# plugin.
#
#####################################################################################################
[CmdletBinding(DefaultParameterSetName = "NotByPath")]
param
(
[parameter(Mandatory = $true, ParameterSetName = "ByPath")]
[switch]$Force,
[string]
$PowerShellHome
)
Set-StrictMode -Version 3.0
if (! ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))
{
Write-Error "WinRM registration requires Administrator rights. To run this cmdlet, start PowerShell with the `"Run as administrator`" option."
return
}
function Register-WinRmPlugin
{
param
(
#
# Expected Example:
# %windir%\\system32\\PowerShell\\6.0.0\\pwrshplugin.dll
#
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$pluginAbsolutePath,
#
# Expected Example: powershell.6.0.0-beta.3
#
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$pluginEndpointName
)
$regKey = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN\Plugin\$pluginEndpointName"
$pluginArchitecture = "64"
if ($env:PROCESSOR_ARCHITECTURE -match "x86" -or $env:PROCESSOR_ARCHITECTURE -eq "ARM")
{
$pluginArchitecture = "32"
}
$regKeyValueFormatString = @"
<PlugInConfiguration xmlns="http://schemas.microsoft.com/wbem/wsman/1/config/PluginConfiguration" Name="{0}" Filename="{1}"
SDKVersion="2" XmlRenderingType="text" Enabled="True" OutputBufferingMode="Block" ProcessIdleTimeoutSec="0" Architecture="{2}"
UseSharedProcess="false" RunAsUser="" RunAsPassword="" AutoRestart="false">
<InitializationParameters>
<Param Name="PSVersion" Value="7.0"/>
</InitializationParameters>
<Resources>
<Resource ResourceUri="http://schemas.microsoft.com/powershell/{0}" SupportsOptions="true" ExactMatch="true">
<Security Uri="http://schemas.microsoft.com/powershell/{0}" ExactMatch="true"
Sddl="O:NSG:BAD:P(A;;GA;;;BA)S:P(AU;FA;GA;;;WD)(AU;SA;GXGW;;;WD)"/>
<Capability Type="Shell"/>
</Resource>
</Resources>
<Quotas IdleTimeoutms="7200000" MaxConcurrentUsers="5" MaxProcessesPerShell="15" MaxMemoryPerShellMB="1024" MaxShellsPerUser="25"
MaxConcurrentCommandsPerShell="1000" MaxShells="25" MaxIdleTimeoutms="43200000"/>
</PlugInConfiguration>
"@
$valueString = $regKeyValueFormatString -f $pluginEndpointName, $pluginAbsolutePath, $pluginArchitecture
New-Item $regKey -Force > $null
New-ItemProperty -Path $regKey -Name ConfigXML -Value $valueString > $null
}
function New-PluginConfigFile
{
[CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")]
param
(
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$pluginFile,
[string]
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$targetPsHomeDir
)
# This always overwrites the file with a new version of it if the
# script is invoked multiple times.
Set-Content -Path $pluginFile -Value "PSHOMEDIR=$targetPsHomeDir" -ErrorAction Stop
Add-Content -Path $pluginFile -Value "CORECLRDIR=$targetPsHomeDir" -ErrorAction Stop
Write-Verbose "Created Plugin Config File: $pluginFile" -Verbose
}
function Install-PluginEndpoint {
[CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")]
param (
[Parameter()] [bool] $Force,
[switch]
$VersionIndependent
)
######################
# #
# Install the plugin #
# #
######################
if (-not [String]::IsNullOrEmpty($PowerShellHome))
{
$targetPsHome = $PowerShellHome
$targetPsVersion = & "$targetPsHome\pwsh" -NoProfile -Command '$PSVersionTable.PSVersion.ToString()'
}
else
{
## Get the PSHome and PSVersion using the current powershell instance
$targetPsHome = $PSHOME
$targetPsVersion = $PSVersionTable.PSVersion.ToString()
}
Write-Verbose "PowerShellHome: $targetPsHome" -Verbose
# For default, not tied to the specific version endpoint, we apply
# only first number in the PSVersion string to the endpoint name.
# Example name: 'PowerShell.6'.
if ($VersionIndependent) {
$dotPos = $targetPsVersion.IndexOf(".")
if ($dotPos -ne -1) {
$targetPsVersion = $targetPsVersion.Substring(0, $dotPos)
}
}
Write-Verbose "Using PowerShell Version: $targetPsVersion" -Verbose
$pluginEndpointName = "PowerShell.$targetPsVersion"
$endPoint = Get-PSSessionConfiguration $pluginEndpointName -Force:$Force -ErrorAction silentlycontinue 2>&1
# If endpoint exists and -Force parameter was not used, the endpoint would not be overwritten.
if ($endpoint -and !$Force)
{
Write-Error -Category ResourceExists -ErrorId "PSSessionConfigurationExists" -Message "Endpoint $pluginEndpointName already exists."
return
}
if (!$PSCmdlet.ShouldProcess($pluginEndpointName)) {
return
}
if ($PSVersionTable.PSVersion -lt "6.0")
{
# This script is primarily used from Windows PowerShell for Win10 IoT and NanoServer to setup PSCore6 remoting endpoint
# so it's ok to hardcode to 'C:\Windows' for those systems
$pluginBasePath = Join-Path "C:\Windows\System32\PowerShell" $targetPsVersion
}
else
{
$pluginBasePath = Join-Path ([System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::Windows) + "\System32\PowerShell") $targetPsVersion
}
$resolvedPluginAbsolutePath = ""
if (! (Test-Path $pluginBasePath))
{
Write-Verbose "Creating $pluginBasePath"
$resolvedPluginAbsolutePath = New-Item -Type Directory -Path $pluginBasePath
}
else
{
$resolvedPluginAbsolutePath = Resolve-Path $pluginBasePath
}
$pluginPath = Join-Path $resolvedPluginAbsolutePath "pwrshplugin.dll"
# This is forced to ensure the file is placed correctly
Copy-Item $targetPsHome\pwrshplugin.dll $resolvedPluginAbsolutePath -Force -Verbose -ErrorAction Stop
$pluginFile = Join-Path $resolvedPluginAbsolutePath "RemotePowerShellConfig.txt"
New-PluginConfigFile $pluginFile (Resolve-Path $targetPsHome)
# Register the plugin
Register-WinRmPlugin $pluginPath $pluginEndpointName
####################################################################
# #
# Validations to confirm that everything was registered correctly. #
# #
####################################################################
if (! (Test-Path $pluginFile))
{
throw "WinRM Plugin configuration file not created. Expected = $pluginFile"
}
if (! (Test-Path $resolvedPluginAbsolutePath\pwrshplugin.dll))
{
throw "WinRM Plugin DLL missing. Expected = $resolvedPluginAbsolutePath\pwrshplugin.dll"
}
try
{
Write-Host "`nGet-PSSessionConfiguration $pluginEndpointName" -ForegroundColor "green"
Get-PSSessionConfiguration $pluginEndpointName -ErrorAction Stop
}
catch [Microsoft.PowerShell.Commands.WriteErrorException]
{
throw "No remoting session configuration matches the name $pluginEndpointName."
}
}
Install-PluginEndpoint -Force $Force
Install-PluginEndpoint -Force $Force -VersionIndependent
Write-Host "Restarting WinRM to ensure that the plugin configuration change takes effect.`nThis is required for WinRM running on Windows SKUs prior to Windows 10." -ForegroundColor Magenta
Restart-Service winrm
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAmMBO/z6uvMDNL
# ywsEntW1l8ui09V7mB9QxyD4sH3/L6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIASzAbkapgzkIHyjEtglU6vA
# HP0o6aqvz8pdcZCJCVXCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAUojy/6UU4L3Vrn/dK+XJByO4hTJOqIPTzWVdj5ai/pNX+eUNphh8Tf0a
# xHN7BsJqb2Qgq8YNMrEB6Sxl61PqD1LEURtyKJYjk8b8K7Kfrhi64VAYHmi0OWjq
# aJx+EfcvDB7dP5FT9PH/Z5uv4SAiByOv5z1X0YvJBNIFDmTtlvMIqQjRtrJvZO9a
# 7o8iJGnxo5Vndllw9S+ZIIMkncs4UQAr0wui06M6LlRp91xmUwEPd/xe5uorliBv
# A6ztNcGc/IiBjoT1hmppbilf4cNI3Wvg/Q8lc91kVRl0l0eqMMmn2jFxXe9NgALo
# Fbvo8me3db60yjPg0t51gWVQnq2naKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA665q8c4j/x8zJ68EYw6yuGbLJV5LA3xdRxe9zMCIbFAIGZfLiXpIL
# GBMyMDI0MDQwOTIzMzYzNS43NjNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cBM/jAiGA8yMDI0MDQwOTIzMjU1
# MFoYDzIwMjQwNDEwMjMyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpwEz+
# AgEAMAcCAQACAgUFMAcCAQACAhLlMAoCBQDpwZ5+AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAFSDY14N3Mh+ee3rMt8yNKIob7etD06huplZvq9MQcEm9sd2
# IwCVb2OAM0npW+vDqfe2iRy5dUq/4ubbql82Rsb48/DunMxczqLklNH7RzTv+itS
# E787LO58JXJmQ55onV/q6qlk3cmoxwvJM9weNSwzT0JA30FMjuz2fwPPTcAowDEK
# Y+ndrxZ5tIA8d75m4Mqr2P1GL6A+U33dPs/iYGT/SjWZelVM+RlKDVxnIle4Y+bT
# az5p8+5LbYuAhe6XZg0bxAaSzq21Q027WKSRELU52LJl0ooypH0xvCSMMiMoz/YG
# S3VRrb/UZX9Eo5N00QfzwfFDuXKnofC7gDRCZ3gxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCA9uEmBvEFv7G6AploStR3XcZJkkr/c9OlU+qq+NHsC1zCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgaFrF5LHEGY4yi4AlSQ/fTO1cM36c
# /ejauRhx8H1amdswDQYJKoZIhvcNAQELBQAEggIAq5PCbMbV2oE9WoPprG/dMAPp
# FXJ8PZ84Qdbg8YrW4yJ2NPnTCWzDJl+i2Pfrk+AcERZmwn4YDKoCw1vwHxy8Nqxi
# N1Uw+9ehicYBwhr1R90U9whOLJEozRfw3LTppf+zHVSpKPIOwnXLuT7Br1J9sxoR
# wB4E8lCr0k9dlHea1NR+0eLfbZQkGijzUhXgPnLQkTkDk7VOi6rlQ3RntOyj+DyW
# wrSk6WaK9tHJCAEhHfVZwfPRQtLBgxgc4ixgPtVWCt3jEUTGYzU4VRCa0+2KKFUF
# grtW8hlBVvG+RGXi9IG/40geG0ojpSAMleG0zSA5XoDrVNLRwHKmP3JIAr+/ayTB
# X/+umzn2kQBsWTVkaxo9UyQlTdVkOhY6pbGs4Ex92CiAgRcLSPix1MWGIIoaJ6JL
# nEgwBGza+ajw+pKIK0bT1bVfou9lCYkJ7okgYve+PP+RacpGPkSlKG7GqnPJLnCc
# Gkx3Jes3BVYbb3NegRuFEEi8OBG98Zfrj1TKDQU863VmCWoeynvdsL9U9GUgh21B
# ACRPc60XQj6rH/sr0pCD0kYseTCk3m0l9NrmdQAJXA+wQzg6ehbgwbgyHt22+MtX
# dsVYUm42bl0z/43zU3kCNs5h1dc8sdgiVyzDcMc/jETS5UjfgnugZ6Hqjvi+BTa7
# 9SIzOTp0lRAWwK8JZZ0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/94.ps1 | 94.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Test-JSON(){
param (
$JSON
)
try {
$TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop
$validJson = $true
}
catch {
$validJson = $false
$_.Exception
}
if (!$validJson){
Write-Host "Provided JSON isn't in valid JSON format" -f Red
break
}
}
Function Add-RBACRole(){
[cmdletbinding()]
param
(
$JSON
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/roleDefinitions"
try {
if(!$JSON){
write-host "No JSON was passed to the function, provide a JSON variable" -f Red
break
}
Test-JSON -JSON $JSON
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $Json -ContentType "application/json"
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$JSON = @"
{
"@odata.type": "
"displayName": "Graph RBAC Role",
"description": "New RBAC Role Description",
"permissions": [
{
"actions": [
"Microsoft.Intune/MobileApps/Read",
"Microsoft.Intune/TermsAndConditions/Read",
"Microsoft.Intune/ManagedApps/Read",
"Microsoft.Intune/ManagedDevices/Read",
"Microsoft.Intune/DeviceConfigurations/Read",
"Microsoft.Intune/TelecomExpenses/Read",
"Microsoft.Intune/Organization/Read",
"Microsoft.Intune/RemoteTasks/RebootNow",
"Microsoft.Intune/RemoteTasks/RemoteLock"
]
}
],
"isBuiltInRoleDefinition": false
}
"@
Add-RBACRole -JSON $JSON
|
combined_dataset/train/non-malicious/sample_49_86.ps1 | sample_49_86.ps1 | #
# Module manifest for module 'OCI.PSModules.Database'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Database.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e1b520e7-13c2-41a0-be48-3eacc401dff5'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Database Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Database.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabaseStorageCapacityCloudExadataInfrastructure',
'Add-OCIDatabaseStorageCapacityExadataInfrastructure',
'Add-OCIDatabaseVirtualMachineToCloudVmCluster',
'Add-OCIDatabaseVirtualMachineToVmCluster',
'Complete-OCIDatabaseExternalBackupJob',
'Confirm-OCIDatabaseVmClusterNetwork',
'Disable-OCIDatabaseAutonomousDatabaseManagement',
'Disable-OCIDatabaseAutonomousDatabaseOperationsInsights',
'Disable-OCIDatabaseExternalContainerDatabaseDatabaseManagement',
'Disable-OCIDatabaseExternalContainerDatabaseStackMonitoring',
'Disable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement',
'Disable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights',
'Disable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring',
'Disable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement',
'Disable-OCIDatabaseExternalPluggableDatabaseOperationsInsights',
'Disable-OCIDatabaseExternalPluggableDatabaseStackMonitoring',
'Disable-OCIDatabaseManagement',
'Disable-OCIDatabasePluggableDatabaseManagement',
'Edit-OCIDatabaseManagement',
'Edit-OCIDatabasePluggableDatabaseManagement',
'Enable-OCIDatabaseAutonomousDatabaseManagement',
'Enable-OCIDatabaseAutonomousDatabaseOperationsInsights',
'Enable-OCIDatabaseExadataInfrastructure',
'Enable-OCIDatabaseExternalContainerDatabaseDatabaseManagement',
'Enable-OCIDatabaseExternalContainerDatabaseStackMonitoring',
'Enable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement',
'Enable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights',
'Enable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring',
'Enable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement',
'Enable-OCIDatabaseExternalPluggableDatabaseOperationsInsights',
'Enable-OCIDatabaseExternalPluggableDatabaseStackMonitoring',
'Enable-OCIDatabaseManagement',
'Enable-OCIDatabasePluggableDatabaseManagement', 'Get-OCIDatabase',
'Get-OCIDatabaseApplicationVip',
'Get-OCIDatabaseApplicationVipsList',
'Get-OCIDatabaseAutonomousContainerDatabase',
'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation',
'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociationsList',
'Get-OCIDatabaseAutonomousContainerDatabaseResourceUsage',
'Get-OCIDatabaseAutonomousContainerDatabasesList',
'Get-OCIDatabaseAutonomousContainerDatabaseVersionsList',
'Get-OCIDatabaseAutonomousDatabase',
'Get-OCIDatabaseAutonomousDatabaseBackup',
'Get-OCIDatabaseAutonomousDatabaseBackupsList',
'Get-OCIDatabaseAutonomousDatabaseCharacterSetsList',
'Get-OCIDatabaseAutonomousDatabaseClonesList',
'Get-OCIDatabaseAutonomousDatabaseDataguardAssociation',
'Get-OCIDatabaseAutonomousDatabaseDataguardAssociationsList',
'Get-OCIDatabaseAutonomousDatabaseRefreshableClonesList',
'Get-OCIDatabaseAutonomousDatabaseRegionalWallet',
'Get-OCIDatabaseAutonomousDatabasesList',
'Get-OCIDatabaseAutonomousDatabaseWallet',
'Get-OCIDatabaseAutonomousDbPreviewVersionsList',
'Get-OCIDatabaseAutonomousDbVersionsList',
'Get-OCIDatabaseAutonomousExadataInfrastructure',
'Get-OCIDatabaseAutonomousExadataInfrastructureShapesList',
'Get-OCIDatabaseAutonomousExadataInfrastructuresList',
'Get-OCIDatabaseAutonomousPatch',
'Get-OCIDatabaseAutonomousVirtualMachine',
'Get-OCIDatabaseAutonomousVirtualMachinesList',
'Get-OCIDatabaseAutonomousVmCluster',
'Get-OCIDatabaseAutonomousVmClusterAcdResourceUsageList',
'Get-OCIDatabaseAutonomousVmClusterResourceUsage',
'Get-OCIDatabaseAutonomousVmClustersList', 'Get-OCIDatabaseBackup',
'Get-OCIDatabaseBackupDestination',
'Get-OCIDatabaseBackupDestinationList',
'Get-OCIDatabaseBackupsList',
'Get-OCIDatabaseCloudAutonomousVmCluster',
'Get-OCIDatabaseCloudAutonomousVmClusterAcdResourceUsageList',
'Get-OCIDatabaseCloudAutonomousVmClusterResourceUsage',
'Get-OCIDatabaseCloudAutonomousVmClustersList',
'Get-OCIDatabaseCloudExadataInfrastructure',
'Get-OCIDatabaseCloudExadataInfrastructuresList',
'Get-OCIDatabaseCloudExadataInfrastructureUnallocatedResources',
'Get-OCIDatabaseCloudVmCluster',
'Get-OCIDatabaseCloudVmClusterIormConfig',
'Get-OCIDatabaseCloudVmClustersList',
'Get-OCIDatabaseCloudVmClusterUpdate',
'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntriesList',
'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntry',
'Get-OCIDatabaseCloudVmClusterUpdatesList',
'Get-OCIDatabaseConsoleConnection',
'Get-OCIDatabaseConsoleConnectionsList',
'Get-OCIDatabaseConsoleHistoriesList',
'Get-OCIDatabaseConsoleHistory',
'Get-OCIDatabaseConsoleHistoryContent',
'Get-OCIDatabaseContainerDatabasePatchesList',
'Get-OCIDatabaseDataGuardAssociation',
'Get-OCIDatabaseDataGuardAssociationsList', 'Get-OCIDatabaseDbHome',
'Get-OCIDatabaseDbHomePatch', 'Get-OCIDatabaseDbHomePatchesList',
'Get-OCIDatabaseDbHomePatchHistoryEntriesList',
'Get-OCIDatabaseDbHomePatchHistoryEntry',
'Get-OCIDatabaseDbHomesList', 'Get-OCIDatabaseDbNode',
'Get-OCIDatabaseDbNodesList', 'Get-OCIDatabaseDbServer',
'Get-OCIDatabaseDbServersList', 'Get-OCIDatabaseDbSystem',
'Get-OCIDatabaseDbSystemComputePerformancesList',
'Get-OCIDatabaseDbSystemPatch',
'Get-OCIDatabaseDbSystemPatchesList',
'Get-OCIDatabaseDbSystemPatchHistoryEntriesList',
'Get-OCIDatabaseDbSystemPatchHistoryEntry',
'Get-OCIDatabaseDbSystemShapesList', 'Get-OCIDatabaseDbSystemsList',
'Get-OCIDatabaseDbSystemStoragePerformancesList',
'Get-OCIDatabaseDbSystemUpgradeHistoryEntriesList',
'Get-OCIDatabaseDbSystemUpgradeHistoryEntry',
'Get-OCIDatabaseDbVersionsList',
'Get-OCIDatabaseExadataInfrastructure',
'Get-OCIDatabaseExadataInfrastructureOcpus',
'Get-OCIDatabaseExadataInfrastructuresList',
'Get-OCIDatabaseExadataInfrastructureUnAllocatedResources',
'Get-OCIDatabaseExadataIormConfig',
'Get-OCIDatabaseExternalBackupJob',
'Get-OCIDatabaseExternalContainerDatabase',
'Get-OCIDatabaseExternalContainerDatabasesList',
'Get-OCIDatabaseExternalDatabaseConnector',
'Get-OCIDatabaseExternalDatabaseConnectorsList',
'Get-OCIDatabaseExternalNonContainerDatabase',
'Get-OCIDatabaseExternalNonContainerDatabasesList',
'Get-OCIDatabaseExternalPluggableDatabase',
'Get-OCIDatabaseExternalPluggableDatabasesList',
'Get-OCIDatabaseFlexComponentsList',
'Get-OCIDatabaseGiVersionsList',
'Get-OCIDatabaseInfrastructureTargetVersions',
'Get-OCIDatabaseKeyStore', 'Get-OCIDatabaseKeyStoresList',
'Get-OCIDatabaseMaintenanceRun',
'Get-OCIDatabaseMaintenanceRunHistory',
'Get-OCIDatabaseMaintenanceRunHistoryList',
'Get-OCIDatabaseMaintenanceRunsList', 'Get-OCIDatabaseOneoffPatch',
'Get-OCIDatabaseOneoffPatchesList',
'Get-OCIDatabasePdbConversionHistoryEntriesList',
'Get-OCIDatabasePdbConversionHistoryEntry',
'Get-OCIDatabasePluggableDatabase',
'Get-OCIDatabasePluggableDatabasesList', 'Get-OCIDatabasesList',
'Get-OCIDatabaseSoftwareImage', 'Get-OCIDatabaseSoftwareImagesList',
'Get-OCIDatabaseSystemVersionsList',
'Get-OCIDatabaseUpgradeHistoryEntriesList',
'Get-OCIDatabaseUpgradeHistoryEntry', 'Get-OCIDatabaseVmCluster',
'Get-OCIDatabaseVmClusterNetwork',
'Get-OCIDatabaseVmClusterNetworksList',
'Get-OCIDatabaseVmClusterPatch',
'Get-OCIDatabaseVmClusterPatchesList',
'Get-OCIDatabaseVmClusterPatchHistoryEntriesList',
'Get-OCIDatabaseVmClusterPatchHistoryEntry',
'Get-OCIDatabaseVmClustersList', 'Get-OCIDatabaseVmClusterUpdate',
'Get-OCIDatabaseVmClusterUpdateHistoryEntriesList',
'Get-OCIDatabaseVmClusterUpdateHistoryEntry',
'Get-OCIDatabaseVmClusterUpdatesList',
'Invoke-OCIDatabaseAutonomousDatabaseManualRefresh',
'Invoke-OCIDatabaseCheckExternalDatabaseConnectorConnectionStatus',
'Invoke-OCIDatabaseConfigureAutonomousDatabaseVaultKey',
'Invoke-OCIDatabaseConfigureSaasAdminUser',
'Invoke-OCIDatabaseConvertToPdb',
'Invoke-OCIDatabaseConvertToRegularPluggableDatabase',
'Invoke-OCIDatabaseDbNodeAction',
'Invoke-OCIDatabaseDownloadExadataInfrastructureConfigFile',
'Invoke-OCIDatabaseDownloadOneoffPatch',
'Invoke-OCIDatabaseDownloadValidationReport',
'Invoke-OCIDatabaseDownloadVmClusterNetworkConfigFile',
'Invoke-OCIDatabaseFailoverAutonomousContainerDatabaseDataguardAssociation',
'Invoke-OCIDatabaseFailOverAutonomousDatabase',
'Invoke-OCIDatabaseFailoverDataGuardAssociation',
'Invoke-OCIDatabaseLaunchAutonomousExadataInfrastructure',
'Invoke-OCIDatabaseLocalClonePluggableDatabase',
'Invoke-OCIDatabaseMigrateExadataDbSystemResourceModel',
'Invoke-OCIDatabaseMigrateVaultKey',
'Invoke-OCIDatabaseRefreshPluggableDatabase',
'Invoke-OCIDatabaseReinstateAutonomousContainerDatabaseDataguardAssociation',
'Invoke-OCIDatabaseReinstateDataGuardAssociation',
'Invoke-OCIDatabaseRemoteClonePluggableDatabase',
'Invoke-OCIDatabaseResizeVmClusterNetwork',
'Invoke-OCIDatabaseResourcePoolShapes',
'Invoke-OCIDatabaseRotateAutonomousContainerDatabaseEncryptionKey',
'Invoke-OCIDatabaseRotateAutonomousDatabaseEncryptionKey',
'Invoke-OCIDatabaseRotateAutonomousVmClusterOrdsCerts',
'Invoke-OCIDatabaseRotateAutonomousVmClusterSslCerts',
'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterOrdsCerts',
'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterSslCerts',
'Invoke-OCIDatabaseRotateOrdsCerts',
'Invoke-OCIDatabaseRotatePluggableDatabaseEncryptionKey',
'Invoke-OCIDatabaseRotateSslCerts',
'Invoke-OCIDatabaseRotateVaultKey',
'Invoke-OCIDatabaseSaasAdminUserStatus',
'Invoke-OCIDatabaseScanExternalContainerDatabasePluggableDatabases',
'Invoke-OCIDatabaseShrinkAutonomousDatabase',
'Invoke-OCIDatabaseSwitchoverAutonomousContainerDatabaseDataguardAssociation',
'Invoke-OCIDatabaseSwitchoverAutonomousDatabase',
'Invoke-OCIDatabaseSwitchoverDataGuardAssociation',
'Invoke-OCIDatabaseTerminateAutonomousContainerDatabase',
'Invoke-OCIDatabaseTerminateAutonomousExadataInfrastructure',
'Invoke-OCIDatabaseTerminateDbSystem',
'Invoke-OCIDatabaseUpgradeDatabase',
'Invoke-OCIDatabaseUpgradeDbSystem',
'Move-OCIDatabaseAutonomousContainerDatabaseCompartment',
'Move-OCIDatabaseAutonomousDatabaseCompartment',
'Move-OCIDatabaseAutonomousExadataInfrastructureCompartment',
'Move-OCIDatabaseAutonomousVmClusterCompartment',
'Move-OCIDatabaseBackupDestinationCompartment',
'Move-OCIDatabaseCloudAutonomousVmClusterCompartment',
'Move-OCIDatabaseCloudExadataInfrastructureCompartment',
'Move-OCIDatabaseCloudVmClusterCompartment',
'Move-OCIDatabaseDataguardRole',
'Move-OCIDatabaseDbSystemCompartment',
'Move-OCIDatabaseDisasterRecoveryConfiguration',
'Move-OCIDatabaseExadataInfrastructureCompartment',
'Move-OCIDatabaseExternalContainerDatabaseCompartment',
'Move-OCIDatabaseExternalNonContainerDatabaseCompartment',
'Move-OCIDatabaseExternalPluggableDatabaseCompartment',
'Move-OCIDatabaseKeyStoreCompartment',
'Move-OCIDatabaseKeyStoreType',
'Move-OCIDatabaseOneoffPatchCompartment',
'Move-OCIDatabaseSoftwareImageCompartment',
'Move-OCIDatabaseVmClusterCompartment', 'New-OCIDatabase',
'New-OCIDatabaseApplicationVip',
'New-OCIDatabaseAutonomousContainerDatabase',
'New-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation',
'New-OCIDatabaseAutonomousDatabase',
'New-OCIDatabaseAutonomousDatabaseBackup',
'New-OCIDatabaseAutonomousDatabaseWallet',
'New-OCIDatabaseAutonomousVmCluster', 'New-OCIDatabaseBackup',
'New-OCIDatabaseBackupDestination',
'New-OCIDatabaseCloudAutonomousVmCluster',
'New-OCIDatabaseCloudExadataInfrastructure',
'New-OCIDatabaseCloudVmCluster', 'New-OCIDatabaseConsoleConnection',
'New-OCIDatabaseConsoleHistory',
'New-OCIDatabaseDataGuardAssociation', 'New-OCIDatabaseDbHome',
'New-OCIDatabaseDbSystem', 'New-OCIDatabaseExadataInfrastructure',
'New-OCIDatabaseExternalBackupJob',
'New-OCIDatabaseExternalContainerDatabase',
'New-OCIDatabaseExternalDatabaseConnector',
'New-OCIDatabaseExternalNonContainerDatabase',
'New-OCIDatabaseExternalPluggableDatabase',
'New-OCIDatabaseKeyStore', 'New-OCIDatabaseMaintenanceRun',
'New-OCIDatabaseOneoffPatch', 'New-OCIDatabasePluggableDatabase',
'New-OCIDatabaseRecommendedVmClusterNetwork',
'New-OCIDatabaseSoftwareImage', 'New-OCIDatabaseVmCluster',
'New-OCIDatabaseVmClusterNetwork',
'Register-OCIDatabaseAutonomousDatabaseDataSafe',
'Remove-OCIDatabase', 'Remove-OCIDatabaseApplicationVip',
'Remove-OCIDatabaseAutonomousDatabase',
'Remove-OCIDatabaseAutonomousDatabaseBackup',
'Remove-OCIDatabaseAutonomousVmCluster', 'Remove-OCIDatabaseBackup',
'Remove-OCIDatabaseBackupDestination',
'Remove-OCIDatabaseCloudAutonomousVmCluster',
'Remove-OCIDatabaseCloudExadataInfrastructure',
'Remove-OCIDatabaseCloudVmCluster',
'Remove-OCIDatabaseConsoleConnection',
'Remove-OCIDatabaseConsoleHistory', 'Remove-OCIDatabaseDbHome',
'Remove-OCIDatabaseExadataInfrastructure',
'Remove-OCIDatabaseExternalContainerDatabase',
'Remove-OCIDatabaseExternalDatabaseConnector',
'Remove-OCIDatabaseExternalNonContainerDatabase',
'Remove-OCIDatabaseExternalPluggableDatabase',
'Remove-OCIDatabaseKeyStore', 'Remove-OCIDatabaseOneoffPatch',
'Remove-OCIDatabasePluggableDatabase',
'Remove-OCIDatabaseSoftwareImage',
'Remove-OCIDatabaseVirtualMachineFromCloudVmCluster',
'Remove-OCIDatabaseVirtualMachineFromVmCluster',
'Remove-OCIDatabaseVmCluster', 'Remove-OCIDatabaseVmClusterNetwork',
'Restart-OCIDatabaseAutonomousContainerDatabase',
'Restart-OCIDatabaseAutonomousDatabase', 'Restore-OCIDatabase',
'Restore-OCIDatabaseAutonomousDatabase',
'Start-OCIDatabaseAutonomousDatabase',
'Start-OCIDatabasePluggableDatabase',
'Stop-OCIDatabaseAutonomousDatabase', 'Stop-OCIDatabaseBackup',
'Stop-OCIDatabasePluggableDatabase',
'Unregister-OCIDatabaseAutonomousDatabaseDataSafe',
'Update-OCIDatabase',
'Update-OCIDatabaseAutonomousContainerDatabase',
'Update-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation',
'Update-OCIDatabaseAutonomousDatabase',
'Update-OCIDatabaseAutonomousDatabaseBackup',
'Update-OCIDatabaseAutonomousDatabaseRegionalWallet',
'Update-OCIDatabaseAutonomousDatabaseWallet',
'Update-OCIDatabaseAutonomousExadataInfrastructure',
'Update-OCIDatabaseAutonomousVmCluster',
'Update-OCIDatabaseBackupDestination',
'Update-OCIDatabaseCloudAutonomousVmCluster',
'Update-OCIDatabaseCloudExadataInfrastructure',
'Update-OCIDatabaseCloudVmCluster',
'Update-OCIDatabaseCloudVmClusterIormConfig',
'Update-OCIDatabaseConsoleConnection',
'Update-OCIDatabaseConsoleHistory',
'Update-OCIDatabaseDataGuardAssociation',
'Update-OCIDatabaseDbHome', 'Update-OCIDatabaseDbNode',
'Update-OCIDatabaseDbSystem',
'Update-OCIDatabaseExadataInfrastructure',
'Update-OCIDatabaseExadataIormConfig',
'Update-OCIDatabaseExternalContainerDatabase',
'Update-OCIDatabaseExternalDatabaseConnector',
'Update-OCIDatabaseExternalNonContainerDatabase',
'Update-OCIDatabaseExternalPluggableDatabase',
'Update-OCIDatabaseKeyStore', 'Update-OCIDatabaseMaintenanceRun',
'Update-OCIDatabaseOneoffPatch',
'Update-OCIDatabasePluggableDatabase',
'Update-OCIDatabaseSoftwareImage', 'Update-OCIDatabaseVmCluster',
'Update-OCIDatabaseVmClusterNetwork'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Database'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Find files not containig.ps1 | Find files not containig.ps1 | # Find all files which does not contains the text in $Pattern
function ssHasNot(
[string] $Path="*.txt"
,[string] $pattern=""
)
{
$has=[string]@(get-childitem $path | ss $pattern | foreach {$_.Path})
get-childitem $path| where {$has.Contains($_.FullName) -eq $false}
}
|
combined_dataset/train/non-malicious/Simplest animation.ps1 | Simplest animation.ps1 | [int]$x = 0
[int]$y = 0
[int]$cX = 200
[int]$cY = 200
[int]$rad = 100
[int]$grad = 0
[float]$kfc = 0.5
$tabPag1_OnPaint= {
$tmrTim2.Enabled = $false
$g = $tabPag1.CreateGraphics()
$pen = New-Object Drawing.Pen([Drawing.Brushes]::Red)
$g.DrawRectangle($pen, [Convert]::ToInt32($cX - 100), [Convert]::ToInt32($cY - 100), $cX, $cY)
$g.FillEllipse([Drawing.Brushes]::Red, [Convert]::ToInt32($cX + $x - 10), `
[Convert]::ToInt32($cY + $y - 10), 20, 20)
$g.Dispose()
$tmrTim1.Enabled = $true
}
$tmrTim1_OnTick= {
$grad += 5
if ($gard -gt 360) { $grad -= 360 }
$x = $rad * [Math]::Cos($grad * [Math]::PI / 180)
$y = $kfc * $rad * [Math]::Sin($grad * [Math]::PI / 180)
$tabPag1.Invalidate()
}
$tabPag2_OnPaint= {
$tmrTim1.Enabled = $false
$g = $tabPag2.CreateGraphics()
$brush = New-Object Drawing.SolidBrush Blue
$font = New-Object Drawing.Font("Tahoma", (12 + $val), 1)
$msg = "Hello from GDI+!"
[float]$center = $tabPag2.DisplayRectangle.Width / 2
$size = $g.MeasureString($msg, $font)
[float]$swlpos = $center - ($size.Width / 2)
$g.DrawString($msg, $font, $brush, $swlpos, 10)
$tmrTim2.Enabled = $true
}
$tmrTim2_OnTick= {
$val += 5
if ($val -ge 50) {
$val = $null
}
$tabPag2.Invalidate()
}
function ShowMainWindow {
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][Reflection.Assembly]::LoadWithPartialName("System.Drawing")
[Windows.Forms.Application]::EnableVisualStyles()
$frmMain = New-Object Windows.Forms.Form
$tabTabs = New-Object Windows.Forms.TabControl
$tabPag1 = New-Object Windows.Forms.TabPage
$tabPag2 = New-Object Windows.Forms.TabPage
$tmrTim1 = New-Object Windows.Forms.Timer
$tmrTim2 = New-Object Windows.Forms.Timer
#tabTabs
$tabTabs.Controls.AddRange(@($tabPag1, $tabPag2))
$tabTabs.Dock = "Fill"
#tabPag1
$tabPag1.Text = "Orbital moving"
$tabPag1.UseVisualStyleBackColor = $true
$tabPag1.Add_Paint($tabPag1_OnPaint)
#tabPag2
$tabPag2.Text = "Swelling font"
$tabPag2.UseVisualStyleBackColor = $true
$tabPag2.Add_Paint($tabPag2_OnPaint)
#tmrTim1
$tmrTim1.Interval = 100
$tmrTim1.Add_Tick($tmrTim1_OnTick)
#tmrTim2
$tmrTim2.Interval = 100
$tmrTim2.Add_Tick($tmrTim2_OnTick)
#frmMain
$frmMain.ClientSize = New-Object Drawing.Size(410, 430)
$frmMain.Controls.AddRange(@($tabTabs))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.MaximizeBox = $false
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "Animation"
[void]$frmMain.ShowDialog()
}
ShowMainWindow
|
combined_dataset/train/non-malicious/sample_37_22.ps1 | sample_37_22.ps1 | #
# Module manifest for module 'OCI.PSModules.Globallydistributeddatabase'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Globallydistributeddatabase.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '31a94d9b-5cc3-4808-88f0-6b82ed090ffe'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Globallydistributeddatabase Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Globallydistributeddatabase.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIGloballydistributeddatabaseNetwork',
'Get-OCIGloballydistributeddatabasePrivateEndpoint',
'Get-OCIGloballydistributeddatabasePrivateEndpointsList',
'Get-OCIGloballydistributeddatabaseShardedDatabase',
'Get-OCIGloballydistributeddatabaseShardedDatabasesList',
'Get-OCIGloballydistributeddatabaseWorkRequest',
'Get-OCIGloballydistributeddatabaseWorkRequestErrorsList',
'Get-OCIGloballydistributeddatabaseWorkRequestLogsList',
'Get-OCIGloballydistributeddatabaseWorkRequestsList',
'Invoke-OCIGloballydistributeddatabaseConfigureShardedDatabaseGsms',
'Invoke-OCIGloballydistributeddatabaseConfigureSharding',
'Invoke-OCIGloballydistributeddatabaseDownloadGsmCertificateSigningRequest',
'Invoke-OCIGloballydistributeddatabaseFetchConnectionString',
'Invoke-OCIGloballydistributeddatabaseFetchShardableCloudAutonomousVmClusters',
'Invoke-OCIGloballydistributeddatabasePatchShardedDatabase',
'Invoke-OCIGloballydistributeddatabasePrevalidateShardedDatabase',
'Move-OCIGloballydistributeddatabasePrivateEndpointCompartment',
'Move-OCIGloballydistributeddatabaseShardedDatabaseCompartment',
'New-OCIGloballydistributeddatabaseGsmCertificateSigningRequest',
'New-OCIGloballydistributeddatabasePrivateEndpoint',
'New-OCIGloballydistributeddatabaseShardedDatabase',
'New-OCIGloballydistributeddatabaseWallet',
'Remove-OCIGloballydistributeddatabasePrivateEndpoint',
'Remove-OCIGloballydistributeddatabaseShardedDatabase',
'Start-OCIGloballydistributeddatabaseShardedDatabase',
'Stop-OCIGloballydistributeddatabaseShardedDatabase',
'Update-OCIGloballydistributeddatabasePrivateEndpoint',
'Update-OCIGloballydistributeddatabaseShardedDatabase',
'Write-OCIGloballydistributeddatabaseSignedCertificateAndGenerateWallet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Globallydistributeddatabase'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/format-iislog.ps1 | format-iislog.ps1 | param
(
[Parameter(
Mandatory=$true,
Position = 0,
ValueFromPipeline=$true,
HelpMessage="Specifies the path to the IIS *.log file to import. You can also pipe a path to Import-Iss-Log."
)]
[ValidateNotNullOrEmpty()]
[string]
$Path,
[Parameter(
Mandatory=$true,
Position = 1,
ValueFromPipeline=$true,
HelpMessage="Specifies the desired field names. Must be in the following format: #Fields: fname1 fname2"
)]
[ValidateNotNullOrEmpty()]
[string]
$NewPath,
[Parameter(
Mandatory=$true,
Position = 2,
ValueFromPipeline=$true,
HelpMessage="Specifies the output location for the modified log file."
)]
[ValidateNotNullOrEmpty()]
[string]
$OutPath,
[Parameter(
Position = 3,
HelpMessage="Specifies the delimiter that separates the property values in the IIS *.log file. The default is a spacebar."
)]
[ValidateNotNullOrEmpty()]
[string]
$Delimiter = " ",
[Parameter(HelpMessage="The character encoding for the IIS *log file. The default is the UTF8.")]
[Microsoft.PowerShell.Commands.FileSystemCmdletProviderEncoding]
$Encoding = [Microsoft.PowerShell.Commands.FileSystemCmdletProviderEncoding]::UTF8
)
begin
{
$fieldNames = @()
$newfieldnames = @()
}
process
{
#add headers to new output file
(get-content $path)[0..2] | Out-File $outpath -Append -encoding Default
$newpath | Out-File $outpath -Append -encoding Default
#populate $newfieldnames from the mandatory parameter $newpath
$newfieldNames = @($newpath.Substring("#Fields: ".Length).Split($Delimiter));
foreach($line in Get-Content -Path $Path)
{
# Indentify / parse the log header to determine field names
if($line.StartsWith("#Fields: "))
{
$fieldNames = @($line.Substring("#Fields: ".Length).Split($Delimiter));
}
# Identify / parse the "non log header" lines to determine field values
elseif(-not $line.StartsWith("#"))
{
$logline = ""
$fieldValues = @($line.Split($Delimiter));
#Initialize a hashtable to hold fields and values
#Default value is a hyphen
#Only fields specified in the $newpath parameter are initialized
$output = @{}
foreach ($item in $newfieldnames)
{
switch($item)
{
"date"{ $output.add("date", "-")}
"time"{ $output.add("time", "-")}
"s-ip"{ $output.add("s-ip", "-")}
"cs-method"{ $output.add("cs-method", "-")}
"cs-uri-stem"{ $output.add("cs-uri-stem", "-")}
"cs-uri-query"{ $output.add("cs-uri-query", "-")}
"s-port"{ $output.add("s-port", "-")}
"cs-username"{ $output.add("cs-username", "-")}
"c-ip"{ $output.add("c-ip", "-")}
"cs-version"{ $output.add("cs-version", "-")}
"cs(User-Agent)"{ $output.add("cs(User-Agent)", "-")}
"sc-status"{ $output.add("sc-status", "-")}
"sc-substatus"{ $output.add("sc-substatus", "-")}
"sc-win32-status"{ $output.add("sc-win32-status", "-")}
"sc-bytes"{ $output.add("sc-bytes", "-")}
"time-taken"{ $output.add("time-taken", "-")}
"cs-host"{ $output.add("cs-host", "-")}
"cs(Cookie)"{ $output.add("cs(Cookie)", "-")}
"cs(Referer)"{ $output.add("cs(Referer)", "-")}
"s-sitename"{ $output.add("s-sitename", "-")}
"s-computername"{ $output.add("s-computername", "-")}
"cs-bytes"{ $output.add("cs-bytes", "-")}
}
}
#Add every field from old log file to the $ouptuts hashtable
#Portions of the hash table which are not over written at this point retain the default value (hyphen)
for($i = 0; $i -lt $fieldnames.Length; $i++)
{
$name = $fieldNames[$i]
$value = $fieldValues[$i]
switch($name)
{
"date"{ $output['date'] = $value}
"time"{ $output['time'] = $value}
"s-ip"{ $output['s-ip'] = $value}
"cs-method"{ $output['cs-method'] = $value}
"cs-uri-stem"{ $output['cs-uri-stem'] = $value}
"cs-uri-query"{ $output['cs-uri-query'] = $value}
"s-port"{ $output['s-port'] = $value}
"cs-username"{ $output['cs-username'] = $value}
"c-ip"{ $output['c-ip'] = $value}
"cs-version"{ $output['cs-version'] = $value}
"cs(User-Agent)"{ $output['cs(User-Agent)'] = $value}
"sc-status"{ $output['sc-status'] = $value}
"sc-substatus"{ $output['sc-substatus'] = $value}
"sc-win32-status"{ $output['sc-win32-status'] = $value}
"sc-bytes"{ $output['sc-bytes'] = $value}
"time-taken"{ $output['time-taken'] = $value}
"cs-host"{ $output['cs-host'] = $value}
"cs(Cookie)"{ $output['cs(Cookie)'] = $value}
"cs(Referer)"{ $output['cs(Referer)'] = $value}
"s-sitename"{ $output['s-sitename'] = $value}
"s-computername"{ $output['s-computername'] = $value}
"cs-bytes"{ $output['cs-bytes'] = $value}
}
}
#$output
$linewriter = $null
#Write lines to new log file
#Only call upon keys (from output hash) which correspond to desired $newfieldnames as specified in $newpath parameter.
#Unwanted fields from old log are inherently dropped
#Newly included fields not present in old log are inherently replaced by hypens
foreach ($item in $newfieldnames)
{
$linewriter += $output[$item]
$linewriter += " "
}
$linewriter |%{$_ -replace " $",""}| Out-File $outpath -Append -encoding Default
}
}
}
# usage example
#.\\import-iislog-final.ps1 "C:\\Old Logs\\u_ex120218.log" "#Fields: date time s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Referer) sc-status sc-substatus sc-win32-status sc-bytes time-taken" "C:\\Revised Logs\\u_ex120218.log"
#foreach ($log in (gci "c:\\Old Logs")) {.\\import-iislog-final.ps1 $log.fullname "#Fields: date time s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Referer) sc-status sc-substatus sc-win32-status sc-bytes time-taken" "C:\\Revised Logs\\$log"}
|
combined_dataset/train/non-malicious/Get- ExchangeMBStore.ps1 | Get- ExchangeMBStore.ps1 | Param (
[Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$true)]
[alias("Name","ComputerName")]$Computer=@("xcserver01")
)
process{
$XCinfo = GetXCDatabases $Computer
$XCMaintInfo = GetMBStoreMaintenance $Computer
foreach ($DB in $XCinfo){
try{
$DB.WhiteSpace = $XCMaintInfo[$DB.MB].WhiteSpace
$DB.RetainedMailbox = $XCMaintInfo[$DB.MB].RetainedMailbox
$DB.RetainedMailboxSize = $XCMaintInfo[$DB.MB].RetainedMailboxSize
$DB.DeletedMailbox = $XCMaintInfo[$DB.MB].DeletedMailbox
$DB.DeletedMailboxSize = $XCMaintInfo[$DB.MB].DeletedMailboxSize
$DB.DeletedItems = $XCMaintInfo[$DB.MB].DeletedItems
$DB.DeletedItemsSize = $XCMaintInfo[$DB.MB].DeletedItemsSize
}
catch{
Write-Error $("For " + $Computer + ": " + $($error[0]))
}
}
$Global:XCserverInfo += $XCinfo | select Server, StorageGroup, DatabaseName, Path, FileSize, DeletedMailbox, DeletedMailboxSize, RetainedMailbox, RetainedMailboxSize, DeletedItems, DeletedItemsSize
}
begin{
$Global:XCserverInfo = @()
$Quote = [char]34
Function GetADSIObject ($Name){
write-verbose "get ADSI information for $Name"
$root = [ADSI]'LDAP://RootDSE'
$cfConfigRootpath = "LDAP://" + $root.ConfigurationNamingContext.tostring()
$configRoot = [ADSI]$cfConfigRootpath
$searcher = new-object System.DirectoryServices.DirectorySearcher($configRoot)
$searcher.Filter = '(&(objectCategory=msExchExchangeServer)(cn=' + $Name + '))'
$searchres = $searcher.FindOne()
$snServerEntry = New-Object System.DirectoryServices.directoryentry
$snServerEntry = $searchres.GetDirectoryEntry()
$adsiServer = [ADSI]('LDAP://' + $snServerEntry.DistinguishedName)
return $adsiserver
}
Function GetXCDatabases($XCservername){
$XCDatabases = @()
$XCserver = GetADSIObject $XCservername
write-verbose "get XC DB information for $($XCserver.Name)"
$dfsearcher = new-object System.DirectoryServices.DirectorySearcher($XCserver)
#get all standard mailstores
$dfsearcher.Filter = "(objectCategory=msExchPrivateMDB)"
$srSearchResults = $dfsearcher.FindAll()
#get all public folder stores
$dfsearcher.Filter = "(objectCategory=msExchPublicMDB)"
$srSearchResults += $dfsearcher.FindAll()
foreach ($srSearchResult in $srSearchResults){
$msMailStore = $srSearchResult.GetDirectoryEntry()
$msMailStoreFileName = $msMailStore.msExchEDBFile
$Filter = $msMailStoreFileName -replace '\\\\','\\\\'
write-verbose "getting details for $Filter thru WMI"
$msMailStoreFile = (Gwmi -computername $XCservername -class CIM_DataFile -filter "Name = '$Filter'")
$sgStorageGroup = $msMailStore.psbase.Parent
#skip recovery databases
if ($sgStorageGroup.msExchESEParamBaseName -ne "R00"){
$XCdatabase = New-Object PSObject -Property @{
Server = [string] $XCservername
StorageGroup = [string] $sgStorageGroup.Name
DataBaseName = [string] $msMailStore.Name
MB = "$($sgStorageGroup.Name)\\$($msMailStore.Name)"
Path = [string] $msMailStoreFileName
FileSize = "$([math]::round($msMailStoreFile.FileSize/1048576,0)) MB"
WhiteSpace = ""
RetainedMailbox = ""
RetainedMailboxSize = ""
DeletedMailbox = ""
DeletedMailboxSize = ""
DeletedItems = ""
DeletedItemsSize = ""
}
}
write-verbose "retrieved information for $($XCdatabase.MB)"
$XCDatabases += $XCdatabase
}
return $XCdatabases | sort MB
}
Function GetMBStoreMaintenance ($Computername){
$MBMaintInfo = @{}
$WmidtQueryDT = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime([DateTime]::UtcNow.AddDays(-1))
$Filter = "Logfile='Application' and SourceName = 'MSExchangeIS Mailbox Store' and TimeWritten >='" + $WmidtQueryDT + "'"
$Events = (Get-WmiObject -Computername $ComputerName -class Win32_NTLogEvent -Filter $Filter | sort $_.TimeWritten -Descending)
foreach ($Event in $Events){
write-verbose "getting details of Event $($Event.Eventcode)"
switch ($Event.Eventcode){
'1207'{ #Cleanup Item Recovery
$itemsremovedStart = $Event.Insertionstrings[0]
$itemsremovedSizeStart = $Event.Insertionstrings[1]
$itemsremovedEnd = $Event.Insertionstrings[2]
$itemsremovedSizeEnd = $Event.Insertionstrings[3]
$MB = $Event.Insertionstrings[4]
write-verbose "For: $MB Item Cleanup details"
write-verbose "Begin: $itemsremovedStart items with a total size of $itemsremovedStartSize KB"
write-verbose "End: $itemsremovedEnd items with a total size of $itemsremovedEndSize KB"
if (-not $MBMaintInfo.ContainsKey($MB)){
$MBMaintInfo.add($MB,@{})
$MBMaintInfo.$MB.Name = $MB
}
if (-not $MBMaintInfo.$MB.ContainsKey("DeletedItems")){$MBMaintInfo.$MB.Add("DeletedItems",$itemsremovedEnd)}
if (-not $MBMaintInfo.$MB.ContainsKey("DeletedItemsSize")){$MBMaintInfo.$MB.Add("DeletedItemsSize","$itemsremovedSizeEnd KB")}
}
'1221'{ #Online Defrag Whitespace
$WhiteSpace = $Event.Insertionstrings[0]
$MB = $Event.Insertionstrings[1]
write-verbose "For: $MB Online Defrag details"
write-verbose "Defrag has freed up $WhiteSpace MB"
if (-not $MBMaintInfo.ContainsKey($MB)){
$MBMaintInfo.add($MB,@{})
$MBMaintInfo.$MB.Name = $MB
}
if (-not $MBMaintInfo.$MB.ContainsKey("WhiteSpace")){$MBMaintInfo.$MB.Add("WhiteSpace","$WhiteSpace MB")}
}
'9535'{ #Cleanup Deleted Mailboxes
$mbremoved = $Event.Insertionstrings[0]
$mbremovedSize = $Event.Insertionstrings[1]
$mbretained = $Event.Insertionstrings[2]
$mbretainedSize = $Event.Insertionstrings[3]
$MB = $Event.Insertionstrings[4]
write-verbose "For: $MB Mailbox Cleanup details"
write-verbose "Removed: $mbremoved mailboxes with a total size of $mbremovedSize KB"
write-verbose "Retained: $mbretained mailboxes with a total size of $mbretainedSize KB"
if (-not $MBMaintInfo.ContainsKey($MB)){
$MBMaintInfo.add($MB,@{})
$MBMaintInfo.$MB.Name = $MB
}
if (-not $MBMaintInfo.$MB.ContainsKey("DeletedMailbox")){$MBMaintInfo.$MB.Add("DeletedMailbox",$mbremoved)}
if (-not $MBMaintInfo.$MB.ContainsKey("DeletedMailboxSize")){$MBMaintInfo.$MB.Add("DeletedMailboxSize","$mbremovedSize KB")}
if (-not $MBMaintInfo.$MB.ContainsKey("RetainedMailbox")){$MBMaintInfo.$MB.Add("RetainedMailbox",$mbretained)}
if (-not $MBMaintInfo.$MB.ContainsKey("RetainedMailboxSize")){$MBMaintInfo.$MB.Add("RetainedMailboxSize","$mbretainedSize KB")}
}
'default'{write-verbose "event $($Event.Eventcode) not defined"}
}
}
return $MBMaintInfo | Sort Name
}
}
end{
$Global:XCserverInfo | sort Server, StorageGroup, DatabaseName
}
|
combined_dataset/train/non-malicious/sample_63_67.ps1 | sample_63_67.ps1 | #
# Module manifest for module 'OCI.PSModules.Capacitymanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Capacitymanagement.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '847ff9d9-1cd2-4050-8297-31d3b08d96b0'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Capacitymanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Capacitymanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCICapacitymanagementInternalNamespaceOccOverviewsList',
'Get-OCICapacitymanagementOccAvailabilitiesList',
'Get-OCICapacitymanagementOccAvailabilityCatalog',
'Get-OCICapacitymanagementOccAvailabilityCatalogContent',
'Get-OCICapacitymanagementOccAvailabilityCatalogsInternalList',
'Get-OCICapacitymanagementOccAvailabilityCatalogsList',
'Get-OCICapacitymanagementOccCapacityRequest',
'Get-OCICapacitymanagementOccCapacityRequestsInternalList',
'Get-OCICapacitymanagementOccCapacityRequestsList',
'Get-OCICapacitymanagementOccCustomerGroup',
'Get-OCICapacitymanagementOccCustomerGroupsList',
'Get-OCICapacitymanagementOccOverviewsList',
'Invoke-OCICapacitymanagementPatchInternalOccCapacityRequest',
'Invoke-OCICapacitymanagementPatchOccCapacityRequest',
'Invoke-OCICapacitymanagementPublishOccAvailabilityCatalog',
'New-OCICapacitymanagementOccAvailabilityCatalog',
'New-OCICapacitymanagementOccCapacityRequest',
'Remove-OCICapacitymanagementOccAvailabilityCatalog',
'Remove-OCICapacitymanagementOccCapacityRequest',
'Update-OCICapacitymanagementInternalOccCapacityRequest',
'Update-OCICapacitymanagementOccAvailabilityCatalog',
'Update-OCICapacitymanagementOccCapacityRequest'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Capacitymanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_53_42.ps1 | sample_53_42.ps1 | #
# Module manifest for module 'OCI.PSModules.Ocicontrolcenter'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ocicontrolcenter.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'fc85f17d-35f9-4106-a77a-ccaa291877f6'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ocicontrolcenter Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocicontrolcenter.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOcicontrolcenterMetricPropertiesList',
'Get-OCIOcicontrolcenterNamespacesList',
'Invoke-OCIOcicontrolcenterRequestSummarizedMetricData'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocicontrolcenter'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_61_30.ps1 | sample_61_30.ps1 | #
# Module manifest for module 'OCI.PSModules.Functions'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Functions.dll'
# Version number of this module.
ModuleVersion = '90.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Functions Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList',
'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList',
'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList',
'Get-OCIFunctionsPbfListingVersion',
'Get-OCIFunctionsPbfListingVersionsList',
'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction',
'Move-OCIFunctionsApplicationCompartment',
'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction',
'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction',
'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3787.ps1 | 3787.ps1 |
Param(
[Parameter(Mandatory = $true,
HelpMessage="Name of the resource group to which the KeyVault belongs to. A new resource group with this name will be created if one doesn't exist")]
[ValidateNotNullOrEmpty()]
[string]$resourceGroupName,
[Parameter(Mandatory = $true,
HelpMessage="Name of the KeyVault in which encryption keys are to be placed. A new vault with this name will be created if one doesn't exist")]
[ValidateNotNullOrEmpty()]
[string]$keyVaultName,
[Parameter(Mandatory = $true,
HelpMessage="Location of the KeyVault. Important note: Make sure the KeyVault and VMs to be encrypted are in the same region / location.")]
[ValidateNotNullOrEmpty()]
[string]$location,
[Parameter(Mandatory = $true,
HelpMessage="Identifier of the Azure subscription to be used")]
[ValidateNotNullOrEmpty()]
[string]$subscriptionId,
[Parameter(Mandatory = $false,
HelpMessage="Name of the AAD application that will be used to write secrets to KeyVault. A new application with this name will be created if one doesn't exist. If this app already exists, pass aadClientSecret parameter to the script")]
[ValidateNotNullOrEmpty()]
[string]$aadAppName,
[Parameter(Mandatory = $false,
HelpMessage="Client secret of the AAD application that was created earlier")]
[ValidateNotNullOrEmpty()]
[string]$aadClientSecret,
[Parameter(Mandatory = $false,
HelpMessage="Name of optional key encryption key in KeyVault. A new key with this name will be created if one doesn't exist")]
[ValidateNotNullOrEmpty()]
[string]$keyEncryptionKeyName
)
$VerbosePreference = "Continue"
$ErrorActionPreference = "Stop"
Select-AzSubscription -SubscriptionId $subscriptionId;
if($aadAppName)
{
$SvcPrincipals = (Get-AzADServicePrincipal -SearchString $aadAppName);
if(-not $SvcPrincipals)
{
$identifierUri = [string]::Format("http://localhost:8080/{0}",[Guid]::NewGuid().ToString("N"));
$defaultHomePage = 'http://contoso.com';
$now = [System.DateTime]::Now;
$oneYearFromNow = $now.AddYears(1);
$aadClientSecret = [Guid]::NewGuid().ToString();
Write-Host "Creating new AAD application ($aadAppName)";
$secureAadClientSecret = ConvertTo-SecureString -String $aadClientSecret -AsPlainText -Force;
$ADApp = New-AzADApplication -DisplayName $aadAppName -HomePage $defaultHomePage -IdentifierUris $identifierUri -StartDate $now -EndDate $oneYearFromNow -Password $secureAadClientSecret;
$servicePrincipal = New-AzADServicePrincipal -ApplicationId $ADApp.ApplicationId;
$SvcPrincipals = (Get-AzADServicePrincipal -SearchString $aadAppName);
if(-not $SvcPrincipals)
{
Write-Error "Failed to create AAD app $aadAppName. Please log in to Azure using Connect-AzAccount and try again";
return;
}
$aadClientID = $servicePrincipal.ApplicationId;
Write-Host "Created a new AAD Application ($aadAppName) with ID: $aadClientID ";
}
else
{
if(-not $aadClientSecret)
{
$aadClientSecret = Read-Host -Prompt "Aad application ($aadAppName) was already created, input corresponding aadClientSecret and hit ENTER. It can be retrieved from https://manage.windowsazure.com portal" ;
}
if(-not $aadClientSecret)
{
Write-Error "Aad application ($aadAppName) was already created. Re-run the script by supplying aadClientSecret parameter with corresponding secret from https://manage.windowsazure.com portal";
return;
}
$aadClientID = $SvcPrincipals[0].ApplicationId;
}
}
Try
{
$resGroup = Get-AzResourceGroup -Name $resourceGroupName -ErrorAction SilentlyContinue;
}
Catch [System.ArgumentException]
{
Write-Host "Couldn't find resource group: ($resourceGroupName)";
$resGroup = $null;
}
if (-not $resGroup)
{
Write-Host "Creating new resource group: ($resourceGroupName)";
$resGroup = New-AzResourceGroup -Name $resourceGroupName -Location $location;
Write-Host "Created a new resource group named $resourceGroupName to place keyVault";
}
Try
{
$keyVault = Get-AzKeyVault -VaultName $keyVaultName -ErrorAction SilentlyContinue;
}
Catch [System.ArgumentException]
{
Write-Host "Couldn't find Key Vault: $keyVaultName";
$keyVault = $null;
}
if (-not $keyVault)
{
Write-Host "Creating new key vault: ($keyVaultName)";
$keyVault = New-AzKeyVault -VaultName $keyVaultName -ResourceGroupName $resourceGroupName -Sku Standard -Location $location;
Write-Host "Created a new KeyVault named $keyVaultName to store encryption keys";
}
if($aadAppName)
{
Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ServicePrincipalName $aadClientID -PermissionsToKeys wrapKey -PermissionsToSecrets set;
}
Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -EnabledForDiskEncryption;
Write-Host "Enabling Soft Delete on KeyVault $keyVaultName";
$resource = Get-AzResource -ResourceId $keyVault.ResourceId;
$resource.Properties | Add-Member -MemberType "NoteProperty" -Name "enableSoftDelete" -Value "true" -Force;
Set-AzResource -resourceid $resource.ResourceId -Properties $resource.Properties -Force;
Write-Host "Adding resource lock on KeyVault $keyVaultName";
$lockNotes = "KeyVault may contain AzureDiskEncryption secrets required to boot encrypted VMs";
New-AzResourceLock -LockLevel CanNotDelete -LockName "LockKeyVault" -ResourceName $resource.Name -ResourceType $resource.ResourceType -ResourceGroupName $resource.ResourceGroupName -LockNotes $lockNotes -Force;
$diskEncryptionKeyVaultUrl = $keyVault.VaultUri;
$keyVaultResourceId = $keyVault.ResourceId;
if($keyEncryptionKeyName)
{
Try
{
$kek = Get-AzKeyVaultKey -VaultName $keyVaultName -Name $keyEncryptionKeyName -ErrorAction SilentlyContinue;
}
Catch [Microsoft.Azure.KeyVault.KeyVaultClientException]
{
Write-Host "Couldn't find key encryption key named : $keyEncryptionKeyName in Key Vault: $keyVaultName";
$kek = $null;
}
if(-not $kek)
{
Write-Host "Creating new key encryption key named:$keyEncryptionKeyName in Key Vault: $keyVaultName";
$kek = Add-AzKeyVaultKey -VaultName $keyVaultName -Name $keyEncryptionKeyName -Destination Software -ErrorAction SilentlyContinue;
Write-Host "Created key encryption key named:$keyEncryptionKeyName in Key Vault: $keyVaultName";
}
$keyEncryptionKeyUrl = $kek.Key.Kid;
}
Write-Host "Please note down below details that will be needed to enable encryption on your VMs " -foregroundcolor Green;
if($aadAppName)
{
Write-Host "`t aadClientID: $aadClientID" -foregroundcolor Green;
Write-Host "`t aadClientSecret: $aadClientSecret" -foregroundcolor Green;
}
Write-Host "`t DiskEncryptionKeyVaultUrl: $diskEncryptionKeyVaultUrl" -foregroundcolor Green;
Write-Host "`t DiskEncryptionKeyVaultId: $keyVaultResourceId" -foregroundcolor Green;
if($keyEncryptionKeyName)
{
Write-Host "`t KeyEncryptionKeyURL: $keyEncryptionKeyUrl" -foregroundcolor Green;
Write-Host "`t KeyEncryptionKeyVaultId: $keyVaultResourceId" -foregroundcolor Green;
}
Write-Host "Please Press [Enter] after saving values displayed above. They are needed to enable encryption using Set-AzVmDiskEncryptionExtension cmdlet" -foregroundcolor Green;
Read-Host;
foreach($vm in $allVMs)
{
if($vm.Location.replace(' ','').ToLower() -ne $keyVault.Location.replace(' ','').ToLower())
{
Write-Error "To enable AzureDiskEncryption, VM and KeyVault must belong to same subscription and same region. vm Location: $($vm.Location.ToLower()) , keyVault Location: $($keyVault.Location.ToLower())";
return;
}
Write-Host "Encrypting VM: $($vm.Name) in ResourceGroup: $($vm.ResourceGroupName) " -foregroundcolor Green;
if($aadAppName)
{
if(-not $kek)
{
Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All';
}
else
{
Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -AadClientID $aadClientID -AadClientSecret $aadClientSecret -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All';
}
}
else
{
if(-not $kek)
{
Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All';
}
else
{
Set-AzVMDiskEncryptionExtension -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All';
}
}
Get-AzVmDiskEncryptionStatus -ResourceGroupName $vm.ResourceGroupName -VMName $vm.Name;
}
|
combined_dataset/train/non-malicious/sample_46_7.ps1 | sample_46_7.ps1 | @{
GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @('MSFT_MpPerformanceRecording.psm1')
FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml')
CompatiblePSEditions = @('Desktop', 'Core')
FunctionsToExport = @( 'New-MpPerformanceRecording',
'Get-MpPerformanceReport'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '5.1'
}
# SIG # Begin signature block
# MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5QoGq9EV41ZN5
# fnwNlxKx8aIBP8W7y/AxkQ4SrJmPcKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl
# RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT
# Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5
# eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW
# AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1
# PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD
# s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX
# ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w
# S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
# aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO
# 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j
# cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV
# HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf
# E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L
# fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t
# ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH
# g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1
# et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG
# azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz
# WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw
# DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+
# DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS
# cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/
# OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU
# pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA
# vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA
# AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY
# mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g
# BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH
# AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl
# AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC
# lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz
# /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b
# jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9
# TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b
# 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9
# pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj
# ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol
# Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ
# 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN
# Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w
# 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB
# IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ
# KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB
# gjcCARUwLwYJKoZIhvcNAQkEMSIEICjaAYW6dpF96OECCa1j0HmEWEEdofGluuKS
# KwAnvISeMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa
# gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAaxgs
# 9GkngpovGZ++THpqnZRiAcdPPw0wrkmXHC/WHOqLT1FEVw3B3NMjc818wWbLlYtb
# f3geto2AIEcVBIq3DvZA0nm1OId6pmsER3FzA314dSjj2ln54h5T0r46eX5996i9
# Tm/vT4whBKAfGq98C9cGcCUXqpD8EhB+QjbHfKofqZLSAhtJeo6N8s/mc0MHNSvp
# 2Abh6w1qRt0wRjpByyanYrNSBrpqATFTiq5GQgGRi2/MtB2t1UpMjqw+N2YnBZqR
# laeoHW84Lm2fgeYgm0qdHmsfYDjYYlU+PmPp9Omb2cOIGqhtl/f3zPTJVdzcFDaM
# qnnAonXp99i6JFu3TKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3
# DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB
# BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCs
# NQqhRClUZDXHBEqXRdiBxl3jjjYSt87orYc9z50r3wIGZjOrDNN5GBMyMDI0MDUw
# OTAwNDQ0Ni40MjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJC
# Qy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR
# eDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQEL
# BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5
# WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM
# aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTEl
# MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtcta
# irCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+P
# RsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7
# uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7
# uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77
# +X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMM
# aEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb
# 2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQ
# kK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkW
# hjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA
# 6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz
# 5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4l
# w/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU
# oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z
# b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB
# BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w
# cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j
# cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B
# Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K
# 8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6y
# ZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQW
# kXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj
# 0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAI
# kS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdI
# llsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/
# A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/e6zR98Pkplml
# iO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Z
# daard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8E
# ZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBg
# bQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN
# BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y
# aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC
# AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi
# vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G
# awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm
# ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks
# UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr
# g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B
# mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR
# c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR
# RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR
# lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS
# xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd
# MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa
# voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD
# VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud
# JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR
# PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy
# bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G
# CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix
# BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY
# Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5
# 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU
# hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM
# vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A
# PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN
# n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs
# c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1
# 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g
# MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm
# 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0
# aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMt
# OTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB
# MAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOnmEfEwIhgP
# MjAyNDA1MDgyMzAwMDFaGA8yMDI0MDUwOTIzMDAwMVowdDA6BgorBgEEAYRZCgQB
# MSwwKjAKAgUA6eYR8QIBADAHAgEAAgIW5TAHAgEAAgIUETAKAgUA6edjcQIBADA2
# BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB
# AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAK/QKumm9PKZykw1Polf4lAG3ZzJBOGf
# +2ZXn9mgyaF6JwG4wg6u1mZJBVZaWgrqZVnGmjM2M/NorN2buMqs4MA3flcoFq/j
# B/t0K+UwTZR05VEEPwrfFgLRatoYbpdhbZP5+1WyGJwowH95Rkl9QmwaBHcxn9fB
# PdTr7UHoD/ZJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgfqouKUei
# vGoYDlJ1b7GruEpjOeuL102fiYvJsKcpJnIwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEA
# AAHdMCIEINAKWOVA+P6UX3km3sMfBv/ZT9ljcGdKI2r+/FtcYbEGMA0GCSqGSIb3
# DQEBCwUABIICACsJzxy4Scda6jBN0eADlBvzWwy9Zp9xwOTnIJ6OSs8Pot/8CKR6
# gK4PyJm/PrE2bSFlwtdhu3iMSI4WFTT7CukH/kRxJfOaRhE17rmTneKfu+aaGNWq
# qtaysFPo4kFodXwPW+Z512NcbPbB35vo8BclGQztJFD35LE/41e78y+uPOwTwIEE
# q1p+yhQgGUC9Vh4apCZCKjnyr9CkdTy1e9j6HXJ7ClVuKN0eqJvBQuCKyvtG+iUj
# LF+2et54Y5A5tN0pikuepqjinCNUO2T5EimmOddQCAPV7xkIKdp92wI9ysJ9s53e
# Kh5P9CReTBlnXeJIDZdVHlwqejcysuATt2Gwxck3XtIODamKA8vV6HVAuwe4sHjn
# 69yvvA8L9EtEkD4uf0XLRPG3euRwcXjRTpKHXKVVn4fmNIqow09L5Fh1EiMVAQ8/
# G41kjq2YIocCE2UufrHA7Xa47nRYQiwZLpbWcnrwjzayS5bSK7hmLY6rykViOgR+
# n8PJLke4yYJyTw+qb5xBXqjy60MPoMpwhkupBM1nXWBYeMP+Dud4tMQooD+HoG+n
# qu9Bq6E5C/w6DkwXB0nKidR3D6UKCCdO9/Oi6JtaBGUsoB0R3IU5xX5vMP3F6HwH
# 2JY3UjJzUSLY1IhbISA0zU5kVyvkZD6+YbVhuFDEoFRBhJBYadh+Kwtf
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-WMIVersions_2.ps1 | Get-WMIVersions_2.ps1 | #Requires -Version 2
param ( $Credential, $ComputerName )
# The official way to detect .NET versions is to look at their known location on the hard drive as per
# this article: http://msdn.microsoft.com/en-us/kb/kb00318785.aspx
# thanks to David M (http://twitter.com/makovec) for the WQL
$query = "select name from win32_directory where name like 'c:\\\\windows\\\\microsoft.net\\\\framework\\\\v%'"
$res = Get-WmiObject -query $query -Credential $Credential -ComputerName $ComputerName | ForEach-Object {
Split-Path $_.name -Leaf } | # returns directories
Where-Object { $_ -like 'v*' } | # only include those that start with v
ForEach-Object { [system.version]( $_ -replace "^v" ) } # remove "v" from the string and convert to version object
# Create hashtable with computername and version details
$prop = @{
ComputerName = $ComputerName
V1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 0 } ) { $true } }
V1_1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 1 } ) { $true } }
V2Present = &{ if ( $res | Where-Object { $_.Major -eq 2 -and $_.Minor -eq 0 } ) { $true } }
V3_5Present = &{ if ( $res | Where-Object { $_.Major -eq 3 -and $_.Minor -eq 5 } ) { $true } }
V4Present = &{ if ( $res | Where-Object { $_.Major -eq 4 -and $_.Minor -eq 0 } ) { $true } }
VersionDetails = $res
}
# Create and output PSobject using hashtable
New-Object PSObject -Property $prop
|
combined_dataset/train/non-malicious/sample_12_77.ps1 | sample_12_77.ps1 | ##----------------------------------------------------------------------------
## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved.
##----------------------------------------------------------------------------
# Import string constants
. ./StringConstants.ps1
# Import shared functions and vars
. ./Commonalities.ps1
Stop-Service -Name $ServiceConstants.serviceName
Remove-Service -ServiceToRemove $ServiceConstants.serviceName
# Get temporary scoped Environment variables from ACS component framework
$dataPath = Get-DataPath
$installationPath = Get-InstallationPath
# Remove files when stopped if its an axis path
Remove-AxisDirectory -AxisFilePath $dataPath
Remove-AxisDirectory -AxisFilePath $installationPath
# SIG # Begin signature block
# MIIoIQYJKoZIhvcNAQcCoIIoEjCCKA4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBpzVb2Ni4mr+so
# HX7QJ3UIWzYSPUcVkmMxSFV/IfT8gaCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx
# MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW
# QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0
# aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH
# zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9
# hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB
# UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t
# 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g
# fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu
# j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP
# cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc
# aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI
# KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E
# BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp
# Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5
# NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH
# fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY
# SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs
# X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G
# Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j
# +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB
# Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl
# EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet
# ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF
# xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM
# aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGekwghnl
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF
# AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCC8
# zpn/ICHg5yqsnPKbuMkmlTNOcU8e8bXR5Jl73q3ZXTANBgkqhkiG9w0BAQEFAASC
# AYAl2sJKrfvadGgAzljkTovOfJWLOPdSB0UdoPUMtGpWXjFP9wX+4a+COI6SB2WV
# NPipxUd/yI71SwJ3q3R4rcC/GUbpqKmwSy45R2vsvNrSkYNL7MYTbwaTKj+6hu7m
# vahxwlAX4Mo+8AqOQdSmtcCfdRM8SYGPcOuEQXeJJNRmXSaB/MYw3XrbchR2XsUd
# rxZPQH95UMMbePUbVjIw++qMRKDdS1LDfcJ7pZ14xSehtolNgvvFWwsZJTMbrNvI
# WB5qb5ieuHksn73rWTiiCZbRvVJmXMsypxaTadR2EV8MTsm5+NBHm2uPaF3n+EMw
# PbYGhTx6xKfzSW9kvvkFSCVmum0fxDDWoylpDBrSO7J/dRX/wKc9mBnAE+h/tly/
# GQBNSKBantVMW8TsiUfrhbpbrkyH6D1LkcFigGhlXMt8HuByYAlM2xlWfBk69iTm
# JHe+qJpmse4TYspHhAveTFRCe0gv35PNzbRTWRt5skuTRPkkNDLmgvK4j1sXkuwv
# L8ehghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG9w0BBwKgghcYMIIX
# FAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEEoGgEZjBkAgEBBglg
# hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgN4QSSsXv021u0ZUzk3DINC7AY59k
# wUo0OeF/62eq0GECEEeZ/t0ljquiXcuI5ojj/j4YDzIwMjQwOTIwMDk1NjM4WqCC
# EwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUA
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQG
# EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0
# IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# o1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrd
# ECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLP
# ywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8b
# ZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK
# 1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9
# MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapM
# ZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyq
# q1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8Sdlal
# JPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+
# 8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rx
# KBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4G
# A1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAW
# gBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUx
# o97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29t
# L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy
# bDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp
# Z2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQu
# Y29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NB
# LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN
# 6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3
# aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM
# 2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ
# +OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgm
# agNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doR
# S4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/K
# wtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHL
# FAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquv
# czroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIj
# TvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mt
# kIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3
# DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX
# BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0
# ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJ
# BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln
# aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0Ew
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE
# 8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBML
# JnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU
# 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLy
# dkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFk
# dECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgm
# f6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9a
# bJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwY
# SH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80Vg
# vCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5
# FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9
# Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIB
# ADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7Nfj
# gtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG
# AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au
# ZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy
# dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0
# hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0
# LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcN
# AQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp
# +3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9
# qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8
# ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6Z
# JxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnE
# tp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx
# ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV7
# 7QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT
# 1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkP
# Cr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvm
# fxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCC
# BHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYD
# VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln
# aWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew
# HhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3
# DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZ
# wuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4V
# pX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAd
# YyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3
# T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjU
# N6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNda
# SaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm
# mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyV
# w4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3
# AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYi
# Cd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmp
# sh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7Nfj
# gtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNt
# yA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUG
# A1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2Vy
# dEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3
# DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+Ica
# aVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096ww
# epqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcD
# x4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsg
# jTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37Y
# OtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYD
# VQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lD
# ZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAF
# RK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzEN
# BgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIwMDk1NjM4WjArBgsq
# hkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG
# 9w0BCQQxIgQgZt8I6422OjBF3Oe2n7X+oR0+4i5jijRhBm+me1yoSuUwNwYLKoZI
# hvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQM
# eCgwDQYJKoZIhvcNAQEBBQAEggIAFhZDw4qMwV2oSAC+kS+DXNhnMTiDoeQ+/x8C
# v8f6BQ1HjWk/BAeeCDj/ZCgiC+3z+QgSdm2/Q0mp6M0beLdgplOzLFE3BrcWGHSs
# iEiRkIeTgYZt1048D5Zp7mpGmPJJayi/fTtcuv+mhyJF+3Loug/GZgMGWQdFDTM1
# Zf/Rg8ZdxneqAWbh9P+7KcUi+QWxzQss5wWHeGsOb3r3ayCVlC6iRqE2pXAOyEkb
# D60qnwQ7nOKjikfs6IrLTHFh6KWKpKzD6yvAKEekEiJRRZPpvIsndLZ2sjt//Fy8
# mo73CXdKs3jty6iJgnwRrStxItss+03xX4JApM04Nzv70CSqTW9b4dZQRB42kP4Y
# 8Q0lliGGKzmDBr+neaDWEwYIBOYfP0i3hGaTvlqozLfNgKns7ZRmLXnWHgcdLKWo
# QXiLf9Lvk1H51l95d9HL2pYS1BoDeKeGt67yajOdp1AwJqPbfs6QOxkSRYbhVHuF
# zLGPnLdLwWgjL9npI92hNIQfP6luvfPC9We0XWl0DhnNzTGs5ketXF9/E4Nhj1Qf
# xq+Uezd7JznsCH4k7IUemAnVtT0FBYs8DcbzCZwFlzC5WmBnud/LiV+WD/O8YGI4
# IDepEkd/SMDe8WcbmV1od+L564mKxbqYE7TxK+git8OfmaBcB7GO27xRcCsBl5Y8
# IdIE+bU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_8_7.ps1 | sample_8_7.ps1 | @{
GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-Acl", "Set-Acl", "Get-PfxCertificate", "Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "Get-AuthenticodeSignature", "Set-AuthenticodeSignature", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-CmsMessage", "Unprotect-CmsMessage", "Protect-CmsMessage" , "New-FileCatalog" , "Test-FileCatalog"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD++xTkW7oivoiQ
# gqU/R85f/MwSI1hVEeaegSriXP6+BqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFh1eRlM7vpfcyNRhGD2p01b
# 7R1UWqEpDNm2QYTPq7fWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAMRTpJFtQXp8dB2qwtspSYtVsdb3LigCOQf6YLm8YcybLMDFEodZ1AnYW
# bvIBMx+xC7nEdaovVvLufneNAwpmQoz5U3oY5azDJP7Epqf/ULiBdh4NKztiVaRg
# zI9olhtJhcCcQRDhOcXCsuJxq73Vi76ibCArt1QKMXhxWvZPfDlvQbp30ppaqaU/
# Dm3jlJ/XAN4wiSrPNjdpRG8sU+RUTBz043HjNBUk5y4/BZT/WWIJtGZ5f3ksXIIi
# qTZUiRnwWLKWwMurfa2Os7tIi5lwlPj9uikYomS7ySsaPuhm7CpR2S/niAKHxr26
# NilmmZTBfOnpQoKXN5IwVfn9xCEQ/qGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCpSGZOV1rkmMcR+xJ3U9Qs29ie/rp0GKMzn1kdnWWx2wIGZwfraroD
# GBMyMDI0MTAxNjE4MjcxOC45MTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpSYjAiGA8yMDI0MTAxNjE0NTUz
# MFoYDzIwMjQxMDE3MTQ1NTMwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqulJi
# AgEAMAoCAQACAgPRAgH/MAcCAQACAh0+MAoCBQDqu6PiAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAHQbttDwVR794xiQd2p8+NLUv3933V2n+D2JAsA1z531
# 1N0q7uVJM4NYxiCxcL30EJtnN2M3CaClr+r/02ipbiwsG98G4E0u4JtzoIA6m77k
# B/nLoop0pnuRB7NFdUAsLTe1On0ocS31jjaK630e1S6slt3dBf+8sTaJpdYuCkO7
# Zf199KHBNqLTj9Z5LiRrgZLRDdwVYqDiouOuwrGj2wYwCR9B8qJSUms5gbOI19+P
# JT4f/eC4Dd3LAfzz0HYcnPgKtmLQncNlISUvUnOWYPjRjJBt+xbNMHWe37Z0FDoo
# 4kYNBSo91Dp7avxRLYgDYCLhO3B5fs25lLRQo5LQr7sxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCB9B7W5zjIi7fAxstr1bvAnL3ok3sR4LqYIVvZ1QR1D
# LjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQg+uMbsqvcZ/jcMOOmPy0C1nGa
# qZqkCTFfXvAWn3rEsYYwDQYJKoZIhvcNAQELBQAEggIAALATnhOR+e8Vg78bHdbe
# 2EfRVxyhRaysyU6HNUMEhfYNLdBSmNSPLPm8sJ9SJR/FO9dZL3ono0z+HZlzFVsk
# bF+RFQYgF+UwxgoMuRQ6YY8MSSGLg/Eoq4GcitY7Vis4Fxuhi366TlhkKtWWSb0Y
# WR39YYiOoYgfM3UNd4dw1DNegw6Fy78NSYY32vXLfigfAjZFNGq0oKBFR1PSiFgK
# 5emr03GmGP875ltCI8rSQWoLyAAOc1WT2U3D/xMMU11nacvoNRSIkTIu8npHJaGK
# t2i8CgTnvWFKXge4IupmdN2pC/5tqSKZjfGISBNReWIhTR++BMvx/Dh07Aqzbt0x
# zgwbujxYAiMZL4dFbSHuAi+t7BxJyW5yT1qE7J0TYVcBldo812XiKxZS6DQF9Mig
# pwts+uZichngLE8pQOvWc5NLM+NesjN0glaSb/RyuK8yUTWM+FfPKdkcnqMa4zxq
# xIlJ8y1x1E8SMEcxkyn9drrl7B2pjC3ev9YtBNjXQwptTgBhNFPo3B8EKZkcHd82
# dD2OWAB86DtJyChW4jLFRl6OLDmRN29bZY0CEzv70mvdCB99gAeWueoJKrhqgHdm
# oQsUbcfnOUIZ41lqFGAL1zGOjDUSVfteOtPgZ9E+jCf5bE2QX+hSOHlay4X3FrX2
# wWNSBi8J4JanTwtRj9n11Ig=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_35_75.ps1 | sample_35_75.ps1 | (self.webpackChunkshell_app=self.webpackChunkshell_app||[]).push([[179,429],{4174:(W,F,d)=>{"use strict";d.d(F,{X:()=>f});var u=d(8714);let f=(()=>{class s{static themeStorageKey="msft.sme.shell-assetManager-theme";static defaultTheme="light";static darkTheme="dark";static assets;static get theme(){const c=MsftSme.LocalStorageHandler.getItem(s.themeStorageKey);return s.ensureValidTheme(c)}static set theme(c){c=s.ensureValidTheme(c),MsftSme.LocalStorageHandler.setItem(s.themeStorageKey,c),u.R.assetManager.setTheme(c)}static getBaseLocationPath(c,N=!0){const m=MsftSme.self();return`${m.Host.isWeb||"http:"===location.protocol?window.location.origin:m.Environment.loadPath}/${c}${N?`?v=${m.Environment.version}`:""}`}static getAssetLocationPath(c){return this.getBaseLocationPath(`assets/styles/${c}`)}static getLibraryLocationPath(c){return this.getBaseLocationPath(`external/${c}`,!1)}static initialize(c){u.R.localizationManager.getLocaleId();const m=MsftSme.getLocationSearchParameter("theme");m&&(s.theme=m.value),s.configureWithBrowserTheme(),s.assets={css:[s.getAssetLocationPath("fonts.css")],cssV2:[s.getAssetLocationPath("fonts.css")],js:[]},u.R.assetManager.loadAssets(s.theme,s.assets);const E=MsftSme.self();E.Resources.assets.css.push(s.getAssetLocationPath("main.css")),E.Resources.assets.cssV2.push(s.getAssetLocationPath("main-v2.css")),E.Resources.assets.js.push(),E.Resources.lib={monaco:{"0.17.1":this.getLibraryLocationPath("monaco/0.17.1/vs"),"0.36.1":this.getLibraryLocationPath("monaco/0.36.1/vs")},jsll:{"4.2.18":this.getLibraryLocationPath("jsll/4.2.18/")}}}static ensureValidTheme(c){const N=[s.defaultTheme,s.darkTheme];return(MsftSme.isNullOrWhiteSpace(c)||N.every(m=>m!==c))&&(c=s.defaultTheme),c}static configureWithBrowserTheme(){!MsftSme.LocalStorageHandler.getItem(s.themeStorageKey)&&window.matchMedia&&window.matchMedia("(prefers-color-scheme: dark)").matches&&(s.theme=s.darkTheme)}}return s})()},3905:(W,F,d)=>{"use strict";d.d(F,{c:()=>u});class u{static get element(){return document.getElementById("sme-splash")}static get progress(){return document.getElementById("sme-splash-progress")}static get message(){return document.getElementById("sme-splash-message")}static get errorElement(){return document.getElementById("sme-splash-error")}static get errorResponse(){return document.getElementById("sme-splash-error-response-message")}static setProgressValue(s,b){if(u.progress){const c=Number(s);if(isNaN(c))return;const N=Number(u.progress.getAttribute("value"));if(!isNaN(N)&&c<N)return;u.progress.setAttribute("value",s),u.progress.setAttribute("aria-valuenow",s),u.message.innerText=b}}static complete(){if(!u.element)return;const s=MsftSme.getStrings();u.setProgressValue("100",s.MsftSmeShell.App.Splash.Messages.applicationReady),u.element.remove()}static aadSsoError(s){u.element&&(u.errorElement.style.display="inline",u.message.style.display="none",u.errorResponse.innerHTML=s)}}},3054:(W,F,d)=>{"use strict";var u;d.d(F,{B:()=>u}),function(f){let s,b,c,N;var m;f.module="Microsoft.SME.Shell",f.resourceName="MsftSmeShell",f.powerShellPrefix="WACSH",f.Get_CimWin32OperatingSystem={command:"Get-CimWin32OperatingSystem",script:"##Get-CimWin32OperatingSystem##:Get-CimWin32OperatingSystem.ps1\nimport-module CimCmdlets\nGet-CimInstance -Namespace root/cimv2 -ClassName Win32_OperatingSystem\n"},(s=f.Internal||(f.Internal={})).Get_SystemLockdownPolicy={command:"Get-SystemLockdownPolicy",script:"##Get-SystemLockdownPolicy##:Get-SystemLockdownPolicy.ps1\nreturn [System.Management.Automation.Security.SystemPolicy]::GetSystemLockdownPolicy().ToString()\n"},(m=b=f.Azure||(f.Azure={})).Set_AzureHybridManagement={command:"Set-AzureHybridManagement",script:'##Set-AzureHybridManagement##:Set-AzureHybridManagement.ps1\nparam (\n[Parameter(Mandatory = $true)]\n[String]\n$subscriptionId,\n[Parameter(Mandatory = $true)]\n[String]\n$resourceGroup,\n[Parameter(Mandatory = $true)]\n[String]\n$tenantId,\n[Parameter(Mandatory = $true)]\n[String]\n$azureRegion,\n[Parameter(Mandatory = $true)]\n[boolean]\n$useProxyServer,\n[Parameter(Mandatory = $false)]\n[String]\n$proxyServerIpAddress,\n[Parameter(Mandatory = $false)]\n[String]\n$proxyServerIpPort,\n[Parameter(Mandatory = $true)]\n[string]\n$authToken,\n[Parameter(Mandatory = $true)]\n[string]\n$correlationId\n)\nSet-StrictMode -Version 5.0\nfunction setupScriptEnv() {\nSet-Variable -Name LogName -Option ReadOnly -Value "Microsoft-ServerManagementExperience" -Scope Script\nSet-Variable -Name LogSource -Option ReadOnly -Value "SMEScript" -Scope Script\nSet-Variable -Name ScriptName -Option ReadOnly -Value "Set-HybridManagement.ps1" -Scope Script\nSet-Variable -Name Machine -Option ReadOnly -Value "Machine" -Scope Script\nSet-Variable -Name HybridAgentFile -Option ReadOnly -Value "AzureConnectedMachineAgent.msi" -Scope Script\nSet-Variable -Name HybridAgentPackageLink -Option ReadOnly -Value "https://aka.ms/AzureConnectedMachineAgent" -Scope Script\nSet-Variable -Name HybridAgentExecutable -Option ReadOnly -Value "$env:ProgramFiles\\AzureConnectedMachineAgent\\azcmagent.exe" -Scope Script\nSet-Variable -Name HttpsProxy -Option ReadOnly -Value "https_proxy" -Scope Script\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name LogName -Scope Script -Force\nRemove-Variable -Name LogSource -Scope Script -Force\nRemove-Variable -Name ScriptName -Scope Script -Force\nRemove-Variable -Name Machine -Scope Script -Force\nRemove-Variable -Name HybridAgentFile -Scope Script -Force\nRemove-Variable -Name HybridAgentPackageLink -Scope Script -Force\nRemove-Variable -Name HybridAgentExecutable -Scope Script -Force\nRemove-Variable -Name HttpsProxy -Scope Script -Force\n}\nfunction main(\n[string]$subscriptionId,\n[string]$resourceGroup,\n[string]$tenantId,\n[string]$azureRegion,\n[boolean]$useProxyServer,\n[string]$proxyServerIpAddress,\n[string]$proxyServerIpPort,\n[string]$authToken,\n[string]$correlationId\n) {\n$err = $null\n$args = @{}\nInvoke-WebRequest -Uri $HybridAgentPackageLink -OutFile $HybridAgentFile -ErrorAction SilentlyContinue -ErrorVariable +err\nif ($err) {\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]:Couldn\'t download the hybrid management package. Error: $err" -ErrorAction SilentlyContinue\nWrite-Error @($err)[0]\nreturn @()\n}\nmsiexec /i $HybridAgentFile /l*v installationlog.txt /qn | Out-String -ErrorAction SilentlyContinue -ErrorVariable +err\nif ($err) {\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]:Error while installing the hybrid agent package. Error: $err" -ErrorAction SilentlyContinue\nWrite-Error @($err)[0]\nreturn @()\n}\nif ($useProxyServer) {\n[System.Environment]::SetEnvironmentVariable($HttpsProxy, $proxyServerIpAddress+\':\'+$proxyServerIpPort, $Machine)\n$env:https_proxy = [System.Environment]::GetEnvironmentVariable($HttpsProxy, $Machine)\n}\n& $HybridAgentExecutable connect --resource-group $resourceGroup --tenant-id $tenantId --location $azureRegion `\n--subscription-id $subscriptionId --access-token $authToken --correlation-id $correlationId\nRestart-Service -Name himds -ErrorAction SilentlyContinue -ErrorVariable +err\nif ($err) {\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]:Couldn\'t restart the himds service. Error: $err" -ErrorAction SilentlyContinue\nWrite-Error @($err)[0]\nreturn $err\n}\n}\nsetupScriptEnv\ntry {\nMicrosoft.PowerShell.Management\\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue\nreturn main $subscriptionId $resourceGroup $tenantId $azureRegion $useProxyServer $proxyServerIpAddress $proxyServerIpPort $authToken $correlationId\n} finally {\ncleanupScriptEnv\n}\n'},m.Test_ScriptCanBeRun={command:"Test-ScriptCanBeRun",script:"##Test-ScriptCanBeRun##:Test-ScriptCanBeRun.ps1\nparam(\n[Parameter(Mandatory = $True)]\n[string]\n$nodeName\n)\nreturn @{ ScriptCanRun = $true }\n"},function(m){m.Disable_CredSspClientRole={command:"Disable-CredSspClientRole",script:'##Disable-CredSspClientRole##:Disable-CredSspClientRole.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\n}\nfunction getCredSSPClientEnabled() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction disableCredSSP() {\n$err = $null\n$result = Disable-WSManCredSSP -Role Client -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction main() {\nsetupScriptEnv\ntry {\nif (getCredSSPClientEnabled) {\n$err = disableCredSSP\nif ($err) {\nif (getCredSSPClientEnabled) {\nthrow @($err)[0]\n}\n}\n}\n} catch {\nWrite-Error $_.Exception.Message\nthrow $_.Exception.Message\n} finally {\ncleanupScriptEnv\n}\nreturn $true\n}\n$results = $null\nif (-not ($env:pester)) {\n$results = main\n}\nreturn $results\n'},m.Disable_CredSspManagedServer={command:"Disable-CredSspManagedServer",script:'##Disable-CredSspManagedServer##:Disable-CredSspManagedServer.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction getCredSSPClientEnabled() {\nSet-Variable credSSPClientPath -Option Constant -Value "WSMan:\\localhost\\Client\\Auth\\CredSSP" -ErrorAction SilentlyContinue\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $credSSPClientPath -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction disableCredSSPClientRole() {\n$err = $null\n$result = Disable-WSManCredSSP -Role Client -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction disableCredSSPClient() {\nif (-not (getCredSSPClientEnabled)) {\nreturn $null\n}\n$err = disableCredSSPClientRole\nif ($err) {\nif (-not (getCredSSPClientEnabled)) {\nreturn $null\n}\nreturn $err\n}\nreturn $null\n}\nfunction getCredSSPServerEnabled() {\nSet-Variable credSSPServicePath -Option Constant -Value "WSMan:\\localhost\\Service\\Auth\\CredSSP" -ErrorAction SilentlyContinue\n$credSSPServerEnabled = $false;\n$credSSPServerService = Get-Item $credSSPServicePath -ErrorAction SilentlyContinue\nif ($credSSPServerService) {\n$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)\n}\nreturn $credSSPServerEnabled\n}\nfunction disableCredSSPServerRole() {\n$err = $null\n$result = Disable-WSManCredSSP -Role Server -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction disableCredSSPServer() {\nif (-not (getCredSSPServerEnabled)) {\nreturn $null\n}\n$err = disableCredSSPServerRole\nif ($err) {\nif (-not (getCredSSPServerEnabled)) {\nreturn $null\n}\nreturn $err\n}\nreturn $null\n}\nfunction main() {\n$err = disableCredSSPServer\nif ($err) {\nthrow $err\n}\n$err = disableCredSSPClient\nif ($err) {\nthrow $err\n}\nreturn $true\n}\nif (-not ($env:pester)) {\nreturn main\n}\n'},m.Enable_CredSSPClientRole={command:"Enable-CredSSPClientRole",script:'##Enable-CredSSPClientRole##:Enable-CredSSPClientRole.ps1\nparam (\n[Parameter(Mandatory=$True)]\n[string[]]$serverNames\n)\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\nSet-Variable -Name CredentialsDelegationPolicyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation"\nSet-Variable -Name AllowFreshCredentialsPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation\\AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation\\AllowFreshCredentialsWhenNTLMOnly"\nSet-Variable -Name AllowFreshCredentialsPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentialsWhenNTLMOnly"\nSet-Variable -Name TypeAlreadyExistsHResult -Option ReadOnly -Scope Script -Value -2146233088\n Set-Variable -Name NativeCode -Option ReadOnly -Scope Script -Value @"\n using Microsoft.Win32;\n using System;\n using System.Collections.Generic;\n using System.Globalization;\n using System.Linq;\n using System.Runtime.InteropServices;\n using System.Text;\n using System.Threading;\n \n namespace SME\n {\n public static class LocalGroupPolicy\n {\n [Guid("EA502722-A23D-11d1-A7D3-0000F87571E3")]\n [ComImport]\n [ClassInterface(ClassInterfaceType.None)]\n public class GPClass\n {\n }\n \n [ComImport, Guid("EA502723-A23D-11d1-A7D3-0000F87571E3"),\n InterfaceType(ComInterfaceType.InterfaceIsIUnknown)]\n public interface IGroupPolicyObject\n {\n void New(\n [MarshalAs(UnmanagedType.LPWStr)] string pszDomainName,\n [MarshalAs(UnmanagedType.LPWStr)] string pszDisplayName,\n uint dwFlags);\n \n void OpenDSGPO(\n [MarshalAs(UnmanagedType.LPWStr)] string pszPath,\n uint dwFlags);\n \n void OpenLocalMachineGPO(uint dwFlags);\n \n void OpenRemoteMachineGPO(\n [MarshalAs(UnmanagedType.LPWStr)] string pszComputerName,\n uint dwFlags);\n \n void Save(\n [MarshalAs(UnmanagedType.Bool)] bool bMachine,\n [MarshalAs(UnmanagedType.Bool)] bool bAdd,\n [MarshalAs(UnmanagedType.LPStruct)] Guid pGuidExtension,\n [MarshalAs(UnmanagedType.LPStruct)] Guid pGuid);\n \n void Delete();\n \n void GetName(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszName,\n int cchMaxLength);\n \n void GetDisplayName(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszName,\n int cchMaxLength);\n \n void SetDisplayName(\n [MarshalAs(UnmanagedType.LPWStr)] string pszName);\n \n void GetPath(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszPath,\n int cchMaxPath);\n \n void GetDSPath(\n uint dwSection,\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszPath,\n int cchMaxPath);\n \n void GetFileSysPath(\n uint dwSection,\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszPath,\n int cchMaxPath);\n \n IntPtr GetRegistryKey(uint dwSection);\n \n uint GetOptions();\n \n void SetOptions(uint dwOptions, uint dwMask);\n \n void GetMachineName(\n [MarshalAs(UnmanagedType.LPWStr)] StringBuilder pszName,\n int cchMaxLength);\n \n uint GetPropertySheetPages(out IntPtr hPages);\n }\n \n private const int GPO_OPEN_LOAD_REGISTRY = 1;\n private const int GPO_SECTION_MACHINE = 2;\n private const string ApplicationName = @"wsman";\n private const string AllowFreshCredentials = @"AllowFreshCredentials";\n private const string AllowFreshCredentialsWhenNTLMOnly = @"AllowFreshCredentialsWhenNTLMOnly";\n private const string ConcatenateDefaultsAllowFresh = @"ConcatenateDefaults_AllowFresh";\n private const string PathCredentialsDelegationPath = @"SOFTWARE\\Policies\\Microsoft\\Windows";\n private const string GPOpath = @"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Group Policy Objects";\n private const string Machine = @"Machine";\n private const string CredentialsDelegation = @"\\CredentialsDelegation";\n private const string PoliciesPath = @"Software\\Policies\\Microsoft\\Windows";\n private const string BackSlash = @"\\";\n \n public static string EnableAllowFreshCredentialsPolicy(string[] serverNames, bool hasNTLMOnlyUpdateBeenMade)\n {\n if (Thread.CurrentThread.GetApartmentState() == ApartmentState.STA)\n {\n return EnableAllowFreshCredentialsPolicyImpl(serverNames, hasNTLMOnlyUpdateBeenMade);\n }\n else\n {\n string value = null;\n \n var thread = new Thread(() =>\n {\n value = EnableAllowFreshCredentialsPolicyImpl(serverNames, hasNTLMOnlyUpdateBeenMade);\n });\n \n thread.SetApartmentState(ApartmentState.STA);\n thread.Start();\n thread.Join();\n \n return value;\n }\n }\n \n public static string RemoveServersFromAllowFreshCredentialsPolicy(string[] serverNames)\n {\n if (Thread.CurrentThread.GetApartmentState() == ApartmentState.STA)\n {\n return RemoveServersFromAllowFreshCredentialsPolicyImpl(serverNames);\n }\n else\n {\n string value = null;\n \n var thread = new Thread(() =>\n {\n value = RemoveServersFromAllowFreshCredentialsPolicyImpl(serverNames);\n });\n \n thread.SetApartmentState(ApartmentState.STA);\n thread.Start();\n thread.Join();\n \n return value;\n }\n }\n \n private static string EnableAllowFreshCredentialsPolicyImpl(string[] serverNames, bool hasNTLMOnlyUpdateBeenMade)\n {\n IGroupPolicyObject gpo = (IGroupPolicyObject)new GPClass();\n gpo.OpenLocalMachineGPO(GPO_OPEN_LOAD_REGISTRY);\n \n var KeyHandle = gpo.GetRegistryKey(GPO_SECTION_MACHINE);\n \n try\n {\n var rootKey = Registry.CurrentUser;\n \n using (RegistryKey GPOKey = rootKey.OpenSubKey(GPOpath, true))\n {\n foreach (var keyName in GPOKey.GetSubKeyNames())\n {\n if (keyName.EndsWith(Machine, StringComparison.OrdinalIgnoreCase))\n {\n var key = GPOpath + BackSlash + keyName + BackSlash + PoliciesPath;\n \n UpdateGpoRegistrySettingsAllowFreshCredentials(ApplicationName, serverNames, Registry.CurrentUser, key, hasNTLMOnlyUpdateBeenMade);\n }\n }\n }\n \n //saving gpo settings\n gpo.Save(true, true, new Guid("35378EAC-683F-11D2-A89A-00C04FBBCFA2"), new Guid("7A9206BD-33AF-47af-B832-D4128730E990"));\n }\n catch (Exception ex)\n {\n return ex.Message;\n }\n finally\n {\n KeyHandle = IntPtr.Zero;\n }\n \n return null;\n }\n \n private static string RemoveServersFromAllowFreshCredentialsPolicyImpl(string[] serverNames)\n {\n IGroupPolicyObject gpo = (IGroupPolicyObject)new GPClass();\n gpo.OpenLocalMachineGPO(GPO_OPEN_LOAD_REGISTRY);\n \n var KeyHandle = gpo.GetRegistryKey(GPO_SECTION_MACHINE);\n \n try\n {\n var rootKey = Registry.CurrentUser;\n \n using (RegistryKey GPOKey = rootKey.OpenSubKey(GPOpath, true))\n {\n foreach (var keyName in GPOKey.GetSubKeyNames())\n {\n if (keyName.EndsWith(Machine, StringComparison.OrdinalIgnoreCase))\n {\n var key = GPOpath + BackSlash + keyName + BackSlash + PoliciesPath;\n \n UpdateGpoRegistrySettingsRemoveServersFromFreshCredentials(ApplicationName, serverNames, Registry.CurrentUser, key);\n }\n }\n }\n \n //saving gpo settings\n gpo.Save(true, true, new Guid("35378EAC-683F-11D2-A89A-00C04FBBCFA2"), new Guid("7A9206BD-33AF-47af-B832-D4128730E990"));\n }\n catch (Exception ex)\n {\n return ex.Message;\n }\n finally\n {\n KeyHandle = IntPtr.Zero;\n }\n \n return null;\n }\n \n private static void UpdateGpoRegistrySettingsAllowFreshCredentials(string applicationName, string[] serverNames, RegistryKey rootKey, string registryPath, bool hasNTLMOnlyUpdateBeenMade)\n {\n var registryPathCredentialsDelegation = registryPath + CredentialsDelegation;\n var credentialDelegationKey = rootKey.OpenSubKey(registryPathCredentialsDelegation, true);\n \n try\n {\n if (credentialDelegationKey == null)\n {\n credentialDelegationKey = rootKey.CreateSubKey(registryPathCredentialsDelegation, RegistryKeyPermissionCheck.ReadWriteSubTree);\n }\n \n credentialDelegationKey.SetValue(AllowFreshCredentials, 1, RegistryValueKind.DWord);\n credentialDelegationKey.SetValue(ConcatenateDefaultsAllowFresh, 1, RegistryValueKind.DWord);\n }\n finally\n {\n credentialDelegationKey.Dispose();\n credentialDelegationKey = null;\n }\n \n var allowFreshCredentialKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentials, true);\n \n try\n {\n\n if (allowFreshCredentialKey == null)\n {\n allowFreshCredentialKey = rootKey.CreateSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentials, RegistryKeyPermissionCheck.ReadWriteSubTree);\n }\n\n if (allowFreshCredentialKey != null)\n {\n var values = allowFreshCredentialKey.ValueCount;\n var valuesToAdd = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialKey.GetValueNames();\n var existingValues = new Dictionary<string, string>(StringComparer.OrdinalIgnoreCase);\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialKey.GetValue(valueName).ToString();\n \n if (!existingValues.ContainsKey(value))\n {\n existingValues.Add(value, value);\n }\n }\n \n foreach (var key in valuesToAdd.Keys)\n {\n if (!existingValues.ContainsKey(key))\n {\n allowFreshCredentialKey.SetValue(Convert.ToString(values + 1, CultureInfo.InvariantCulture), key, RegistryValueKind.String);\n values++;\n }\n }\n }\n }\n finally\n {\n allowFreshCredentialKey.Dispose();\n allowFreshCredentialKey = null;\n }\n\n if (hasNTLMOnlyUpdateBeenMade) {\n var allowFreshCredentialWhenNTLMOnlyKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentialsWhenNTLMOnly, true);\n \n try\n {\n\n if (allowFreshCredentialWhenNTLMOnlyKey == null)\n {\n allowFreshCredentialWhenNTLMOnlyKey = rootKey.CreateSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentialsWhenNTLMOnly, RegistryKeyPermissionCheck.ReadWriteSubTree);\n }\n\n if (allowFreshCredentialWhenNTLMOnlyKey != null)\n {\n var values = allowFreshCredentialWhenNTLMOnlyKey.ValueCount;\n var valuesToAdd = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialWhenNTLMOnlyKey.GetValueNames();\n var existingValues = new Dictionary<string, string>(StringComparer.OrdinalIgnoreCase);\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialWhenNTLMOnlyKey.GetValue(valueName).ToString();\n \n if (!existingValues.ContainsKey(value))\n {\n existingValues.Add(value, value);\n }\n }\n \n foreach (var key in valuesToAdd.Keys)\n {\n if (!existingValues.ContainsKey(key))\n {\n allowFreshCredentialWhenNTLMOnlyKey.SetValue(Convert.ToString(values + 1, CultureInfo.InvariantCulture), key, RegistryValueKind.String);\n values++;\n }\n }\n }\n }\n finally\n {\n allowFreshCredentialWhenNTLMOnlyKey.Dispose();\n allowFreshCredentialWhenNTLMOnlyKey = null;\n }\n }\n }\n \n private static void UpdateGpoRegistrySettingsRemoveServersFromFreshCredentials(string applicationName, string[] serverNames, RegistryKey rootKey, string registryPath)\n {\n var registryPathCredentialsDelegation = registryPath + CredentialsDelegation;\n \n using (var allowFreshCredentialKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentials, true))\n {\n if (allowFreshCredentialKey != null)\n {\n var valuesToRemove = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialKey.GetValueNames();\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialKey.GetValue(valueName).ToString();\n \n if (valuesToRemove.ContainsKey(value))\n {\n allowFreshCredentialKey.DeleteValue(valueName);\n }\n }\n }\n }\n\n using (var allowFreshCredentialWhenNTLMOnlyKey = rootKey.OpenSubKey(registryPathCredentialsDelegation + BackSlash + AllowFreshCredentialsWhenNTLMOnly, true))\n {\n if (allowFreshCredentialWhenNTLMOnlyKey != null)\n {\n var valuesToRemove = serverNames.ToDictionary(key => string.Format(CultureInfo.InvariantCulture, @"{0}/{1}", applicationName, key), value => value);\n var valueNames = allowFreshCredentialWhenNTLMOnlyKey.GetValueNames();\n \n foreach (var valueName in valueNames)\n {\n var value = allowFreshCredentialWhenNTLMOnlyKey.GetValue(valueName).ToString();\n \n if (valuesToRemove.ContainsKey(value))\n {\n allowFreshCredentialWhenNTLMOnlyKey.DeleteValue(valueName);\n }\n }\n }\n }\n }\n }\n }\n"@ # Cannot have leading whitespace on this line!\n}\n\n<#\n\n.SYNOPSIS\nClean up all added global variables, constants, etc.\n\n.DESCRIPTION\nClean up all added global variables, constants, etc.\n\n#>\n\nfunction cleanupScriptEnv() {\n Remove-Variable -Name WsManApplication -Scope Script -Force\n Remove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\n Remove-Variable -Name CredentialsDelegationPolicyPath -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsPath -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPath -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsPropertyName -Scope Script -Force\n Remove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Scope Script -Force\n Remove-Variable -Name TypeAlreadyExistsHResult -Scope Script -Force\n Remove-Variable -Name NativeCode -Scope Script -Force\n}\n\n<#\n\n.SYNOPSIS\nEnable CredSSP client role on this computer.\n\n.DESCRIPTION\nEnable the CredSSP client role on this computer. This computer should be a \nWindows Admin Center gateway, desktop or service mode.\n\n#>\n\nfunction enableCredSSPClient() {\n $path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n\n Set-Item -Path $path True -Force -ErrorAction SilentlyContinue -ErrorVariable +err\n\n return $err\n}\n\n<#\n\n.SYNOPSIS\nGet if CredSSP is enabled on client.\n\n.DESCRIPTION\nGet if CredSSP is enabled on client for client role.\n\n#>\n\nfunction getCredSSPClientEnabled() {\n $credSSPClientEnabled = $false;\n\n $path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n $credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\n\n if ($credSSPClientService) {\n $credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n }\n\n return $credSSPClientEnabled\n}\n\n<#\n\n.SYNOPSIS\nGet the CredentialsDelegation container from the registry.\n\n.DESCRIPTION\nGet the CredentialsDelegation container from the registry. If the container\ndoes not exist then a new one will be created.\n\n#>\n\nfunction getCredentialsDelegationItem() {\n $credentialDelegationItem = Get-Item $CredentialsDelegationPolicyPath -ErrorAction SilentlyContinue\n if (-not ($credentialDelegationItem)) {\n $credentialDelegationItem = New-Item $CredentialsDelegationPolicyPath\n }\n\n return $credentialDelegationItem\n}\n\n<#\n\n.SYNOPSIS\nCreates the CredentialsDelegation\\AllowFreshCredentials / CredentialsDelegation\\AllowFreshCredentialsWhenNTLMOnly container from the registry.\n\n.DESCRIPTION\nCreate the CredentialsDelegation\\AllowFreshCredentials / CredentialsDelegation\\AllowFreshCredentialsWhenNTLMOnly container from the registry. If the container\ndoes not exist then a new one will be created.\n\n#>\n\nfunction createCredentialsDelegationItem([string] $propertyPath) {\n $allowFreshCredentialsItem = Get-Item $propertyPath -ErrorAction SilentlyContinue\n if (-not ($allowFreshCredentialsItem)) {\n New-Item $propertyPath\n }\n}\n\n<#\n\n.SYNOPSIS\nSet the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly property value in the CredentialsDelegation container.\n\n.DESCRIPTION\nSet the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly property value in the CredentialsDelegation container.\nIf the value exists then it is not changed.\n\n#>\n\nfunction setCredentialsDelegationProperty([Object] $credentialDelegationItem, [string] $propertyName) {\n $credentialDelegationItem | New-ItemProperty -Name $propertyName -Value 1 -Type DWord -Force\n}\n\n<#\n\n.SYNOPSIS\nAdd the passed in server(s) to the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly key/container.\n\n.DESCRIPTION\nAdd the passed in server(s) to the AllowFreshCredentials / AllowFreshCredentialsWhenNTLMOnly key/container. \nIf a given server is already present then do not add it again.\n\n#>\n\nfunction addServersToCredentialsDelegationItem([string[]] $serverNames, [string] $propertyName, [string] $propertyPath) {\n $valuesAdded = 0\n\n foreach ($serverName in $serverNames) {\n $newValue = "{0}/{1}" -f $WsManApplication, $serverName\n\n $hasValue = $false\n\n # Check if any registry-value nodes values of registry-key node have certain value.\n $key = Get-ChildItem $CredentialsDelegationPolicyPath | ? PSChildName -eq $propertyName\n\n if ($null -eq $key) {\n New-Item -Path $propertyPath\n $valueNames = @()\n } else {\n $valueNames = @($key.GetValueNames())\n\n foreach ($valueName in $valueNames) {\n $value = $key.GetValue($valueName)\n \n if ($value -eq $newValue) {\n $hasValue = $true\n break\n }\n }\n }\n\n if (-not ($hasValue)) {\n New-ItemProperty $propertyPath -Name ($valueNames.Length + 1) -Value $newValue -Force\n $valuesAdded++\n }\n }\n\n return $valuesAdded -gt 0\n}\n\n<#\n\n.SYNOPSIS\nAdd the passed in server(s) to the delegation list in the registry.\n\n.DESCRIPTION\nAdd the passed in server(s) to the delegation list in the registry.\n\n#>\n\nfunction addServersToDelegation([string[]] $serverNames) {\n # Get the CredentialsDelegation key/container\n $credentialDelegationItem = getCredentialsDelegationItem\n\n # Test, and create if needed, the AllowFreshCredentials property value\n setCredentialsDelegationProperty $credentialDelegationItem $AllowFreshCredentialsPropertyName\n # Test, and create if needed, the AllowFreshCredentialsWhenNTLMOnly property value\n setCredentialsDelegationProperty $credentialDelegationItem $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n\n # Create the AllowFreshCredentials key/container\n createCredentialsDelegationItem $AllowFreshCredentialsPath\n # Create the AllowFreshCredentialsWhenNTLMOnly key/container\n createCredentialsDelegationItem $AllowFreshCredentialsWhenNTLMOnlyPath\n\n # Add the servers to the AllowFreshCredentials key/container, if not already present\n $updateFreshCredentialsGroupPolicy = addServersToCredentialsDelegationItem $serverNames $AllowFreshCredentialsPropertyName $AllowFreshCredentialsPath\n # Add the servers to the AllowFreshCredentialsWhenNTLMOnly key/container, if not already present\n $updateFreshCredentialsWhenNTLMOnlyGroupPolicy = addServersToCredentialsDelegationItem $serverNames $AllowFreshCredentialsWhenNTLMOnlyPropertyName $AllowFreshCredentialsWhenNTLMOnlyPath\n\n if ($updateFreshCredentialsGroupPolicy) {\n $hasNTLMOnlyUpdateBeenMade = $false\n if ($updateFreshCredentialsWhenNTLMOnlyGroupPolicy) {\n $hasNTLMOnlyUpdateBeenMade = $true\n }\n setLocalGroupPolicy $serverNames $hasNTLMOnlyUpdateBeenMade\n }\n}\n\n<#\n\n.SYNOPSIS\nSet the local group policy to match the settings that have already been made.\n\n.DESCRIPTION\nLocal Group Policy must match the settings that were made by this script to\nensure that an older Local GP setting does not overwrite the thos settings.\n\n#>\n\nfunction setLocalGroupPolicy([string[]] $serverNames, [bool] $hasNTLMOnlyUpdateBeenMade) {\n try {\n Add-Type -TypeDefinition $NativeCode\n } catch {\n if ($_.Exception.HResult -ne $TypeAlreadyExistsHResult) {\n throw $_.Exception.Message\n }\n }\n\n $errorMessage = [SME.LocalGroupPolicy]::EnableAllowFreshCredentialsPolicy($serverNames, $hasNTLMOnlyUpdateBeenMade)\n\n if ($errorMessage) {\n throw $errorMessage\n }\n\n return $true\n}\n\n<#\n\n.SYNOPSIS\nMain function of this script.\n\n.DESCRIPTION\nEnable CredSSP client role and add the passed in servers to the list\nof servers to which this client can delegate credentials.\n\n#>\nfunction main([string[]] $serverNames) {\n setupScriptEnv\n\n try {\n # If client role is enabled, skip to adding servers to delegation\n if (-not (getCredSSPClientEnabled)) {\n # If not enabled try to enable\n $err = enableCredSSPClient\n if ($err) {\n # If there was an error, and server role is not enabled return error.\n if (-not (getCredSSPClientEnabled)) {\n throw $err\n }\n }\n }\n\n addServersToDelegation $serverNames\n } catch {\n Write-Error $_.Exception.Message\n\n throw $_.Exception.Message\n } finally {\n cleanupScriptEnv\n }\n\n return $true\n}\n\n###############################################################################\n# Script execution starts here\n###############################################################################\nif (-not ($env:pester)) {\n return main $serverNames\n}\n'},m.Enable_CredSspManagedServer={command:"Enable-CredSspManagedServer",script:'##Enable-CredSspManagedServer##:Enable-CredSspManagedServer.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable CredSSPServicePath -Option ReadOnly -Scope Script -Value "WSMan:\\localhost\\Service\\Auth\\CredSSP"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable CredSSPServicePath -Scope Script -Force\n}\nfunction getCredSSPServerEnabled()\n{\n$credSSPServerEnabled = $false;\n$credSSPServerService = Get-Item $CredSSPServicePath -ErrorAction SilentlyContinue\nif ($credSSPServerService) {\n$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)\n}\nreturn $credSSPServerEnabled\n}\nfunction enableCredSSP() {\n$err = $null\n$result = Enable-WSManCredSSP -Role Server -Force -ErrorAction SilentlyContinue -ErrorVariable +err\nreturn $err\n}\nfunction main() {\nsetupScriptEnv\ntry {\nif (-not (getCredSSPServerEnabled)) {\n$err = enableCredSSP\nif ($err) {\nif (-not (getCredSSPServerEnabled)) {\nthrow $err\n}\n}\n}\n} catch {\nWrite-Error $err\nthrow $_.Exception.Message\n} finally {\ncleanupScriptEnv\n}\nreturn $true\n}\nif (-not ($env:pester)) {\nreturn main\n}\n'},m.Get_CredSspClientConfigurationOnGateway={command:"Get-CredSspClientConfigurationOnGateway",script:'##Get-CredSspClientConfigurationOnGateway##:Get-CredSspClientConfigurationOnGateway.ps1\nparam (\n[Parameter(Mandatory=$True)]\n[string[]]$serverNames\n)\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\nSet-Variable -Name CredentialsDelegationPolicyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation"\nSet-Variable -Name AllowFreshCredentialsPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentialsWhenNTLMOnly"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\nRemove-Variable -Name CredentialsDelegationPolicyPath -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsPropertyName -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Scope Script -Force\n}\nfunction getCredSSPClientStatus() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction verifyCredentialsDelegationRegKeyPresent([string] $registryKeyName) {\n$credentialDelegationItem = Get-Item $CredentialsDelegationPolicyPath -ErrorAction SilentlyContinue\nif ($credentialDelegationItem) {\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | Where-Object PSChildName -eq $registryKeyName\nif ($key -and $key.GetValueNames()) {\nreturn $True\n}\n}\nreturn $False\n}\nfunction getDelegatableServersListForRegKey([string]$registryKeyName) {\n$serversList = @()\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | Where-Object PSChildName -eq $registryKeyName\n$valueNames = $key.GetValueNames()\nforeach ($valueName in $valueNames) {\n$serversList += $key.GetValue($valueName).ToLower()\n}\nreturn $serversList\n}\nfunction main([string[]] $serverNames) {\nsetupScriptEnv\n$serverNames = $serverNames | ForEach-Object { $_.ToLower() }\n$isGatewayConfiguredAsClientRole = getCredSSPClientStatus\n$allowFreshCredentialsKeyPresent = verifyCredentialsDelegationRegKeyPresent $AllowFreshCredentialsPropertyName\n$allowFreshCredentialsWhenNTLMOnlyKeyPresent = verifyCredentialsDelegationRegKeyPresent $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n$allowFreshCredentialsDelegatableServers = @()\n$allowFreshCredentialsWhenNTLMOnlyDelegatableServers = @()\n$notDelegatableServers = @()\nif ($allowFreshCredentialsKeyPresent) {\n$freshCredentialsServers = getDelegatableServersListForRegKey $AllowFreshCredentialsPropertyName\n[array]$allowFreshCredentialsDelegatableServers = $serverNames | Where-Object { $freshCredentialsServers.Contains("$WsManApplication/$($_)") }\n}\nif (-not $allowFreshCredentialsDelegatableServers) {\n$allowFreshCredentialsDelegatableServers = @()\n}\nif ($allowFreshCredentialsWhenNTLMOnlyKeyPresent) {\n$freshCredentialsWhenNTLMServers = getDelegatableServersListForRegKey $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n[array]$allowFreshCredentialsWhenNTLMOnlyDelegatableServers = $serverNames | Where-Object { $freshCredentialsWhenNTLMServers.Contains("$WsManApplication/$($_)") }\n}\nif (-not $allowFreshCredentialsWhenNTLMOnlyDelegatableServers) {\n$allowFreshCredentialsWhenNTLMOnlyDelegatableServers = @()\n}\n[array]$notDelegatableServers = $serverNames | Where-Object { -not $allowFreshCredentialsDelegatableServers.Contains($_) -and -not $allowFreshCredentialsWhenNTLMOnlyDelegatableServers.Contains($_) }\nif (-not $notDelegatableServers) {\n$notDelegatableServers = @()\n}\ncleanupScriptEnv\n$result = [PSCustomObject]@{\nIsGatewayConfiguredAsClientRole = $isGatewayConfiguredAsClientRole\nAllowFreshCredentialsKeyPresent = $allowFreshCredentialsKeyPresent\nAllowFreshCredentialsWhenNTLMOnlyKeyPresent = $allowFreshCredentialsWhenNTLMOnlyKeyPresent\nAllowFreshCredsDelegatableServers = $allowFreshCredentialsDelegatableServers\nAllowFreshCredsWhenNTLMOnlyDelegatableServers = $allowFreshCredentialsWhenNTLMOnlyDelegatableServers\nNotDelegatableServers = $notDelegatableServers\n}\nreturn $result\n}\nreturn main $serverNames\n'},m.Get_CredSspClientRole={command:"Get-CredSspClientRole",script:'##Get-CredSspClientRole##:Get-CredSspClientRole.ps1\nparam (\n[Parameter(Mandatory=$True)]\n[string[]]$serverNames\n)\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPClientAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Client\\Auth\\CredSSP"\nSet-Variable -Name CredentialsDelegationPolicyPath -Option ReadOnly -Scope Script -Value "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows\\CredentialsDelegation"\nSet-Variable -Name AllowFreshCredentialsPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentials"\nSet-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Option ReadOnly -Scope Script -Value "AllowFreshCredentialsWhenNTLMOnly"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPClientAuthPath -Scope Script -Force\nRemove-Variable -Name CredentialsDelegationPolicyPath -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsPropertyName -Scope Script -Force\nRemove-Variable -Name AllowFreshCredentialsWhenNTLMOnlyPropertyName -Scope Script -Force\n}\nfunction getCredSSPClientEnabled() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPClientAuthPath\n$credSSPClientEnabled = $false;\n$credSSPClientService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPClientService) {\n$credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value)\n}\nreturn $credSSPClientEnabled\n}\nfunction getServersDelegated([string[]] $serverNames, [string] $propertyName) {\n$valuesFound = 0\nforeach ($serverName in $serverNames) {\n$newValue = "{0}/{1}" -f $WsManApplication, $serverName\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | ? PSChildName -eq $propertyName\n$valueNames = $key.GetValueNames()\nforeach ($valueName in $valueNames) {\n$value = $key.GetValue($valueName)\nif ($value -eq $newValue) {\n$valuesFound++\nbreak\n}\n}\n}\nreturn $valuesFound -eq $serverNames.Length\n}\nfunction areCredentialsDelegationItemsPresent([string] $propertyName) {\n$credentialDelegationItem = Get-Item $CredentialsDelegationPolicyPath -ErrorAction SilentlyContinue\nif ($credentialDelegationItem) {\n$key = Get-ChildItem $CredentialsDelegationPolicyPath | ? PSChildName -eq $propertyName\nif ($key) {\n$valueNames = $key.GetValueNames()\nif ($valueNames) {\nreturn $true\n}\n}\n}\nreturn $false\n}\nfunction main([string[]] $serverNames) {\nsetupScriptEnv\n$isServersDelegatedToAllowFreshCredentials = $false\n$isServersDelegatedToAllowFreshCredentialsWhenNTLMOnly = $false\n$isClientEnabled = getCredSSPClientEnabled\nif (areCredentialsDelegationItemsPresent $AllowFreshCredentialsPropertyName) {\n$isServersDelegatedToAllowFreshCredentials = getServersDelegated $serverNames $AllowFreshCredentialsPropertyName\n}\nif (areCredentialsDelegationItemsPresent $AllowFreshCredentialsWhenNTLMOnlyPropertyName) {\n$isServersDelegatedToAllowFreshCredentialsWhenNTLMOnly = getServersDelegated $serverNames $AllowFreshCredentialsWhenNTLMOnlyPropertyName\n}\ncleanupScriptEnv\nreturn $isClientEnabled -and $isServersDelegatedToAllowFreshCredentials -and $isServersDelegatedToAllowFreshCredentialsWhenNTLMOnly\n}\nreturn main $serverNames\n'},m.Get_CredSspManagedServer={command:"Get-CredSspManagedServer",script:'##Get-CredSspManagedServer##:Get-CredSspManagedServer.ps1\nSet-StrictMode -Version 5.0\nImport-Module Microsoft.WSMan.Management -ErrorAction SilentlyContinue\nfunction setupScriptEnv() {\nSet-Variable -Name WsManApplication -Option ReadOnly -Scope Script -Value "wsman"\nSet-Variable -Name CredSSPServiceAuthPath -Option ReadOnly -Scope Script -Value "localhost\\Service\\Auth\\CredSSP"\n}\nfunction cleanupScriptEnv() {\nRemove-Variable -Name WsManApplication -Scope Script -Force\nRemove-Variable -Name CredSSPServiceAuthPath -Scope Script -Force\n}\nfunction getCredSSPServerEnabled() {\n$path = "{0}:\\{1}" -f $WsManApplication, $CredSSPServiceAuthPath\n$credSSPServerEnabled = $false;\n$credSSPServerService = Get-Item $path -ErrorAction SilentlyContinue\nif ($credSSPServerService) {\n$credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value)\n}\nreturn $credSSPServerEnabled\n}\nfunction main() {\nsetupScriptEnv\n$result = getCredSSPServerEnabled\ncleanupScriptEnv\nreturn $result\n}\nif (-not ($env:pester)) {\nreturn main\n}\n'},m.Test_CredSsp={command:"Test-CredSsp",script:"##Test-CredSsp##:Test-CredSsp.ps1\nparam (\n[Parameter(Mandatory = $true)]\n[string]\n$ServerName,\n[Parameter(Mandatory = $true)]\n[string]\n$Username,\n[Parameter(Mandatory = $true)]\n[string]\n$Password\n)\n$secure_password = ConvertTo-SecureString $Password -AsPlainText -Force\n$cred = New-Object System.Management.Automation.PSCredential ($Username, $secure_password)\nTest-WSMan -computerName $ServerName -Authentication Credssp -Credential $cred\n"}}(c=f.CredSsp||(f.CredSsp={})),function(m){m.Get_ArcStatus={command:"Get-ArcStatus",script:'##Get-ArcStatus##:Get-ArcStatus.ps1\n$LogName = "Microsoft-ServerManagementExperience"\n$LogSource = "SMEScript"\n$ScriptName = "Get-ArcStatus.ps1"\n$AzcmagentExecutable = "$env:ProgramFiles\\AzureConnectedMachineAgent\\azcmagent.exe"\nfunction main() {\n$service = Get-Service -Name himds -ErrorVariable Err -ErrorAction SilentlyContinue\nif(!!$Err){\n$Err = "Failed to retrieve HIMDS service. Details: $Err"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "NotInstalled"\n}\nelseif ($service.Status -ne "Running") {\n$Err = "The Azure arc agent is not running. Details: HIMDS service is $($service.Status)"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "Disconnected"\n}\nelse {\n$rawStatus = Invoke-Command { & $AzcmagentExecutable show --json --log-stderr } -ErrorVariable Err 2>$null\nif (!!$Err) {\n$Err = "The Azure arc agent failed to communicate. Details: $rawStatus"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "Disconnected"\n}\nelseif (!$rawStatus) {\n$Err = "The Azure arc agent is not connected. Details: $rawStatus"\nMicrosoft.PowerShell.Management\\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information `\n-Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue\n$status = "Disconnected"\n}\nelse {\n$status = ($rawStatus | ConvertFrom-Json -ErrorAction Stop).status\n}\n}\n$computerSummary = Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\\Select-Object Name\n@{\nazureArcStatus = $status\ncomputerName = $computerSummary.Name\n}\n}\nif (-not ($env:pester)) {\nMicrosoft.PowerShell.Management\\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue\nreturn main\n}\n'},m.Get_RebootPendingStatus={command:"Get-RebootPendingStatus",script:'##Get-RebootPendingStatus##:Get-RebootPendingStatus.ps1\nimport-module CimCmdlets\nfunction Get-ComputerNameChangeStatus {\n$currentComputerName = (Get-ItemProperty "HKLM:SYSTEM\\CurrentControlSet\\Control\\ComputerName\\ComputerName"-ErrorAction SilentlyContinue).ComputerName\n$activeComputerName = (Get-ItemProperty "HKLM:SYSTEM\\CurrentControlSet\\Control\\ComputerName\\ActiveComputerName"-ErrorAction SilentlyContinue).ComputerName\nreturn $currentComputerName -ne $activeComputerName\n}\nfunction Get-CCMRebootPending {\n$status = Invoke-WmiMethod -Namespace "ROOT\\ccm\\ClientSDK" -Class CCM_ClientUtilities -Name ` DetermineIfRebootPending -ErrorAction SilentlyContinue\nreturn $status\n}\nfunction Test-PendingReboot {\nif ($value = Get-ChildItem "HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Component Based Servicing\\RebootPending" -ErrorAction Ignore) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = $value\n}\n}\nif ($value = Get-Item "HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WindowsUpdate\\Auto Update\\RebootRequired" -ErrorAction Ignore) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = $value\n}\n}\nif (Get-ComputerNameChangeStatus) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = \'Computer ID changed\'\n}\n}\n$status = Get-CCMRebootPending\nif (($status -ne $null) -and $status.RebootPending) {\nreturn @{\nrebootRequired = $true\nadditionalInformation = $status\n}\n}\nreturn @{\nrebootRequired = $false\nadditionalInformation = $null\n}\n}\nTest-PendingReboot\n'},m.Get_ScheduledTask={command:"Get-ScheduledTask",script:"##Get-ScheduledTask##:Get-ScheduledTask.ps1\nImport-Module ScheduledTasks -ErrorAction SilentlyContinue\nGet-ScheduledTaskInfo -TaskName WACInstallUpdates\n"},m.Get_UpdateStatus={command:"Get-UpdateStatus",script:"##Get-UpdateStatus##:Get-UpdateStatus.ps1\n$fileContent = Get-Content $env:temp\\InstallLog.txt -ErrorAction SilentlyContinue\nif($null -eq $fileContent){\nreturn @{failedToUpdate = $false}\n}\n$file_data = Get-Content $env:temp\\InstallLog.txt | Where-Object { $_ -like '*Windows Admin Center -- Installation failed*' }\nif ( $file_data ) {\nreturn @{failedToUpdate = $true}\n}\nreturn @{failedToUpdate = $false}\n"},m.New_WindowsAdminCenterUpdateSchedule={command:"New-WindowsAdminCenterUpdateSchedule",script:'##New-WindowsAdminCenterUpdateSchedule##:New-WindowsAdminCenterUpdateSchedule.ps1\nparam (\n[Parameter(Mandatory = $true)]\n[string]$installTime,\n[Parameter(Mandatory = $true)]\n[string]$downloadWACUrl,\n[Parameter(Mandatory = $true)]\n[bool]$installNow,\n[Parameter(Mandatory = $true)]\n[boolean]\n$fromTaskScheduler\n)\nImport-Module ScheduledTasks -ErrorAction SilentlyContinue\nfunction newWindowsAdminCenterUpdateSchedule() {\nparam (\n[string]\n$downloadWACUrl\n)\nfunction Get-CurrentSslCertificates([string]$portNumber) {\nWrite-Host "Retrieving current certificate for $portNumber"\n$netshCommand = "netsh http show sslcert ipport=0.0.0.0:{0}" -f $portNumber\n$portCertificate = (Invoke-Expression $netshCommand) -Join \' \'\n$pattern = "Certificate hash\\s+: (\\w+)"\n$thumbprint = $portCertificate | Microsoft.PowerShell.Utility\\Select-String -Pattern $pattern | ForEach-Object { $_ -match $pattern > $null; $matches[1] };\nreturn @{ thumbprint = $thumbprint }\n}\nfunction Set-ErrorLogContent {\nParam(\n[Parameter(Mandatory = $True)]\n[bool] $failedToUpdate,\n[Parameter(Mandatory = $True)]\n[string] $errorCode,\n[Parameter(Mandatory = $True)]\n[string] $errorMessage\n)\n$errorLogFile = $env:temp + "\\WindowsAdminCenterErrorLogFile.json"\n$fileContents = ""\n$errorContent = "{ ""failedToUpdate"": ""$($failedToUpdate)"", ""time"": ""$(Get-Date)"", ""errorCode"": ""$($errorCode)"", ""errorMessage"": ""$($errorMessage)""}"\nif (-Not(Test-Path $errorLogFile)) {\nnew-item $errorLogFile\n$json = \'{\n"errors":[]\n}\'\n$fileContents = ConvertFrom-Json -InputObject $json\n}\nelse {\n$fileContents = ([System.IO.File]::ReadAllText($errorLogFile) | ConvertFrom-Json)\nif ($fileContents.errors -eq $null) {\n$json = \'{\n"errors":[]\n}\'\n$fileContents = ConvertFrom-Json -InputObject $json\n}\n}\n$fileContents.errors += $errorContent\nConvertTo-Json -InputObject $fileContents | Out-File $errorLogFile\n}\n$serviceFound = Get-Service ServerManagementGateway -ErrorAction SilentlyContinue\nif ($null -eq $serviceFound) {\n$isServiceMode = $false\n}\nelse {\n$isServiceMode = $true\n}\n$isHAEnabled = "false"\nif (Test-Path -Path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway\\Ha") {\n$HARegistryResult = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway\\HA" -Name isHAEnabled\n$isHAEnabled = $HARegistryResult\n}\n$registryResult = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway" -Name SmePort\n$port = $registryResult\n$directoryForDownload = "$($env:Temp)"\n$tempDlPath = $directoryForDownload + "\\WAC.msi"\n$privacyType = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway" -Name SmeTelemetryPrivacyType\n$devMode = Get-ItemPropertyValue -path "Registry::HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\ServerManagementGateway" -Name DevMode\nif ($null -eq $devMode -or \'\' -eq $devMode) {\n$devMode = \'0\'\n}\n$testConnection = Test-NetConnection\nif ($testConnection.pingSucceeded -eq $false) {\n$errorMessage = "InternetConnectionFailed"\nSet-ErrorLogContent $true "503" $errorMessage\nreturn $errorMessage\n}\nif ($isServiceMode -eq $true) {\nStop-Service ServerManagementGateway\n}\nelse {\nStop-Process -Name SmeDesktop\n}\nfor ($i = 1; $i -le 5 ; $i++) {\ntry {\nInvoke-WebRequest $downloadWACUrl -OutFile $tempDlPath -ErrorVariable +err\nBreak\n}\ncatch {\nif ($i -ge 5) {\n$statusMessage = $Error[0].Exception.Message\n$errorMessage = "WACDownloadNotFound " + $statusMessage\nSet-ErrorLogContent $true "404" $errorMessage\nreturn @{err = $err }\n}\nelse {\nStart-Sleep -s 1\n}\n}\n}\n$logPath = "$($env:Temp)" + "\\installLog.txt"\n$certResults = Get-CurrentSslCertificates($port)\n$certThumbprint = $certResults.thumbprint\nif ($isHAEnabled -eq "true") {\n$zipFilePath = $directoryForDownload + "Install-WindowsAdminCenterHA-1907.zip"\nInvoke-WebRequest "http://aka.ms/WACHAScript" -OutFile $zipFilePath\nExpand-Archive -Path $zipFilePath -DestinationPath $directoryForDownload -Verbose -Force\nRemove-Item $zipFilePath\nSet-Location $directoryForDownload # so we can locate and run the install-WindowsAdminCenterHA.ps1 script\n.\\Install-WindowsAdminCenterHA.ps1 -msiPath $tempDlPath -Verbose\n}\nelse {\n$exitCode = 0;\n$updateFailed = $false\nif ($null -eq $certThumbprint) {\n$process = Start-Process -NoNewWindow -Wait -FilePath \'msiexec.exe\' `\n-ArgumentList "/i $tempDlPath /qn /L*v ""$($logPath)"" SME_PORT=$port SSL_CERTIFICATE_OPTION=generate DEV_MODE=$devMode SME_TELEMETRY_PRIVACY_TYPE=$privacyType" `\n-Passthru\n$exitCode = $process.exitCode\n}\nelse {\n$process = Start-Process -NoNewWindow -Wait -FilePath "msiexec.exe" `\n-ArgumentList "/i $tempDlPath /qn /L*v ""$($logPath)"" SME_PORT=$port SME_THUMBPRINT=$certThumprint SSL_CERTIFICATE_OPTION=installed DEV_MODE=$devMode SME_TELEMETRY_PRIVACY_TYPE=$privacyType" `\n-Passthru\n$exitCode = $process.exitCode\n}\n$errorMessage = "WAC_InstallSuccessful"\nif ( $exitCode -ne 0 ) {\n$errorMessage = "WAC_InstallFailed"\n$updateFailed = $true\n}\nSet-ErrorLogContent $updateFailed $exitCode $errorMessage\nif ($isServiceMode -eq $true) {\nRestart-Service ServerManagementGateway\n}\nelse {\nStart-Process "$env:ProgramFiles\\Windows Admin Center\\SmeDesktop.exe"\n}\n}\nRemove-item $tempDlPath\n}\nenum UpdateScheduleErrorCode {\nnoError = 0\nscriptNotCreated = 1\nnotAnAdmin = 2\nschedulerNoConnection = 3\n}\n$isWdacEnforced = $ExecutionContext.SessionState.LanguageMode -eq \'ConstrainedLanguage\';\nif ($isWdacEnforced) {\nif ($fromTaskScheduler) {\nnewWindowsAdminCenterUpdateSchedule $downloadWACUrl;\nreturn;\n}\n}\nelse {\n$ScriptFile = $env:Temp + "\\WACInstall-Updates.ps1"\n}\n$Scheduler = New-Object -ComObject Schedule.Service\nfor ($i = 1; $i -le 3; $i++) {\nTry {\n$Scheduler.Connect()\nBreak\n}\nCatch {\nif ($i -ge 3) {\nWrite-EventLog -LogName Application -Source "SME Windows Updates Install Updates" -EntryType Error -EventID 1 -Message "Can\'t connect to Schedule service"\nWrite-Error "Can\'t connect to Schedule service" -ErrorAction Stop\nreturn @{\nIsSuccess = $false\nErrorCode = [UpdateScheduleErrorCode]::schedulerNoConnection\n}\n}\nelse {\nStart-Sleep -s 1\n}\n}\n}\n$cmdInstallNowValue = if ($installNow -eq $true) { "`$true" } else { "`$false" }\nif ($isWdacEnforced) {\n$arg = "-WindowStyle Hidden -command ""&{Import-Module Microsoft.SME.Shell; New-WACSHWindowsAdminCenterUpdateSchedule -fromTaskScheduler `$true -installTime $installTime -installNow $cmdInstallNowValue -downloadWACUrl $downloadWACUrl}"""\n}\nelse {\n(Get-Command newWindowsAdminCenterUpdateSchedule).ScriptBlock | Set-Content -path $ScriptFile\nif (-Not(Test-Path $ScriptFile)) {\n$message = "Failed to create file:" + $ScriptFile\nWrite-Error $message\nreturn @{\nIsSuccess = $false\nErrorCode = [UpdateScheduleErrorCode]::scriptNotCreated\n}\n}\n$arg = "-WindowStyle Hidden -File $ScriptFile -downloadWACUrl $downloadWACUrl"\n}\n$RootFolder = $Scheduler.GetFolder("\\")\n$taskName = "WACInstallUpdates"\nif ($RootFolder.GetTasks(0) | Where-Object { $_.Name -eq $taskName }) {\nWrite-Debug("Deleting existing task" + $taskName)\nUnregister-ScheduledTask -TaskName \'WACInstallUpdates\' -Confirm:$false\n}\n$taskTrigger = New-ScheduledTaskTrigger -Once -At $installTime\n$taskSettings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -WakeToRun -RunOnlyIfNetworkAvailable\n$taskAction = New-ScheduledTaskAction `\n-Execute \'powershell.exe\' `\n-Argument $arg\n$description = "Update WAC to the latest version at the defined time"\n$id = [System.Security.Principal.WellKnownSidtype]::BuiltinAdministratorsSid\n$x = new-object System.Security.Principal.SecurityIdentifier -ArgumentList $id, $null\n$translatedID = $x.Translate([System.Security.Principal.NTAccount])\n$taskPrincipal = New-ScheduledTaskPrincipal -GroupId $translatedID.value -RunLevel Highest\nRegister-ScheduledTask `\n-TaskName $taskName `\n-Action $taskAction `\n-Trigger $taskTrigger `\n-Description $description `\n-Settings $taskSettings `\n-Principal $taskPrincipal | Out-Null\nif ($installNow -eq $true) {\nStart-ScheduledTask -TaskName "WACInstallUpdates"\n}\nreturn @{\nIsSuccess = $true\nErrorCode = [UpdateScheduleErrorCode]::noError\n}\n'},m.Remove_InstallUpdateScheduledTask={command:"Remove-InstallUpdateScheduledTask",script:"##Remove-InstallUpdateScheduledTask##:Remove-InstallUpdateScheduledTask.ps1\nImport-Module ScheduledTasks -ErrorAction SilentlyContinue\nUnregister-ScheduledTask -TaskName 'WACInstallUpdates' -Confirm:$false\n"}}(N=f.Updates||(f.Updates={}))}(u||(u={}))},9906:(W,F,d)=>{"use strict";var u=d(6150),s=(d(4155),d(5281)),b=d(8714),c=d(5610),N=d(3678),m=d(7011),E=d(564),M=d(5930);let L=(()=>{class g{preload(l,o){return l.data&&l.data.preload?o():(0,M.of)(null)}static \u0275fac=function(o){return new(o||g)};static \u0275prov=s.Yz7({token:g,factory:g.\u0275fac})}return g})();var I=d(1387);const x=[{path:"extensions",loadChildren:()=>d.e(177).then(d.bind(d,2177)).then(g=>g.ExtensionsRootModule)},{path:"",loadChildren:()=>Promise.all([d.e(420),d.e(576),d.e(817),d.e(975),d.e(531),d.e(380),d.e(485),d.e(417),d.e(709)]).then(d.bind(d,2709)).then(g=>g.ShellModule)}];let z=(()=>{class g{static \u0275fac=function(o){return new(o||g)};static \u0275mod=s.oAB({type:g});static \u0275inj=s.cJS({imports:[I.Bz.forRoot(x,{initialNavigation:"enabledBlocking",preloadingStrategy:L}),I.Bz]})}return g})(),_=(()=>{class g{static \u0275fac=function(o){return new(o||g)};static \u0275cmp=s.Xpm({type:g,selectors:[["sme-root"]],decls:1,vars:0,template:function(o,h){1&o&&s._UZ(0,"router-outlet")},dependencies:[I.lC],encapsulation:2})}return g})(),X=(()=>{class g{static \u0275fac=function(o){return new(o||g)};static \u0275mod=s.oAB({type:g,bootstrap:[_]});static \u0275inj=s.cJS({providers:[L],imports:[m.ez,u.b2,z,E.ioB]})}return g})();var K=d(4174),U=d(3905);var Z=d(3054);let Q=(()=>class g{static version="4.174.0"})();(0,s.G48)();const D={name:N.Xd.nameOfShell,version:Q.version,powerShellModuleName:Z.B.module,powerShellPrefix:Z.B.powerShellPrefix,isProduction:true},Y={},G={};let q=MsftSme.noop;if(window.location.pathname.startsWith("/extensions/")||window.location.pathname.startsWith("/idle"))D.name="msft.sme.shell-extensions",G.websocket=!0,G.cssV2=!0,window.location.pathname.startsWith("/extensions/background")&&(G.disableAccessibility=!0,G.disableStyleInjection=!0);else{console.log('%cWelcome to the Windows Admin Center debugging api. Type "MsftSme.help()" to see a list of available commands',"font-size: medium; font-weight: bold; color: #0078D7;");const g=MsftSme.getLocationSearchParameter("l");g&&!MsftSme.isNullOrWhiteSpace(g.value)&&(Y.azureLocale=g.value),q=()=>{MsftSme.self().Host.isElectron&&(MsftSme.self().Environment.loadPath=location.href.substring(0,location.href.indexOf("/index.html")));const A=MsftSme.getStrings();U.c.setProgressValue("10",A.MsftSmeShell.App.Splash.Messages.preparingAssets),K.X.initialize(true),U.c.setProgressValue("20",A.MsftSmeShell.App.Splash.Messages.bootstrappingAngular)}}b.R.initialize(D,Y,G).then(()=>{q(),u.q6().bootstrapModule(X)},g=>{const A=g;if(!A.extendedSource&&A.extendedSource!==c.U.sources.getNoCache&&A.extendedSource!==c.U.sources.aadSso)throw g;if(A.extendedSource===c.U.sources.aadSso&&!MsftSme.isNullOrWhiteSpace(A.message))return U.c.aadSsoError(A.message),void console.error(A);const l=new URL(A.extended.url);if(403===A.extended.status){const o=window.location,h=new URLSearchParams(o.search),v=new URLSearchParams;for(const $ of["l","theme","staticVersion"])h.has($)&&v.append($,h.get($));const S=encodeURI(o.origin+o.pathname);v.append("redirect",S),window.location.replace(`${l.origin}?${v.toString()}`)}else(0===A.extended.status||404===A.extended.status)&&console.error(`Couldn't access to ${l.origin}: ${A.message}`)})},4155:(W,F,d)=>{"use strict";d(1122),d(5753)},4915:(W,F,d)=>{"use strict";d.d(F,{CA:()=>A,Tb:()=>g,Tx:()=>q,Y:()=>_,kz:()=>U});var u,f,s,b,c=function(l,o){return{name:l,value:void 0===o?-1:o,delta:0,entries:[],id:"v2-".concat(Date.now(),"-").concat(Math.floor(8999999999999*Math.random())+1e12)}},N=function(l,o){try{if(PerformanceObserver.supportedEntryTypes.includes(l)){if("first-input"===l&&!("PerformanceEventTiming"in self))return;var h=new PerformanceObserver(function(v){return v.getEntries().map(o)});return h.observe({type:l,buffered:!0}),h}}catch{}},m=function(l,o){var h=function v(S){"pagehide"!==S.type&&"hidden"!==document.visibilityState||(l(S),o&&(removeEventListener("visibilitychange",v,!0),removeEventListener("pagehide",v,!0)))};addEventListener("visibilitychange",h,!0),addEventListener("pagehide",h,!0)},E=function(l){addEventListener("pageshow",function(o){o.persisted&&l(o)},!0)},M=function(l,o,h){var v;return function(S){o.value>=0&&(S||h)&&(o.delta=o.value-(v||0),(o.delta||void 0===v)&&(v=o.value,l(o)))}},L=-1,I=function(){return"hidden"===document.visibilityState?0:1/0},x=function(){m(function(l){L=l.timeStamp},!0)},z=function(){return L<0&&(L=I(),x(),E(function(){setTimeout(function(){L=I(),x()},0)})),{get firstHiddenTime(){return L}}},_=function(l,o){var h,v=z(),S=c("FCP"),$=function(e){"first-contentful-paint"===e.name&&(O&&O.disconnect(),e.startTime<v.firstHiddenTime&&(S.value=e.startTime,S.entries.push(e),h(!0)))},C=window.performance&&performance.getEntriesByName&&performance.getEntriesByName("first-contentful-paint")[0],O=C?null:N("paint",$);(C||O)&&(h=M(l,S,o),C&&$(C),E(function(e){S=c("FCP"),h=M(l,S,o),requestAnimationFrame(function(){requestAnimationFrame(function(){S.value=performance.now()-e.timeStamp,h(!0)})})}))},X=!1,K=-1,U=function(l,o){X||(_(function(n){K=n.value}),X=!0);var h,v=function(n){K>-1&&l(n)},S=c("CLS",0),$=0,C=[],O=function(n){n.hadRecentInput||($&&n.startTime-C[C.length-1].startTime<1e3&&n.startTime-C[0].startTime<5e3?($+=n.value,C.push(n)):($=n.value,C=[n]),$>S.value&&(S.value=$,S.entries=C,h()))},e=N("layout-shift",O);e&&(h=M(v,S,o),m(function(){e.takeRecords().map(O),h(!0)}),E(function(){$=0,K=-1,S=c("CLS",0),h=M(v,S,o)}))},V={passive:!0,capture:!0},Z=new Date,Q=function(l,o){u||(u=o,f=l,s=new Date,G(removeEventListener),D())},D=function(){if(f>=0&&f<s-Z){var l={entryType:"first-input",name:u.type,target:u.target,cancelable:u.cancelable,startTime:u.timeStamp,processingStart:u.timeStamp+f};b.forEach(function(o){o(l)}),b=[]}},Y=function(l){if(l.cancelable){var o=(l.timeStamp>1e12?new Date:performance.now())-l.timeStamp;"pointerdown"==l.type?(h=o,v=l,S=function(){Q(h,v),C()},$=function(){C()},C=function(){removeEventListener("pointerup",S,V),removeEventListener("pointercancel",$,V)},addEventListener("pointerup",S,V),addEventListener("pointercancel",$,V)):Q(o,l)}var h,v,S,$,C},G=function(l){["mousedown","keydown","touchstart","pointerdown"].forEach(function(o){return l(o,Y,V)})},q=function(l,o){var h,v=z(),S=c("FID"),$=function(O){O.startTime<v.firstHiddenTime&&(S.value=O.processingStart-O.startTime,S.entries.push(O),h(!0))},C=N("first-input",$);h=M(l,S,o),C&&m(function(){C.takeRecords().map($),C.disconnect()},!0),C&&E(function(){S=c("FID"),h=M(l,S,o),b=[],f=-1,u=null,G(addEventListener),b.push($),D()})},ee={},g=function(l,o){var h,v=z(),S=c("LCP"),$=function(e){var n=e.startTime;n<v.firstHiddenTime&&(S.value=n,S.entries.push(e),h())},C=N("largest-contentful-paint",$);if(C){h=M(l,S,o);var O=function(){ee[S.id]||(C.takeRecords().map($),C.disconnect(),ee[S.id]=!0,h(!0))};["keydown","click"].forEach(function(e){addEventListener(e,O,{once:!0,capture:!0})}),m(O,!0),E(function(e){S=c("LCP"),h=M(l,S,o),requestAnimationFrame(function(){requestAnimationFrame(function(){S.value=performance.now()-e.timeStamp,ee[S.id]=!0,h(!0)})})})}},A=function(l){var o,h=c("TTFB");o=function(){try{var v=performance.getEntriesByType("navigation")[0]||function(){var S=performance.timing,$={entryType:"navigation",startTime:0};for(var C in S)"navigationStart"!==C&&"toJSON"!==C&&($[C]=Math.max(S[C]-S.navigationStart,0));return $}();if(h.value=h.delta=v.responseStart,h.value<0||h.value>performance.now())return;h.entries=[v],l(h)}catch{}},"complete"===document.readyState?setTimeout(o,0):addEventListener("load",function(){return setTimeout(o,0)})}},6616:(W,F,d)=>{var u={"./af":76,"./af.js":76,"./ar":9392,"./ar-dz":9786,"./ar-dz.js":9786,"./ar-kw":9616,"./ar-kw.js":9616,"./ar-ly":2415,"./ar-ly.js":2415,"./ar-ma":1950,"./ar-ma.js":1950,"./ar-sa":7565,"./ar-sa.js":7565,"./ar-tn":4264,"./ar-tn.js":4264,"./ar.js":9392,"./az":3843,"./az.js":3843,"./be":7544,"./be.js":7544,"./bg":5557,"./bg.js":5557,"./bm":4431,"./bm.js":4431,"./bn":8769,"./bn-bd":3546,"./bn-bd.js":3546,"./bn.js":8769,"./bo":4012,"./bo.js":4012,"./br":9654,"./br.js":9654,"./bs":6772,"./bs.js":6772,"./ca":8172,"./ca.js":8172,"./cs":4145,"./cs.js":4145,"./cv":5084,"./cv.js":5084,"./cy":7684,"./cy.js":7684,"./da":2621,"./da.js":2621,"./de":268,"./de-at":5784,"./de-at.js":5784,"./de-ch":4364,"./de-ch.js":4364,"./de.js":268,"./dv":5772,"./dv.js":5772,"./el":1758,"./el.js":1758,"./en-au":2557,"./en-au.js":2557,"./en-ca":4831,"./en-ca.js":4831,"./en-gb":9589,"./en-gb.js":9589,"./en-ie":6950,"./en-ie.js":6950,"./en-il":7356,"./en-il.js":7356,"./en-in":3623,"./en-in.js":3623,"./en-nz":3223,"./en-nz.js":3223,"./en-sg":6268,"./en-sg.js":6268,"./eo":4190,"./eo.js":4190,"./es":6983,"./es-do":611,"./es-do.js":611,"./es-mx":2010,"./es-mx.js":2010,"./es-us":7210,"./es-us.js":7210,"./es.js":6983,"./et":4419,"./et.js":4419,"./eu":8558,"./eu.js":8558,"./fa":9169,"./fa.js":9169,"./fi":8719,"./fi.js":8719,"./fil":4176,"./fil.js":4176,"./fo":8604,"./fo.js":8604,"./fr":4354,"./fr-ca":1744,"./fr-ca.js":1744,"./fr-ch":4285,"./fr-ch.js":4285,"./fr.js":4354,"./fy":7505,"./fy.js":7505,"./ga":1667,"./ga.js":1667,"./gd":5128,"./gd.js":5128,"./gl":2411,"./gl.js":2411,"./gom-deva":172,"./gom-deva.js":172,"./gom-latn":4252,"./gom-latn.js":4252,"./gu":9612,"./gu.js":9612,"./he":9301,"./he.js":9301,"./hi":9232,"./hi.js":9232,"./hr":1094,"./hr.js":1094,"./hu":9430,"./hu.js":9430,"./hy-am":719,"./hy-am.js":719,"./id":2186,"./id.js":2186,"./is":1763,"./is.js":1763,"./it":765,"./it-ch":6969,"./it-ch.js":6969,"./it.js":765,"./ja":9834,"./ja.js":9834,"./jv":4278,"./jv.js":4278,"./ka":3959,"./ka.js":3959,"./kk":4302,"./kk.js":4302,"./km":1573,"./km.js":1573,"./kn":2808,"./kn.js":2808,"./ko":3006,"./ko.js":3006,"./ku":2370,"./ku.js":2370,"./ky":3965,"./ky.js":3965,"./lb":8729,"./lb.js":8729,"./lo":3297,"./lo.js":3297,"./lt":8418,"./lt.js":8418,"./lv":9153,"./lv.js":9153,"./me":2569,"./me.js":2569,"./mi":223,"./mi.js":223,"./mk":9234,"./mk.js":9234,"./ml":3043,"./ml.js":3043,"./mn":6420,"./mn.js":6420,"./mr":1637,"./mr.js":1637,"./ms":8068,"./ms-my":4459,"./ms-my.js":4459,"./ms.js":8068,"./mt":9128,"./mt.js":9128,"./my":6525,"./my.js":6525,"./nb":8897,"./nb.js":8897,"./ne":2387,"./ne.js":2387,"./nl":9534,"./nl-be":6937,"./nl-be.js":6937,"./nl.js":9534,"./nn":2817,"./nn.js":2817,"./oc-lnc":7214,"./oc-lnc.js":7214,"./pa-in":4973,"./pa-in.js":4973,"./pl":2878,"./pl.js":2878,"./pt":2608,"./pt-br":4452,"./pt-br.js":4452,"./pt.js":2608,"./ro":8095,"./ro.js":8095,"./ru":5819,"./ru.js":5819,"./sd":2149,"./sd.js":2149,"./se":6870,"./se.js":6870,"./si":8647,"./si.js":8647,"./sk":871,"./sk.js":871,"./sl":4347,"./sl.js":4347,"./sq":4741,"./sq.js":4741,"./sr":5074,"./sr-cyrl":2928,"./sr-cyrl.js":2928,"./sr.js":5074,"./ss":4577,"./ss.js":4577,"./sv":6967,"./sv.js":6967,"./sw":7580,"./sw.js":7580,"./ta":9384,"./ta.js":9384,"./te":8228,"./te.js":8228,"./tet":74,"./tet.js":74,"./tg":6952,"./tg.js":6952,"./th":1539,"./th.js":1539,"./tk":2277,"./tk.js":2277,"./tl-ph":252,"./tl-ph.js":252,"./tlh":8966,"./tlh.js":8966,"./tr":2200,"./tr.js":2200,"./tzl":509,"./tzl.js":509,"./tzm":2231,"./tzm-latn":1580,"./tzm-latn.js":1580,"./tzm.js":2231,"./ug-cn":5582,"./ug-cn.js":5582,"./uk":4162,"./uk.js":4162,"./ur":5284,"./ur.js":5284,"./uz":9449,"./uz-latn":8127,"./uz-latn.js":8127,"./uz.js":9449,"./vi":7288,"./vi.js":7288,"./x-pseudo":8275,"./x-pseudo.js":8275,"./yo":5249,"./yo.js":5249,"./zh-cn":8119,"./zh-cn.js":8119,"./zh-hk":9610,"./zh-hk.js":9610,"./zh-mo":3741,"./zh-mo.js":3741,"./zh-tw":7512,"./zh-tw.js":7512};function f(b){var c=s(b);return d(c)}function s(b){if(!d.o(u,b)){var c=new Error("Cannot find module '"+b+"'");throw c.code="MODULE_NOT_FOUND",c}return u[b]}f.keys=function(){return Object.keys(u)},f.resolve=s,W.exports=f,f.id=6616},4795:(W,F,d)=>{"use strict";function u(s,b,c,N,m,E,M){try{var L=s[E](M),I=L.value}catch(x){return void c(x)}L.done?b(I):Promise.resolve(I).then(N,m)}function f(s){return function(){var b=this,c=arguments;return new Promise(function(N,m){var E=s.apply(b,c);function M(I){u(E,N,m,M,L,"next",I)}function L(I){u(E,N,m,M,L,"throw",I)}M(void 0)})}}d.d(F,{Z:()=>f})},2970:(W,F,d)=>{"use strict";function c(e,n,r,t){var p,i=arguments.length,a=i<3?n:null===t?t=Object.getOwnPropertyDescriptor(n,r):t;if("object"==typeof Reflect&&"function"==typeof Reflect.decorate)a=Reflect.decorate(e,n,r,t);else for(var P=e.length-1;P>=0;P--)(p=e[P])&&(a=(i<3?p(a):i>3?p(n,r,a):p(n,r))||a);return i>3&&a&&Object.defineProperty(n,r,a),a}function N(e,n){return function(r,t){n(r,t,e)}}function I(e,n){if("object"==typeof Reflect&&"function"==typeof Reflect.metadata)return Reflect.metadata(e,n)}function x(e,n,r,t){return new(r||(r=Promise))(function(a,p){function P(w){try{y(t.next(w))}catch(R){p(R)}}function j(w){try{y(t.throw(w))}catch(R){p(R)}}function y(w){w.done?a(w.value):function i(a){return a instanceof r?a:new r(function(p){p(a)})}(w.value).then(P,j)}y((t=t.apply(e,n||[])).next())})}function D(e){return this instanceof D?(this.v=e,this):new D(e)}function Y(e,n,r){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var i,t=r.apply(e,n||[]),a=[];return i={},p("next"),p("throw"),p("return"),i[Symbol.asyncIterator]=function(){return this},i;function p(T){t[T]&&(i[T]=function(k){return new Promise(function(B,H){a.push([T,k,B,H])>1||P(T,k)})})}function P(T,k){try{!function j(T){T.value instanceof D?Promise.resolve(T.value.v).then(y,w):R(a[0][2],T)}(t[T](k))}catch(B){R(a[0][3],B)}}function y(T){P("next",T)}function w(T){P("throw",T)}function R(T,k){T(k),a.shift(),a.length&&P(a[0][0],a[0][1])}}function q(e){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var r,n=e[Symbol.asyncIterator];return n?n.call(e):(e=function K(e){var n="function"==typeof Symbol&&Symbol.iterator,r=n&&e[n],t=0;if(r)return r.call(e);if(e&&"number"==typeof e.length)return{next:function(){return e&&t>=e.length&&(e=void 0),{value:e&&e[t++],done:!e}}};throw new TypeError(n?"Object is not iterable.":"Symbol.iterator is not defined.")}(e),r={},t("next"),t("throw"),t("return"),r[Symbol.asyncIterator]=function(){return this},r);function t(a){r[a]=e[a]&&function(p){return new Promise(function(P,j){!function i(a,p,P,j){Promise.resolve(j).then(function(y){a({value:y,done:P})},p)}(P,j,(p=e[a](p)).done,p.value)})}}}d.d(F,{FC:()=>Y,KL:()=>q,fM:()=>N,gn:()=>c,mG:()=>x,qq:()=>D,w6:()=>I}),"function"==typeof SuppressedError&&SuppressedError}},W=>{W.O(0,[817,975,509,531,865,57,683,436,967,37],()=>W(W.s=9906)),W.O()}]); |
combined_dataset/train/non-malicious/sample_63_68.ps1 | sample_63_68.ps1 | # Import the helper functions
Import-Module $PSScriptRoot\..\..\Misc\helper.psm1 -Verbose:$false
function Get-TargetResource
{
[CmdletBinding()]
[OutputType([System.Collections.Hashtable])]
param
(
[parameter(Mandatory = $true)]
[System.String]
$Category
)
#Write-Verbose "Use this cmdlet to deliver information about command processing."
#Write-Debug "Use this cmdlet to write debug information while troubleshooting."
<#
$returnValue = @{
Category = [System.String]
Keypad = [System.String]
Numlock = [System.String]
Fastboot = [System.String]
FnLock = [System.String]
FullScreenLogo = [System.String]
FnLockMode = [System.String]
Password = [System.String]
SecurePassword = [System.String]
PathToKey = [System.String]
WarningsAndErr = [System.String]
PowerWarn = [System.String]
PntDevice = [System.String]
ExternalHotKey = [System.String]
PostF2Key = [System.String]
PostF12Key = [System.String]
PostHelpDeskKey = [System.String]
RptKeyErr = [System.String]
ExtPostTime = [System.String]
SignOfLifeIndication = [System.String]
WyseP25Access = [System.String]
}
$returnValue
#>
# Check if module DellBIOSprovider is already loaded. If not, load it.
try{
$bool = Confirm-DellPSDrive -verbose
}
catch
{
write-Verbose $_
$msg = "Get-TargetResource: $($_.Exception.Message)"
Write-DellEventLog -Message $msg -EventID 1 -EntryType 'Error'
write-Verbose "Exiting Get-TargetResource"
return
}
if ($bool) {
Write-Verbose "Dell PS-Drive DellSmbios is found."
}
else{
$Message = “Get-TargetResource: Module DellBiosProvider was imported correctly."
Write-DellEventLog -Message $Message -EventID 2
}
$Get = get-childitem -path @("DellSmbios:\" + $Category)
# Removing Verbose and Debug from output
$PSBoundParameters.Remove("Verbose") | out-null
$PSBoundParameters.Remove("Debug") | out-null
$out = @{}
$Get | foreach-Object {$out.Add($_.Attribute, $_.CurrentValue)}
$out.add('Category', $Category )
$out
}
function Set-TargetResource
{
[CmdletBinding()]
param
(
[parameter(Mandatory = $true)]
[System.String]
$Category,
[ValidateSet("Enabled","Disabled")]
[System.String]
$AdvancedMode,
[System.String]
$Password,
[System.String]
$SecurePassword,
[System.String]
$PathToKey
)
if (-not(CheckModuleLoaded)) {
Write-Verbose -Message 'Required module DellBiosProvider does not exist. Exiting.'
return $true
}
$DellPSDrive = get-psdrive -name Dellsmbios
if ( !$DellPSDrive)
{
$Message = "Drive DellSmbios is not found. Exiting."
Write-Verbose $Message
Write-DellEventLog -Message $Message -EventID 3 -EntryType "Error"
return $true
}
$attributes_desired = $PSBoundParameters
$atts = $attributes_desired
$pathToCategory = $DellPSDrive.Name + ':\' + $atts["Category"]
Dir $pathToCategory -verbose
$atts.Remove("Verbose") | out-null
$atts.Remove("Category") | out-null
$atts.Remove("Debug") | out-null
$securePwd=$atts["SecurePassword"]
$passwordSet=$atts["Password"]
$atts.Remove("Password") | Out-Null
$atts.Remove("SecurePassword") | Out-Null
$pathToKey=$atts["PathToKey"]
if(-Not [string]::IsNullOrEmpty($pathToKey))
{
if(Test-Path $pathToKey)
{
$key=Get-Content $pathToKey
}
else
{
$key=""
}
}
$atts.Remove("PathToKey") | Out-Null
#foreach($a in Import-Csv((Get-DellBIOSEncryptionKey)))
#{
# $key+=$a
# }
$atts.Keys | foreach-object {
# $atts[$_]
$path = $pathToCategory + '\' + $($_)
$value = $atts[$_]
if(-Not [string]::IsNullOrEmpty($securePwd))
{
$pasvar=ConvertTo-SecureString $securePwd.ToString() -Key $key
Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue -PasswordSecure $pasvar
}
elseif(-Not [string]::IsNullOrEmpty($passwordSet))
{
Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue -Password $passwordSet
}
else
{
Set-Item -path $path -value $value -verbose -ErrorVariable ev -ErrorAction SilentlyContinue
}
if ( $ev) {
$cmdline = $ExecutionContext.InvokeCommand.ExpandString($ev.InvocationInfo.Line)
$Message = "An error occured in executing " + $cmdline + "`nError message: $($ev.ErrorDetails)"
Write-Verbose $Message
Write-DellEventLog -Message $Message -EventID 5 -EntryType "Error"
}
}
}
function Test-TargetResource
{
[CmdletBinding()]
[OutputType([System.Boolean])]
param
(
[parameter(Mandatory = $true)]
[System.String]
$Category,
[ValidateSet("Enabled","Disabled")]
[System.String]
$AdvancedMode,
[System.String]
$Password,
[System.String]
$SecurePassword,
[System.String]
$PathToKey
)
$Get = Get-TargetResource $PSBoundParameters['Category'] -verbose
New-DellEventLog
$PSBoundParameters.Remove("Verbose") | out-null
$PSBoundParameters.Remove("Debug") | out-null
$PSBoundParameters.Remove("Category") | out-null
$PSBoundParameters.Remove("Password") | out-null
$PSBoundParameters.Remove("SecurePassword") | out-null
$attributes_desired = $PSBoundParameters
$bool = $true
foreach ($config_att in $PSBoundParameters.GetEnumerator())
{
if ($Get.ContainsKey($config_att.Key)) {
$currentvalue = $Get[$config_att.Key]
$currentvalue_nospace = $currentvalue -replace " ", ""
if ($config_att.Value -ne $currentvalue_nospace){
$bool = $false
$drift = "`nCurrentValue: $currentvalue_nospace`nDesiredValue: $($config_att.value)"
$message = "Configuration is drifted in category $Category for $($config_att.Key). $drift"
write-verbose $message
Write-DellEventLog -Message $message -EventID 4 -EntryType Warning
}
else {
write-Debug "Configuration is same for $config_att."
}
}
else
{
$message = "Unsupported attribute $($config_att)"
Write-Verbose $message
}
}
return $bool
}
Export-ModuleMember -Function *-TargetResource
# SIG # Begin signature block
# MIIqwgYJKoZIhvcNAQcCoIIqszCCKq8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAF6qnWCP9lQTCC
# Dv7bJQ0BKB1KKql0ynlvpmrIYQ464KCCElwwggXfMIIEx6ADAgECAhBOQOQ3VO3m
# jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE
# ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s
# ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv
# ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy
# dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx
# MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu
# MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
# AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq
# gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l
# OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr
# +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d
# vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1
# HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn
# DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig
# nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z
# HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK
# Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u
# DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC
# AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw
# FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG
# AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn
# MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp
# MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O
# BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp
# UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7
# BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+
# LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv
# 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF
# VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX
# bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG
# ATCCA+mgAwIBAgIQKcjO4K8g4fYFFpiqGB6UiDANBgkqhkiG9w0BAQ0FADBPMQsw
# CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50
# cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yMzA5MjExNTMxMjZaFw0y
# NDA5MjExNTMxMjVaMH4xCzAJBgNVBAYTAlVTMQ4wDAYDVQQIEwVUZXhhczETMBEG
# A1UEBxMKUm91bmQgUm9jazERMA8GA1UEChMIRGVsbCBJbmMxJDAiBgNVBAsTG0RV
# UCBDbGllbnQgQ3JlYXRpb24gU2VydmljZTERMA8GA1UEAxMIRGVsbCBJbmMwggGi
# MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQCMaBhwV7jJkdmP+tXH06aqD1fq
# fge3rGr6hGz+V/ifIReHg8LxzLxOspMPj6t8IpXRcpkV3tt3fg793FCg4jfSWVmR
# inwVJOHD8bR6XUNfLbtS/1M/PsSQijNKdSbL1nDKcIF5JfeN6CgkdU9AateJGLKF
# Qc9YUgbNnnwlrHWjQmV78Cu4TDz7dOxjrwnRMTXe9wPL+38nwRZYOo97bBYmtTjW
# LGfZOfg3e9DypJykJ1kQqGUa9O5PLAfvQb+NOi8gSpn3+XkliY29xx0ocQQrGDG8
# +KzfjXjGArElKBwjVirQaLhpBeeaWuDNeKTcJOzYL9Sh9IzVNpuBPwiImin5Za7S
# KwyEPlPAsFgCduEsKCoWq67MPx0z7bGRPwp5Y03KZGJUDxQAG+PlI3jvjFZiZ6YB
# Xi4TStiisY6t0Ol5kpE2lKHp3Pt/9iam1x7/y0EiQtkMXTuep1qdc3Waa7s0jEDD
# 3/T4AknlkfhROxP85xaii32M9In0Tqr1hPm3pqsCAwEAAaOCASgwggEkMAwGA1Ud
# EwEB/wQCMAAwHQYDVR0OBBYEFBFKGdzeU/CRsp0sA1HLF7oe6ORSMB8GA1UdIwQY
# MBaAFO+funmwc/IlHnicA1KcG1OE3o3tMGcGCCsGAQUFBwEBBFswWTAjBggrBgEF
# BQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYBBQUHMAKGJmh0dHA6
# Ly9haWEuZW50cnVzdC5uZXQvb3ZjczItY2hhaW4ucDdjMDEGA1UdHwQqMCgwJqAk
# oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvb3ZjczIuY3JsMA4GA1UdDwEB/wQE
# AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzATBgNVHSAEDDAKMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQ0FAAOCAgEAGtZRY5WmdTQbQGP/Nx77+u6udEUQn40GDjXPfT4j
# nVlhJ99N35giv1mWstRXxOqY7YauotNcUNzep1d8oV5/YKc7+x0s/ZwuNQmLtVyb
# VSrDy7DJiYNle/4am6GDefIUMMWgr8BGY8n/LdDVfL9Gir72V+HOe2N4cVnti0Ti
# U9/1ebEdhKd/a0awP+mh8EZG7OJ41A1JkPc4rjsh3yfQi5AQ4P1RF1hSgudkZpQI
# 8051WnnwjStKEWA2uiX3x2z63TvrPtdaJoYbtIniUx9ZVg3373sV8StFwPcyPzqX
# 9Eod7Goj4D+Vg3bB73jjG+miuykSjxNHVnhNB7EnCVffnsD5hJHRXGRCZvof59id
# NhpkuF0G4ZIYDrAF06HvJ4kxyGZCiNi6oJxfyndhG4FsCPI4XiE0n1N25lx1GeJZ
# tgRH7okPBMOu3rYTQDH2+g85yNBwap18EC7XDTyi7H/Ih616pG9ca9Xv4MsptRU9
# 6UXqPemiXG9TbuEsBWgu6YYx0qBMlIT+bqDbghkpeXrF/zRjDBAD9p38VHnqay3B
# r4RTbap/gUMQzgD2P2f6axjAg3yZaXab1qtI7VZptyXmVK7nRPwXCZmTR6SnxCaS
# 7gD2GtIZiCiztpBq6zJEQhS39BQoXVV0bQ7k+m1ZX2VW0z8Ld54PZlbc8vnP1YcA
# iyowggZwMIIEWKADAgECAhBx71V0rzVUw1osafZvS2vNMA0GCSqGSIb3DQEBDQUA
# MGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQD
# DDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9y
# aXR5IC0gQ1NCUjEwHhcNMjEwNTA3MTkyMDQ1WhcNNDAxMjI5MjM1OTAwWjBPMQsw
# CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50
# cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAJ6ZdhcanlYXCGMsk02DYYQzNAK22WKg3sIOuSBMyFedD91U
# Ww0M1gHdL0jhkQnh28gVBIK2e/DY1jA7GXFw+6iml/YpXaQMqfRTPlfbDE5u/Hbb
# XyTpql9D45PnDs/KJbzETDALWg/mBvTlbgyZZlhPg2HCc3xcIm8BRcUP90BPZEvQ
# FwqpDh4CL6GPTPJnUNs+5J/CTz906zGk0JTQmbwwkglqyyTNoth2UtBOdZhPZFrS
# XoP0WMBdanXE2D9kOosUDdh24eq5a+cRcEkROGMTbvHG+r0QRTUH5nYV0HUWqsJD
# V/6r/mNzRiKguPPkx3BGCfmpN0Gas0tsH3Byowf2NZJ0EWRu+QLVwJKV8ZdZfg3u
# oiXycVW4m42/ze6u3fsM564yTlCNod/Rc7/Bzn912qu/0K2COMXniO2ibTqGEbfX
# sOGoizsMQReaX+RbmMidAJ/3c9LD6Z8Fh3khg9YL7dHMCJ/g8cXJWLpTX9SHsYtZ
# qNJezWnQPvrEOQmvtLXt5zz6IofWc/kXlWrDHPVVeF/U+gvAWz+MeBUOWkw6buUm
# mNAnzCDfwIY7eo1lRn7ZYV6p9K4+1PyvRcc6s4UESovICV2zewIoWeOGfYCiWEBm
# YuA4VYOrnylBJrq76dhk+La7KHPNFUrXnnPjZkyxUZ2BI4vIhneytiw3InAhAgMB
# AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTvn7p5sHPy
# JR54nANSnBtThN6N7TAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBFBgNV
# HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwCAYGZ4EMAQQBMA0GCSqGSIb3DQEBDQUAA4ICAQBe84aZNcF57vAQ
# r9eSQ9KF0FvgmKDgcVHJFMtQmmAOsAQmSbHP6bqbCKHaQ13UbyOiufhAx0f+TQEL
# SJA/yNxqtD5TNSi+QEpHhWoed0DMgH9htDxPeajmo6agfkSGcb8SG5WBcvcNpdDe
# Z5/Gorjxavn8/nRmxmTmeT1qA2FOSx/MIGLLAhjsY+1+cT+WugteaCJn7B/A0gUW
# ZrGypOr8xZWjjRKl9Y3vGyDNmffnMvNZcR/dlOZ55VIjEFYq/Fk4v795JZJqx/2r
# Z3dxsQR9Na0UwT6o/CMXVggYfNd6ImuRasw1RW1PO51DnQW4nfP8NCFcBBgyVzg0
# wcqDI0amiCMhxn4UgKux77sLrAk/7lORMbPiVESqtX0wPCwjnOg/o1jqQAgXoyBf
# esAM26r/AxYDDXRkIpqUXjA1dhP10+Hj4AfK2epFiEacVNUQ4vMyCUC251wXMv7M
# r+ttz2A8dfPuXGBAVRu1Wa9yI2hNnHQEDBDJr1Bbpw1mD5blmpXgIKIa0LDuOEme
# KmeekZZsmNvEEG1gfB5uSOe2fq8zBxJx772VO76pg9RCfbenNNdfhpG1r1ZY2lV9
# F73bvM1kQRWNMVEGT7Qusos9nPNN41gDVMysiPhSPE5LRgklGf8V56eYRi59uurj
# 43z/+bkZlb52uQ15sgJRGkrIn4jCQzGCF7wwghe4AgEBMGMwTzELMAkGA1UEBhMC
# VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAMTH0VudHJ1c3QgQ29k
# ZSBTaWduaW5nIENBIC0gT1ZDUzICECnIzuCvIOH2BRaYqhgelIgwDQYJYIZIAWUD
# BAIBBQCgfDAQBgorBgEEAYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGC
# NwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQx
# IgQgzrzyoPS3IdVkPT3fYkqyOywvPOc9TI3yTG3Gh/cNeiEwDQYJKoZIhvcNAQEB
# BQAEggGAisnESBF6cuERTi3imjpnAlOg0CzB7YAdWWBClgfJSWnoF2adtnp+jLM2
# siaztJw/9nIQUQZWgiIoMTnLyC2iCcQz0hKp99T226co3cshXKlTxW6pRE68qlsM
# PlXG1DITsqXan/VrZ/VMq1TRLbhEZvjJgy2ay10XJn8zi1uiVWv8nyxpAk1FNmzX
# zXZDJUF3XpBmvYARru0uNaYigKlc8M6XWS3pz7+FXwDjUJAzcbBPJLYTx9LsmqPq
# so2bXv/Ms9f5OOOuD1OTHduNX6JLHera6FpxJkaAvEmP/qEoLQH3HVgpa8YSV1cA
# UhqtYPyx7ufqjpg5pEwakLE3pPCDdAaiBYIpdbp/7I5HWhx8wv5IB2xAJFcWvWOt
# Q79e6NXHa3HP/FGN1uWL3gymDGlLxvUgiJ7zdFv7UXU4IUzbjuNZ3QDioPHh06oS
# IRxcAUdYJurTj8bLbusKfMxMYSnCBcSyNb5YEIoEuB+5qqc1kZogUPZmcxbp9UmH
# FtqKRhQroYIVLDCCFSgGCisGAQQBgjcDAwExghUYMIIVFAYJKoZIhvcNAQcCoIIV
# BTCCFQECAQMxDTALBglghkgBZQMEAgEwgfQGCyqGSIb3DQEJEAEEoIHkBIHhMIHe
# AgEBBgpghkgBhvpsCgMFMDEwDQYJYIZIAWUDBAIBBQAEINaiFpchPOfqxxbGMg7x
# LolKN2TmHCrNEB2LB5xrTEyeAgkA54jTte8HM0AYDzIwMjQwNDE5MTA1MzM0WjAD
# AgEBoHmkdzB1MQswCQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJpbzEPMA0GA1UE
# BxMGT3R0YXdhMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSswKQYDVQQDEyJFbnRy
# dXN0IFRpbWVzdGFtcCBBdXRob3JpdHkgLSBUU0ExoIIPWDCCBCowggMSoAMCAQIC
# BDhj3vgwDQYJKoZIhvcNAQEFBQAwgbQxFDASBgNVBAoTC0VudHJ1c3QubmV0MUAw
# PgYDVQQLFDd3d3cuZW50cnVzdC5uZXQvQ1BTXzIwNDggaW5jb3JwLiBieSByZWYu
# IChsaW1pdHMgbGlhYi4pMSUwIwYDVQQLExwoYykgMTk5OSBFbnRydXN0Lm5ldCBM
# aW1pdGVkMTMwMQYDVQQDEypFbnRydXN0Lm5ldCBDZXJ0aWZpY2F0aW9uIEF1dGhv
# cml0eSAoMjA0OCkwHhcNOTkxMjI0MTc1MDUxWhcNMjkwNzI0MTQxNTEyWjCBtDEU
# MBIGA1UEChMLRW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9D
# UFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsT
# HChjKSAxOTk5IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3Qu
# bmV0IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTCCASIwDQYJKoZIhvcN
# AQEBBQADggEPADCCAQoCggEBAK1NS6kShrLqoyAHFRZkKitL0b8LSk2O7YB2pWe3
# eEDAc0LIaMDbUyvdXrh2mDWTixqdfBM6Dh9btx7P5SQUHrGBqY19uMxrSwPxAgzc
# q6VAJAB/dJShnQgps4gL9Yd3nVXN5MN+12pkq4UUhpVblzJQbz3IumYM4/y9uEnB
# dolJGf3AqL2Jo2cvxp+8cRlguC3pLMmQdmZ7lOKveNZlU1081pyyzykD+S+kULLU
# SM4FMlWK/bJkTA7kmAd123/fuQhVYIUwKfl7SKRphuM1Px6GXXp6Fb3vAI4VIlQX
# AJAmk7wOSWiRv/hH052VQsEOTd9vJs/DGCFiZkNw1tXAB+ECAwEAAaNCMEAwDgYD
# VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFXkgdERgL7Y
# ibkIozH5oSQJFrlwMA0GCSqGSIb3DQEBBQUAA4IBAQA7m49WmzDnU5l8enmnTZfX
# GZWQ+wYfyjN8RmOPlmYk+kAbISfK5nJz8k/+MZn9yAxMaFPGgIITmPq2rdpdPfHO
# bvYVEZSCDO4/la8Rqw/XL94fA49XLB7Ju5oaRJXrGE+mH819VxAvmwQJWoS1btgd
# OuHWntFseV55HBTF49BMkztlPO3fPb6m5ZUaw7UZw71eW7v/I+9oGcsSkydcAy1v
# MNAethqs3lr30aqoJ6b+eYHEeZkzV7oSsKngQmyTylbe/m2ECwiLfo3q15ghxvPn
# PHkvXpzRTBWN4ewiN8yaQwuX3ICQjbNnm29ICBVWz7/xK3xemnbpWZDFfIM1EWVR
# MIIFEzCCA/ugAwIBAgIMWNoT/wAAAABRzg33MA0GCSqGSIb3DQEBCwUAMIG0MRQw
# EgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQ
# U18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc
# KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u
# ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMB4XDTE1MDcyMjE5MDI1
# NFoXDTI5MDYyMjE5MzI1NFowgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRy
# dXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRl
# cm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhv
# cml6ZWQgdXNlIG9ubHkxJjAkBgNVBAMTHUVudHJ1c3QgVGltZXN0YW1waW5nIENB
# IC0gVFMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2SPmFKTofEuF
# cVj7+IHmcotdRsOIAB840Irh1m5WMOWv2mRQfcITOfu9ZrTahPuD0Cgfy3boYFBp
# m/POTxPiwT7B3xLLMqP4XkQiDsw66Y1JuWB0yN5UPUFeQ18oRqmmt8oQKyK8W01b
# jBdlEob9LHfVxaCMysKD4EdXfOdwrmJFJzEYCtTApBhVUvdgxgRLs91oMm4QHzQR
# uBJ4ZPHuqeD347EijzRaZcuK9OFFUHTfk5emNObQTDufN0lSp1NOny5nXO2W/KW/
# dFGI46qOvdmxL19QMBb0UWAia5nL/+FUO7n7RDilCDkjm2lH+jzE0Oeq30ay7PKK
# GawpsjiVdQIDAQABo4IBIzCCAR8wEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8B
# Af8EBAMCAQYwOwYDVR0gBDQwMjAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6
# Ly93d3cuZW50cnVzdC5uZXQvcnBhMDMGCCsGAQUFBwEBBCcwJTAjBggrBgEFBQcw
# AYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYDVR0fBCswKTAnoCWgI4YhaHR0
# cDovL2NybC5lbnRydXN0Lm5ldC8yMDQ4Y2EuY3JsMBMGA1UdJQQMMAoGCCsGAQUF
# BwMIMB0GA1UdDgQWBBTDwnHSe9doBa47OZs0JQxiA8dXaDAfBgNVHSMEGDAWgBRV
# 5IHREYC+2Im5CKMx+aEkCRa5cDANBgkqhkiG9w0BAQsFAAOCAQEAHSTnmnRbqnD8
# sQ4xRdcsAH9mOiugmjSqrGNtifmf3w13/SQj/E+ct2+P8/QftsH91hzEjIhmwWON
# uld307gaHshRrcxgNhqHaijqEWXezDwsjHS36FBD08wo6BVsESqfFJUpyQVXtWc2
# 6Dypg+9BwSEW0373LRFHZnZgghJpjHZVcw/fL0td6Wwj+Af2tX3WaUWcWH1hLvx4
# S0NOiZFGRCygU6hFofYWWLuRE/JLxd8LwOeuKXq9RbPncDDnNI7revbTtdHeaxOZ
# RrOL0k2TdbXxb7/cACjCJb+856NlNOw/DR2XjPqqiCKkGDXbBY524xDIKY9j0K6s
# GNnaxJ9REjCCBg8wggT3oAMCAQICEAfXE1PaJWG0YemQR4pMzgQwDQYJKoZIhvcN
# AQELBQAwgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgw
# JgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQL
# EzAoYykgMjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9u
# bHkxJjAkBgNVBAMTHUVudHJ1c3QgVGltZXN0YW1waW5nIENBIC0gVFMxMB4XDTI0
# MDExOTE2NDYyOFoXDTI5MDYwMTAwMDAwMFowdTELMAkGA1UEBhMCQ0ExEDAOBgNV
# BAgTB09udGFyaW8xDzANBgNVBAcTBk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwg
# SW5jLjErMCkGA1UEAxMiRW50cnVzdCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNB
# MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMeSOEE5/6A/X01Nipcx
# 45uHw3gFaTYLUrOqg12w0r1+voOgX16el/PbNRep+dsVYnzK9sXJNBXiEaWSsS7g
# aVRdDiu+VcYBjIVjskktNV/lTkPEcQuktB40Tf9FyP5P4TDo6WVsa2XTvtQsaNCt
# BJtqudBU+zUAkDHG2GhqXa/qftD5nRPvzp1jZEJyB4X7BjGL450LptUy21KlTgw8
# wcCa0X8Cd2MTzfM9PB4CSzaG4AS0eHfkmy/hiSregl3r5Brcjbp7pJ+Pjmx16wPg
# gAS/sQkc+mF6s5uBtwvJEwp47Qj2zKZfQkcSOkd4dv682pk/ZOs3XirfUuKZsP3v
# hMqROqKwp7G2Vhw/RPh+ke94piT+3ike+PX3UX+2eC2HtL0AucYe4OjhE+7uX9de
# 7qR8dWDOoTWQWMKrtUhDe+nHd4mJi8ahjGmXz256Q/70X/tj5STq3+AQkKcSkMwb
# rQiK0Y2FIKJuoYsWJ5Ux089uAymfRMInCKy39IlNN+QliVpTLFMNghRzxuzFsNmH
# 2JsS7iY6X5cvcMkweKFaSm3SSEoPVWp+9lvih1/aERt3vhpe90gKmHEMfa4qgX2y
# npFgDtHZajASiuSa7KZLb4UGSRAOhUg/LuYUz1rjTzgqr9cxALwslpWSrXPPehxR
# y/4t6cAuWA4KFWXLiHsyG2ANAgMBAAGjggFbMIIBVzAMBgNVHRMBAf8EAjAAMB0G
# A1UdDgQWBBRDaB9vnyLQ+F8J9/y45SPGjgdCkjAfBgNVHSMEGDAWgBTDwnHSe9do
# Ba47OZs0JQxiA8dXaDBoBggrBgEFBQcBAQRcMFowIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLmVudHJ1c3QubmV0MDMGCCsGAQUFBzAChidodHRwOi8vYWlhLmVudHJ1
# c3QubmV0L3RzMS1jaGFpbjI1Ni5jZXIwMQYDVR0fBCowKDAmoCSgIoYgaHR0cDov
# L2NybC5lbnRydXN0Lm5ldC90czFjYS5jcmwwDgYDVR0PAQH/BAQDAgeAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMEIGA1UdIAQ7MDkwNwYKYIZIAYb6bAoBBzApMCcG
# CCsGAQUFBwIBFhtodHRwczovL3d3dy5lbnRydXN0Lm5ldC9ycGEwDQYJKoZIhvcN
# AQELBQADggEBAL6w3P28+man/CMd89lXYvQk3x0v+VjLyswMfc9uh/Vuglor3uNf
# xs4a5AivjgQBHv8C+AVTuKhihXuZq0V72aqxF4PRKX6TIeg2iEIhOPv7DYHJw4qM
# yipeZq/5nPSNfBL7em06irAA9ztwpQ+7tVOp4cYpJurcEkovXVoEuKrjhwt9yJ4G
# /mlmS46n9L4wyaXikKGogQ0+RyGSUF0y5PJWz6mUIbswwncYEZomrvHiPi/8P4kz
# N12U590axeXMZmz6AM6W4oDt+CynxWgTaXwERK0I1fmrya0XZtUvC1fwm89cHqsN
# J0Zp/qi3BSWO4LIVM0pfupyL0CgJPLWFsuExggSYMIIElAIBATCBxzCBsjELMAkG
# A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3
# d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDE1IEVu
# dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEmMCQGA1UEAxMd
# RW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzECEAfXE1PaJWG0YemQR4pMzgQw
# CwYJYIZIAWUDBAIBoIIBpTAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJ
# KoZIhvcNAQkFMQ8XDTI0MDQxOTEwNTMzNFowKQYJKoZIhvcNAQk0MRwwGjALBglg
# hkgBZQMEAgGhCwYJKoZIhvcNAQELMC8GCSqGSIb3DQEJBDEiBCCjeJsqScEP8INy
# RzhT9fVWxGsVzj16gA7gzJHDKfBzRDCCAQsGCyqGSIb3DQEJEAIvMYH7MIH4MIH1
# MIHyBCAoSfcxGNdBRQVhc80+7Mu9U0teDvD6BhaNsOJzSQPujzCBzTCBuKSBtTCB
# sjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsT
# H1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAy
# MDE1IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEmMCQG
# A1UEAxMdRW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzECEAfXE1PaJWG0YemQ
# R4pMzgQwCwYJKoZIhvcNAQELBIICAAPl8vsnLIYacP3AlJJLcSkRFwcjoyICSxi1
# uz/zP+EOS0r9oViU9m0U3/a/x7+3pFy0W4cH/5wenN3B3R9BYnpSDoziqSWo8zay
# AUdF+AWEQnKBu5aT32zxqNH+tamxiBMxU54OwtMtl3n6QO3nMiyu4QVl6OHALVVd
# n+3hKqC1QwyKSeb/Ia0dWmzmkG/mbPgnByoAtoEX7kC3qA521Lo9wNhf/mWeOZV2
# aiGDRIdRGyqzzTi1s5oZm18P4bwPwrciXzhoBT3NXPDQP/2F7FYNbsD8u5OCi9Nj
# g3FNB3DhlpmS8hZAVbVkER6VPS8fFN04P0L59EH9Nh7xUqg4oIqrcErYQgHfliKM
# FxeceiqGee0nPwMFOodHILBJYMioGexMGU5xj9d8+g5uhRoDsGmKSPvBPCyW50Po
# v9zHlm2Xc5g2rtiwx+tqdPbfMJtNrITfgyydcXLC6h1HSq6dI7SMa/YKMQ2bJLbi
# PcOJ5QDtouUz5/6M6JV7QJNQwF0GftSUgc7GM6bdu/ESPS1OPbC/rhk6C+dXQ93Q
# hZf7+Higas/t/v97iHzooR2MWhe64zVl5Bhhx3ulWTasmQ6y6L1wkG5ggBATdg6d
# JKnyEBWC0cYp689mJ1vLfkAGydWKOiKhHGoa/J9nnet87gMcQWpN09MMFeDyUDCy
# /GQbq6i/
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_4_48.ps1 | sample_4_48.ps1 | # Copyright ?2010, Microsoft Corporation. All rights reserved.
# You may use this code and information and create derivative works of it,
# provided that the following conditions are met:
# 1. This code and information and any derivative works may only be used for
# troubleshooting a) Windows and b) products for Windows, in either case using
# the Windows Troubleshooting Platform
# 2. Any copies of this code and information
# and any derivative works must retain the above copyright notice, this list of
# conditions and the following disclaimer.
# 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND,
# WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES
# OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND
# INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION
# WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER.
#************************************************
#************************************************
# DistSvcs_Utils.ps1
# Version 1.0.0
# Date: 05-09-2011
# Author: Jeremy LaBorde - jlaborde@microsoft.com
# Description: This script provides gathers MSDTC registry keys in XML format,
# generates a summary report, and a XAML representation of the local DTC settings
#
# This is the main SDP package for MSDTC
#************************************************
###########################################################
#
# Last Update: 5-9-2011
# Author: jlaborde
#
# Description:
# returns string representing the OS version
#
# Usage:
# Get-OSVersionString
#
# Example:
# Get-OSVersionString
#
# Needs to be moved to a utils / globally accessible location
#
###########################################################
function Get-OSVersionString( )
{ $local:version = ([Environment]::OSVersion.Version.Major.ToString()) + "." + ([Environment]::OSVersion.Version.Minor.ToString())
switch( $local:version )
{
"6.2" { return "Windows 8 / 2012" }
"6.1" { return "Windows 7 / 2008 R2" }
"6.0" { return "Windows Vista / 2008" }
"5.2" { return "Windows XP 64 / 2003" }
"5.1" { return "Windows XP" }
"5.0" { return "Windows 2000" }
}
return ""
}
###########################################################
#
# Last Update: 5-9-2011
# Author: jlaborde
#
# Description:
# collect Distributed Services application event logs of interest
#
# Usage:
# Get-DistSvcsAppLogsAsCSV [string]$local:outputfile
# where $local:outputfile will be a csv file
#
# Example:
# Get-DistSvcsAppLogsAsCSV "ApplicationLogs.csv"
#
###########################################################
function Get-DistSvcsAppLogsAsCSV( [string]$local:outputfile )
{
if( (Get-Host).version.major -eq "1" )
{
$Logs = Get-EventLog -LogName application | Select-Object -Property EntryType, EventID, Source, TimeWritten, Message
} else
{
$Logs = get-eventlog -logname application -Source "*Windows Error Reporting*",
"*SideBySide*",
"*Application Error*",
"*Application Hang*",
"*Application Popup*",
"*User Profile Service*",
"*MsiInstaller*",
"*DNS*",
"*VSS*",
"*SQL*",
"*Cluster*",
"*MSDTC*",
"*COM*",
"*Complus*",
"*gupdate*",
"*Userenv*"`
| Select-Object `
-property EntryType, EventID, Source, TimeWritten, Message
}
$Logs | Export-Csv $local:outputfile
}
###########################################################
#
# Last Update: 5-9-2011
# Author: jlaborde
#
# Description:
# collect Distributed Services system event logs of interest
#
# Usage:
# Get-DistSvcsSysLogsAsCSV [string]$local:outputfile
# where $local:outputfile will be a csv file
#
# Example:
# Get-DistSvcsSysLogsAsCSV "SystemLogs.csv"
#
###########################################################
function Get-DistSvcsSysLogsAsCSV( [string]$local:outputfile )
{
if( (Get-Host).version.major -eq "1" )
{
$Logs = Get-EventLog -LogName system | Select-Object -Property EntryType, EventID, Source, TimeWritten, Message
} else
{
$Logs = get-eventlog -logname system -Source "*Windows Error Reporting*",
"*VSS*",
"*SQL*",
"*Cluster*",
"*MSDTC*",
"*Complus*",
"*DistributedCOM*",
"*Kerberos*",
"*GroupPolicy*",
"*SMSvcHost*",
"*DnsApi*"`
| Select-Object `
-property EntryType, EventID, Source, TimeWritten, Message
}
$Logs | Export-Csv $local:outputfile
}
###########################################################
#
# Last Update: 5-9-2011
# Author: jlaborde
# Inspired By: Joe Mansfield ( http://helvick.blogspot.com/2007/08/checking-service-permissions-with.html )
#
# Description:
# output permissions on a service
#
# Usage:
# Get-ServicePermission [string]$local:ServiceNameMask
#
# Example:
# Get-ServicePermission "*msdtc*"
#
###########################################################
function Get-ServicePermission( [string]$local:ServiceNameMask )
{ $local:retv = ""
# get the services
$local:services = Get-CimInstance -query 'select * from win32_service'
# loop through each, looking for the ones of interest
foreach( $local:service in $local:services )
{ if( $local:service.Name -like $local:ServiceNameMask )
{ $local:retv += "Display Name: " + $local:service.DisplayName + "`r`n"
$local:retv += "Name: " + $local:service.Name + "`r`n"
$local:retv += "Path: " + $local:service.PathName + "`r`n"
# get the permissions on the object
$local:path = $local:service.PathName.Substring( 0, $local:service.PathName.IndexOf( "." ) ) + ".exe"
$local:secure = get-acl $local:path
# output permissions
foreach( $local:item in $local:secure.Access )
{ $local:retv += "`r`n"
$local:retv += "`t" + $item.IdentityReference.Value + "`r`n"
$local:retv += "`t" + $item.AccessControlType.ToString() + "`r`n"
$local:retv += "`t" + $item.FileSystemRights.ToString() + "`r`n"
}
$local:retv += "`r`n"
$local:retv += "`r`n"
}
}
return $local:retv
}
###########################################################
#
# Last Update: 5-24-2011
# Author: jlaborde
#
# Description:
# return a reg key value
#
# Usage:
# Get-RegKeyValue [string]$local:regkey, [string]$local:regvalue
#
# Example:
# $local:binSD = Get-RegKeyValue "HKEY_LOCAL_MACHINE\software\microsoft\ole" "MachineLaunchRestriction"
#
###########################################################
function Get-RegKeyValue( [string]$local:regkey, [string]$local:regvalue )
{ if( (Test-Path ("registry::" + $local:regkey)) -eq $false )
{ return $null
}
$local:reg = Get-Item ("registry::" + $local:regkey)
if( $local:regvalue -eq $null -or $local:regvalue -eq "" )
{ return ( ($local:reg).GetValue( "", $null ) )
}
$local:val = Get-ItemProperty $reg.PSPath
if( $local:val -eq $null )
{ return $null
}
return $local:val.$local:regvalue
}
###########################################################
#
# Last Update: 3-31-2012
# Author: jlaborde
#
# Description:
# test if a registry value exists
#
# Usage:
# Get-RegKeyValueExists [string]$local:regkey, [string]$local:regvalue
#
# Example:
# if( ( Get-RegKeyValue "HKEY_LOCAL_MACHINE\software\microsoft\ole" "MachineLaunchRestriction" ) )
#
###########################################################
function Get-RegKeyValueExists( [string]$local:regkey, [string]$local:regvalue )
{ if( (Test-Path ("registry::" + $local:regkey)) -eq $false )
{ return $false
}
$local:reg = Get-Item ("registry::" + $local:regkey)
if( $local:regvalue -eq $null -or $local:regvalue -eq "" )
{ return $true
}
$local:val = Get-ItemProperty $reg.PSPath
if( $local:val -eq $null )
{ return $false
}
return $true
}
###########################################################
#
# Last Update: 10-6-2011
# Author: jlaborde
#
# Description:
# return a reg key value as true or false
#
# Usage:
# Get-RegKeyBool [string]$local:regkey, [string]$local:regvalue
#
# Example:
# $local:bool = Get-RegKeyValue "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" "NetworkDtcAccess"
#
###########################################################
function Get-RegKeyBool( [string]$local:regkey, [string]$local:regvalue )
{ $local:bool = Get-RegKeyValue $local:regkey $local:regvalue
if( $local:bool -eq $null -or $local:bool -eq $false -or $local:bool -eq 0 )
{ return $false
}
return $true
}
###########################################################
#
# Last Update: 10-6-2011
# Author: jlaborde
#
# Description:
# find subkey based on presence of an inner subkey, possibly at a certain default value
#
# Usage:
# Get-RegistryKeyBasedOnSubkey [string]$local:keyname, [string]$local:subkeyname, [string]$local:subkeyvalue
#
# Example:
# Get-RegistryKeyBasedOnSubkey "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CID" "Description" "MSDTC"
# we're looking for the subkey who contains a subkey name Description set to default value MSDTC
#
###########################################################
function Get-RegistryKeyBasedOnSubkey( [string]$local:keyname, [string]$local:subkeyname, [string]$local:subkeyvalue )
{
# get the subkeys for this key
$local:ChildKeys = Get-Item ("registry::" + $local:keyname + "\*") -ErrorAction SilentlyContinue
# loop through the root's subkeys
foreach( $local:subkey in $local:ChildKeys )
{
# find the subkey off the looping subkey
$local:s2 = Get-Item ("registry::" + $local:subkey.Name + "\" + $local:subkeyname) -ErrorAction SilentlyContinue
if( $local:s2 -ne $null )
{ # if we don't care about the default value, return this key
if( $local:subkeyvalue -eq $null -or $local:subkeyvalue -eq "" )
{ return $local:subkey
}
# if we do care about the default value, make sure we have one and compare it
$local:default = ($local:s2).GetValue( "", $null )
if( $local:default -ne $null )
{ if( $local:default.CompareTo( $local:subkeyvalue ) -eq 0 )
{ return $local:subkey
}
}
}
}
return $null
}
###########################################################
#
# Last Update: 10-6-2011
# Author: jlaborde
#
# Description:
# find subkey based on presence of an entry
#
# Usage:
# Get-RegistrySubKeyBasedOnEntry [string]$local:keyname [string]$local:entryname [string]$local:entryvalue
#
# Example:
# Get-RegistrySubKeyBasedOnEntry "HKEY_LOCAL_MACHINE\Cluster\Resources\{GUID}" "MSDTC" ""
# we're looking for the subkey who contains an entry name MSDTC set to any value
#
###########################################################
function Get-RegistrySubKeyBasedOnEntry( [string]$local:keyname, [string]$local:entryname, [string]$local:entryvalue )
{
# get the subkeys for this key
$local:ChildKeys = Get-Item ("registry::" + $local:keyname + "\*") -ErrorAction SilentlyContinue
# loop through the root's subkeys
foreach( $local:subkey in $local:ChildKeys )
{
# try to find the entry name
$local:regentries = ($local:subkey).GetValueNames( )
if( $local:regentries -ne $null )
{
foreach( $local:entry in $local:regentries )
{ if( $local:entry -eq $local:entryname )
{ if( $local:entryvalue -eq $null -or $local:entryvalue -eq "" )
{ return $local:subkey
}
if( (Get-RegKeyValue $local:subkey.Name $local:entryname) -eq $local:entryvalue )
{ return $local:subkey
}
return $null
}
}
}
}
return $null
}
###########################################################
#
# Last Update: 5-24-2011
# Author: jlaborde
#
# Description:
# create a basic 'permissions' class
#
# Usage:
# Get-PermissionsClass
#
# Example:
# $local:Perms = Get-PermissionsClass
#
###########################################################
function Get-PermissionsClass( )
{ $local:strings = @()
$local:object = New-Object Object |
Add-Member -MemberType NoteProperty -Name Account -Value "" -PassThru |
Add-Member -MemberType NoteProperty -Name Type -Value "" -PassThru |
Add-Member -MemberType NoteProperty -Name Rights -Value 0 -PassThru
return $local:object
}
###########################################################
#
# Last Update: 5-24-2011
# Author: jlaborde
#
# Description:
# create a a permission object based on a binary representation of a SID
#
# Usage:
# Get-PermissionsFromBinarySID $local:binary
#
# Example:
# $local:Perm = Get-PermissionsFromBinarySID $local:binSD
#
###########################################################
function Get-PermissionsFromBinarySID( $local:binary )
{ $local:array = @()
# not supported pre-Vista
#if( $OSVersion.Major -lt 6 )
#{ return $local:array
#}
#$converter = new-object system.management.ManagementClass Win32_SecurityDescriptorHelper
#$SDDL = $converter.BinarySDToSDDL( $local:binary )
#$CSD = New-Object System.Security.AccessControl.CommonSecurityDescriptor -ArgumentList $false, $false, $SDDL.SDDL
$CSD = New-Object System.Security.AccessControl.CommonSecurityDescriptor -ArgumentList $false, $false, $local:binary, 0
foreach( $dacl_ in $CSD.DiscretionaryAcl )
{ $local:Perms = Get-PermissionsClass
$AccountSID = New-Object System.Security.Principal.SecurityIdentifier ( $dacl_.SecurityIdentifier )
$local:RealSID = $AccountSID.Translate( [System.Security.Principal.NTAccount] )
if( $local:RealSID -ne $null )
{
$local:Perms.Account = $local:RealSID.Value
$local:Perms.Type = $dacl_.AceType
$local:Perms.Rights = $dacl_.AccessMask
$local:array = $local:array + $local:Perms
}
}
return $local:array
}
function Get-CombinePermissionsClass( )
{ $local:objects1 = @()
$local:objects2 = @()
$local:object = New-Object Object |
Add-Member -MemberType NoteProperty -Name Account -Value "" -PassThru |
Add-Member -MemberType NoteProperty -Name aAllow -Value $local:objects1 -PassThru |
Add-Member -MemberType NoteProperty -Name aDeny -Value $local:objects2 -PassThru
return $local:object
}
function Get-CombinedPermFromListByAccount( [Object]$local:CombPermsArray, [string]$local:account )
{ foreach( $local:perm in $local:CombPermsArray )
{ if( $local:perm.Account.ToUpper( ) -eq $local:account.ToUpper( ) )
{ return $local:perm }
}
return $null
}
function Get-CombinedPermissionsFromPermissionsList( $local:PermsArray )
{ $local:CombPerms = @()
foreach( $local:perm in $local:PermsArray )
{ $local:cp = Get-CombinedPermFromListByAccount $local:CombPerms $local:perm.Account
if( $local:cp -eq $null )
{ $local:cp = Get-CombinePermissionsClass
$local:cp.Account = $local:perm.Account
$local:CombPerms = $local:CombPerms + $local:cp
}
if( $local:perm.Type -eq "AccessAllowed" )
{ $local:cp.aAllow = $local:cp.aAllow + $local:perm
} else
{ $local:cp.aDeny = $local:cp.aDeny + $local:perm
}
}
return $local:CombPerms
}
###########################################################
#
# Last Update: 6-21-2011
# Author: jlaborde
#
# Description:
# generate a GUID with { } around it
#
# Usage:
# Get-GUID
#
# Example:
# $local:guid = Get-GUID
#
###########################################################
function Get-GUID( )
{ return ( "{" + ([System.Guid]::NewGuid()).ToString( ) + "}" )
}
# functions used to output SDDL information
# use Format-SDDL for full text output
# returns a string of the SID / Account
function Get-SDDL_WellKnown( [string] $code )
{
if( $code.Length -gt 2 )
{ return $code
}
switch( $code )
{
"AN" { return "Anonymous" }
"AO" { return "Account Operators" }
"AU" { return "Authenticated Users" }
"BA" { return "Built-In Administrators" }
"BG" { return "Built-In Guests" }
"BO" { return "Backup Operators" }
"BU" { return "Built-In Users" }
"CA" { return "Certificate Publishers" }
"CD" { return "Users Cert DCOM" }
"CG" { return "Creator Group" }
"CO" { return "Creator Owner" }
"DA" { return "Domain Administrators" }
"DC" { return "Domain Computers" }
"DD" { return "Domain Controllers" }
"DG" { return "Domain Guests" }
"DU" { return "Domain Users" }
"EA" { return "Enterprise Administrators" }
"ED" { return "Enterprise DCs" }
"HI" { return "High Integrity Level" }
"IU" { return "Interactively Logged-On User" }
"LA" { return "Local Administrator" }
"LG" { return "Local Guest" }
"LS" { return "Local Service Account" }
"LW" { return "Low Integrity Level" }
"ME" { return "Medium Integrity Level" }
"MU" { return "Performance Monitor Users" }
"NO" { return "Network Configuration Operators" }
"NS" { return "Network Service Account" }
"NU" { return "Network Logon User" }
"PA" { return "Group Policy Administrators" }
"PO" { return "Printer Operators" }
"PS" { return "Principal Self" }
"PU" { return "Power Users" }
"RC" { return "Restricted Code" }
"RD" { return "Terminal Server Users" }
"RE" { return "Replicator" }
"RO" { return "Enterprise Read-only DCs" }
"RS" { return "RAS Servers Group" }
"RU" { return "Alias PreWin2K" }
"SA" { return "Schema Administrators" }
"SI" { return "System Integrity Level" }
"SO" { return "Server Operators" }
"SU" { return "Service Logon User" }
"SY" { return "Local System" }
"WD" { return "Everyone" }
}
return "unknown SDDL group ( " + $code + " )"
}
# returns a string name of the Owner
function Get-SDDL_Owner( [string] $SDDLString )
{ $indexOwner = $SDDLString.IndexOf( "O:" )
$indexGroup = $SDDLString.IndexOf( "G:" )
if( $indexOwner -eq -1 -or $indexGroup -eq -1 )
{ return "error parsing owner (1)"
}
if( $indexGroup -lt $indexOwner )
{ return "error parsing owner (2)"
}
$substring = $SDDLString.Substring( $indexOwner +2, $indexGroup -2 )
return Get-SDDL_WellKnown $substring
}
# returns a string name of the Group
function Get-SDDL_Group( [string] $SDDLString )
{ $indexGroup = $SDDLString.IndexOf( "G:" )
$indexDACL = $SDDLString.IndexOf( "D:" )
if( $indexDACL -eq -1 -or $indexGroup -eq -1 )
{ return "error parsing group (1)"
}
if( $indexDACL -lt $indexOwner )
{ return "error parsing group (2)"
}
$substring = $SDDLString.Substring( $indexGroup +2, $indexDACL -2 -$indexGroup )
return Get-SDDL_WellKnown $substring
}
# returns a string name of ACE type
function Get-SDDL_Ace_Type( [string] $code )
{ if( $code -eq $null -or $code -eq "" )
{ return ""
}
switch( $code )
{
"A" { return "Access Allowed" }
"D" { return "Access Denied" }
"OA" { return "Access Allowed Object" }
"OD" { return "Access Denied Object" }
"AU" { return "Audit" }
"AL" { return "Alarm" }
"OU" { return "Audit Object" }
"OL" { return "Alaram Object" }
"ML" { return "Mandatory Label" }
}
return "Unknown ACE Type: " + $code
}
# returns a string array of ACE flags
function Get-SDDL_Ace_Flags( [string] $code )
{ $retstring = @()
if( $code -eq $null -or $code -eq "" )
{ return $retstring
}
while( $code.Length -gt 0 )
{ if( $code.Length -gt 1 )
{ $tempcode = $code.Substring( 0, 2 )
$code = $code.Substring( 2 )
} else
{ $tempcode = $code
$code = ""
}
switch( $tempcode )
{
"CI" { $retstring += "Container Inherit" }
"OI" { $retstring += "Object Inherit" }
"NP" { $retstring += "No Propagate Inherit" }
"IO" { $retstring += "Inherit Only" }
"ID" { $retstring += "Inherited" }
"SA" { $retstring += "Audit Successful" }
"FA" { $retstring += "Audit Failure" }
}
}
return $retstring
}
# returns a string array of ACE rights
function Get-SDDL_Ace_Rights( [string] $code )
{ $retstring = @()
if( $code -eq $null -or $code -eq "" )
{ return $retstring
}
while( $code.Length -gt 0 )
{ if( $code.Length -gt 1 )
{ $tempcode = $code.Substring( 0, 2 )
$code = $code.Substring( 2 )
} else
{ $tempcode = $code
$code = ""
}
if( $tempcode.StartsWith( "0x" ) )
{ $tempcode = $code.Substring( 0, 6 )
$code = $code.Substring( 6 )
$retstring += ( "0x" + $tempcode ).ToString( )
}
switch( $tempcode )
{
"GA" { $retstring += "Generic All" }
"GR" { $retstring += "Generic Read" }
"GW" { $retstring += "Generic Write" }
"GX" { $retstring += "Generic Execute" }
"RC" { $retstring += "Read" }
"SD" { $retstring += "Delete" }
"WD" { $retstring += "Write DAC" }
"WO" { $retstring += "Write Owner" }
"RP" { $retstring += "Read Property" }
"WP" { $retstring += "Write Property" }
"CC" { $retstring += "Create Child" }
"DC" { $retstring += "Delete Child" }
"LC" { $retstring += "List Children" }
"SW" { $retstring += "Self Write" }
"LO" { $retstring += "List Object" }
"DT" { $retstring += "Delete Tree" }
"CR" { $retstring += "Control Access" }
"FA" { $retstring += "File All" }
"FR" { $retstring += "File Read" }
"FW" { $retstring += "File Write" }
"FX" { $retstring += "File Execute" }
"KA" { $retstring += "Reg Key All" }
"KR" { $retstring += "Reg Key Read" }
"KW" { $retstring += "Reg Key Write" }
"KX" { $retstring += "Reg Key Execute" }
"NR" { $retstring += "No Read Up" }
"NW" { $retstring += "No Write Up" }
"NX" { $retstring += "No Execute Up" }
}
}
return $retstring
}
# returns a string of the SID / Account
function Get-SDDL_Ace_ObjectGUID( [string] $code )
{ if( $code -eq $null -or $code -eq "" )
{ return ""
}
switch( $code )
{
"CR;ab721a53-1e2f-11d0-9819-00aa0040529b" { return "Change Password" }
"CR;00299570-246d-11d0-a768-00aa006e0529" { return "Reset Password" }
}
return Get-SDDL_WellKnown $code
}
# returns a string of the SID / Account
function Get-SDDL_Ace_InheritObjectGUID( [string] $code )
{ if( $code -eq $null -or $code -eq "" )
{ return ""
}
return Get-SDDL_WellKnown $code
}
# returns a string of the SID / Account
function Get-SDDL_Ace_SID( [string] $code )
{ if( $code -eq $null -or $code -eq "" )
{ return ""
}
return Get-SDDL_WellKnown $code
}
# returns a string of full ACE info
function Get-SDDL_Ace( [string] $Ace )
{ $Ace = $Ace.TrimStart( '(' )
$Ace = $Ace.TrimEnd( ')' )
$array = $Ace.Split( ';' )
$ret = ""
$acetype = Get-SDDL_Ace_Type $array[0]
$aceflags = Get-SDDL_Ace_Flags $array[1]
$acerights = Get-SDDL_Ace_Rights $array[2]
$aceobjg = Get-SDDL_Ace_ObjectGUID $array[3]
$aceiobjg = Get-SDDL_Ace_InheritObjectGUID $array[4]
$acesid = Get-SDDL_Ace_SID $array[5]
$ret += "Type:`t" + $acetype + "`r`n"
if( $aceflags -ne $null -and $aceflags.Count -gt 0 )
{ $ret += "Flags:`t"
foreach( $flag in $aceflags )
{ $ret += $flag + "`r`n"
}
}
if( $acerights -ne $null -and $acerights.Count -gt 0 )
{ $ret += "Rights:`t"
foreach( $right in $acerights )
{ $ret += $right + "`r`n"
}
}
if( $aceobjg -ne $null -and $aceobjg -ne "" )
{ $ret += "Ace Obj:`t" + $aceobjg + "`r`n"
}
if( $aceiobjg -ne $null -and $aceiobjg -ne "" )
{ $ret += "Ace IObj:`t" + $aceiobjg + "`r`n"
}
if( $acesid -ne $null -and $acesid -ne "" )
{ $ret += "Ace SID:`t" + $acesid + "`r`n"
}
return $ret
}
# returns a string array of the flags for a DACL or SACL
function Get-ACL_Flags( [string] $flags )
{ $ret = @()
if( $flags -eq $null -or $flags -eq "" )
{ return $ret
}
while( $flags.Length -gt 0 )
{
switch( $flags.SubString( 0, 1 ) )
{
"P" { $ret += "Protected"
}
"A" { switch( $flags.SubString( 1, 1 ) )
{
"R" { $ret += "Auto Inherit Req"
}
"I" { $ret += "Auto Inherit"
}
}
$flags = $flags.Substring( 1 )
}
}
$flags = $flags.Substring( 1 )
}
return $ret
}
function Get-SDDL_DACL( [string] $SDDLString )
{ $indexDACL = $SDDLString.IndexOf( "D:" )
$indexSACL = $SDDLString.IndexOf( "S:" )
if( $indexDACL -eq -1 )
{ return "error parsing DACL (1)"
}
if( $indexSACL -ne -1 -and $indexSACL -lt $indexDACL )
{ return "error parsing DACL (2)"
}
if( $indexSACL -ne -1 )
{ $substring = $SDDLString.Substring( $indexDACL +2, $indexSACL -2 -$indexDACL )
} else
{ $substring = $SDDLString.Substring( $indexDACL +2 )
}
$ret = "DACL:`r`n"
$array = $substring.Split( '(' )
$index = 0
if( -not $array[0].EndsWith( ')' ) )
{ $dflags = Get-ACL_Flags $array[0]
if( $dflags -ne $null -and $dflags.Count -gt 0 )
{ $ret += "Flags:`t"
foreach( $dflag in $dflags )
{ $ret += $dflag + "`r`n"
}
}
$index++
}
while( $index -lt $array.Count )
{
$rAce = Get-SDDL_Ace $array[ $index ]
$ret += $rAce + "`r`n"
$index++
}
return $ret
}
function Get-SDDL_SACL( [string] $SDDLString )
{ $indexSACL = $SDDLString.IndexOf( "S:" )
if( $indexSACL -eq -1 )
{ return ""
}
$substring = $SDDLString.Substring( $indexSACL +2 )
$ret = "SACL:`r`n"
$array = $substring.Split( '(' )
$index = 0
if( -not $array[0].EndsWith( ')' ) )
{ $sflags = Get-ACL_Flags $array[0]
if( $sflags -ne $null -and $sflags.Count -gt 0 )
{ $ret += "Flags:`t"
foreach( $dflag in $dflags )
{ $ret += $dflag + "`r`n"
}
}
$index++
}
while( $index -lt $array.Count )
{
$rAce = Get-SDDL_Ace $array[ $index ]
$ret += $rAce + "`r`n"
$index++
}
return $ret
}
# main interface
#ex. Format-SDDL "O:BAG:DUD:(A;ID;FA;;;BA)(A;ID;FA;;;SY)(A;ID;0x1301bf;;;AU)(A;ID;0x1200a9;;;BU)"
function Format-SDDL( [string] $SDDLString )
{ $ret = ""
$ret += "Owner: " + (Get-SDDL_Owner $SDDLString) + "`r`n"
$ret += "Group: " + (Get-SDDL_Group $SDDLString) + "`r`n"
$ret += (Get-SDDL_DACL $SDDLString) + "`r`n"
$ret += (Get-SDDL_SACL $SDDLString) + "`r`n"
return $ret
}
###########################################################
#
# Last Update: 5-11-2011
# Author: jlaborde
#
# Description:
# retrieve EnableDOCM key
#
# Usage:
# Get-EnableDCOM
#
# Example:
# $local:OnOrOff = Get-EnableDCOM
# returns $true or $false
#
###########################################################
function Get-EnableDCOM( )
{ $local:value = (Get-ItemProperty "registry::HKEY_LOCAL_MACHINE\Software\Microsoft\OLE" EnableDCOM).EnableDCOM.ToUpper( )
if( $local:value -eq "Y" )
{ return $true
}
return $false
}
###########################################################
#
# Last Update: 3-20-2012
# Author: jlaborde
#
# Description:
# used to log a 'root cause' message
#
# Usage:
# AlertKnownIssue $true / $false "RootCauseID" "Description of error" "FTE Only" / "Partners" / "Internal" / "Public"
#
###########################################################
# Visibility = FTE Only, Partners, Internal, or Public
function AlertKnownIssue( [string]$sRootCauseID, [string]$sStatement, [string]$sVisibility )
{
switch( $sVisibility )
{
"FTE Only" { $vis = 1 }
"Partners" { $vis = 2 }
"Internal" { $vis = 3 }
"Public" { $vis = 4 }
default { $vis = 1 }
}
if( $global:gDebugSDPOn )
{ Update-DiagRootCause -Id $sRootCauseID -Detected $true
Write-GenericMessage -RootCauseID $sRootCauseID -Visibility $vis -SolutionTitle $sStatement
} else
{ "Issue detected: " + $sRootCauseID + ", " + $vis + ", " + $sStatement
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAzPoqinxv9sJh5
# RAjDS9ymd3yg5ZT5JlYD5qz4bd1mfaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICx68pwEBK9+SMzlty5pQBts
# ed6tEA5RnY2lRsBEEG4RMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAciAF3tP+GhAW6TtpS6O6rENDANW/fHHNVvL1cBhFRfhOMPFogx5LEDqK
# y9YjJR/mGN+fPu9M9F4ifA5X3GL9XuKDL/TMLRFVpiei1GcEagrTkzj+iZCUc8fg
# 7AkeUu17C15X4IafBYy2QC2THwZMbhzkh9059JMlmv5PZeyNkg+GpramNNsFle7Q
# 4aKLsz4Lgg07/row0V8lSYzgQACMbNAW5yNPw7woDypC6eoHLRL+LQTqSjiYLiWz
# 45vm7Ge7Gudgs0lIEC0AP2NbzZ8ZWihkAtZRltHBoKYmqINIie7bJ46y3E/w4c8H
# D2FaxRL597YJlsDNk0rRiK1ZmuCpQKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBd48VTyy/MIhAcDtKJDZ3rNdz7hOUSnYb/j2KhexjbnQIGZxp6XqTH
# GBMyMDI0MTAyODExNDA0Mi4zMTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB
# /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv
# g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV
# ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5
# hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d
# 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f
# PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj
# +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5
# hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb
# K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6
# YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J
# OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9
# Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre
# rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55
# ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH
# XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb
# KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP
# maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY
# yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr
# 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA
# sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4
# vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh
# xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA
# Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smV3jAiGA8yMDI0MTAyODA0NDcy
# NloYDzIwMjQxMDI5MDQ0NzI2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZXe
# AgEAMAcCAQACAiCYMAcCAQACAhOLMAoCBQDqyudeAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAEFghDjhxi2TSq7RRxDW8oDboQrBl/FnL9GFyUGkxt5Hz/YP
# xhSGpJ8w4/Uc7LKfS5rtB+7Ou2rGzeojlAdVUArx1kj94wVSPeBrEy9PBwhiSqDW
# DINZjAa60rf5xjy9lMiQcK54bc21WGJa4ZlGC9qrcYoQpLqiwuYZS76Io7iSbtEh
# MY/0WpMko/8XFost2uITk8Hh2RjhtVnZ4rJ1N1+/2kZobq1RJX7cvC0OFH4gYrGg
# GJDLvaPbnwgdNz88IdYs1Nch8qdg7r8oBSko61ML576CxdcnSGw9Vpf07jA/s0Rm
# Tcg81r/kwthHbYIWPw+cOA4BYp09eecPmASoKj8xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCC4W2vgdnPNw/nTkk/KLU/CdbeiGtoKfG4tMx9tZ6RUVTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbd
# izXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgWXKlh2TCsXUYprvY+OJSRQQYCPt9
# 9/x5xOK3eVkF+jEwDQYJKoZIhvcNAQELBQAEggIAOOWC/xn00LZ2bWGlDooEJB7g
# t7rhXBMFFElr73dulOP7/W7y2EmtfnZlxGaZ5n3kwdyxl2bZulkY5MoSn/IzhOWN
# zG9AkVNwzPiDKJLJjW4RlYGXIoCmlVPx4X1CGg8Z0FLJ8cu4PpMxqwLjrUbaBP01
# pUosCxhqnJ3MzXbQLQ0W/Sd36z/RBhcrOq1xL65/LXNwA+tUO5Kz4ze0jYoxVezS
# FyxVsAlpqsH/WmAOW12KgiOaG+cnLKOcfoz3pN3byi/avKhAv9BaTp2h0RnJ1w1x
# vkI7zfDjAQWRSTURMlZeeZaWE2uxnimN4iCW3wlDx7nRh3Jve1ityMhwYS2PuRnb
# EWf5Ae6dQ8zRI9Qe2NfQBT58pvxZLWRdHVFWDZa84ObxE8E27Zk6nP9UWnXCIJEm
# 1O4bZSE2HMoXPeGRcpvX3jRxa0LQt7hohBKZAbrVGk0DHV1ykhHAgQSKnCXJzjVi
# 0RkLoQO4G6lE9Moe7gg2duBkwKIW11tJwpuaQXD4QUG7yOKn08aeJkqG1dwitDKa
# YwRUnTs8gwwJcvO5uXO43p0KjDPIB8jLvyTSdNMLN01BzwbPNRIxG1IIqd49wKDL
# AEVLh2o8VJG2gZXZj/D1iw9Lfrt/Ut63g3bBR3QB27WEjwRVQXOR0+mTn6cnUirL
# u4R2HSL31gSQRRtwksc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1259.ps1 | 1259.ps1 |
function Format-CADSearchFilterValue
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$String
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$string = $string.Replace('\', '\5c')
$string = $string.Replace('*', '\2a')
$string = $string.Replace('(', '\28')
$string = $string.Replace(')', '\29')
$string = $string.Replace('/', '\2f')
$string.Replace("`0", '\00')
}
Set-Alias -Name 'Format-ADSpecialCharacters' -Value 'Format-CADSearchFilterValue'
|
combined_dataset/train/non-malicious/sample_65_31.ps1 | sample_65_31.ps1 | $ServerCertificateName = "CN=ServiceFabricServerCert"
$ClientCertificateName = "CN=ServiceFabricClientCert"
function IsSecurityX509([string]$ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$properties = $jsonConfig.properties
if ($properties -ne $Null)
{
$security = $properties.security
if ($security -ne $Null )
{
$clusterCredentialType = $security.ClusterCredentialType
return ($clusterCredentialType -ne $Null -And $clusterCredentialType -eq "X509")
}
}
return $False
}
function IsLocalMachine([string] $MachineName)
{
return ($MachineName -eq $env:ComputerName) -Or ($MachineName -eq "localhost")
}
function GetHostName([string] $iPAddress)
{
$hostName = $iPAddress
if ([bool]($iPAddress -as [ipaddress]))
{
$hostName = [System.Net.Dns]::GetHostByAddress($iPAddress).HostName
}
return $hostName
}
function IsThisMachineServer([string] $ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
Foreach ($node in $nodes)
{
$hostName = GetHostName -iPAddress $node.iPAddress
if (IsLocalMachine -MachineName $hostName)
{
return $True;
}
}
return $False
}
function InstallCertToLocal([string] $CertSetupScript)
{
invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ServerCertificateName'"
invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ClientCertificateName'"
$cerLoc = "cert:\LocalMachine\My"
$cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ServerCertificateName*" }
$serverthumbprint = $cert.Thumbprint
$cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ClientCertificateName*" }
$clientthumbprint = $cert.Thumbprint
return $serverthumbprint,$clientthumbprint
}
function IsOneBox([string] $ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
$machineNames = $nodes.iPAddress | select -uniq
return ($machineNames.Count -eq 1)
}
function ExportCertificateToLocal([string]$PackageRoot, [string]$CertSetupScript, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$ClusterConfigFilePath)
{
$serverCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $serverThumbprint -Name "server"
$clientCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $clientThumbprint -Name "client"
Write-Host "Server certificate is exported to $($serverCertificate[0]) with the password $($serverCertificate[1])"
Write-Host "Client certificate is exported to $($clientCertificate[0]) with the password $($clientCertificate[1])"
# If the current machine is server, then remove the client cert. If the current machine is client, then remove server cert.
if (IsThisMachineServer -ClusterConfigFilePath $ClusterConfigFilePath)
{
if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath))
{
Write-Host "Remove client certificate on localhost."
invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ClientCertificateName'"
}
}
else
{
Write-Host "Remove server certificate on localhost."
invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ServerCertificateName'"
}
return $serverCertificate
}
function ExportCertificate([string]$PackageRoot, [string]$Thumbprint, [string] $Name)
{
$OutputCertificateFolder = Join-Path $PackageRoot "Certificates"
if (-Not(Test-Path $OutputCertificateFolder))
{
try
{
New-Item -ItemType Directory -Force -Path $OutputCertificateFolder -ErrorAction Stop | Out-Null
}
catch
{
Write-Error "Unable to create output certificate directory $OutputCertificateFolder. Error: $_"
exit 1
}
}
$PfxFilePath = "$OutputCertificateFolder\$Name.pfx"
$randomnum = Get-Random
$pswd = ConvertTo-SecureString -String "$randomnum" -Force -AsPlainText
Get-ChildItem -Path "cert:\localMachine\my\$Thumbprint" | Export-PfxCertificate -FilePath $PfxFilePath -Password $pswd > $null
return $PfxFilePath,$randomnum
}
function ModifyJsonThumbprint([string]$ClusterConfigFilePath, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$OutputPath)
{
Write-Host "Modify thumbprint in $ClusterConfigFilePath"
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$securityCertInfo = New-Object -TypeName PSObject
$certificate= New-Object –TypeName PSObject
$certificate | Add-Member -Name "Thumbprint" -value "$ServerThumbprint" -MemberType NoteProperty
$certificate | Add-Member -Name "X509StoreName" -value "My" -MemberType NoteProperty
$clientcertificate = New-Object -TypeName PSObject
$clientcertificate | Add-Member -Name "CertificateThumbprint" -value "$ClientThumbprint" -MemberType NoteProperty
$clientcertificate | Add-Member -Name "IsAdmin" -value $true -MemberType NoteProperty
$clientcertificateArray = @()
$clientcertificateArray += $clientcertificate
$securityCertInfo | Add-Member -Name "ClusterCertificate" -value $certificate -MemberType NoteProperty
$securityCertInfo | Add-Member -Name "ServerCertificate" -value $certificate -MemberType NoteProperty
$securityCertInfo | Add-Member -Name "ClientCertificateThumbprints" -value $clientcertificateArray -MemberType NoteProperty
if (IsReverseProxyEndPointConfigured -ClusterConfigFilePath $ClusterConfigFilePath)
{
$securityCertInfo | Add-Member -Name "ReverseProxyCertificate" -value $certificate -MemberType NoteProperty
}
$jsonConfig.properties.security.CertificateInformation = $securityCertInfo
$jsonObject = ConvertTo-Json $jsonConfig -Depth 10
$jsonObject > $OutputPath
}
function IsReverseProxyEndPointConfigured([string]$ClusterConfigFilePath)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
$properties = $jsonConfig.properties
$nodetypes = $properties.nodetypes
foreach($node in $nodes)
{
$nodetypeRef = $node.nodetypeRef
foreach($nodetype in $nodetypes)
{
if ($nodetype.Name -eq $nodetypeRef)
{
if ($nodetype.reverseProxyEndpointPort -ne $Null)
{
return $True;
}
}
}
}
return $False
}
function AddToTrustedHosts([string]$MachineName)
{
Write-Host "Adding $MachineName to TrustedHosts"
Set-Item WSMan:\localhost\Client\TrustedHosts -Value "$MachineName" -Concatenate -Force
}
function InstallCertToRemote([string]$ClusterConfigFilePath, [string]$CertificatePath, [string]$Password)
{
$jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json
$nodes = $jsonConfig.nodes
$pswd = ConvertTo-SecureString -String $Password -Force -AsPlainText
$certBytes = [System.IO.File]::ReadAllBytes($CertificatePath)
$iPAddressList = $nodes.iPAddress | select -uniq
Foreach ($iPAddress in $iPAddressList)
{
$machineName = GetHostName -iPAddress $iPAddress
if (IsLocalMachine -MachineName $machineName)
{
Write-Host "Skipping certificate installation in $machineName."
continue
}
AddToTrustedHosts -MachineName $machineName
Write-Host "Connectting to $machineName"
for($retry = 0; $retry -le 2; $retry ++)
{
Write-Host "Installing server certificate in $machineName for iteration $retry"
Invoke-Command -ComputerName $machineName -ScriptBlock {
param($pswd, $certBytes)
Get-ChildItem -Path Cert:\LocalMachine\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force
Get-ChildItem -Path Cert:\LocalMachine\root | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force
Get-ChildItem -Path Cert:\CurrentUser\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force
$certPath = [System.IO.Path]::GetTempFileName()
[system.IO.file]::WriteAllBytes($certPath, $certBytes);
Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\My -FilePath $certPath -Password $pswd > $null
Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\root -FilePath $certPath -Password $pswd > $null
Import-PfxCertificate -Exportable -CertStoreLocation Cert:\CurrentUser\My -FilePath $certPath -Password $pswd > $null
} -ArgumentList $pswd,$certBytes
if ($?)
{
Write-Host "Installed server certificate in $machineName"
break
}
if ($retry -eq 2)
{
Write-Host "Installing server certificate in $machineName failed after 3 attemps"
}
else
{
Write-Host "Unable to intall server certificate in $machineName, retry after 30 seconds..."
Start-Sleep -Seconds 30
}
}
}
}
# SIG # Begin signature block
# MIInkwYJKoZIhvcNAQcCoIInhDCCJ4ACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBes9mKwSwmEyt5
# rlIN/UE8nv4hdY7kCy+udFdDWSrVDaCCDXYwggX0MIID3KADAgECAhMzAAACy7d1
# OfsCcUI2AAAAAALLMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NTU5WhcNMjMwNTExMjA0NTU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC3sN0WcdGpGXPZIb5iNfFB0xZ8rnJvYnxD6Uf2BHXglpbTEfoe+mO//oLWkRxA
# wppditsSVOD0oglKbtnh9Wp2DARLcxbGaW4YanOWSB1LyLRpHnnQ5POlh2U5trg4
# 3gQjvlNZlQB3lL+zrPtbNvMA7E0Wkmo+Z6YFnsf7aek+KGzaGboAeFO4uKZjQXY5
# RmMzE70Bwaz7hvA05jDURdRKH0i/1yK96TDuP7JyRFLOvA3UXNWz00R9w7ppMDcN
# lXtrmbPigv3xE9FfpfmJRtiOZQKd73K72Wujmj6/Su3+DBTpOq7NgdntW2lJfX3X
# a6oe4F9Pk9xRhkwHsk7Ju9E/AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUrg/nt/gj+BBLd1jZWYhok7v5/w4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzQ3MDUyODAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAJL5t6pVjIRlQ8j4dAFJ
# ZnMke3rRHeQDOPFxswM47HRvgQa2E1jea2aYiMk1WmdqWnYw1bal4IzRlSVf4czf
# zx2vjOIOiaGllW2ByHkfKApngOzJmAQ8F15xSHPRvNMmvpC3PFLvKMf3y5SyPJxh
# 922TTq0q5epJv1SgZDWlUlHL/Ex1nX8kzBRhHvc6D6F5la+oAO4A3o/ZC05OOgm4
# EJxZP9MqUi5iid2dw4Jg/HvtDpCcLj1GLIhCDaebKegajCJlMhhxnDXrGFLJfX8j
# 7k7LUvrZDsQniJZ3D66K+3SZTLhvwK7dMGVFuUUJUfDifrlCTjKG9mxsPDllfyck
# 4zGnRZv8Jw9RgE1zAghnU14L0vVUNOzi/4bE7wIsiRyIcCcVoXRneBA3n/frLXvd
# jDsbb2lpGu78+s1zbO5N0bhHWq4j5WMutrspBxEhqG2PSBjC5Ypi+jhtfu3+x76N
# mBvsyKuxx9+Hm/ALnlzKxr4KyMR3/z4IRMzA1QyppNk65Ui+jB14g+w4vole33M1
# pVqVckrmSebUkmjnCshCiH12IFgHZF7gRwE4YZrJ7QjxZeoZqHaKsQLRMp653beB
# fHfeva9zJPhBSdVcCW7x9q0c2HVPLJHX9YCUU714I+qtLpDGrdbZxD9mikPqL/To
# /1lDZ0ch8FtePhME7houuoPcMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAALLt3U5+wJxQjYAAAAAAsswDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA+B+EZukwaT8LuzTsxMFVRL
# J48wx+tVOjsI7NKS8YM/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAUllumJw9iQ225s+TMIgk+k7S3gu3EZQ88Z0H4xFAZVJB+dlxaAjZZGxY
# MuHAuO96XqnGJRjmwVvTGKQAhJjlB0J0lAzSBDsgDtHPOa9vyqeShaHrTZcCAbkp
# b1+NVNXbW/dD/YPgyRTzcyGplUiCg1wgsSxjkbP4Y1VevXMlYQRxfvNLIuESSwnK
# EN5H5NQtPG+SNqFpTH+eal/7GAu9VU5Rsy5ROLiYjdeC23+nzUSP1ED/YcT5L1Rz
# M3gRB/diC4xrHHxxNs6iNFdeULoTLmLGiBuQt6ZndIxGVhx8lg0CZKkCUjm4fDKs
# GJScbF8R6MpgiRLs0X1PmfbbQygsUqGCFv0wghb5BgorBgEEAYI3AwMBMYIW6TCC
# FuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCTKV2eH6jVsya6IKCY+nZmUZ3awNks9S9KOzE2JqlY5gIGY+5PEE5e
# GBMyMDIzMDIxODAyNTAwNC43MDlaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxMkJDLUUz
# QUUtNzRFQjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EVQwggcMMIIE9KADAgECAhMzAAAByk/Cs+0DDRhsAAEAAAHKMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDE0
# MFoXDTI0MDIwMjE5MDE0MFowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjEyQkMtRTNBRS03NEVCMSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEAwwGcq9j50rWEkcLSlGZLweUVfxXRaUjiPsyaNVxPdMRs
# 3CVe58siu/EkaVt7t7PNTPko/s8lNtusAeLEnzki44yxk2c9ekm8E1SQ2YV9b8/L
# OxfKapZ8tVlPyxw6DmFzNFQjifVm8EiZ7lFRoY448vpcbBD18qjYNF/2Z3SQchcs
# dV1N9Y6V2WGl55VmLqFRX5+dptdjreBXzi3WW9TsoCEWcYCBK5wYgS9tT2SSSTza
# e3jmdw40g+LOIyrVPF2DozkStv6JBDPvwahXWpKGpO7rHrKF+o7ECN/ViQFMZyp/
# vxePiUABDNqzEUI8s7klYmeHXvjeQOq/CM3C/Y8bj3fJObnZH7eAXvRDnxT8R6W/
# uD1mGUJvv9M9BMu3nhKpKmSxzzO5LtcMEh2tMXxhMGGNMUP3DOEK3X+2/LD1Z03u
# sJTk5pHNoH/gDIvbp787Cw40tsApiAvtrHYwub0TqIv8Zy62l8n8s/Mv/P764CTq
# rxcXzalBHh+Xy4XPjmadnPkZJycp3Kczbkg9QbvJp0H/0FswHS+efFofpDNJwLh1
# hs/aMi1K/ozEv7/WLIPsDgK16fU/axybqMKk0NOxgelUjAYKl4wU0Y6Q4q9N/9Pw
# AS0csifQhY1ooQfAI0iDCCSEATslD8bTO0tRtqdcIdavOReqzoPdvAv3Dr1XXQ8C
# AwEAAaOCATYwggEyMB0GA1UdDgQWBBT6x/6lS4ESQ8KZhd0RgU7RYXM8fzAfBgNV
# HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
# aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
# CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
# L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
# HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC
# AQDY0HkqCS3KuKefFX8/rm/dtD9066dKEleNqriwZqsM4Ym8Ew4QiqOqO7mWoYYY
# 4K5y8eXSOHKNXOfpO6RbaYj8jCOcJAB5tqLl5hiMgaMbAVLrl1hlix9sloO45LON
# 0JphKva3D6AVKA7P78mA9iRHZYUVrRiyfvQjWxmUnxhis8fom92+/RHcEZ1Dh5+p
# 4gzeeL84Yl00Wyq9EcgBKKfgq0lCjWNSq1AUG1sELlgXOSvKZ4/lXXH+MfhcHe91
# WLIaZkS/Hu9wdTT6I14BC97yhDsZWXAl0IJ801I6UtEFpCsTeOyZBJ7CF0rf5lxJ
# 8tE9ojNsyqXJKuwVn0ewCMkZqz/cEwv9FEx8QmsZ0ZNodTtsl+V9dZm+eUrMKZk6
# PKsKArtQ+jHkfVsHgKODloelpOmHqgX7UbO0NVnIlpP55gQTqV76vU7wRXpUfz7K
# hE3BZXNgwG05dRnCXDwrhhYz+Itbzs1K1R8I4YMDJjW90ASCg9Jf+xygRKZGKHjo
# 2Bs2XyaKuN1P6FFCIVXN7KgHl/bZiakGq7k5TQ4OXK5xkhCHhjdgHuxj3hK5AaOy
# +GXxO/jbyqGRqeSxf+TTPuWhDWurIo33RMDGe5DbImjcbcj6dVhQevqHClR1OHSf
# r+8m1hWRJGlC1atcOWKajArwOURqJSVlThwVgIyzGNmjzjCCB3EwggVZoAMCAQIC
# EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS
# b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX
# DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
# 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG
# Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP
# 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P
# XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361
# VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB
# Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9
# X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e
# wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw
# wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr
# 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
# FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
# BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n
# FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw
# PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j
# cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH
# hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF
# BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl
# ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
# ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
# j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu
# 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/
# GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D
# YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO
# xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO
# Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I
# 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0
# zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM
# mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT
# TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIBATCB+KGB0KSBzTCByjEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj
# cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF
# U046MTJCQy1FM0FFLTc0RUIxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAKOO55cMT4syPP6nClg2IWfajMqkoIGD
# MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF
# BQACBQDnmh8LMCIYDzIwMjMwMjE3MjM0MzA3WhgPMjAyMzAyMTgyMzQzMDdaMHQw
# OgYKKwYBBAGEWQoEATEsMCowCgIFAOeaHwsCAQAwBwIBAAICJ0wwBwIBAAICEZ0w
# CgIFAOebcIsCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC
# AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQDUrVZ55zFEOMDH
# xKaXnTpCDznfPZEx9BCoHg33vREQ2X+25B8dCkYQw074jzfqja5O8e7VOKQqInfr
# wxuF619Uie05nRXI/du28cr+symmgqRYu6I0NqO5l7MwfqanY3SEEHmyKs4gKdFx
# dVvt4dpYVz4oBsgJNi9W60QpyX8DEjGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
# aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAByk/Cs+0DDRhsAAEAAAHKMA0GCWCGSAFl
# AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN
# AQkEMSIEIFEPThtwkVID5ZFAxgoLCW0t5j5KbUxm1UHOd9+mgHPlMIH6BgsqhkiG
# 9w0BCRACLzGB6jCB5zCB5DCBvQQgEz0b85vrVU2slZAk4jt1SDEk6IzZAwVCoWwF
# 3KzcGuAwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AcpPwrPtAw0YbAABAAAByjAiBCBs2NLOHeQZicslZyYgpO23DnJ5iMSGZ1v1oe0Y
# 0PkU5zANBgkqhkiG9w0BAQsFAASCAgBADC5yIkTmP3etL/2iQ3zcVhSsXeNbBrXs
# 01RvX2ZjJqhuvetN5o82hOAfBbS4SkvJEC/aIbQyDGISQyv5x/sOAfr9WAWY1X8B
# F9XHjHBwg2PJW35OC2ibYAl/OeD2XMSToQ31+FKX8RStp77Bl/UcNJpc1xD+jK69
# fmKDvBKZK695S3Bu0pbRfkmp3tVdO5HAYfOS6cHpRagt9huTZ07ay/mykQs1M3j8
# hkpl3MdlbHUYk2odHW2vu3GwU75Ct59S0XnJJu8Q4nGYa8XE2rwx8nVSbbuFR3R9
# 0PT35EuFxiBkpu4jz51VNARDMUi2VT34lLSvEYT8t+CEU2ftUTduXgNlXQ8HISVa
# 6xRPp75yCFlVPV9W0jOKCkIngdo4Sw1VL4Hlgm7Mju/9obGsATxkm8VpVO4yqr4h
# oJ2JrsDMnr4bWJ7Zq5xh5wnmzDlrphFTk7/GC7B81o47o0D/tMNgSOXBWH5fMGGq
# duWX/l5Qjia1vN0r7NhVxToMdJvmnIrwhMQDjnTYRlFd5D9RMca2znADWO92twNY
# lNFQcM1RvNBJyWdigEYEXeDQfaJqsO8DVnzVBDrc6Chkp966aGrJBerEO9uUlEHb
# U6CreWT1frTjhkxM812nAPaGTAcTwNjDCY/46TZkIDOZxkNoZuUFPhJMu3oIiyll
# eMBuZG0/lw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/833.ps1 | 833.ps1 | Param(
[parameter(Mandatory=$true)]
$CsvFilePath
)
$ErrorActionPreference = "Stop"
$scriptsPath = $PSScriptRoot
if ($PSScriptRoot -eq "") {
$scriptsPath = "."
}
. "$scriptsPath\asr_logger.ps1"
. "$scriptsPath\asr_common.ps1"
. "$scriptsPath\asr_csv_processor.ps1"
Function ProcessItemImpl($processor, $csvItem, $reportItem) {
$reportItem | Add-Member NoteProperty "UpdatePropertiesJobId" $null
$reportItem | Add-Member NoteProperty "ProtectableStatus" $null
$reportItem | Add-Member NoteProperty "ProtectionState" $null
$reportItem | Add-Member NoteProperty "ProtectionStateDescription" $null
$vaultName = $csvItem.VAULT_NAME
$sourceMachineName = $csvItem.SOURCE_MACHINE_NAME
$sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER
$targetAvailabilitySet = $csvItem.AVAILABILITY_SET
$targetPrivateIP = $csvItem.PRIVATE_IP
$targetSubnet = $csvItem.TARGET_SUBNET
$targetMachineSize = $csvItem.MACHINE_SIZE
$targetPostFailoverResourceGroup = $csvItem.TARGET_RESOURCE_GROUP
$vaultServer = $asrCommon.GetAndEnsureVaultContext($vaultName)
$fabricServer = $asrCommon.GetFabricServer($sourceConfigurationServer)
$protectionContainer = $asrCommon.GetProtectionContainer($fabricServer)
$protectableVM = $asrCommon.GetProtectableItem($protectionContainer, $sourceMachineName)
$processor.Logger.LogTrace("ProtectableStatus: '$($protectableVM.ProtectionStatus)'")
$reportItem.ProtectableStatus = $protectableVM.ProtectionStatus
if ($protectableVM.ReplicationProtectedItemId -ne $null) {
$protectedItem = $asrCommon.GetProtectedItem($protectionContainer, $sourceMachineName)
$reportItem.ProtectionState = $protectedItem.ProtectionState
$reportItem.ProtectionStateDescription = $protectedItem.ProtectionStateDescription
$processor.Logger.LogTrace("ProtectionState: '$($protectedItem.ProtectionState)'")
$processor.Logger.LogTrace("ProtectionDescription: '$($protectedItem.ProtectionStateDescription)'")
if ($protectedItem.ProtectionState -eq 'Protected') {
$processor.Logger.LogTrace("Creating job to set machine properties...")
$nicDetails = $protectedItem.NicDetailsList[0]
if (($targetAvailabilitySet -eq '') -or ($targetAvailabilitySet -eq $null)) {
$updatePropertiesJob = Set-AzureRmRecoveryServicesAsrReplicationProtectedItem `
-InputObject $protectedItem `
-PrimaryNic $nicDetails.NicId `
-RecoveryNicStaticIPAddress $targetPrivateIP `
-RecoveryNetworkId $nicdetails.RecoveryVMNetworkId `
-RecoveryNicSubnetName $targetSubnet `
-UseManagedDisk $False `
-Size $targetMachineSize
} else {
$targetAvailabilitySetObj = Get-AzureRmAvailabilitySet `
-ResourceGroupName $targetPostFailoverResourceGroup `
-Name $targetAvailabilitySet
$updatePropertiesJob = Set-AzureRmRecoveryServicesAsrReplicationProtectedItem `
-InputObject $protectedItem `
-PrimaryNic $nicDetails.NicId `
-RecoveryNicStaticIPAddress $targetPrivateIP `
-RecoveryNetworkId $nicdetails.RecoveryVMNetworkId `
-RecoveryNicSubnetName $targetSubnet `
-UseManagedDisk $False `
-RecoveryAvailabilitySet $targetAvailabilitySetObj.Id `
-Size $targetMachineSize
}
if ($updatePropertiesJob -eq $null)
{
$processor.Logger.LogErrorAndThrow("Error creating update properties job for '$($sourceMachineName)'")
}
$reportItem.UpdatePropertiesJobId = $updatePropertiesJob.Name
} else {
$processor.Logger.LogTrace("Item '$($sourceMachineName)' it is not in a Protected status")
}
} else {
$processor.Logger.LogTrace("'$($sourceMachineName)' item is not in a protected state ready for replication")
}
}
Function ProcessItem($processor, $csvItem, $reportItem) {
try {
ProcessItemImpl $processor $csvItem $reportItem
}
catch {
$exceptionMessage = $_ | Out-String
$processor.Logger.LogError($exceptionMessage)
throw
}
}
$logger = New-AsrLoggerInstance -CommandPath $PSCommandPath
$asrCommon = New-AsrCommonInstance -Logger $logger
$processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem
$processor.ProcessFile($CsvFilePath)
|
combined_dataset/train/non-malicious/Get-WebFile _1.1.ps1 | Get-WebFile _1.1.ps1 | ## Get-WebFile.ps1 (aka wget for PowerShell)
##############################################################################################################
## Downloads a file or page from the web
## History:
## v3.1 - Unwrap the filename when it has quotes around it
## v3 - rewritten completely using HttpWebRequest + HttpWebResponse to figure out the file name, if possible
## v2 - adds a ton of parsing to make the output pretty
## - added measuring the scripts involved in the command, (uses Tokenizer)
##############################################################################################################
#function wget {
param(
$url = (Read-Host "The URL to download"),
$fileName
)
$req = [System.Net.HttpWebRequest]::Create($url);
$res = $req.GetResponse();
if($fileName -and !(Split-Path $fileName)) {
$fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName
}
elseif(($fileName -eq $null) -or (Test-Path -PathType "Container" $fileName))
{
# if( -and !((Test-Path -PathType "Leaf" $fileName) -or ((Test-Path -PathType "Container" (Split-Path $fileName)) -and -not )))
[string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $res.Headers["Content-Disposition"] ).Groups[1].Value
$fileName = $fileName.trim("\\/""'")
if(!$fileName) {
$fileName = $res.ResponseUri.Segments[-1]
$fileName = $fileName.trim("\\/")
if(!$fileName) {
$fileName = Read-Host "Please provide a file name"
}
$fileName = $fileName.trim("\\/")
if(!([IO.FileInfo]$fileName).Extension) {
$fileName = $fileName + "." + $res.ContentType.Split(";")[0].Split("/")[1]
}
}
$fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName
}
if($res.StatusCode -eq 200) {
$reader = new-object System.IO.StreamReader $res.GetResponseStream()
$writer = new-object System.IO.StreamWriter $fileName
# TODO: stick this in a loop and give progress reports
$writer.Write($reader.ReadToEnd())
$reader.Close();
$writer.Close();
}
$res.Close();
ls $fileName
#}
|
combined_dataset/train/non-malicious/sample_43_26.ps1 | sample_43_26.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudguard'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '416303ec-c9d6-4a65-8413-14973e520be8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudguard Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudguardCompartment',
'Get-OCICloudguardConditionMetadataType',
'Get-OCICloudguardConditionMetadataTypesList',
'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule',
'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource',
'Get-OCICloudguardDataSourceEventsList',
'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector',
'Get-OCICloudguardDetectorRecipe',
'Get-OCICloudguardDetectorRecipeDetectorRule',
'Get-OCICloudguardDetectorRecipeDetectorRulesList',
'Get-OCICloudguardDetectorRecipesList',
'Get-OCICloudguardDetectorRule',
'Get-OCICloudguardDetectorRulesList',
'Get-OCICloudguardDetectorsList',
'Get-OCICloudguardImpactedResourcesList',
'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList',
'Get-OCICloudguardManagedListTypesList',
'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem',
'Get-OCICloudguardProblemEndpointsList',
'Get-OCICloudguardProblemEntitiesList',
'Get-OCICloudguardProblemHistoriesList',
'Get-OCICloudguardProblemsList',
'Get-OCICloudguardRecommendationsList',
'Get-OCICloudguardResourceProfile',
'Get-OCICloudguardResourceProfileEndpointsList',
'Get-OCICloudguardResourceProfileImpactedResourcesList',
'Get-OCICloudguardResourceProfilesList',
'Get-OCICloudguardResourceTypesList',
'Get-OCICloudguardResponderActivitiesList',
'Get-OCICloudguardResponderExecution',
'Get-OCICloudguardResponderExecutionsList',
'Get-OCICloudguardResponderRecipe',
'Get-OCICloudguardResponderRecipeResponderRule',
'Get-OCICloudguardResponderRecipeResponderRulesList',
'Get-OCICloudguardResponderRecipesList',
'Get-OCICloudguardResponderRule',
'Get-OCICloudguardResponderRulesList',
'Get-OCICloudguardSecurityPoliciesList',
'Get-OCICloudguardSecurityPolicy',
'Get-OCICloudguardSecurityRecipe',
'Get-OCICloudguardSecurityRecipesList',
'Get-OCICloudguardSecurityZone',
'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting',
'Get-OCICloudguardSightingEndpointsList',
'Get-OCICloudguardSightingImpactedResourcesList',
'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList',
'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe',
'Get-OCICloudguardTargetDetectorRecipeDetectorRule',
'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList',
'Get-OCICloudguardTargetDetectorRecipesList',
'Get-OCICloudguardTargetResponderRecipe',
'Get-OCICloudguardTargetResponderRecipeResponderRule',
'Get-OCICloudguardTargetResponderRecipeResponderRulesList',
'Get-OCICloudguardTargetResponderRecipesList',
'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList',
'Get-OCICloudguardWorkRequest',
'Get-OCICloudguardWorkRequestErrorsList',
'Get-OCICloudguardWorkRequestLogsList',
'Get-OCICloudguardWorkRequestsList',
'Invoke-OCICloudguardExecuteResponderExecution',
'Invoke-OCICloudguardRequestRiskScores',
'Invoke-OCICloudguardRequestSecurityScores',
'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend',
'Invoke-OCICloudguardRequestSummarizedActivityProblems',
'Invoke-OCICloudguardRequestSummarizedProblems',
'Invoke-OCICloudguardRequestSummarizedResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedRiskScores',
'Invoke-OCICloudguardRequestSummarizedSecurityScores',
'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendProblems',
'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores',
'Invoke-OCICloudguardSkipBulkResponderExecution',
'Invoke-OCICloudguardSkipResponderExecution',
'Invoke-OCICloudguardTriggerResponder',
'Move-OCICloudguardDataSourceCompartment',
'Move-OCICloudguardDetectorRecipeCompartment',
'Move-OCICloudguardManagedListCompartment',
'Move-OCICloudguardResponderRecipeCompartment',
'Move-OCICloudguardSecurityRecipeCompartment',
'Move-OCICloudguardSecurityZoneCompartment',
'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource',
'New-OCICloudguardDetectorRecipe',
'New-OCICloudguardDetectorRecipeDetectorRule',
'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe',
'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone',
'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe',
'New-OCICloudguardTargetResponderRecipe',
'Remove-OCICloudguardCompartment',
'Remove-OCICloudguardDataMaskRule',
'Remove-OCICloudguardDataSource',
'Remove-OCICloudguardDetectorRecipe',
'Remove-OCICloudguardDetectorRecipeDetectorRule',
'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource',
'Remove-OCICloudguardManagedList',
'Remove-OCICloudguardResponderRecipe',
'Remove-OCICloudguardSecurityRecipe',
'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget',
'Remove-OCICloudguardTargetDetectorRecipe',
'Remove-OCICloudguardTargetResponderRecipe',
'Stop-OCICloudguardWorkRequest',
'Update-OCICloudguardBulkProblemStatus',
'Update-OCICloudguardConfiguration',
'Update-OCICloudguardDataMaskRule',
'Update-OCICloudguardDataSource',
'Update-OCICloudguardDetectorRecipe',
'Update-OCICloudguardDetectorRecipeDetectorRule',
'Update-OCICloudguardManagedList',
'Update-OCICloudguardProblemStatus',
'Update-OCICloudguardResponderRecipe',
'Update-OCICloudguardResponderRecipeResponderRule',
'Update-OCICloudguardSecurityRecipe',
'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget',
'Update-OCICloudguardTargetDetectorRecipe',
'Update-OCICloudguardTargetDetectorRecipeDetectorRule',
'Update-OCICloudguardTargetResponderRecipe',
'Update-OCICloudguardTargetResponderRecipeResponderRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/901.ps1 | 901.ps1 | $gitdirectory="<Replace with path to local Git repo>"
$webappname="mywebapp$(Get-Random)"
cd $gitdirectory
New-AzWebApp -Name $webappname
git push azure master
|
combined_dataset/train/non-malicious/404.ps1 | 404.ps1 | if (-not [PSFramework.Configuration.ConfigurationHost]::ImportFromRegistryDone)
{
$config_hash = Read-PsfConfigPersisted -Scope 127
foreach ($value in $config_hash.Values)
{
try
{
if (-not $value.KeepPersisted) { Set-PSFConfig -FullName $value.FullName -Value $value.Value -EnableException }
else { Set-PSFConfig -FullName $value.FullName -PersistedValue $value.Value -PersistedType $value.Type -EnableException }
[PSFramework.Configuration.ConfigurationHost]::Configurations[$value.FullName.ToLower()].PolicySet = $value.Policy
[PSFramework.Configuration.ConfigurationHost]::Configurations[$value.FullName.ToLower()].PolicyEnforced = $value.Enforced
}
catch { }
}
[PSFramework.Configuration.ConfigurationHost]::ImportFromRegistryDone = $true
}
|
combined_dataset/train/non-malicious/3819.ps1 | 3819.ps1 |
function Test-NewAzureRmVhdVMWithValidDiskFile
{
$rgname = Get-ComputeTestResourceName
try
{
[string]$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(' ', '');
New-AzResourceGroup -Name $rgname -Location $loc -Force;
[string]$file = ".\VhdFiles\tiny.vhd";
$vmname = $rgname + 'vm';
[string]$domainNameLabel = "$vmname-$rgname".tolower();
$vm = New-AzVM -ResourceGroupName $rgname -Name $vmname -Location $loc -DiskFile $file -OpenPorts 1234 -DomainNameLabel $domainNameLabel;
Assert-AreEqual $vm.Name $vmname;
Assert-AreEqual $vm.Location $loc;
Assert-Null $vm.OSProfile $null;
Assert-Null $vm.StorageProfile.DataDisks;
Assert-NotNull $vm.StorageProfile.OSDisk.ManagedDisk;
$stoname = $vmname;
$diskname = $vmname;
$disk = Get-AzDisk -ResourceGroupName $rgname -DiskName $diskname;
Assert-AreEqual Windows $disk.OsType;
Assert-AreEqual Import $disk.CreationData.CreateOption;
Assert-AreEqual "https://${stoname}.blob.core.windows.net/${rgname}/${diskname}.vhd" $disk.CreationData.SourceUri;
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-NewAzureRmVhdVMWithInvalidDiskFile
{
$rgname = Get-ComputeTestResourceName;
try
{
[string]$file1 = ".\test_invalid_file_1.vhd";
$st = Set-Content -Path $file1 -Value "test1" -Force;
[string]$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(' ', '');
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$expectedException = $false;
$expectedErrorMessage = "*unsupported format*";
try
{
[string]$domainNameLabel = "$rgname-$rgname".tolower();
$st = New-AzVM -ResourceGroupName $rgname -Name $rgname -Location $loc -Linux -DiskFile $file1 -OpenPorts 1234 -DomainNameLabel $domainNameLabel;
}
catch
{
if ($_ -like $expectedErrorMessage)
{
$expectedException = $true;
}
}
if (-not $expectedException)
{
throw "Expected exception from calling New-AzVM was not caught: '$expectedErrorMessage'.";
}
}
finally
{
Clean-ResourceGroup $rgname;
}
}
|
combined_dataset/train/non-malicious/sample_34_87.ps1 | sample_34_87.ps1 | ##########################################################################################
# <copyright file="Microsoft.EnterpriseManagement.OperationsManager.ClientShell.NonInteractiveStartup.ps1" company="Microsoft">
# Copyright (c) Microsoft Corporation. All rights reserved.
# </copyright>
# <summary>Microsoft.EnterpriseManagement.OperationsManager.ClientShell.NonInteractiveStartup.ps1 script.</summary>
##########################################################################################
.\Microsoft.EnterpriseManagement.OperationsManager.ClientShell.Functions.ps1;
Start-OperationsManagerClientShell -ManagementServerName: "" -PersistConnection: $false -Interactive: $false;
# SIG # Begin signature block
# MIIn8QYJKoZIhvcNAQcCoIIn4jCCJ94CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNakoxqclAnwAG
# P7Fus93V01sEW2Sjo0B1I6XqFAwnxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGdEwghnNAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCggeAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJevgd4IkNy9ZuDvHtdkVXgq
# kbkxfV9g5wvj4jjqFrwmMHQGCisGAQQBgjcCAQwxZjBkoEaARABTAHkAcwB0AGUA
# bQAgAEMAZQBuAHQAZQByACAALQAgAE8AcABlAHIAYQB0AGkAbwBuAHMAIABNAGEA
# bgBhAGcAZQByoRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTANBgkqhkiG9w0B
# AQEFAASCAQAu9V//Wk5T9fW0z7kLO/xCuXS9+cdEFPDZofh8s6/HHUtWuprXq7XL
# slE48Oq6PpY/YwGhtXWCd8c7JdFtAJQgdP+QhrT30PQvbMO5mmnBNxKK3lsiW/3H
# MgoRWBg5hOEdqnfirKcKOEDI0+J1k1PitHoUH2kSSsT+H0fmUWNunO3BPiliqBny
# xrXpdjGcKbNh9E36dkNqIrVs9gvhiSjlaRmSTQIkRBYWZss5wBQL9KBgWuSUyZD4
# mhdpkehKSjRbhpu4TYq1R4efZg4wej5B8W+70nr6kDewTOf+dWVHBpapS+A+lOaB
# zy0O2sJDnn3yPYkVAdGREhIQfZo1hVbLoYIXKTCCFyUGCisGAQQBgjcDAwExghcV
# MIIXEQYJKoZIhvcNAQcCoIIXAjCCFv4CAQMxDzANBglghkgBZQMEAgEFADCCAVkG
# CyqGSIb3DQEJEAEEoIIBSASCAUQwggFAAgEBBgorBgEEAYRZCgMBMDEwDQYJYIZI
# AWUDBAIBBQAEIEyZ3BCjHAZqwqkoclBi7s8MrSQqEZrhhS3Z03YhJrtrAgZl1f2z
# AXIYEzIwMjQwMzA1MTM0NTUyLjMzM1owBIACAfSggdikgdUwgdIxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJ
# cmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBF
# U046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeWPasDzPbQLowABAAAB5TAN
# BgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0y
# MzEwMTIxOTA3MzVaFw0yNTAxMTAxOTA3MzVaMIHSMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP
# cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQt
# NEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqXvgOtq7Y7osusk7cfJO
# 871pdqL/943I/kwtZmuZQY04kw/AwjTxX3MF9E81y5yt4hhLIkeOQwhQaa6HSs9X
# n/b5QIsas3U/vuf1+r+Z3Ncw3UXOpo8d0oSUqd4lDxHpw/h2u7YbKaa3WusZw17z
# TQJwPp3812iiaaR3X3pWo62NkUDVda74awUF5YeJ7P8+WWpwz95ae2RAyzSUrTOY
# J8f4G7uLWH4UNFHwXtbNSv/szeOFV0+kB+rbNgIDxlUs2ASLNj68WaDH7MO65T8Y
# KEMruSUNwLD7+BWgS5I6XlyVCzJ1ZCMklftnbJX7UoLobUlWqk/d2ko8A//i502q
# lHkch5vxNrUl+NFTNK/epKN7nL1FhP8CNY1hDuCx7O4NYz/xxnXWRyjUm9TI5DzH
# 8kOQwWpJHCPW/6ZzosoqWP/91YIb8fD2ml2VYlfqmwN6xC5BHsVXt4KpX+V9qOgu
# k83H/3MXV2/zJcF3OZYk94KJ7ZdpCesAoOqUbfNe7H201CbPYv3pN3Gcg7Y4aZjE
# EABkBagpua1gj4KLPgJjI7QWblndPjRrl3som5+0XoJOhxxz9Sn+OkV9CK0t+N3v
# VxL5wsJ6hD6rSfQgAu9X5pxsQ2i5I6uO/9C1jgUiMeUjnN0nMmcayRUnmjOGOLRh
# Gxy/VbAkUC7LIIxC8t2Y910CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTf/5+Hu01z
# MSJ8ReUJCAU5eAyHqjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAM/rCE4WMPVp3
# waQQn2gsG69+Od0zIZD1HgeAEpKU+3elrRdUtyKasmUOcoaAUGJbAjpc6DDzaF2i
# UOIwMEstZExMkdZV5RjWBThcHw44jEFz39DzfNvVzRFYS6mALjwj5v7bHZU2AYlS
# xAjI9HY+JdCFPk/J6syBqD05Kh1CMXCk10aKudraulXbcRTAV47n7ehJfgl4I1m+
# DJQ7MqnIy+pVq5uj4aV/+mx9bm0hwyNlW3R6WzB+rSok1CChiKltpO+/vGaLFQkZ
# NuLFiJ9PACK89wo116Kxma22zs4dsAzv3lm8otISpeJFSMNhnJ4fIDKwwQAtsiF1
# eAcSHrQqhnLOUFfPdXESKsTueG5w3Aza1WI6XAjsSR5TmG51y2dcIbnkm4zD/Bvt
# zvVEqKZkD8peVamYG+QmQHQFkRLw4IYN37Nj9P0GdOnyyLfpOqXzhV+lh72IebLs
# +qrGowXYKfirZrSYQyekGu4MYT+BH1zxJUnae2QBHLlJ+W64n8wHrXJG9PWZTHeX
# Kmk7bZ4+MGOfCgS9XFsONPWOF0w116864N4kbNEsr0c2ZMML5N1lCWP5UyAibxl4
# QhE0XShq+IX5BlxRktbNZtirrIOiTwRkoWJFHmi0GgYu9pgWnEFlQTyacsq4OVih
# uOvGHuWfCvFX98zLQX19KjYnEWa0uC0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD3jaIa5gWuwTjDNYN3zkSkzpGLCqCBgzCB
# gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUA
# AgUA6ZGdfzAiGA8yMDI0MDMwNTIxMzI0N1oYDzIwMjQwMzA2MjEzMjQ3WjB0MDoG
# CisGAQQBhFkKBAExLDAqMAoCBQDpkZ1/AgEAMAcCAQACAgbDMAcCAQACAhHeMAoC
# BQDpku7/AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAOO6iEHbVxoluzo8d
# Dr7gCSkWprT8cLZLdWV07Fo38NtKqZwqdD64fkui1tmHK9n6dH1OAjaoJnsG/+Ab
# nF3RsFpmP8hDOz8sXZVnwVc8OevTQqao2Q8AlHPLRhGLjSvlPaXtL+pb9c5FnxaH
# 2RTg2pVQVuScb4KJJWuissB/qeQxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB5TANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCDJEpe3DGythD1nXyo2bE1KntzCeYynmvAzdzEjWyt3yTCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vwj+kCh/TULCFvFQf1
# Tr3tMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHl
# j2rA8z20C6MAAQAAAeUwIgQg+jFt3esHkN6VfLXbA8YkXrZDohUatT70ABnTKsue
# l5AwDQYJKoZIhvcNAQELBQAEggIASbYC98XJh4/fgtmPVE14g4HqWO0l7SO72Fin
# /RPKPOSzHmNHX93F9X3TjeEQylSyZQXijcsy8T0Izd4R4BnLwWbQcw9ufUrKlPNV
# TvKGw12MDBRrx3a5uEgs5pVRHoXaWZrIVb1eT7R2VEOSouWudE9CylmEVvexxHxb
# sJiJZVqHE/VfdJfwh6u4pf9r3VwR9u1ouZkNag8LKgEzQcDHWr8KoJdO87q+jZPp
# iHd4r+39SLVNRrhOebeQJ93RMx5svHKSo6/e3fXYbacs4mbBXW7fdyradTIDM4SM
# ME4ypGCBb+lanQFXhOWVgFDUl93s6VMnoTnX9dntvNg/BKl4UFmi55m713DJG4fs
# bSVCn44M0DG5yfR2S2wKpzPlMVohmu/dKs7H2Bc+uidqCzMztzQBDMvcsAQZHufV
# fyBL11OHWg/W0soYPxVen5MMPj/UQJjRpK3W52YrQO1PPn86DJmpahK+0wIvRSf7
# fIF4KhwU9/acMHgfSOsD67j4kRWhod4s6tQYqvNJXV1dZ2mpG0u9jhr5YJ6cNbAU
# nVMpbcY0swLftHX2dQdF83blz3Fx+JEgSeagMYMZ63cZmP1d2+pQbQ0iKfhH/Wr8
# FMiS/idJNnll0P29zeBqFqW/8zP1ae1X5hDLENDRstB81hEj/2mUOFA+BpfMlUBJ
# CjVO0SI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1408.ps1 | 1408.ps1 |
function Uninstall-CMsmqMessageQueue
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[Switch]
$Private
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$commonArgs = @{ 'Name' = $Name ; 'Private' = $Private }
if( -not (Test-CMsmqMessageQueue @commonArgs) )
{
return
}
if( $pscmdlet.ShouldProcess( "MSMQ Message Queue $Name", "remove" ) )
{
try
{
[Messaging.MessageQueue]::Delete( (Get-CMsmqMessageQueuePath @commonArgs) )
}
catch
{
Write-Error $_
return
}
while( Test-CMsmqMessageQueue @commonArgs )
{
Start-Sleep -Milliseconds 100
}
}
}
Set-Alias -Name 'Remove-MsmqMessageQueue' -Value 'Uninstall-CMsmqMessageQueue'
|
combined_dataset/train/non-malicious/sample_27_60.ps1 | sample_27_60.ps1 |
///////////////////////////////////////////////////////////////////////////////
// Helper to set a designer prop
///////////////////////////////////////////////////////////////////////////////
function setDesignerProp(tname, ttype, tvalue) {
var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0);
trait.value = tvalue;
}
///////////////////////////////////////////////////////////////////////////////
// Toggle button and gobal state
///////////////////////////////////////////////////////////////////////////////
var ct = command.getTrait("state");
if (ct.value == 0) {
ct.value = 2;
setDesignerProp("showVertexNormals", "bool", true);
}
else {
ct.value = 0;
setDesignerProp("showVertexNormals", "bool", false);
}
// SIG // Begin signature block
// SIG // MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // 8WnjIYTGGZLXQAPNeLf+s8nHbPKRa9IodmxB9XX17/2g
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghoLMIIaBwIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCDYy41hr/tCLcXLHqh+aauCDBgiWBaTtik8
// SIG // /BcZikSWhDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAJvP/rN4
// SIG // Rn3FTcLGUKdsDiWQ5wxVElxZttTFTMcXSUHRf2zIIZWM
// SIG // utVnPhoqr0C+USChyihCmgqNsAd99+8jQ1XPRp6y1gLK
// SIG // xDUYgtzM7e+StaioGQfVcUdiKnB1CXl8JeXqcF1xvY7t
// SIG // NjUHXbKoSMwe5cB2DHjV60tQzbOPeD8nXmLxqH8/tEuV
// SIG // k51n+eCFQ/6STZTfxJ0O+us9yOuvFnpi5Hhcr7YkAoWZ
// SIG // E3Dve2RG02t1o6JSZj/fV94mXhbD92HvYkOupL9ZJvjY
// SIG // svIfo4tQc8T3iKBKUW8Uo9ZZLiDa6UuSAQ3KF8G01M0w
// SIG // p0zIut0VlL1c3aMvkdy4ZYEEadahgheVMIIXkQYKKwYB
// SIG // BAGCNwMDATGCF4Ewghd9BgkqhkiG9w0BBwKgghduMIIX
// SIG // agIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUQYLKoZIhvcN
// SIG // AQkQAQSgggFABIIBPDCCATgCAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgl0KKpX7fKHVHzI5fuA/B
// SIG // 8aPsy7APxE/ccB0d3Ud+vSMCBmXnp4zTeRgSMjAyNDAz
// SIG // MDYwMjM4NTkuNThaMASAAgH0oIHRpIHOMIHLMQswCQYD
// SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
// SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
// SIG // IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQg
// SIG // QW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hp
// SIG // ZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
// SIG // BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
// SIG // ghHsMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB
// SIG // AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MTlaFw0y
// SIG // NTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy
// SIG // YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046
// SIG // OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m
// SIG // dCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3
// SIG // DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1D
// SIG // taWMv9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4
// SIG // CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
// SIG // tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE
// SIG // 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23
// SIG // EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQqdskM
// SIG // 48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWH
// SIG // g9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4
// SIG // Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8/ar9cG4W
// SIG // 7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+Df
// SIG // Xl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0S
// SIG // SCV/mpXC0BoPkk5asfxrrJbCsJePHSOEblpJzRmzaP6O
// SIG // MXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1e
// SIG // qdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08Wk
// SIG // JJuyzPqfitgubdRCmYr9CVsNOuW+wHDYGhciJDF2Lkrj
// SIG // kFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN
// SIG // 7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiA
// SIG // nzY4dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0A
// SIG // XmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
// SIG // Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
// SIG // Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
// SIG // MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYI
// SIG // KwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1T
// SIG // dGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
// SIG // /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYD
// SIG // VR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0
// SIG // ofDbk+llWi1cC6nsfie5Jtp09o6b6ARCpvtDPq2KFP+h
// SIG // i+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815
// SIG // pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/
// SIG // OYG/B/gNnz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd
// SIG // 2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5E
// SIG // CAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEF
// SIG // ikunbUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFb
// SIG // fpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
// SIG // uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL
// SIG // BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5H
// SIG // s36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTeGEDO
// SIG // oIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0x
// SIG // aO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIu
// SIG // fGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSvKhqQpmdB
// SIG // zAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrx
// SIG // dZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMA
// SIG // AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw
// SIG // gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1p
// SIG // Y3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0
// SIG // eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4
// SIG // MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
// SIG // c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
// SIG // BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
// SIG // AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw
// SIG // ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk
// SIG // 4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX
// SIG // 9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG
// SIG // Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
// SIG // RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2
// SIG // Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+
// SIG // jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1
// SIG // KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL
// SIG // 64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakX
// SIG // W2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX78
// SIG // 2Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOm
// SIG // TTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07B
// SIG // MzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIz
// SIG // GHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
// SIG // +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
// SIG // emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode
// SIG // 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJ
// SIG // KwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQU
// SIG // KqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n
// SIG // FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
// SIG // KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S
// SIG // ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD
// SIG // CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNV
// SIG // HQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME
// SIG // GDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8E
// SIG // TzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j
// SIG // b20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRf
// SIG // MjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
// SIG // CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
// SIG // LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt
// SIG // 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U5
// SIG // 18JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN
// SIG // 3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu
// SIG // 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
// SIG // pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnD
// SIG // vBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu
// SIG // LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG
// SIG // +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+Cljd
// SIG // QDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJ
// SIG // VGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRr
// SIG // akURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+
// SIG // CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8C
// SIG // wYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVn
// SIG // K+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
// SIG // 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
// SIG // ELQdVTNYs6FwZvKhggNPMIICNwIBATCB+aGB0aSBzjCB
// SIG // yzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
// SIG // b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
// SIG // Y3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj
// SIG // cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
// SIG // CxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3
// SIG // MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
// SIG // ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCzcgTnGasSwe/d
// SIG // ru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVT
// SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
// SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
// SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZIm
// SIG // DDAiGA8yMDI0MDMwNTIzMTUyNFoYDzIwMjQwMzA2MjMx
// SIG // NTI0WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpkiYM
// SIG // AgEAMAkCAQACARoCAf8wBwIBAAICEY8wCgIFAOmTd4wC
// SIG // AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoD
// SIG // AqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
// SIG // 9w0BAQsFAAOCAQEAQ/mVHAz1IukM9GD46PmITSSe28+V
// SIG // SHS3asneU1ficTJ23Dvhyy9jTEyNJn4QyFQnaqDl1gDM
// SIG // uw6kBCWD3sV0jQ9DeZe+NVGlt01/q45WZ8WRVJFxdYZW
// SIG // x+QzmYRqJq9tbBKM6Oznz9xl8b9EMnRaQGupT92OTYLz
// SIG // bUBBUiLeLRvbeEe4a0jJbBH4mfwvAVrxTZfXYZVe4cR+
// SIG // PDEMQ7mKVP5dW236cuKzLtwn/Za8T8z2imDFuA39zoeU
// SIG // veKKKjI0tlDFoS5RqLJElU4vHDPjbDgUQegFr/EC7x4u
// SIG // xPkwDB2k+2cJGBbeWJccIYOp3VIRgxjeP9diFzJOhp/+
// SIG // OitwXzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVT
// SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
// SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
// SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFBDQSAyMDEwAhMzAAAB5y6PL5MLTxvpAAEAAAHn
// SIG // MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx
// SIG // DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEICss
// SIG // 87P0debyzO7ABfhFdnvYfL4t3yhJuq806r3iclXOMIH6
// SIG // BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg5TZdDXZq
// SIG // hv0N4MVcz1QUd4RfvgW/QAG9AwbuoLnWc60wgZgwgYCk
// SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
// SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
// SIG // Aecujy+TC08b6QABAAAB5zAiBCDXJA3surVkGmcQwEiV
// SIG // jkqKGBV2NaFjBQUYO+QQp/4amDANBgkqhkiG9w0BAQsF
// SIG // AASCAgAQZAFJMaOJeO7YdUHu9zlEbtj0GXDsTzKLRpoq
// SIG // grUwcTzZH+4jJK/NDstwCXEfrJDF3yuyMw+x8nuxHSn4
// SIG // +gL+dXZbHG1CJvbkrwfemGn+8U9bW0mzVtJS9BGwOl6b
// SIG // /cS1XgsUW1F8w9nd9zhyWcYO1oPqyqfyR53ZYb3aXglX
// SIG // IeDNQOF7GtG4G4Yf+7UXOVYTF0cbZR4+rF0F9GMO9EEY
// SIG // 2ZqASnHQGTtaBcSYCk/c1d2UF3G3XHmCN8DJ8ES6fABj
// SIG // AXwdjqyMmLeiX3yb+7CyE40K49hwj0SRyaxEEcankQHq
// SIG // OVxUWKRzsoXJ9Mbq4KXxPOwObM5i58ZK5KPkKR471M+B
// SIG // NVxOFAC1jelIuaXRdELcOE6W1WsXZHLlFiQqp4fJTxv0
// SIG // sJeOtq0PlQZqv7qzutprnT0XtgjsKI9nVFz4P6uKsury
// SIG // 5d4WI1mXJVeXYmzfXvbxqzH60x5RqJ6QDVek/lb1QMxb
// SIG // KXAItQe41U7HNEAaPQ2QW4xWzBf6EmF8+CqzNqcRPmWY
// SIG // FoV5/bi1q9yCWKozT2tM9nTejHfjtZtCPTU3CKFD2f3w
// SIG // 0zAExdmb/h2b9sl50j97wJvNi723Kkyh8ltV0zlZjlSB
// SIG // fkAX9EzFbACHs+DxpfmZSPSXbd+OFPnfPXlncR7JZRoK
// SIG // Bs2Z5vq/ns2moqehDsrRVPigqpaeoQ==
// SIG // End signature block
|
combined_dataset/train/non-malicious/3862.ps1 | 3862.ps1 |
function Test-NewExchangeConnectionV4V6
{
$kind = isDirect $false;
$loc = "Los Angeles"
$peeringLocation = getPeeringLocation $kind $loc;
$facilityId = $peeringLocation[0].PeeringDBFacilityId
Write-Debug "Creating Connection at $facilityId"
$md5 = getHash
$md5 = $md5.ToString()
Write-Debug "Created Hash $md5"
$sessionv4 = newIpV4Address $false $false 0 0
$sessionv6 = newIpV6Address $false $false 0 0
Write-Debug "Created IPs $sessionv4"
$maxv4 = maxAdvertisedIpv4
$maxv6 = maxAdvertisedIpv6
Write-Debug "Created maxAdvertised $maxv4 $maxv6"
$createdConnection = New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv4 $maxv4 -MaxPrefixesAdvertisedIPv6 $maxv6 -PeerSessionIPv4Address $sessionv4 -PeerSessionIPv6Address $sessionv6 -MD5AuthenticationKey $md5
Assert-AreEqual $md5 $createdConnection.BgpSession.Md5AuthenticationKey
Assert-AreEqual $facilityId $createdConnection.PeeringDBFacilityId
Assert-AreEqual $maxv4 $createdConnection.BgpSession.MaxPrefixesAdvertisedV4
Assert-AreEqual $maxv6 $createdConnection.BgpSession.MaxPrefixesAdvertisedv6
Assert-AreEqual $sessionv4 $createdConnection.BgpSession.PeerSessionIPv4Address
Assert-AreEqual $sessionv6 $createdConnection.BgpSession.PeerSessionIPv6Address
}
function Test-NewExchangeConnectionV4
{
$kind = isDirect $false;
$loc = "Los Angeles"
$peeringLocation = getPeeringLocation $kind $loc;
$facilityId = $peeringLocation[0].PeeringDBFacilityId
Write-Debug "Creating Connection at $facilityId"
$md5 = getHash
$md5 = $md5.ToString()
Write-Debug "Created Hash $md5"
$sessionv4 = newIpV4Address $false $false 0 0
$sessionv6 = $null
Write-Debug "Created IPs $sessionv4"
$maxv4 = maxAdvertisedIpv4
$maxv6 = $null
Write-Debug "Created maxAdvertised $maxv4 $maxv6"
$createdConnection = New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv4 $maxv4 -PeerSessionIPv4Address $sessionv4 -MD5AuthenticationKey $md5
Assert-AreEqual $md5 $createdConnection.BgpSession.Md5AuthenticationKey
Assert-AreEqual $facilityId $createdConnection.PeeringDBFacilityId
Assert-AreEqual $maxv4 $createdConnection.BgpSession.MaxPrefixesAdvertisedV4
Assert-AreEqual $maxv6 $createdConnection.BgpSession.MaxPrefixesAdvertisedv6
Assert-AreEqual $sessionv4 $createdConnection.BgpSession.PeerSessionIPv4Address
Assert-AreEqual $sessionv6 $createdConnection.BgpSession.PeerSessionIPv6Address
}
function Test-NewExchangeConnectionV6
{
$kind = isDirect $false;
$loc = "Los Angeles"
$peeringLocation = getPeeringLocation $kind $loc;
$facilityId = $peeringLocation[0].PeeringDBFacilityId
Write-Debug "Creating Connection at $facilityId"
$md5 = getHash
$md5 = $md5.ToString()
Write-Debug "Created Hash $md5"
$sessionv6 = newIpV6Address $false $false 0 0
Write-Debug "Created IPs $sessionv4"
$maxv6 = maxAdvertisedIpv6
Write-Debug "Created maxAdvertised $maxv4 $maxv6"
$createdConnection = New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv6 $maxv6 -PeerSessionIPv6Address $sessionv6 -MD5AuthenticationKey $md5
Assert-AreEqual $md5 $createdConnection.BgpSession.Md5AuthenticationKey
Assert-AreEqual $facilityId $createdConnection.PeeringDBFacilityId
Assert-AreEqual $null $createdConnection.BgpSession.MaxPrefixesAdvertisedV4
Assert-AreEqual $maxv6 $createdConnection.BgpSession.MaxPrefixesAdvertisedv6
Assert-AreEqual $null $createdConnection.BgpSession.PeerSessionIPv4Address
Assert-AreEqual $sessionv6 $createdConnection.BgpSession.PeerSessionIPv6Address
}
function Test-NewExchangeConnectionWrongV4
{
$kind = isDirect $false;
$loc = "Los Angeles"
$peeringLocation = getPeeringLocation $kind $loc;
$facilityId = $peeringLocation[0].PeeringDBFacilityId
Write-Debug "Creating Connection at $facilityId"
$md5 = getHash
$md5 = $md5.ToString()
Write-Debug "Created Hash $md5"
$sessionv4 = newIpV4Address $false $false 0 0
$sessionv6 = newIpV6Address $false $false 0 0
Write-Debug "Created IPs $sessionv4"
$maxv4 = maxAdvertisedIpv4
$maxv6 = maxAdvertisedIpv6
Write-Debug "Created maxAdvertised $maxv4 $maxv6"
Assert-ThrowsContains {New-AzPeeringExchangeConnectionObject -PeeringDbFacilityId $facilityId -MaxPrefixesAdvertisedIPv4 $maxv4 -MaxPrefixesAdvertisedIPv6 $maxv6 -PeerSessionIPv4Address $sessionv4 -PeerSessionIPv6Address $sessionv6 -MD5AuthenticationKey $md5} "Parameter name: Invalid Prefix"
} |
combined_dataset/train/non-malicious/sample_11_70.ps1 | sample_11_70.ps1 | ConvertFrom-StringData @'
id_appliedsectemploutput=Applied Security Templates
id_appliedsectemplobtaining=Gathering applied security templates
'@
# SIG # Begin signature block
# MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDMO44RTwPSzkwb
# nqjwOLKr2rtbSa9yaD7TVGOq+rCar6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMfT
# 8tUBctfXR2/YKi5tlzg2fBbKRz7CDW977mUbEuNAMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAer4bEJ7SlWq/sStroMJ9CuPyBp7UOZUVzo6F
# GCl/AAfhAQgEmU6qsBE9TETzGfMT1Y8drv45+RGqWXDJy2rumDi7szon+0kUpP/P
# XvIIhHW6P9dpDJNNJrM8fwS2hmvqw7bgJuonawF8tNuWmECndJMwbq+oMGrvq7ab
# nh+q9zWg4C22MLKKslgjN4EVTATaacG5aM0AcROa6sA9gB3Bzg3/lAaJoXKSB7uz
# 9K/qm6/CHHKZjgKQtFfgVSnsEJcyNrZRrTZz3Bja/wuaVt+d8x2MjFleZGFdHNzh
# 82RK9vviW6z6hEbHxms+pcPt+XfK1rES19uZmf5/VcnVR2tnNaGCF68wgherBgor
# BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCP/OyGFMMqnSyGXjXry2v4Q0zG2qn0IA7G
# z1e2JHYCKgIGZutLSAOMGBIyMDI0MTAyODExNDA0MC40NFowBIACAfSggdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH/Ejh8
# 98Fl1qEAAQAAAf8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046NEMxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ
# 6JXSkHtuDz+pz+aSIN0lefMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1T
# hUKQBkReq+TE/lA1O0Ebkil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGH
# F8cVXu+G2aocsIKYPGFk+YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCed
# xR22nXGMaYKl0EzKCT8rSHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9Mwq
# NgPqkt4E/SFkOHk/d/jGEYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvR
# J1HupCW/mnAM16tsrdhIQMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v3
# 98gSk8CULxiKzFdoZfhGkMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G
# 5bN1SKvRneOI461oOrtd3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJp
# uiLXa6xXxrG2VP90J48Lid1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0Dj
# Lezob6BDfmj3SPaLpqZprwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj21
# 2xZMiBlZU5JL25QeFJiRuAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYD
# VR0OBBYEFMP6leT+tP93sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
# g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt
# ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l
# AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA
# A4ICAQA5I03kykuLK6ebzrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCn
# pa2CiUitq2K9eM4bWUiNrIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86
# J699uwjNOT8bnX66JQmTvvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZm
# Or87hn89yZUa2MamzZMK0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ
# 3w3nqOmX2Si0uF293z1Fs6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd
# 0thMAj3WBM1QXsED2rUS9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPL
# Q8PzdoK3v1FrQh0MgxK7BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52B
# F7y1d0auAOgF65U4r5xEKVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K26
# 6VhhxEr3mqKEXSKtCzr9Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDdd
# FE7AC/TXogK5PyFjUifJbuPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJj
# g4a4ZTVJdofj0lI/e3zIZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMC
# AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m
# dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy
# NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9
# DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2
# Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N
# 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc
# ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ
# j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk
# lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy
# L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M
# 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
# pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
# HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode
# 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA
# ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB
# MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE
# AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
# /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
# b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt
# 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP
# MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++
# Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9
# QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2
# wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR
# AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z
# bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx
# t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3
# Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
# uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
# cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVy
# c+TBEsVE9cWymaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6snaZTAiGA8yMDI0MTAyODA5Mzk0OVoYDzIwMjQx
# MDI5MDkzOTQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydplAgEAMAoCAQAC
# AgU8AgH/MAcCAQACAhQpMAoCBQDqyyvlAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG
# CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL
# BQADggEBAC5Q0mZXZYSZmBYEzcnJMnCN3t5Hxb7Mh+9aVdlRs4Ds6h6ctOa91ofI
# +MgGrNVVf46wKYwDisJIGIVXK3u8PunDoLSBDsbvikcTgar2Kxq7z1XrIVlvRypa
# BzGly9Hn5cWIqjG02tn4gI1A0tIClGHW0Vn0Cc5rqkQATmkArMUWn+IpkZWd51Zx
# aIPp3Jg+OInXRmWUMkCQh5L/CjIpVWoRHGKp+e+aHgX30Fpj7f3ssB8u9ZBpDtpj
# yQ1q8MjADCb9YW1jNLAW/+CVOOA5Ke8WHeYrqB7VGJwwzdVOWr98Dm9KK7r1r7iz
# APhAkFRjuT7rUWTleVm7qGj0XE7U7w4xggQNMIIECQIBATCBkzB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgB
# ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3
# DQEJBDEiBCDgCnOm7m3+BXeVdUrXDY/61q84qgMcCmX4ROG7u3+vojCB+gYLKoZI
# hvcNAQkQAi8xgeowgecwgeQwgb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONI
# RXy6nKf9MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAH/Ejh898Fl1qEAAQAAAf8wIgQg7T5lmlzzvfxlHMbUmRWINSo0bA6YaFy+4mQP
# 1xdlyRswDQYJKoZIhvcNAQELBQAEggIAW9Cnmwccf/woZbhRbVM/N1VFrHOrmCm4
# b4sgOxLhJoRAuEaoYlDZUNdxOEGmzQrqU9VDaWOElmNjMdOgSNbn1KVSf8VdJWn9
# TyFmAA2a+uITGJcIcok9npv9DU1SbbMS29FN2h4ur+/BQwzosKol4wu33qPDUhwR
# gYJcFOTNg5pJRTYGp/LtWmu5jpiHoZciYoa6IbJGb3CQa92E1HAnfrFmwEbuBVAF
# AdNoxwy03vLXbtNkrH/cSBuX13mIVjRK4wmLQINfWGd/ig4ybFWNNelclsWzW0Aj
# gX+SBhvEwKmtG364L9zKWvRMGk6Mjyqs+LKieCFNAdDTrQV9PjubLeEX415CABKF
# DJinhzfPjMw+DhV/jxPZY9a3LYtuUQ6SB5VOleA6zNi2yv3qZfBYtiV89EiT0XGg
# 2fHWUIYEpYiY4p/HHExIH+8FreH10e+qlL+mp24otkEQFxOTN+1vN/eBcYWfYDTv
# tDGdDCwcCXBRDkS+ijcZGqNRB65p1imcX8bK9fte50w/GtWyrhLLHW1a/dfVlbzV
# r9vxHiloZ+uF7KsLy+6MplPUvbZsWYSzUNtSZps2T0CLLBbpkQx3ds9a91A9D5GB
# xgVsdoBejt7YTB27aDTBsJ0YXeftkuue4Yx11cwaXF0J/o+cbLGAj9+oMges+2w5
# n5bU7Vz0rdA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2040.ps1 | 2040.ps1 |
Describe "Credential tests" -Tags "CI" {
It "Explicit cast for an empty credential returns null" {
[PSCredential]::Empty.GetNetworkCredential() | Should -BeNullOrEmpty
}
}
|
combined_dataset/train/non-malicious/sample_6_54.ps1 | sample_6_54.ps1 | [ dynamic, provider("dcismprovider"),
Association, Description (
"DCIM_MetricDefForME is a derivation of CIM_MetricDefForME "
"and represents an association that ties a DCIM_BaseMetricDefinition "
"to a CIM_ManagedElement to define metrics for the latter." ) ]
class DCIM_MetricDefForME : CIM_MetricDefForME
{
[
Description ("Dependent represents the object that is dependent on the Antecedent."),
Override ("Dependent"),
Required
]
CIM_BaseMetricDefinition REF Dependent;
[
Description ("Antecedent represents the independent object in this association."),
Override ("Antecedent"),
Required
]
CIM_ManagedElement REF Antecedent;
[
Description ("The property shall indicates whether the metric defined by the referenced CIM_BaseMetricDefinition is being collected for the referenced CIM_ManagedElement."),
Override ("MetricCollectionEnabled"),
Required,
Valuemap { "2", "3", "4" },
Values { "Enabled", "Disabled", "Reserved" }
]
uint16 MetricCollectionEnabled;
};
/* SIG # Begin signature block */
/* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA63Tn1NdxRQugI */
/* xMiyY7iftjDta6qKNODt6iCn1rtozaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBKpbEhvvqU */
/* TVSNBxNnqfNe8BftTWlcK6ETMaUpstFc3DBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYBJU5RalM90xhsCr87DXsvCRPM1U8R1l5ggg1pTKVTEhfFS */
/* 4PbGam4/HbDVuf8m2Y/gwPw2Lmp7ZsFiVfC7iRjEeQ3qPuSoKYn/eq6NhzFYNYod */
/* i4q/zpuo9oBVpON0e4fLUHDeA2KqiEfR8OkPcr7NAe9/CeHCD78jJUhcJ4JKtxMq */
/* 1ll4EifzjVTWEsev6lsxPhfPZutnIswpDjHx26MsPzI5MmBCN6bAAxjZFRWju7fr */
/* mxrE8b1OLxbynwQNMK+/oIxPDWtzne1wlkF3wcpqnBiBAfPzBXSEiFpWpmOpybsl */
/* 6dpq+uGXiCX1p4o5JW1YGlaoMcpGkalO4+9Pu5euKD81vvxAwTa0M2yE0EgKHkOC */
/* BWmsUO55Cf2OiAKzoGHgSQgRA2tpiMS5uSOlsistXFsIcrnzd1fQgVeCfGOmUXv9 */
/* N5H1YaxnrJYxLl/bjA56dtEXHXuDLIcu2wG1HYEzjGy4JFe18IPlt1tu8c7y33pd */
/* PLNR3+Um5uso9B0dZUuhghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */
/* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */
/* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgI3rwUBo+2YV2 */
/* GgO/Ehs8F6JLUQqQQwWMFsUuz6s9Wb0CEAf5N2XxCWNMCVxZ6vFEZ/EYDzIwMjQw */
/* OTIwMDcwMTE2WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */
/* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */
/* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */
/* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */
/* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */
/* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */
/* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */
/* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */
/* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */
/* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */
/* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */
/* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */
/* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */
/* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */
/* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */
/* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */
/* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */
/* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */
/* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */
/* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */
/* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */
/* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */
/* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */
/* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */
/* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */
/* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */
/* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */
/* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */
/* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */
/* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */
/* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */
/* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */
/* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */
/* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */
/* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */
/* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */
/* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */
/* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */
/* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */
/* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */
/* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */
/* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */
/* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */
/* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */
/* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */
/* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */
/* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */
/* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */
/* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */
/* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */
/* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */
/* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */
/* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */
/* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */
/* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */
/* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */
/* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */
/* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */
/* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */
/* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */
/* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */
/* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */
/* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */
/* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */
/* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */
/* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */
/* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */
/* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */
/* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */
/* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */
/* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */
/* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */
/* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */
/* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */
/* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */
/* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */
/* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */
/* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */
/* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */
/* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */
/* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */
/* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */
/* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */
/* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */
/* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */
/* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */
/* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */
/* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */
/* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */
/* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */
/* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */
/* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */
/* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */
/* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */
/* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */
/* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */
/* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */
/* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */
/* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */
/* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */
/* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */
/* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */
/* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */
/* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */
/* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */
/* MDcwMTE2WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */
/* GZzPQDAvBgkqhkiG9w0BCQQxIgQg3OC53Tn65ifM7ACfYxksDkhSmhFjlMvKcOmS */
/* WGFclIMwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */
/* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAbDj6daHyrj20w+a0pBCT */
/* 0V7XXLt59SWbEXKtsEFElSSVHqVK48gFQNpEvcfdFJvIg8JgNrr/n6n0Iy3RYinM */
/* FyvBGwxFuvHp/Pwpe8RXOxMY9QLbI07jSpGi+6m7sawVwb2tsLWtBvoutgjxlm1H */
/* 2zYU4dfCGy+VrlA3oZ+Bgea/5ErlxMqo3XG9hwhxUI0nlauDqhP3OGyMtR/0wm97 */
/* tcs6QZ5fueIbZPxZkcAj+f8YeXX0jnl0AnBTwvT7ur3lz34OcldH4QCiJB5UyP9I */
/* ok4E2Nw6vsVvB/HLd7uuw9DYIdXrprKOivAB9oE3vXzDzL1hjypm2FF6enwX76VE */
/* 98sQMd995H927y3LRDs5RjPWoqJKLpdYdxIlR/o91UtS31nsLBJ/Xw9bj7eW/WF/ */
/* C4nFFCCIWn8HddjAdn5qjK9KGKSJJ+dhH2PIlmrJqZ5TIVAiSg/HP3/6MfadhKqH */
/* GLKUAoXTP5My+VJRoY4ahwvScv7Zr2JPcjTfI1/lu4d6lKmsT3aKFW8FvioIPKOZ */
/* a++9o7SYkKxtlus06htUVPLjwmG+phvjQLrXD38zGCavg0AnIDrb8xlabM4tmI5Q */
/* qe0JyWEBf+vHogQBuB37CpLCgDpv8KPKe3higP2cnGqRwybNVZ1NvQsMA9n0M9as */
/* 605fnJwzUHIavzJZk2zwkos= */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/sample_0_97.ps1 | sample_0_97.ps1 | #************************************************
# TS_RegistrySizeLimitCheck.ps1
# Version 1.0
# Date: 12-21-2011
# Author: v-anecho
# Description: The RegistrySizeLimit entry exists in the registry. This may cause the computer to stop responding as well as log Event ID 333's in the System Event Log.
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_RegistrySizeLimitCheck -Status $ScriptStrings.ID_RegistrySizeLimitCheckDesc
$RootCauseDetected = $false
$RootCauseName = "RC_RegistrySizeLimitCheck"
#Rule ID 1855
#-----------
# http://sharepoint/sites/rules/Rule%20Submissions/Windows_madhbo_2011-11-11T09_03_41.xml
#Description
#-----------
# The RegistrySizeLimit entry exists in the registry. This may cause the computer to stop responding as well as log Event ID 333's in the System Event Log.
#
#Related KB
#----------
# 2567018
# 124594
#
#Script Author
#-------------
# anecho
#********************
#Data gathering
#********************
$InformationCollected = new-object PSObject
$HasIssue = $false
Function registrySizeLimitValue
{
return (Get-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control").RegistrySizeLimit
}
#********************
#Detection Logic
#********************
$RegistrySizeLimit = registrySizeLimitValue
if ($RegistrySizeLimit -gt 0) #if the SizeLimit is active (not null and greater than 0) the statement is true
{
$HasIssue = $true
}
#********************
#Alert Evaluation
#********************
if($HasIssue)
{
$RegSizeLimitHex = ("{0:X}" -f $RegistrySizeLimit)
add-member -inputobject $InformationCollected -membertype noteproperty -name "Registry Size Limit Value" -value $RegSizeLimitHex
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/2567018" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 2 -SupportTopicsID 8113 -SolutionTitle $ScriptStrings.ID_RegistrySizeLimitCheckRC
}
else
{
Update-DiagRootCause -id $RootCauseName -Detected $false
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWxXWSKUSd1eWI
# owCLaGwCxAeOEfITktdB50qD+M6e2qCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFqf
# CSnseKuccR2XuUeY03G3XtiHdSWFCRGgpB4gMLmJMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAGzKU4VdkxZQbNSWMJb8U4A7c8ywF39m8wdjg
# gL7ISBT9ZGIJu7wkRSyIedCuOSQaLYh7bre9gLIO9jwFjtLUdYXRbRk7RRhw2DaJ
# p92eqmwEuE3N7Be1Etxm1QXcMAPdVx2k+fkkxczvXJxpVImlibjex10OQljaW+eo
# nwvOLUSh8Q0aM8POwzFvbaestmO/Lkclr4XiYtY3ESXlrgRf+rEoLlG7Otch9Y8u
# tDnnqH+LGKSngILcp4TPUSb7zZzDjaWMFRD469rbpeo6dYT8/Q3ftywVO4+ZmOaV
# aERY0ht+K95JW1V3PRy+Z6TSVb+BP5F0gg5UsP/b8O+Ornr2zKGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCjzmfdhmeKg1reoqo2RpLY1CI80bzFoIrY
# EeLmq/I8YgIGZwf5Kl/TGBMyMDI0MTAxNzAwMjMxOS4wNjVaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB
# AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW
# b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T
# 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo
# n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB
# +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA
# lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f
# xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU
# TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM
# 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp
# 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc
# 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8
# HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp
# F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV
# bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5
# 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe
# kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx
# iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE
# GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd
# iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2
# JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix
# UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi
# 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q
# bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D
# r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpgHDAi
# GA8yMDI0MTAxNjE1NTQwNFoYDzIwMjQxMDE3MTU1NDA0WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqumAcAgEAMAcCAQACAhIvMAcCAQACAhPlMAoCBQDqu7GcAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAHuP/X6PZbCsmOTK8GwWLZveG+/J
# k5nliRyIl7wkEgUXr88W0WoQ4/kHI2QzLDs/NrwH3rrZNznm2seUGcvgV11gdnm5
# abKLdE5l24nz7DBD4SV2YoqBmCxz9goffWsZ0z+SpxyMY0b+bfLsONSmXErNbaX5
# b+bQg8dakYdSFu85vEuMjVBaue4c+p3GgzuTyygcHHBStANOrW3WF1+CdlUdewrO
# o0fn5xtORyfXOmMXSHxAOKpmYyN0EJgPG39/QWLGn0Lg1rKqsa5I49+6MHy6gppY
# Psryu72GTDjrSvWzZu4S2TZ0XI9M+R8fCgbUPw+rMt/lEzICgd0P99zV5ngxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa
# JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCaJp0puoAyoSRkFQuLN3jyicCY
# C0ZqPvA0FX6lvzJ29TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj
# ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgoRyIaeGo
# OOurQLPkkBY5FFnEbPsKgMDAtZbn8Dnp704wDQYJKoZIhvcNAQELBQAEggIARtJT
# r7dVqm9uwCTtf2nagtd/TI0KyX+exR+2b967TLxgFTBT6UUlXlNHMAh4V0q6swjk
# ElbaKoh0AVmV9OMZK/GUMYLeW9ETHBradsG8KGuwYw0XheUuJ5BRj7lHBLClHT6A
# Fd2PAz6GVXrPUxLhSGMTpzhAPlDnVyawylIGdCdAhH7hu9hbFFuttSqq26otyNZO
# ZbKjPpVGW6GJsig67uW7h1fNql8oQgH9O7VKF6JBWz9O8YxOtoxKLrewLLJYO40x
# AOM2byTEFFJzGy2FhqJzFWyU1CcYGAhiNy9m6WELFRrUG8T8uNeAAU81U0PQyNKB
# y//0dRlc03YCwf3MjkY5YQCcIjvnJ4fF9y6kRs707HETcukBKTZqzvmXpIz9oXAm
# +/atD09CdTES2NKrM1cPF0sMFvmNmVPr1Dd9b6LAALCFSirgBL11g3xU3XlJVD8R
# XlLHwX3JkhhtEhI5+JDxCVnlfFV8m/782t+vWoT4CL/00VyQ0QimujjQnuChVnxi
# 1BWU3I/MFY5O3z4jyQBFAQ7awx6/has5H6nwtew67kvBX/7rJBpuIU6oSHu0A+Q1
# iV75k2iU0alBFeXIVaGXoLJhGsc5JMRN9ZLsvT1ylkAEkA8mNHla7uZhwiQVFqn8
# 4Du72bYU4Ohve05oUGBt5Hob6nVNfsTgf2HGBT4=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_89.ps1 | sample_48_89.ps1 | param (
[Parameter(Mandatory = $true)]
[PSObject] $Session,
[Parameter(Mandatory = $true)]
[string] $WindowsRegistryKeyPath
)
Invoke-Command -Session $Session -ArgumentList $WindowsRegistryKeyPath -ScriptBlock {
param($WindowsRegistryKeyPath)
try
{
$returnArrayObject = @()
Get-Item -Path $WindowsRegistryKeyPath | Select-Object -ExpandProperty Property | ForEach-Object {
$registryEntryKey = $_
Write-Verbose "registryEntryKey: $registryEntryKey"
$registryEntryValue = (Get-ItemProperty -path $WindowsRegistryKeyPath -Name $_).$_
Write-Verbose "registryEntryValue: $registryEntryValue"
$newRegistryEntryObject = New-Object System.Object
$newRegistryEntryObject | Add-Member -Type NoteProperty -Name Path -Value $WindowsRegistryKeyPath
$newRegistryEntryObject | Add-Member -Type NoteProperty -Name Key -Value $registryEntryKey
$newRegistryEntryObject | Add-Member -Type NoteProperty -Name Value -Value $registryEntryValue
$returnArrayObject += $newRegistryEntryObject
}
return $returnArrayObject
}
catch
{
$ErrorMessage = $_.Exception.Message
throw "An error occurred when querying for all Windows Registry key entries on VM [WindowsRegistryKeyPath: $WindowsRegistryKeyPath]. Error: $($ErrorMessage)"
}
}
# Reference documentation - https://docs.microsoft.com/en-us/powershell/scripting/samples/working-with-registry-entries?view=powershell-5.1#listing-registry-entries
|
combined_dataset/train/non-malicious/sample_18_10.ps1 | sample_18_10.ps1 | @{
GUID="{Fb6cc51d-c096-4b38-b78d-0fed6277096a}"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
RootModule="Microsoft.Management.Infrastructure.CimCmdlets"
RequiredAssemblies="Microsoft.Management.Infrastructure.CimCmdlets.dll","Microsoft.Management.Infrastructure.Dll"
FunctionsToExport = @()
CmdletsToExport= "Get-CimAssociatedInstance", "Get-CimClass", "Get-CimInstance", "Get-CimSession", "Invoke-CimMethod",
"New-CimInstance","New-CimSession","New-CimSessionOption","Register-CimIndicationEvent","Remove-CimInstance",
"Remove-CimSession","Set-CimInstance",
"Export-BinaryMiLog","Import-BinaryMiLog"
AliasesToExport = "gcim","scim","ncim", "rcim","icim","gcai","rcie","ncms","rcms","gcms","ncso","gcls"
HelpInfoUri="https://aka.ms/powershell72-help"
}
# SIG # Begin signature block
# MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVr9wtf0/6ef8P
# 7Oewmh6e4caAvboErstvAWik/E+xjqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIICntVmvnX2L67tr4qUz8bO/
# btN9gTrVPwly8+vDQWLNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAqrp+HA+1Tc4ckT9CawnN3TgDg8wLX6bBLqDG4GRQ6AqpYUMeWnTLq7UC
# 15hai8Y/NMKI9M5woKAbrzYRt1NrXoKNFdMAo+uIJ223H42xijPTaM7Om6hwofXB
# nUgnNoHxN6HfaNmQgK8kPIjgr8qRTx9iaiiYYmo5ZxdD93vI9sWMNcdz8gh0+iQe
# 3KYh1CGJlRqVcViXStkGlmMah4IsmEXzoDENH5g+D/eGHVQkF2jmDrMd7IZnIeyx
# 7uQKG4e4jST27lsZ3jXeHHw1+xHKW/YKopB0eDuSIGaBNt/Ddp1pWXY+Uc/wSU80
# Hw08j8KeNUNQZqykrOkxjgYsv8a9BKGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC
# F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBoL6sie9laNs0LLxXBrbeDVU9bNXjvB6bMmwMpi5IRNwIGZc4b54sA
# GBIyMDI0MDIyMDE4MTg0MC41NlowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EeowggcgMIIFCKADAgECAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy
# MloXDTI1MDMwNTE4NDUyMlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOFBd0TRbNcbvDN4L1IZ0fp5XB0aUXpiClTvB44UGSlb
# 3K4SYlIMTUAMHH/QNO5EFqmVIPwJHVCrJCbFEMP8J28PJ5kUBxnqXb6eUyyyZnIL
# xM+3UZNYBS3cZdRTqDQXS0isU0uCh8KM6+bcbSPjzZW60pLjBlPps1WcFWwKGvYC
# OZVsYM3/pCz8SpqQvlzCkZ6XW17tQ7Xd1TBo+M7LRaLWpg2ZHyLtPWW6PYl0V19m
# Ew/KrKr80Odm441JuPwUznEoGhqvXatqALz/UJdovU4xcHAZpGglNi2SyL2eO6rj
# AORwDCK0JnkG1DY2o9nSUuJAHs7XQGb3Okdaf3HX8eZ0CfiSgxYpQPAfmx3/MO7i
# +LzzsVbGbniSRY2+TwV5DtlnRDmCoYpbiDqt69XYh0DEGhtZ2iurC/OovvRZ2yAN
# T8/lzQvy9giyRQll50IYczaEciw1HLD0QWhKiUMz7IJ52TPr3vzuzycinnmJwt8O
# grDmFqTkboxYXp3vW1w3NX36/1FAoxrpTB/Kq6t513mypdYJe/76F6TgDXlbJshz
# q59PSKVrMphm8O+hqzCCM/RJ4tbua+ZzDQUQvMXX+5ZpcSUsc5ciWJ4oXaL9jNDp
# TnQr11uGcxoNwlKwbSFctFPL8tBuw4PSHDsW4rSebOi1LH/l+j2Dt8LOgWOTe0MT
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU+jlbyj3zSQx9FVBtrpPfgfB6UtowHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAJZ9wmbavBe0+LviSbo8oCSeL34Fai2r5C0M
# aB5PkXeujs+whQ0pGRTK24aojy2EvclytvTfHoM6mlgkQD6lvqjao+MV107VMuq9
# Jetib46AIsv7v7cWZGZ+RG7yse+mtpvQ7X3ANu6SA7wjk6LVF6AwmXy3mT9S0TRZ
# vfMCU4ecKMsZLM/8Ojem3CFeiSTTYi8PtJkQFs9ugZu3DgsIexPakVqSkY4GH4hJ
# QxcF/zfkK5U1913DGbIa81LPITISTmHVWHu2nA/vPusn4eyI/ix2oGOPoC+im5/i
# vFQB+sRtXpqPy3AWztZUc2IiCsc2dr/nmTKsAb1i3X0I++RTDFgrS5m8+XZYLf2d
# 9zSM5OOK8Luz8hSjMTi1/Lck2TJDVw229l+2JfePkO354s564YOO+Em9gwgSSmRX
# rxcs0fv5kF9hr4+Z9FhqgUUcIkoShFJnc9sMk8GISFn3K7Ex12gwxDX1OTJ+2i3o
# TPReFKbCNgGrf0O8EVaGXIMYGGtTca14NaJV31gZIHZafG4UzLl9sArqjw9bPxBE
# yKm1ccrccMGvbBZYRyuuBxO4dkglOp6k2hiXH1VEW+P+8JdoAVyaRbWeTtUT6jBp
# evlEmOvIOr25uTIOrWZ2sX+B5pEAtdw1lt81ciSFfNcDprwKJqZxBb8OCYsmmJVA
# 2uJlgIcgMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w
# ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIwk
# bi+DSO4w5WfYG4oAJS8/zQW6oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpfzHJMCIYDzIwMjQwMjIwMTQxMjI1
# WhgPMjAyNDAyMjExNDEyMjVaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOl/MckC
# AQAwBwIBAAICDeAwBwIBAAICE20wCgIFAOmAg0kCAQAwNgYKKwYBBAGEWQoEAjEo
# MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
# 9w0BAQsFAAOCAQEASIxpCjy9ZvKHavVHuHSR2EYMFNs9HIXdQ8w0oqrfoy+l6cF5
# p3UdzymlR1hSN1CGYK7+Ot/iQu2sqCMM3SHPwBXtvaii4xKHS1Q5v+yb2a4Rm/Qf
# wYJO6zRjqZWCs87efOXUGH8FkDp2qYqLGcjIgjGfIo7atuJXDGC7OJmKnRVjFz/a
# WHWd5M4mNtP/k9bQVOZiBFiA87TJhJKv0om+hSmAiaBfLZKJob68+6lBUxkILhIA
# hnZDkFGV3r/qxw5M7GJLZodhSfM3zvYIMFOFQSeTIwqp6Jhw56chBTnk5Y06FuLq
# vLuA9nbgEEywyQysZMrhHKYN/Cp2kYzFuvWtEjGCBA0wggQJAgEBMIGTMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0G
# CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ
# KoZIhvcNAQkEMSIEIHxeZc36xshH5NDpcNFqmqOKRP+F6FsNrxqUIE6PtgBHMIH6
# BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7TF8lP
# YndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCD28hOmBSikPBTYnAGP29FEUtFAb6tv
# JXlD+nNrkygkJDANBgkqhkiG9w0BAQsFAASCAgBmdNJXkGfnVRMN6YUTgkxlvWHM
# XpLjbasuDFMi4sVcK/o5r7KOCLYWT03ncIoCx3jQEQWDIyVPPiXCsA3KyEV/jUcp
# I9eCeLwsuQLSyudlYWke0e6sgQnBlyqUhJjSKXxeeE8x0nvjpbpN+05wWpSsGvNN
# xjMijDLJrOIhft0dCd3LrrqqktLbQDWcnSSkUglwoBiE/RMqqYroMIwe4iHZitzA
# dl1BiHjU03kRw0RhR/csjdrf3M6lvIKYfTiPDmh6cFpfehYqAEe/H2IK8UeGvjgo
# NgQP+BPdApqjKnT2wvcwKPbLx/HqOhR5BFYNeIjE3PC6M0HJ6bWzZnZFDXtTliy5
# J8oiBiL6ih2RdaZsri033AJN8ofUYTB+coqAqrEn3Z6s66QN0kHQRljih0eGQx2h
# m+AgkOH3gWtcpiuH3R5Dr+BuZRTIb2zWs++Cgs1tqqzv/8OEDm3X5u6knHxvP2Nk
# UJZgEyXTaxuvCFF8LEK7n+8S5qHoTmJur/ypxp2D6t8bD8fXf6YE6bCEuJD0e/+b
# wGGwt38oGLsG1zHPZT0in0kcAsZSFOaAkv/Ld1fmnT+M/0GcL6vB+f4cx6tN4cYn
# Di5b6WuVTp+FqjReGBasFQgta2G91rjX5z77qPvHzVA/mXFw/It9uizLD0Us8Vgg
# C2xV8S9c97+sEJo0iw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_40_76.ps1 | sample_40_76.ps1 | # region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Advisor.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Module]::Instance
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = $PSScriptRoot
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# endregion
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAucsXDbMWYBq/T
# /U1oPyL/gfU9jAZPAZuvgaHWueNRo6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH13WFF5ipiwt9zFI6GPi8v4
# 83x0ee3NvdP6tBALzDgiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEALJpQNANOpMUISNe4YZGBN87JXcninLUvmaGmQjCZtW4XIZCS/vsdz3il
# 3Ey8T6QdwZbbt7c69EkTLIgDeTdK0p5mT3qoEeSJwDUuXbAmkeU8ap4E1kd+HqO9
# KKiE8mDlJnJ+WcBdqHnu7KrSTEcMggG4CXWtb2Ik7yXiMmU+jDvd985w1aelGnue
# +LmTwnT6SSY/WLyTj84tGR3+DJO44AK4xlyUpeRm+Gs7Q3W9BWm5GX1dLUcvHj6I
# ciT9/sWiMVPcUd/uOBYFtB8DscctkYyqF0pUXC6cLIZ1Pb2DSAD1yS016mZR3ofS
# dD/8fcDHKHWBi8fs3+bBglNhZIF30KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCEg4DrU2Gq7aIMbV7Ru+U0LJ8ra0E43W0Ujnr+YEhoUwIGZhgdT/UG
# GBMyMDI0MDQyMzEzMTUxMS45NDFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dHEjzAiGA8yMDI0MDQyMzA1MjQz
# MVoYDzIwMjQwNDI0MDUyNDMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp0cSP
# AgEAMAcCAQACAgHvMAcCAQACAhMVMAoCBQDp0xYPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAH5nR6bjBMgAFWKW1b/lYZ8ns1USd9OrwFGO8CX1+QbLybQK
# U2xx7Op/dHp5bkpiEko5Xo7Bi8U6lw0+7HbdzitpMl8DiORCL2J0ZTXlO71dyQ/p
# t0DFsi4dNTfF1IIRZymxccGfIQgcsb9D6wMy8YBZvhdO7nWQiNI6w3KXI1ACkZVZ
# Y1KDzqAYo3i3ACb74aDZUnmPh9h9Ttmm+sXjRVIrO0BkL8nsQ/ZNR5m183BI10gW
# STzS+bH0WpArCvBY5qb7slTvMOBfp/07LwWyQ5QlEC1Uv1/FdSPudicLnF5BKXMi
# Amn1emixMTnYAUhg7hK+6lnMBhlr0mYMqkFQNa0xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDZxU8+bKeEKUZxn6+X6Zl8kK+IznoColLQBwuh9j3PhjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s
# uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgYeN1jrveaiQ/GOoPV9CAFdRUaoVl
# B5V8/kbyKJQ+4sgwDQYJKoZIhvcNAQELBQAEggIAcos53Cev8STqEvlxlWQUhnqt
# TQndwh47cK74Ned0Xv/hBjavAsVQ6WGgDKiaaQKZuRltcSrlRSINtwk15W4njULw
# n3qbd4Q1DTqEAcOkX4JPksuR+RlKTbFUjhA0m3p/o4ljaheBWTbO26vbDegPyPxI
# Nl8VXGv1yV7PiIQpB8rFhkQjshWsviUHQY0/qBgnqTOd9Dt4X4ZrnDNDTtD9IkzV
# GiKKNY0dq+4xKm87/BXOr/67wysGgCakNE2NZOjqlx/ga8kbJOupt/fcVZvSqQDK
# qOVJSxu2RzESUBgZP2HENcOUKQwnv/F1NHQkO7qoAnA96Bd6d2CbKN/yQtiMmZJV
# tlqq9K8RyuKD3MBZK//fFAv4LHtjHzlFRLsHxfEPmn/eIPCb/ie05hx/MFRdGKyh
# sFgtq+mvMF3Qwil21D9zNw1WQwV3EyBrJbkAawp1FSoxNeCWVm4JsxRjC0l9EF+G
# 75qIhLOBVVVULOp8wfWISUwKIqHkhJeZTrpa0qOHg1rBxdumQNoVFxiJT/UtpKge
# uswDwDlhAp7h0b5YZEWFPvoubPUkAS/euomjG4BQ7PQjfT4buqsVbIsTrE6CY5JI
# +d5Kqy3w1K6TzKN9x2s1O5aMBTSSv/rqcrqgxO1QH8yjlzuMfZrVAprS97gA0Xmi
# mekScXglu7z/pHBO/L0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_25_33.ps1 | sample_25_33.ps1 | #########################################################################################
#
# Copyright (c) Microsoft Corporation. All rights reserved.
#
# Localized PackageManagement.Resources.psd1
#
#########################################################################################
ConvertFrom-StringData @'
###PSLOC
OldPowerShellCoreVersion=PackageManagement no longer supports PowerShell Core '{0}'. Please install the latest version of PowerShell Core from 'https://aka.ms/i6t6o3' and try again.
###PSLOC
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIBsoYrH/WngZG
# wcwl3oPmFWjeg9nVV4OusKRd1BszsaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII0Mq4L3/1947bwnMVvGP5Dm
# wbb971etV96SBKgFIvZRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAv05NsqhGTHODmsdhSMJG+E6/ok8HlhNVykU58NINPj2HMzn3YaN21+Tk
# JARZwQygvyQJ97JTITRPoCxx5H0kVbCj72rFclIJ4Tg2Ssge2XkWYD9NY2kf9gvw
# YsuVJY6ar9R6uP+CRrgEru8UaDpEO44ut2bzMnUOsGmMT9rh0ZLGYBBpZqDETKN3
# dwgHEmGHG6eixzbQoPt2Lrn0WHqQpTc0HKz4RfHdJ/eGBL61TJ0VCohZ1kZJwjr2
# 2JPQ1VvMhCf6Y+bASEGsSq+qkgW89joei6n+LYa5xBXahRR/75iRDA2kN9L1TOxr
# YGO/DcRBHNKU1M+L4YjAk8hPkk17vKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDRUUUUcSgOtzC0Pl2qnRID1w+g3TXbm+L6/SqZ+Mc/fAIGZc4U+dUb
# GBMyMDI0MDIyMDE4MTg0My4zMjlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2
# hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN
# PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F
# DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F
# QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP
# hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3
# gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm
# dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7
# Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS
# 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN
# 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc
# GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI
# D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi
# LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc
# ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE
# JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N
# 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp
# 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4
# nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N
# nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO
# pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1
# ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB
# QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7
# n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8qmTAiGA8yMDI0MDIyMDEzNDE0
# NVoYDzIwMjQwMjIxMTM0MTQ1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpfyqZ
# AgEAMAoCAQACAgRzAgH/MAcCAQACAhPKMAoCBQDpgHwZAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAAqzE9GhxF9thMAZTuxei76IypHUwiuIX8lXvri38kpd
# h+d6SKq1ySHAOgjwGIcyk3X+hn3/8ZHL2sRSLpgprqKnsgin4mbFr9RVdvdc0YzS
# q4qORfhVo2QNSadFDz2LHxIm65Z+KTprDyuBTDDdAfSXyp8yF2YDm/MzbSzDeZu5
# g02+Pn3iiIgasuyABb1hOCe3BXJokb7snxQn3MUSRy8IMIQH3Ywhl/yrpWgIDrQS
# ++5hCs6vBlEq7TPaW0YnhHsW2qxlVHSGqwcODhLStGHqFoFzMtvzUZWm25+8TjZj
# DJEL92QTbMak4LadJlj9bkpY7AAWJcKJT+e077I1LX8xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB
# 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDpBE9R94LE/4oHOVmYT5EP567LkhPPKhM3fEC+DEqg
# rTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w
# wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgwozVJFTC8RURiqw1MNcmGZAH
# DEjJwdrMZq20FiZuYDQwDQYJKoZIhvcNAQELBQAEggIAe3x8j91Cfrb4eIoBTD4W
# 87uJqpX233kSJUAlijV3+Vt0rJ97Mv5QqBxs8pPyoFwqZYCgQn6663t/2Jbf0tUm
# aHBXQbSVNvhFPQ+ab14jmw0S0OuXZYRB4VURO+xmU3v/Ttks6iuxeHXjBma+RgJY
# t9gVyY5oX+wIIwyLiCvfmn93G5v+P8Y3Rptu/cWMjLfCfHh6mEQiWZHbNEGEDkD8
# gbkix4+QGOD6AwlcBXwqfObiywYcyG2E5hljHPmQnsoizTuJgzImyyy8dsIRqwU5
# u+i39nmUoQa7bUUge3CuUwOhhBkEBuYSzg6xTPLfT0EvlEYo7YHPDOqLlLSBAFae
# htAaH65KtFoSS/LosGNL50sagHaxYaJ0rPRZJoTSMEs6IRffCruuIYpf4MW8Ov2D
# 8EtiLbyqx2t6ry9nS6xqS4u0U0qmB5w3VQoDksSOcKXhg5vvm/iFpoJ9uMnw1Ywc
# VOGNNujEixDP4z2DlICX/RUhlTSQXp+azE42iWnm7g4qoZnfyq5LKid6ABA6xloZ
# pNFeQg+rnigpt7mwz6SIxDdgmp5FcM568q3xy9KIJOE0OuB07I4q69aKlwqiuDE5
# ig9ySYBaX8yJmVDiU4QKb3HmubmN1J6G9HeCIH6n086XtgUzt+t+2WL7F3S3seYj
# VzJi4EK+n0Q81s+BnsnmBf0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_25_93.ps1 | sample_25_93.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for Partner.
.Description
Create an in-memory object for Partner.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.Partner
.Link
https://learn.microsoft.com/powershell/module/Az.EventGrid/new-azeventgridpartnerobject
#>
function New-AzEventGridPartnerObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.Partner')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="Expiration time of the partner authorization. If this timer expires, any request from this partner to create, update or delete resources in subscriber's
context will fail. If specified, the allowed values are between 1 to the value of defaultMaximumExpirationTimeInDays specified in PartnerConfiguration.
If not specified, the default value will be the value of defaultMaximumExpirationTimeInDays specified in PartnerConfiguration or 7 if this value is not specified.")]
[System.DateTime]
$AuthorizationExpirationTimeInUtc,
[Parameter(HelpMessage="The partner name.")]
[string]
$Name,
[Parameter(HelpMessage="The immutableId of the corresponding partner registration.")]
[string]
$RegistrationImmutableId
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.EventGrid.Models.Partner]::New()
if ($PSBoundParameters.ContainsKey('AuthorizationExpirationTimeInUtc')) {
$Object.AuthorizationExpirationTimeInUtc = $AuthorizationExpirationTimeInUtc
}
if ($PSBoundParameters.ContainsKey('Name')) {
$Object.Name = $Name
}
if ($PSBoundParameters.ContainsKey('RegistrationImmutableId')) {
$Object.RegistrationImmutableId = $RegistrationImmutableId
}
return $Object
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgsBF8NPI/GWfW
# T/PtBENQwMIWelDzB/nIVUvGTBYrbKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDK/tj6+wNUyEMGnCyHttHz4
# PdHZV40ffczmF7hzVy1nMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAtZ4kvpaUgnNbkeMd208ssclizU3D/xonk1d2I0M1Y6ItPa9Jbv/G4t2h
# en4Km0lCGuoMUpRMn786hWBOhEI+mxJ74czR1Vp5F/lq5FzBWPM1/30CBMjkz4f/
# mBwJpeD/VG81wHvhDprVwA8LmVYRMODpV6SKlHTZ/cNOhyoBQUFTl6KH6zOsqcCA
# Zxh5AMrdJ9PRwADbDY0kpOzpC4FPYOgHAHgEG/Drlbt9ROGJSM96nosOvoW1fjOc
# 0DawPQSQWCc0VAICfiw1wfxrXTVwQ2eMlpSleQXbvP5C0S+AOoqDgdicwtdHPRsx
# Rzm/ai6fIXU4nxjkIK28Nf2PJUMddKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA7vAZQ/iMd4j3/89hkesGV1445uNs+kaqCMr4pn9oNKgIGZjOahILN
# GBMyMDI0MDUxNjA2NDIxNC4zMTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/khTAiGA8yMDI0MDUxNjAxNDg1
# M1oYDzIwMjQwNTE3MDE0ODUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7+SF
# AgEAMAcCAQACAhI8MAcCAQACAhLtMAoCBQDp8TYFAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAAxEjKnSk7z0bXwcEuWQw97AgLqpP6QXnwEZM41HdkQ6IjWR
# 80WQra5fw3/m4qY8wuDmJtG7uCD/olcakGKUKmhwvb3cKYRsYimEb3p8Bs0pBosm
# 85tb23aIP6SaYP9RDzyFc0lbTZFgve3dvH5HBA05maKu/SGUwj6YFbCUwkePhxlc
# PwoJht+JDTulGIR60ACLGdEVDfcUZs7CEO4jApeHyK2003zb9kPdjogvdegfmIm3
# t2tuHLEv2/UsXl8nukg/Rp8Xg8xspddR3tZMT6xr/Kt2tdCzUQaW67J+MZBuX6cD
# +zcbEo8FH0fMF0WfCSvSurqFZiM/h6+6P21scbsxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCA1G2VPnr2WAWgnCm0Ugz1kTNcjlePcT+GotV3ZHGlH8zCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o
# CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgrf1hyXgV+TDcVONGGqbNRYWZJ3gR
# eAJl4GXFk1yOgFkwDQYJKoZIhvcNAQELBQAEggIApFdZRtCZeguXzMZSXkZSj5wS
# UDCEBQKBRkq971kZ21s3+2VhjVoypJzCXjG6ZVgkjT54bEFnvaVO3fRvgB7R/Hfj
# FUfGdaBBn7Szq8d22lMzi2QbaRMooWqA3v6SQlNeo+s/Z5OVrLxCwqk4JnC0TUVS
# Az8iaFH9FaB1y/LLTYnMx+gRUxyROtLmAfgTJwB26Py/zgIwRZ1brGrHJm5tdDzr
# +wQEifM05f1Qd8aDHOiTG0BYGUNnnf+PeX5WqeUf6QPQ2uDiZCiqUNwioP3wPN+0
# dTF/HJzfr/Wl/lLyxPyQDbdw76ouUajVSJ9s4/6C8EcbI3R0CqdYq1g1xq7Gvr5a
# Cd3MkGXZHNhQeqKPCdkJ6LusblNiZdJ7dQI5sZDdUdiTaFyPKSFK+g/TcumppvoE
# VHHzSCEkAef02FK5o8VpFENyR19xjfcNrdfQ8S2OY8hJgPG0jNlpUb0ZNNEvD7nv
# dOH9X5rEfuZQaP9cjEbSOf9s/NVMbdaThNXmdNE2Elylr8973wGqPo42TknB+CPE
# o3FIzC7BqylJB4EUNATudqxby8YyMeZtFUDDsI/Cg39Zz///xgGd+UTSIZsIL4xx
# RUhWxemr8+01IyfZ2/iu7VszkSjui/Dbhch3qmOLQyqpIQKBDHsDOppPafm8d4kJ
# YUglOCKjVh+EvKNIBRQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/612.ps1 | 612.ps1 | param(
[string]$Version,
[string]$Path,
[switch]$Force,
$Update,
[switch]$Uninstall
)
$Configs = @{
Url = "https://1.eu.dl.wireshark.org/win64/Wireshark-win64-1.10.5.exe"
Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\"
}
$Configs | ForEach-Object{
try{
$_.Result = $null
if(-not $_.Path){$_.Path = $Path}
$Config = $_
if(-not $Uninstall){
if($_.ConditionExclusion){
$_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue)
}
if(($_.ConditionExclusionResult -eq $null) -or $Force){
$_.Downloads = $_.Url | ForEach-Object{
Get-File -Url $_ -Path $Config.Path
}
$_.Downloads | ForEach-Object{
Start-Process -FilePath $(Join-Path $_.Path $_.Filename) -ArgumentList "/S /desktopicon=yes" -Wait
}
$_.Downloads | ForEach-Object{
Remove-Item (Join-Path $_.Path $_.Filename) -Force
}
if($Update){$_.Result = "AppUpdated";$_
}else{$_.Result = "AppInstalled";$_}
}else{
$_.Result = "ConditionExclusion";$_
}
}else{
$Executable = "C:\Program Files\Wireshark\uninstall.exe"; if(Test-Path $Executable){Start-Process -FilePath $Executable -ArgumentList "/S" -Wait}
$_.Result = "AppUninstalled";$_
}
}catch{
$Config.Result = "Error";$Config
}
} |
combined_dataset/train/non-malicious/sample_46_89.ps1 | sample_46_89.ps1 | function Clear-NearbyShareInstallation {
# Remove shortcuts in start menu for all users
Write-Host 'Started to remove shortcuts ...'
$profiles = Get-WmiObject -Class Win32_UserProfile
foreach ($profile in $profiles) {
if ($profile.Special) {
continue
}
$userStartMenuPath = Join-Path -Path $profile.LocalPath -ChildPath `
'AppData\Roaming\Microsoft\Windows\Start Menu\Programs'
$shortcuts = Get-ChildItem $userStartMenuPath -Filter *.lnk
$wshell = New-Object -ComObject WScript.Shell
foreach ($shortcut in $shortcuts) {
$s = $wshell.CreateShortcut($shortcut.FullName)
if ($s.TargetPath -like "$env:ProgramW6432\Google\NearbyShare\*" -or `
$s.TargetPath -like "$env:ProgramFiles\Google\NearbyShare\*") {
Remove-Item $shortcut.FullName
}
}
}
Write-Host 'Completed to remove shortcuts.'
}
function Get-PnpUtil {
if (Test-Path "$env:SystemRoot\System32\pnputil.exe") {
return "$env:SystemRoot\System32\pnputil.exe"
}
elseif (Test-Path "$env:SystemRoot\SysNative\pnputil.exe") {
return "$env:SystemRoot\SysNative\pnputil.exe"
}
else {
return $null
}
}
function Install-IntelDriver {
Write-Host 'Started to install Intel driver ...'
$pnputil = Get-PnpUtil
if ($pnputil -eq $null) {
Write-Host 'Failed to find pnputil.'
return
}
$PIEInstallationPath = "$env:ProgramW6432\Google\NearbyShare\intel"
if ( Get-WmiObject Win32_NetworkAdapter | Where-Object { ($_.Name -like `
'*Intel*' -or $_.Name -like '*Killer*') -and ($_.Name -like '*Wi-Fi*' -or `
$_.Name -like '*Wireless*' -or $_.Name -like '*Wifi*') } -ne "" ) {
& $pnputil /add-driver "$PIEInstallationPath\PieExtension.INF" /install | Out-Null
& $pnputil /add-driver "$PIEInstallationPath\PieComponent.INF" /install | Out-Null
& $pnputil /scan-devices | Out-Null
if ( ( & $pnputil /enum-devices | Select-String -Pattern `
'{4d3c822d-417d-4b03-b562-cd33f5fda354}' -Context 0,6 ) -ne '' ) {
Write-Host 'Intel PIE SDK successfully installed.'
}
else {
Write-Host 'Intel PIE SDK installation failed.'
}
}
Write-Host 'Completed to install Intel driver.'
}
function Uninstall-IntelDriver {
Write-Host 'Started to uninstall Intel driver ...'
$pnputil = Get-PnpUtil
if ($pnputil -eq $null) {
Write-Host 'Failed to find pnputil.'
return
}
$oem_inf_name = pnputil.exe /enum-devices | Select-String -Pattern `
'{4d3c822d-417d-4b03-b562-cd33f5fda354}' -Context 0,6 | ForEach-Object `
{ $_.Context.PostContext -split ': ' } | Select-String `
-Pattern '.inf' | ForEach-Object { $_ -replace '^\s+|\s+$|\t+|\r+' }
if ($oem_inf_name -ne '') {
& $pnputil /delete-driver $oem_inf_name /uninstall /force | Out-Null
Write-Host 'Uninstalled Intel PIE SDK !'
}
else {
Write-Host 'No intalled Intel PIE SDK !'
}
Write-Host 'Completed to uninstall Intel driver.'
}
Export-ModuleMember -Function Clear-NearbyShareInstallation,Install-IntelDriver,Uninstall-IntelDriver
|
combined_dataset/train/non-malicious/4296.ps1 | 4296.ps1 |
if($IsWindows -eq $false) {
return
}
Import-Module "$PSScriptRoot\PSGetTestUtils.psm1" -WarningAction SilentlyContinue
Import-Module "$PSScriptRoot\Asserts.psm1" -WarningAction SilentlyContinue
$Script:RepositoryName = 'Local'
$SourceLocation = "$PSScriptRoot\PSGalleryTestRepo"
$Script:RegisteredLocalRepo = $false
$Script:INTRepositoryName = 'poshtestgallery'
$Script:INTRepoLocation = 'https://www.poshtestgallery.com/api/v2'
$Script:RegisteredINTRepo = $false
$MicrosoftPowerShellArchive = 'Microsoft.PowerShell.Archive'
$TestArchiveModule = 'TestArchiveModule'
$ContosoServer = 'ContosoServer'
$SmallContosoServer = 'SmallContosoServer'
$SystemModulesPath = Join-Path -Path $PSHOME -ChildPath 'Modules'
$ProgramFilesModulesPath = Microsoft.PowerShell.Management\Join-Path -Path $env:ProgramFiles -ChildPath "WindowsPowerShell\Modules"
function Publish-TestModule
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[Parameter(Mandatory=$true)]
[Version]
$Version
)
if(-not (Test-Path -Path "$SourceLocation\$Name.$version.nupkg" -PathType Leaf))
{
$SourceModulePath = Join-Path -Path $PSScriptRoot -ChildPath "TestModules\$Name\$version"
Publish-Module -Path $SourceModulePath -Repository $Script:RepositoryName -Force -WarningAction SilentlyContinue
}
}
function SignAndPublish-TestModule
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[Parameter(Mandatory=$true)]
[Version]
$Version,
[Parameter(Mandatory=$true)]
[System.Security.Cryptography.X509Certificates.X509Certificate]
$Certificate
)
if(-not (Test-Path -Path "$SourceLocation\$Name.$version.nupkg" -PathType Leaf))
{
$SourceModulePath = Join-Path -Path $PSScriptRoot -ChildPath "TestModules\$Name\$version"
$catalogFilePath = "$SourceModulePath\$Name.cat"
$null = Set-AuthenticodeSignature -Certificate $Certificate -FilePath "$SourceModulePath\$Name.psd1"
if(-not (Get-Command -Name New-FileCatalog -Module Microsoft.PowerShell.Security -ErrorAction SilentlyContinue))
{
Remove-Item -Path $catalogFilePath -Force -Verbose
}
else
{
if($version -ne [Version]'1.0.1.2')
{
Remove-Item -Path $catalogFilePath -Force -ErrorAction SilentlyContinue
$null = New-FileCatalog -Path $SourceModulePath -CatalogFilePath $catalogFilePath
}
$null = Set-AuthenticodeSignature -Certificate $Certificate -FilePath $catalogFilePath
}
Publish-Module -Path $SourceModulePath -Repository $Script:RepositoryName -Force -WarningAction SilentlyContinue
}
}
function RegisterLocalRepo {
Install-NuGetBinaries
if(-not (Test-Path -Path $SourceLocation -PathType Container))
{
$null = New-Item -Path $SourceLocation -ItemType Directory -Force
}
$repo = Get-PSRepository -ErrorAction SilentlyContinue |
Where-Object {$_.SourceLocation.StartsWith($SourceLocation, [System.StringComparison]::OrdinalIgnoreCase)}
if($repo)
{
$Script:RepositoryName = $repo.Name
}
else
{
Register-PSRepository -Name $Script:RepositoryName -SourceLocation $SourceLocation -InstallationPolicy Trusted
$Script:RegisteredLocalRepo = $true
}
}
function SuiteSetup {
RegisterLocalRepo
$INTRepo = Get-PSRepository -ErrorAction SilentlyContinue |
Where-Object {$_.SourceLocation.StartsWith($Script:INTRepoLocation, [System.StringComparison]::OrdinalIgnoreCase)}
if($INTRepo)
{
$Script:INTRepositoryName = $INTRepo.Name
}
else
{
Register-PSRepository -Name $Script:INTRepositoryName -SourceLocation $Script:INTRepoLocation -InstallationPolicy Trusted
$Script:RegisteredINTRepo = $true
}
if($PSEdition -ne 'Core') {
@('1.0.1.3','1.0.1.4') | ForEach-Object { Publish-TestModule -Name $TestArchiveModule -Version $_ }
@('1.0','1.5','2.0','2.5') | ForEach-Object { Publish-TestModule -Name $ContosoServer -Version $_ }
Publish-TestModule -Name $SmallContosoServer -Version 1.0
if(Test-SkipCondition)
{
@('1.0.1.1','1.0.1.2','1.0.1.5', '1.0.1.11') | ForEach-Object { Publish-TestModule -Name $TestArchiveModule -Version $_ }
Publish-TestModule -Name $MicrosoftPowerShellArchive -Version '1.0.1.5'
}
else
{
$CertSubject = 'CN=PSCatalog Code Signing'
$null = Create-CodeSigningCert
$cert = (Get-Childitem cert:\LocalMachine -recurse | Where-Object -FilterScript {$_.Subject -eq $CertSubject})[0]
if(-not $cert)
{
Throw "'$CertSubject' code signing certificate is not created properly."
}
'1.0.1.1','1.0.1.2','1.0.1.11' | ForEach-Object {SignAndPublish-TestModule -Name $TestArchiveModule -Version $_ -Certificate $cert}
$PSGetSubject = 'PowerShellGet Catalog Code Signing'
$null = Create-CodeSigningCert -Subject $PSGetSubject -CertRA "PowerShellGet Test Root Authority"
$PSGetCert = (Get-Childitem cert:\LocalMachine -recurse | Where-Object -FilterScript {$_.Subject -eq "CN=$PSGetSubject"})[0]
if(-not $PSGetCert)
{
Throw "'$PSGetSubject' code signing certificate is not created properly."
}
SignAndPublish-TestModule -Name $TestArchiveModule -Version '1.0.1.5' -Certificate $PSGetCert
SignAndPublish-TestModule -Name $MicrosoftPowerShellArchive -Version '1.0.1.5' -Certificate $Cert
}
}
}
function SuiteCleanup {
$null = Import-PackageProvider -Name PowerShellGet -Force
Cleanup-CodeSigningCert -subject "AliceTest"
Cleanup-CodeSigningCert -subject "BobTest"
RemoveItem (Join-Path -Path $ProgramFilesModulesPath -ChildPath "TestModule")
RemoveItem $script:TempModulesPath
}
function Test-SkipCondition {
([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or
($PSVersionTable.PSVersion -lt '5.1.0') -or
($PSEdition -ne 'Desktop')
}
Describe 'Test PowerShellGet cmdlets support for catalog signed modules with a system module' -tags 'P1','OuterLoop' {
if(Test-SkipCondition) { return }
BeforeAll {
if(Test-SkipCondition) { return }
SuiteSetup
$null = Install-Package -ProviderName NuGet `
-Source $SourceLocation `
-Name $TestArchiveModule `
-RequiredVersion 1.0.1.1 `
-Destination $SystemModulesPath `
-ExcludeVersion
}
AfterAll {
Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Remove-Item -Path "$SystemModulesPath\$TestArchiveModule" -Recurse -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
}
BeforeEach {
Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
It 'Installing a valid catalog signed module with a previous version under System32 path: Should work' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -Repository $Script:RepositoryName -Force
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty
Get-Module -ListAvailable -FullyQualifiedName @{ModuleName=$TestArchiveModule;RequiredVersion='1.0.1.1'} | Should Not BeNullOrEmpty
}
It 'Catalog authenticode signature is missing in the version: Should fail' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $TestArchiveModule -ErrorAction SilentlyContinue | Should BeNullOrEmpty
}
It 'catalog authenticode signature is invalid: Should fail' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $TestArchiveModule -ErrorAction SilentlyContinue | Should BeNullOrEmpty
}
It 'catalog file is invalid: Should fail' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $TestArchiveModule -ErrorAction SilentlyContinue | Should BeNullOrEmpty
}
}
Describe 'Test PowerShellGet cmdlets support for catalog signed modules' -tags 'P1','OuterLoop' {
if(Test-SkipCondition) { return }
BeforeAll {
if(Test-SkipCondition) { return }
SuiteSetup
}
AfterAll {
Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $ContosoServer -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
BeforeEach {
Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $ContosoServer -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $SmallContosoServer -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
It 'Authenticode publisher is different from the previously installed module version: Should fail' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.5 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
}
It 'Installing a valid catalog signed module with a previous version under different modules path: Should work' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName -Scope CurrentUser
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -Repository $Script:RepositoryName -Force
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
}
It 'Without AllowClobber --- installing an unsigned module with a previous version under different modules path: Should work' {
Install-Module -Name $ContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName -Scope CurrentUser
Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName -Force
Get-InstalledModule -Name $ContosoServer -RequiredVersion 2.5 | Should Not BeNullOrEmpty
Get-InstalledModule -Name $ContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty
}
It 'Without Force and AllowClobber --- installing an unsigned module with a previous version under different modules path: Should work' {
Install-Module -Name $ContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName -Scope CurrentUser
Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName
Get-InstalledModule -Name $ContosoServer -RequiredVersion 2.5 | Should Not BeNullOrEmpty
Get-InstalledModule -Name $ContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty
}
It 'Without AllowClobber --- installing an unsigned module with different module with same command: Should fail' {
Install-Module -Name $SmallContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName
Get-InstalledModule -Name $SmallContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty
Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'CommandAlreadyAvailable,Validate-ModuleCommandAlreadyAvailable,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $SmallContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty
}
It 'With AllowClobber --- installing an unsigned module with different module with same command: Should work' {
Install-Module -Name $SmallContosoServer -RequiredVersion 1.0 -Repository $Script:RepositoryName
Install-Module -Name $ContosoServer -RequiredVersion 2.5 -Repository $Script:RepositoryName -AllowClobber
Get-InstalledModule -Name $ContosoServer -RequiredVersion 2.5 | Should Not BeNullOrEmpty
Get-InstalledModule -Name $SmallContosoServer -RequiredVersion 1.0 | Should Not BeNullOrEmpty
}
It 'Install-Module with SkipPublisherCheck --- catalog file is invalid: Should work' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -Repository $Script:RepositoryName -SkipPublisherCheck
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty
}
It 'Install-Module with SkipPublisherCheck --- Catalog authenticode signature is missing in the version: Should work' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -Repository $Script:RepositoryName -SkipPublisherCheck
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty
}
It 'Install-Module with SkipPublisherCheck --- catalog authenticode signature is invalid: Should work' {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -Repository $Script:RepositoryName -SkipPublisherCheck
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty
}
}
Describe 'Test PowerShellGet\Update-Module cmdlet with catalog signed modules' -tags 'P1','OuterLoop' {
if(Test-SkipCondition) { return }
BeforeAll {
if(Test-SkipCondition){ return }
SuiteSetup
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName
}
AfterAll {
Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
BeforeEach {
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
It 'Update a catalog signed module: Should work' {
Update-Module -Name $TestArchiveModule
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
}
It 'Update a catalog signed module without specifying a name: Should work' {
Update-Module
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
}
It 'Update-Module -- Catalog authenticode signature is missing in the version: Should fail' {
Update-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.4 -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
}
It 'Update-Module -- catalog authenticode signature is invalid: Should fail' {
Update-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.3 -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
}
It 'Update-Module -- catalog file is invalid: Should fail' {
Update-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.2 -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
}
}
Describe 'Test Install-Module and Update-Module for catalog signed test modules' -tags 'BVT','InnerLoop' {
if(Test-SkipCondition) { return }
BeforeAll {
if(Test-SkipCondition){ return }
RegisterLocalRepo
$script:TempPath = Get-TempPath
$script:TempModulesPath = Join-Path -Path $script:TempPath -ChildPath "PSGet_$(Get-Random)"
$null = New-Item -Path $script:TempModulesPath -ItemType Directory -Force
if ((Get-Module PKI -ListAvailable)) {
$TestModuleDestination = Join-Path -Path $script:TempModulesPath -ChildPath "TestModule"
if (Test-Path -Path $TestModuleDestination) {
$null = Remove-Item -Path $TestModuleDestination -Force
}
$null = New-Item -Path $TestModuleDestination -Force -ItemType Directory
$TestModuleRoot = Join-Path -Path $script:TempModulesPath -ChildPath "TestModule"
Create-CodeSigningCert -storeName "Cert:\LocalMachine\My" -subject "AliceTest"
$alice1Cert = (Get-ChildItem cert: -CodeSigningCert -Recurse | Where-Object Subject -match "AliceTest" | Select-Object -First 1)
Create-CodeSigningCert -subject "AliceTest" -CertRA "Other Root Authority"
$alice2Cert = (Get-ChildItem cert: -CodeSigningCert -Recurse | Where-Object Issuer -match "Other" | Select-Object -First 1)
Create-CodeSigningCert -subject "BobTest"
$bobCert = (Get-ChildItem cert: -CodeSigningCert -Recurse | Where-Object Subject -match "BobTest" | Select-Object -First 1)
$certs = @{'99.99.99.96' = $alice1Cert; '99.99.99.97' = $alice2Cert; '99.99.99.98' = $bobCert; '99.99.99.99' = $alice1Cert}
$certs.Keys |
ForEach-Object {
$TestModuleVersionDestination = Join-Path -Path $TestModuleDestination -ChildPath "$_"
$null = New-Item -Path $TestModuleVersionDestination -Force -ItemType Directory
$null = New-ModuleManifest -Path (Join-Path -Path $TestModuleVersionDestination -ChildPath "TestModule.psd1") -Description "Test signed TestModule module v. $_" -ModuleVersion $_
$null = Set-AuthenticodeSignature -FilePath (Join-Path -Path $TestModuleVersionDestination -ChildPath "TestModule.psd1") -Certificate ($certs.$_)
$TestModuleVersionPath = Join-Path -Path $TestModuleRoot -ChildPath $_
if(-not (Test-Path -Path "$SourceLocation\TestModule.$_.nupkg" -PathType Leaf)) {
Publish-Module -Path $TestModuleVersionPath -Repository $Script:RepositoryName -Force
}
}
}
Install-Module TestModule -RequiredVersion 99.99.99.96 -Repository $Script:RepositoryName
}
BeforeEach {
Get-InstalledModule TestModule -RequiredVersion 99.99.99.99 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
AfterAll {
SuiteCleanup
}
AfterEach {
}
It 'Install module signed with same signature but different root certificate authority than current module: Should fail' {
Install-Module TestModule -RequiredVersion 99.99.99.97 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -WarningAction SilentlyContinue -Force
$iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
$iwv | should be $null
}
It 'Update module signed with different signature but different root certificate authority than than current module: Should fail' {
Update-Module TestModule -RequiredVersion 99.99.99.97 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -Force
$iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
$iwv | should be $null
}
It 'Install module signed with different signature than current module: Should fail' {
Install-Module TestModule -RequiredVersion 99.99.99.98 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -Force
$iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
$iwv | should be $null
}
It 'Update module signed with different signature than current module: Should fail' {
Update-Module TestModule -RequiredVersion 99.99.99.98 -ErrorVariable iev -ErrorAction SilentlyContinue -WarningVariable iwv -Force
$iev[0].FullyQualifiedErrorId | Should be 'AuthenticodeIssuerMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
$iwv | should be $null
}
It 'Install module signed with same signature and same root certificate authority as current module: Should work' {
Install-Module TestModule -RequiredVersion 99.99.99.99 -ErrorVariable iev -WarningVariable iwv -Force
$iev | should be $null
$iwv | should be $null
}
It 'Update module signed with same signature and same root certificate authority as current module: Should work' {
Update-Module TestModule -RequiredVersion 99.99.99.99 -ErrorVariable iev -WarningVariable iwv -Force
$iev | should be $null
$iwv | should be $null
}
}
Describe 'Install-Module --- Microsoft signed versions of Microsoft.PowerShell.Archive module' -tags 'BVT','InnerLoop' {
BeforeAll {
SuiteSetup
}
BeforeEach {
if($PSVersionTable.PSVersion -lt '5.0.0') {
Install-Package -ProviderName NuGet `
-Source $Script:INTRepoLocation `
-Name $MicrosoftPowerShellArchive `
-RequiredVersion 1.0.1.0 `
-Destination $SystemModulesPath `
-Force `
-ExcludeVersion
}
}
AfterAll {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
if($PSVersionTable.PSVersion -lt '5.0.0') {
Remove-Item -Path "$SystemModulesPath\$MicrosoftPowerShellArchive" -Recurse -Force
}
}
BeforeEach {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
It 'Install-Module Microsoft.PowerShell.Archive -- valid catalog signed module version with a previous version under System32 path: Should work' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName -Force
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty
}
It 'Install-Module Microsoft.PowerShell.Archive -- Authenticode publisher is different from the previously installed module version: Should fail' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.5 -Repository $Script:RepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'PublishersMismatch,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
} `
-Skip:$(Test-SkipCondition)
It 'Install-Module Microsoft.PowerShell.Archive -- Catalog authenticode signature is missing in the version: Should fail' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 -Repository $Script:INTRepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Should BeNullOrEmpty
} `
-Skip:$(Test-SkipCondition)
It 'Install-Module Microsoft.PowerShell.Archive -- catalog authenticode signature is invalid: Should fail' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 -Repository $Script:INTRepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue -Force
$ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Should BeNullOrEmpty
} `
-Skip:$(([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.0.0') )
It 'Install-Module Microsoft.PowerShell.Archive -- catalog file is invalid: Should fail' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -Repository $Script:INTRepositoryName -ErrorVariable ev -ErrorAction SilentlyContinue -Force
if($PSVersionTable.PSVersion -lt '5.1.0') {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -ErrorAction SilentlyContinue | Should Not BeNullOrEmpty
} else {
$ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Should BeNullOrEmpty
}
}
It 'Install-Module Microsoft.PowerShell.Archive -SkipPublisherCheck -- Catalog authenticode signature is missing in the version: Should work' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 -Repository $Script:INTRepositoryName -SkipPublisherCheck -Force
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 | Should Not BeNullOrEmpty
}
It 'Install-Module Microsoft.PowerShell.Archive -SkipPublisherCheck -- catalog authenticode signature is invalid: Should work' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 -Repository $Script:INTRepositoryName -SkipPublisherCheck -Force
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 | Should Not BeNullOrEmpty
}
It 'Install-Module Microsoft.PowerShell.Archive -SkipPublisherCheck -- catalog file is invalid: Should work' {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -Repository $Script:INTRepositoryName -SkipPublisherCheck -Force
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 | Should Not BeNullOrEmpty
}
}
Describe 'Update-Module --- Microsoft signed versions of Microsoft.PowerShell.Archive module' -tags 'BVT','InnerLoop' {
BeforeAll {
SuiteSetup
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName
if(-not (Test-SkipCondition)) {
Install-Module -Name $TestArchiveModule -RequiredVersion 1.0.1.1 -Repository $Script:RepositoryName
}
}
AfterAll {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $TestArchiveModule -AllVersions -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
BeforeEach {
if($PSVersionTable.PSVersion -lt '5.0.0') {
Install-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 -Repository $Script:INTRepositoryName -Force
}
Get-InstalledModule -Name $MicrosoftPowerShellArchive -ErrorAction SilentlyContinue | Where-Object {$_.Version -gt "1.0.1.1" } | PowerShellGet\Uninstall-Module
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 -ErrorAction SilentlyContinue | PowerShellGet\Uninstall-Module
}
It 'Update-Module Microsoft.PowerShell.Archive -- Update a catalog signed module: Should work' {
Update-Module -Name $MicrosoftPowerShellArchive
Get-InstalledModule -Name $MicrosoftPowerShellArchive -MinimumVersion 1.0.1.11 | Should Not BeNullOrEmpty
if($PSVersionTable.PSVersion -ge '5.0.0') {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
}
}
It 'Update-Module Microsoft.PowerShell.Archive -- Update a catalog signed module without specifying a name: Should work' {
Update-Module
Get-InstalledModule -Name $MicrosoftPowerShellArchive -MinimumVersion 1.0.1.11 | Should Not BeNullOrEmpty
if($PSVersionTable.PSVersion -ge '5.0.0') {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
}
if(-not (Test-SkipCondition)) {
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.11 | Should Not BeNullOrEmpty
if($PSVersionTable.PSVersion -ge '5.0.0') {
Get-InstalledModule -Name $TestArchiveModule -RequiredVersion 1.0.1.1 | Should Not BeNullOrEmpty
}
}
}
It 'Update-Module Microsoft.PowerShell.Archive -- Catalog authenticode signature is missing in the version: Should fail' {
Update-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.4 -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'ModuleIsNotCatalogSigned,Validate-ModuleAuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
} `
-Skip:$(([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.0.0') )
It 'Update-Module Microsoft.PowerShell.Archive -- catalog authenticode signature is invalid: Should fail' {
Update-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.3 -ErrorVariable ev -ErrorAction SilentlyContinue
$ev[0].FullyQualifiedErrorId | Should be 'InvalidAuthenticodeSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
} `
-Skip:$(([System.Environment]::OSVersion.Version -le '6.1.7601.65536') -or ($PSVersionTable.PSVersion -lt '5.0.0') )
It 'Update-Module Microsoft.PowerShell.Archive -- catalog file is invalid: Should fail' {
Update-Module -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 -ErrorVariable ev -ErrorAction SilentlyContinue
if($PSVersionTable.PSVersion -ge '5.1.0') {
$ev[0].FullyQualifiedErrorId | Should be 'InvalidCatalogSignature,ValidateAndGet-AuthenticodeSignature,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
} else {
Get-InstalledModule -Name $MicrosoftPowerShellArchive -RequiredVersion 1.0.1.2 | Should Not BeNullOrEmpty
}
}
}
if($Script:RegisteredLocalRepo)
{
Get-PSRepository -Name $Script:RepositoryName -ErrorAction SilentlyContinue | Unregister-PSRepository
}
if($Script:RegisteredINTRepo)
{
Get-PSRepository -Name $Script:INTRepositoryName -ErrorAction SilentlyContinue | Unregister-PSRepository
}
|
combined_dataset/train/non-malicious/sample_35_14.ps1 | sample_35_14.ps1 | #
# Module manifest for module 'OCI.PSModules.Functions'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Functions.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Functions Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList',
'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList',
'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList',
'Get-OCIFunctionsPbfListingVersion',
'Get-OCIFunctionsPbfListingVersionsList',
'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction',
'Move-OCIFunctionsApplicationCompartment',
'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction',
'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction',
'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_49_8.ps1 | sample_49_8.ps1 | 5PrintAllTranslations 限制不能与 IgnoreTranslations 限制一起使用。 8无法将计算列 "%{ccon_column/}" 添加到混合表 "%{ccon_table/}"。请删除计算列。D不能将用于聚合的 "alternateOf" 列添加到混合表 "%{ccon_table/}"。请删除 "alternateOf" 列。p不能创建用于聚合的 "alternateOf" 列,该聚合引用混合表 "%{ccon_baseTable/}" 作为其 BaseTable。请在 DirectQuery 模式下引用基表或删除 "alternateOf" 列。C无法在表 "%{ccon_table/}" 的 DirectQuery 模式下创建多个分区。仅支持单个 DirectQuery 分区。q不能在类型实体的混合表 '%{ccon_table/}' 上创建分区,该表引用其他 Power BI、SAP 或 Azure Analysis Services (AAS)数据集作为 DirectQuery 源。请删除此分区。²由于数据查询表达式引用 '%d{datasourceNumber/}' 数据源,因此无法将表 '%{ccon_table/}' 配置为具有实时分区的增量刷新表。具有实时分区的增量刷新表只能使用单个数据源。请修改表表达式以仅使用单个数据源。请参阅 https://go.microsoft.com/fwlink/?linkid=2172127 了解详细信息。;父类型 '%{type/}' 的 ChangedProperty 对象中 '%{property/}' 的属性不兼容。R父类型 '%{parentType/}' 的 ExcludedArtifact 对象中 '%{ArtifactType/}' 的 ArtifactType 不兼容。.已存在 FormatString changedProperty 对象集合,现在允许重复项。)已存在 Caption changedProperty 对象集合,现在允许重复项。-已存在 Description changedProperty 对象集合,现在允许重复项。/已存在 DisplayFolder changedProperty 对象集合,现在允许重复项。N非 groupby AlternateOf (如 Sum/Min/Max) 的详细信息表“%{ccon_table/}”必须是 DirectQuery 表。J当聚合表“%{ccon_table/}”的详细信息表“%{ccon_basetable/}”处于双模式时,它不能处于 DirectQuery 模式。 |
combined_dataset/train/non-malicious/PS2WCF_6.ps1 | PS2WCF_6.ps1 | <#
.SYNOPSIS
Functions to call WCF Services With PowerShell.
.NOTES
Version 1.2 11.02.2012
Requires Powershell v2 and .NET 3.5
Original version by Christian Glessner
Blog: http://www.iLoveSharePoint.com
Twitter: http://twitter.com/cglessner
Codeplex: http://codeplex.com/iLoveSharePoint
PowerShell v2.0 modification by Justin Dearing
Blog: http://justaprogrammer.net
Twitter: http://twitter.com/zippy1981
.LINK
Blog describing original version: http://www.ilovesharepoint.com/2008/12/call-wcf-services-with-powershell.html
Authoritative version of this fork: https://github.com/justaprogrammer/PowerShellWCF
Posted to PoshCode.org http://poshcode.org/?lang=&q=PS2WCF
#>
# load WCF assemblies
Add-Type -AssemblyName "System.ServiceModel"
Add-Type -AssemblyName "System.Runtime.Serialization"
<#
.SYNOPSIS
Get metadata of a service
.DESCRIPTION
Parses a wsdl or mex and generates a WsdlImporter object from it.
.EXAMPLE
Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc/mex'
.EXAMPLE
Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc' -HttpGet
.EXAMPLE
Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc?wsdl' -HttpGet
#>
function global:Get-WsdlImporter([CmdletBinding()][Parameter(Mandatory=$true, ValueFromPipeline=$true)][string]$WsdlUrl, [switch]$HttpGet)
{
if($HttpGet)
{
$local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::HttpGet
}
else
{
$local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::MetadataExchange
}
$mexClient = New-Object System.ServiceModel.Description.MetadataExchangeClient([Uri]$WsdlUrl, $mode);
$mexClient.MaximumResolvedReferences = [System.Int32]::MaxValue
$metadataSet = $mexClient.GetMetadata()
$wsdlImporter = New-Object System.ServiceModel.Description.WsdlImporter($metadataSet)
return $wsdlImporter
}
<#
.SYNOPSIS
Generate wcf proxy types
.DESCRIPTION
Examines a web services meta data (wsdl or mex) and generates the types for the client proxy,
as well as request and response contracts.
.EXAMPLE
$proxyType = Get-WcfProxyType $wsdlImporter
$endpoints = $wsdlImporter.ImportAllEndpoints();
$proxy = New-Object $proxyType($endpoints[0].Binding, $endpoints[0].Address);
#>
function global:Get-WcfProxyType(
[CmdletBinding()]
[Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter,
[Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl,
[string] $proxyPath
) {
switch ($PsCmdlet.ParameterSetName)
{
"WsdlUrl" {
$WsdlImporter = Get-WsdlImporter $WsdlUrl
trap [Exception]
{
$WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet
continue
}
break
}
"WsdlImporter" { break }
}
$generator = new-object System.ServiceModel.Description.ServiceContractGenerator
foreach($contractDescription in $wsdlImporter.ImportAllContracts())
{
[void]$generator.GenerateServiceContractType($contractDescription)
}
$parameters = New-Object System.CodeDom.Compiler.CompilerParameters
if($proxyPath -eq $null)
{
$parameters.GenerateInMemory = $true
}
else
{
$parameters.OutputAssembly = $proxyPath
}
$providerOptions = New-Object "Collections.Generic.Dictionary[String,String]"
[void]$providerOptions.Add("CompilerVersion","v3.5")
$compiler = New-Object Microsoft.CSharp.CSharpCodeProvider($providerOptions)
$result = $compiler.CompileAssemblyFromDom($parameters, $generator.TargetCompileUnit);
if($result.Errors.Count -gt 0)
{
throw "Proxy generation failed"
}
return $result.CompiledAssembly.GetTypes() | Where-Object {$_.BaseType.IsGenericType -and $_.BaseType.GetGenericTypeDefinition().FullName -eq "System.ServiceModel.ClientBase``1" }
}
<#
.SYNOPSIS
Generate wcf proxy
.DESCRIPTION
Generate wcf proxy in a manner similar to a Get-WebServiceProxy
.EXAMPLE
$proxy = Get-WcfProxy 'http://localhost.fiddler:14232/EchoService.svc/mex'
$proxy.Echo("Justin Dearing");
.EXAMPLE
$proxy = Get-WcfProxy 'net.tcp://localhost:8732/EchoService/mex' 'net.tcp://localhost:8732/EchoService/' (New-Object System.ServiceModel.NetTcpBinding)
$proxy.Echo("Justin Dearing");
#>
function global:Get-WcfProxy(
[CmdletBinding()]
[Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter,
[Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl,
[Parameter(Position=1, Mandatory=$false)][string] $EndpointAddress = $null,
[Parameter(Position=2, Mandatory=$false)][System.ServiceModel.Channels.Binding] $Binding = $null
) {
if ($Binding -ne $null -and [string]::IsNullOrEmpty($EndpointAddress)) {
throw New-Object ArgumentNullException '$EndPointAddress', 'You cannot set $Binding without setting $EndpointAddress.'
}
switch ($PsCmdlet.ParameterSetName)
{
"WsdlUrl" {
$WsdlImporter = Get-WsdlImporter $WsdlUrl
trap [Exception]
{
$WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet
continue
}
break
}
}
$proxyType = Get-WcfProxyType $wsdlImporter;
if ([string]::IsNullOrEmpty($EndpointAddress)) {
$endpoints = $WsdlImporter.ImportAllEndpoints();
$Binding = $endpoints[0].Binding;
$EndpointAddress = $endpoints[0].Address;
}
return New-Object $proxyType($Binding, $EndpointAddress);
}
|
combined_dataset/train/non-malicious/sample_62_57.ps1 | sample_62_57.ps1 | #
# Module manifest for module 'OCI.PSModules.Opensearch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Opensearch.dll'
# Version number of this module.
ModuleVersion = '90.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Opensearch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster',
'Get-OCIOpensearchClusterBackup',
'Get-OCIOpensearchClusterBackupsList',
'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList',
'Get-OCIOpensearchWorkRequest',
'Get-OCIOpensearchWorkRequestErrorsList',
'Get-OCIOpensearchWorkRequestLogsList',
'Get-OCIOpensearchWorkRequestsList',
'Invoke-OCIOpensearchOpensearchClusterRestore',
'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal',
'Invoke-OCIOpensearchResizeOpensearchClusterVertical',
'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster',
'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster',
'Update-OCIOpensearchClusterBackup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_52_69.ps1 | sample_52_69.ps1 |
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Tests if the information provided for a function is valid.
This can range from testing the connection to the underlying web service behind the function or making sure the function code provided is syntactically correct.
.Description
Tests if the information provided for a function is valid.
This can range from testing the connection to the underlying web service behind the function or making sure the function code provided is syntactically correct.
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IFunction
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
FUNCTION <IFunction>: A function object, containing all information associated with the named function. All functions are contained under a streaming job.
[ConfigurationProperty <IFunctionConfiguration>]:
[Binding <IFunctionBinding>]: The physical binding of the function. For example, in the Azure Machine Learning web service’s case, this describes the endpoint.
Type <String>: Indicates the function binding type.
[Input <IFunctionInput[]>]:
[DataType <String>]: The (Azure Stream Analytics supported) data type of the function input parameter. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx
[IsConfigurationParameter <Boolean?>]: A flag indicating if the parameter is a configuration parameter. True if this input parameter is expected to be a constant. Default is false.
[Output <IFunctionOutput>]: Describes the output of a function.
[DataType <String>]: The (Azure Stream Analytics supported) data type of the function output. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx
[ETag <String>]:
[PropertiesType <String>]: Indicates the type of function.
FUNCTIONCONFIGURATIONPROPERTY <IFunctionConfiguration>: .
[Binding <IFunctionBinding>]: The physical binding of the function. For example, in the Azure Machine Learning web service’s case, this describes the endpoint.
Type <String>: Indicates the function binding type.
[Input <IFunctionInput[]>]:
[DataType <String>]: The (Azure Stream Analytics supported) data type of the function input parameter. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx
[IsConfigurationParameter <Boolean?>]: A flag indicating if the parameter is a configuration parameter. True if this input parameter is expected to be a constant. Default is false.
[Output <IFunctionOutput>]: Describes the output of a function.
[DataType <String>]: The (Azure Stream Analytics supported) data type of the function output. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx
INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter
[ClusterName <String>]: The name of the cluster.
[FunctionName <String>]: The name of the function.
[Id <String>]: Resource identity path
[InputName <String>]: The name of the input.
[JobName <String>]: The name of the streaming job.
[Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/
[OutputName <String>]: The name of the output.
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[SubscriptionId <String>]: The ID of the target subscription.
[TransformationName <String>]: The name of the transformation.
.Link
https://learn.microsoft.com/powershell/module/az.streamanalytics/test-azstreamanalyticsfunction
#>
function Test-AzStreamAnalyticsFunction {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IResourceTestStatus])]
[CmdletBinding(DefaultParameterSetName='TestExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='TestExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the streaming job.
${JobName},
[Parameter(ParameterSetName='TestExpanded', Mandatory)]
[Alias('FunctionName')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the function.
${Name},
[Parameter(ParameterSetName='TestExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='TestExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$hasAsJob = $PSBoundParameters.Remove('AsJob')
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
$InputObject = Get-AzStreamAnalyticsFunction @PSBoundParameters
$resourceId = $InputObject.Id
$PSBoundParameters.Add("InputObject", $resourceId)
$PSBoundParameters.Add("Function", $InputObject)
if ($PSBoundParameters.ContainsKey("JobName"))
{
$null = $PSBoundParameters.Remove("JobName")
}
if ($PSBoundParameters.ContainsKey("Name"))
{
$null = $PSBoundParameters.Remove("Name")
}
if ($PSBoundParameters.ContainsKey("ResourceGroupName"))
{
$null = $PSBoundParameters.Remove("ResourceGroupName")
}
if ($PSBoundParameters.ContainsKey("SubscriptionId"))
{
$null = $PSBoundParameters.Remove("SubscriptionId")
}
if ($hasAsJob) {
$PSBoundParameters.Add('AsJob', $true)
}
Az.StreamAnalytics.Internal\Test-AzStreamAnalyticsFunction @PSBoundParameters
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAFSBqHzmifNqSX
# DFPVOpz0Ow+fYoXwL+Y3t1hspvrTLKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB6jfTQhj0qG15/e1yUjE6bd
# SQqIIi7Lvmd8HcrnPGTyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAzEDRzchD2D61o7ObMo2yC7i2jySspB0u9vwMc6c2E0mw4IiB5zYGckpL
# Ahn0gMkCjPMzaNlYlayQoB8VpBlzTAbrmndItu88wJCIND7pRJ47XfvyC1aCoBNO
# mzgI1bzpddG+a3E39srwb+z+DNI+yiOcqT2st07j5fGT+CgQzrHofwJ76l/3rFkS
# SFD4WHHa9H+BZ/bZSlknu9KsLbcb7a63oxqKISrgz6N9rUfYQyiH9F3dYE3R3/4E
# kaOpMiVc3DfDRUT+2dbhM3YtUpQ0uhaY4L/lARn1JLwcLY+gQZ9Gbt1TYjTbazgi
# GdrPJofiNZ0kSGesl1EAFP8+0VHj5KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCMqIpKo3IQU2GulZgJc36p/DX1TpwHZe9K90hbsi7DHQIGZh/eWJrB
# GBMyMDI0MDQyMzEzMTUyMS45MDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRnJUwIhgPMjAyNDA0MjMxMDMzNTdaGA8yMDI0MDQyNDEwMzM1N1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dGclQIBADAHAgEAAgIXWjAHAgEAAgISjTAKAgUA
# 6dLuFQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPeMyGf3Ydy+jqQvs63
# XCZaWY7a56BswHctd6Tk8AklWwZQVK9M+hXCpDyBP05hd5gdWVf56HOP8SwAs89F
# 83kET0f+Ametk+Om8umz2PI4okluGuXg7eRsJ0iiNMPg7WgQ8Qi7VMXppToEvdFw
# yYwBmtcBpN/Gkc78aAYomHiTMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgjdiJYg6dNazc5pTjhLVBbyWwYBiIjoZs+UZS5/n1EwgwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEII54AP2h7Vh7o+D/3jGv808eKZ8LrGHgQ+q5KtqbazFB
# MA0GCSqGSIb3DQEBCwUABIICAJvMEywvunnleODLEtaVY/SomTwdMsx2z2X+KPAw
# mGi7lYgCNgAHS19dHVJGaPjjxdMk2gszsnZGVJcKzgvK5BOcBJZmqVPssOj3IXq5
# sIWQIPQF/ONYWUd4zuois7F21tyXdAjvyYbWQ2ZzzOcjSmjcJjCgn2OSkFnJpvAO
# A/UonvZUNIUy6OW8LI7aFw2BDwaHcLzTapalHsKaRnona7QhZWBAKImDhFZ7MiB2
# jWSTrpiIC6dx8Jj5J2l4kNmJsdBmX1RbRZrLALPb3uedGnQM2bHduZHdkbcFtHBR
# 5FvOHXK9BXNH8ulsQdHpadW97wr1UZh3ugweA+CaJI85HUUscCkxvN0ywX3ytnLk
# Dy1+PGhUXcEkz8ZxlMC0bVWG32OgWFefYgIHTpIh33oMfxpdGm2lVfkltI2ie93f
# wl3eKSh0NzI3BntdLQWbLAMyrr2s2YnFF+KC+rmNWnqWanywI6XzKrCDKboYzofI
# O3qcXpdaryxtLcKiz814ros9vlnf4sUYyo71+sZaYcmLc/6rrF31rlA1+NCFtaKV
# mSuhK7JJSn33Ol93AmKWSf/XjBoCbiuabxvnsGPwlB3uCzUd0LD1YLlSKPEhct85
# QmknhqzKQDG1+TO8RWAB2Habk6OPgxDWUGnrMU0iJTsu7aQ9wKzgA62OAlKZEW01
# d2UG
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_21_69.ps1 | sample_21_69.ps1 | @{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ
# mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji
# Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2
# 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s
# NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9
# kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61
# /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC
# FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x
# 6jeF/KW0L7vYOjGQhAzBRAIGZfxnSanAGBMyMDI0MDMyNzA4MDMzNy4zMzVaMASA
# AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC
# EzMAAAHg1PwfExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5
# WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE
# CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL
# Ex1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC
# AgoCggIBAKyHnPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tq
# orMK7GDvcXdKs+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7j
# arJOEjnFMBp+yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/sv
# NRieA5gUnv/YcM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/
# 5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcq
# hTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHW
# JXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89
# nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEE
# Q4iL4BX8YknKXonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9
# s1WxsZGEBrK/obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT
# +aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJ
# MIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt
# cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw
# AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv
# ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw
# ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI
# hvcNAQELBQADggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8i
# wfflulX5Us64tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wf
# bx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4
# WUE/Po5pU7rQRbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9
# vusT97WeJcfaVosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBd
# BS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR
# 0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJV
# z2agfczGjjsKi2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9
# zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6q
# yglr2K4OoJDJXxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwW
# F5sv+B5fz35OW3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIH
# cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB
# iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp
# TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw
# OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh
# C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx
# WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc
# UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc
# nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo
# veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi
# YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9
# fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH
# GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X
# KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE
# R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/
# eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3
# FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd
# BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE
# AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI
# MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB
# Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud
# HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By
# b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO
# MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy
# dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC
# AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk
# bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng
# ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3
# lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC
# gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6
# MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU
# BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh
# VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+
# fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp
# NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI
# qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB
# AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt
# MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw
# JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMc
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR
# 1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOmuJQUwIhgPMjAyNDAzMjcxMjU0Mjla
# GA8yMDI0MDMyODEyNTQyOVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6a4lBQIB
# ADAHAgEAAgIFgTAHAgEAAgISIDAKAgUA6a92hQIBADA2BgorBgEEAYRZCgQCMSgw
# JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
# DQEBBQUAA4GBADIlpRthshEn5d+i3XXKaMVJ5Tgdt/0PXWhiLWQAIHTPpjACRzpM
# ELBoZ4g0EMmGDoS9giPr8dP+sXxn6Af5zFYnOh8xfQanALKmbJKISU7GfDvnY8PA
# SsH7lCx+SUO3J9JdIDXh0pGIqBjycMv91UmUtimIDRHhOCwqeUND2rVcMYIEDTCC
# BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1Pwf
# ExUffl0AAQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq
# hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgUX/r5YqHcR7liCrMOlNXiEMnAGb/
# dzf++R9A85YtBbcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnl
# bTjPvc77DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIFC6FdiVHDTN
# PwKzjul2MHTaZljgWSs0EQzV63GOp7rCMA0GCSqGSIb3DQEBCwUABIICAHpYdZAN
# YRFQgOhvmKySbpDqpL6XzXkjHZPS6W4/rfvMNLMgLj+lMwkgAlsxREFEbabpsUqY
# elNnO5+ltvAhth8V+IL5jWvao8LSR13vCiQgOqOS2L0x7aoFaRl+pVKCQRaLBPBg
# hLI/C0FTdsm621WNKhLmhx6Py1fQcno9P6bBY0vutwzaMIXENAKYXHb14klEk4Vk
# CYS2g95+30vdQ0WnLFpSAxD1SuyLS6X32DxB4vU2vZgGrY3HoyKg/uzSOi/yYv4w
# eJqfgQF3KnJqkZHuUdFFWq0Yd0f4NZRFjMan4udSuIv6MYXDAQnsP7uqcFW97sAg
# yeCJVSulLH5+dcdN4p6or1N8oo2dXH2Ql38iGj7kjP+Cj4AkEPnzSKUWHq2UGbBD
# vQ9xi4+VR7zhLeuq8ZitdvG0aU4iPA/f4FLWlU/tua01zQa8hymnh284XSzqj4ik
# gEUbBy2xaR+Bgsjkl1puERb8nuFbjpB0P4J44TztjQ5CVXXVGGLfRD3u2iUYA62n
# R9duE8e4DTDWviS745OXJOxU0ESTpRdTQPZc6XOP2d6fKgqIex2tC9Zd/YVndUer
# cM9TjJQvtsVHktFj1YNtkmmgHTraSbna1OQ5MHW4uTiNMh8SjMlSpKWyx4nV+PZI
# 2s9Nd9fmT8bRMi8AZnTIw+GnjMtb2v8I0DC+
# SIG # End signature block
|
combined_dataset/train/non-malicious/USB Script backup_3.ps1 | USB Script backup_3.ps1 | <#
.SYNOPSIS
Backup-ToUSB.ps1 (Version 2.2, 9 Jan 2012)
.DESCRIPTION
This script will backup recently changed *.ps1,*.psm1,*.psd1 files from any
selected folder (default is $pwd) to any number of inserted USB devices, on
which an archive folder 'PSarchive' will be created if it does not already
exist.
As a USB hard disk is a Type 3 device (similar to the system disk), use the
-Unit D switch (drive letter 'D' for example) to distinguish such a unit and
add it to the list of selected devices.
.EXAMPLE
Invoke-Expression ".\\Backup-ToUsb.ps1 -Unit D $args"
Add this line in 'function Backup' in $profile and it will add the USB Hard
Disk 'D' as the standard backup device.
.EXAMPLE
.\\Backup-ToUSB.ps1 -type ps1 -v
Select *.ps1 files to be archived. 'Verbose' will display the name of each
file processed. Using the '-Debug' switch shows the time difference that has
tagged any file for archive.
.NOTES
The author may be contacted via www.SeaStarDevelopment.Bravehost.com
#>
param ([String]$types = 'ps1',
[String]$folder = $pwd,
[String]$unit = $null,
[Switch]$debug,
[Switch]$verbose)
if ($verbose) {
$verbosePreference = 'Continue'
}
if ($debug) {
$debugPreference = 'Continue'
}
$drive = '-<BLANK>-'
if ($types -notmatch '^ps1|psd1|psm1|ps\\*$') { #Adjust to suit.
Write-Warning "Invalid filetype ($types): ps1, psm1, psd1 only."
exit 1
}
if (!(Test-path $folder -pathType Container )) {
[System.Media.SystemSounds]::Hand.Play()
Write-Warning "$folder is not a directory - resubmit."
exit 3
}
$filter = 'DriveType = 2'
if ($unit -match '^[d-z]$') { #Allow any single letter drive unit here.
$filter = "DriveType = 2 OR (DriveType = 3 AND DeviceID = '" + "$unit" + ":')"
}
function copyFile ([string]$value) {
Copy-Item -Path $value -Destination $newFolder -Force
Write-Verbose "--> Archiving file: $value"
$SCRIPT:files++
}
Get-WMIObject Win32_LogicalDisk -filter $filter |
Select-Object VolumeName, DriveType, FreeSpace, DeviceID |
Where-Object {$_.VolumeName -ne $null} |
foreach {
$vol = $_.VolumeName
$drive = $_.DeviceID + '\\'
$type = $_.DriveType
[int]$free = $_.FreeSpace / 1MB
Write-Verbose "Scanning USB devices - Drive = [$drive] Name = $vol, Free = $free Mb"
if (!(Test-Path $drive)) {
Write-Warning "Error on drive $drive - restart."
[System.Media.SystemSounds]::Hand.Play()
exit 4
}
[int]$SCRIPT:files = 0 #Reset counter for each new drive.
$newFolder = $drive + "PSarchive" #Check if folder exists.
if (!(Test-Path $newFolder)) {
New-Item -path ($drive) -name PSarchive -type directory | Out-Null
}
(Get-ChildItem $folder -filter "*.$types") |
foreach {
$checkFile = Join-Path ($drive + 'PSArchive') $_
if (Test-path $checkFile) {
$lwtHdd = $_.LastWriteTime #HDD time last written.
$lwtUsb = (Get-Item $checkFile).LastWriteTime
if ($lwtHdd -gt $lwtUsb) {
Write-Debug "(HDD) $lwtHdd (USB) $LwtUsb $_"
copyFile $_
}
}
else { #New file, so archive it anyway.
Write-Debug "(HDD) $($_.LastWriteTime) (USB Archiving new file) $_"
copyFile $_
}
}
$print = "Backup to USB drive [{0}] (Volume = {2}) completed; {1} files copied." -f $drive, $SCRIPT:files, $vol
Write-Host "--> $print"
}
if ($drive -eq '-<BLANK>-') {
[System.Media.SystemSounds]::Asterisk.Play()
Write-Warning "No USB drive detected - Insert a device and resubmit."
}
|
combined_dataset/train/non-malicious/1945.ps1 | 1945.ps1 |
Describe "Export-FormatData" -Tags "CI" {
BeforeAll {
$fd = Get-FormatData
$testOutput = Join-Path -Path $TestDrive -ChildPath "outputfile"
}
AfterEach {
Remove-Item $testOutput -Force -ErrorAction SilentlyContinue
}
It "Can export all types" {
try
{
$fd | Export-FormatData -path $TESTDRIVE\allformat.ps1xml -IncludeScriptBlock
$sessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault()
$sessionState.Formats.Clear()
$sessionState.Types.Clear()
$runspace = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspace($sessionState)
$runspace.Open()
$runspace.CreatePipeline("Update-FormatData -AppendPath $TESTDRIVE\allformat.ps1xml").Invoke()
$actualAllFormat = $runspace.CreatePipeline("Get-FormatData -TypeName *").Invoke()
$fd.Count | Should -Be $actualAllFormat.Count
Compare-Object $fd $actualAllFormat | Should -Be $null
}
finally
{
$runspace.Close()
Remove-Item -Path $TESTDRIVE\allformat.ps1xml -Force -ErrorAction SilentlyContinue
}
}
It "Works with literal path" {
$filename = 'TestDrive:\[formats.ps1xml'
$fd | Export-FormatData -LiteralPath $filename
(Test-Path -LiteralPath $filename) | Should -BeTrue
}
It "Should overwrite the destination file" {
$filename = 'TestDrive:\ExportFormatDataWithForce.ps1xml'
$unexpected = "SHOULD BE OVERWRITTEN"
$unexpected | Out-File -FilePath $filename -Force
$file = Get-Item $filename
$file.IsReadOnly = $true
$fd | Export-FormatData -Path $filename -Force
$actual = @(Get-Content $filename)[0]
$actual | Should -Not -Be $unexpected
}
It "should not overwrite the destination file with NoClobber" {
$filename = "TestDrive:\ExportFormatDataWithNoClobber.ps1xml"
$fd | Export-FormatData -LiteralPath $filename
{ $fd | Export-FormatData -LiteralPath $filename -NoClobber } | Should -Throw -ErrorId 'NoClobber,Microsoft.PowerShell.Commands.ExportFormatDataCommand'
}
It "Test basic functionality" {
Export-FormatData -InputObject $fd[0] -Path $testOutput
$content = Get-Content $testOutput -Raw
$formatViewDefinition = $fd[0].FormatViewDefinition
$typeName = $fd[0].TypeName
$content.Contains($typeName) | Should -BeTrue
for ($i = 0; $i -lt $formatViewDefinition.Count;$i++)
{
$content.Contains($formatViewDefinition[$i].Name) | Should -BeTrue
}
}
It "Should have a valid xml tag at the start of the file" {
$fd | Export-FormatData -Path $testOutput
$piped = Get-Content $testOutput -Raw
$piped[0] | Should -BeExactly "<"
}
It "Should pretty print xml output" {
$xmlContent=@"
<Configuration>
<ViewDefinitions>
<View>
<Name>ExportFormatDataName</Name>
<ViewSelectedBy>
<TypeName>ExportFormatDataTypeName</TypeName>
</ViewSelectedBy>
<TableControl>
<TableHeaders />
<TableRowEntries>
<TableRowEntry>
<TableColumnItems>
<TableColumnItem>
<PropertyName>Guid</PropertyName>
</TableColumnItem>
</TableColumnItems>
</TableRowEntry>
</TableRowEntries>
</TableControl>
</View>
</ViewDefinitions>
</Configuration>
"@
$expected = @"
<?xml version="1.0" encoding="utf-8"?>
<Configuration>
<ViewDefinitions>
<View>
<Name>ExportFormatDataName</Name>
<ViewSelectedBy>
<TypeName>ExportFormatDataTypeName</TypeName>
</ViewSelectedBy>
<TableControl>
<TableHeaders />
<TableRowEntries>
<TableRowEntry>
<TableColumnItems>
<TableColumnItem>
<PropertyName>Guid</PropertyName>
</TableColumnItem>
</TableColumnItems>
</TableRowEntry>
</TableRowEntries>
</TableControl>
</View>
</ViewDefinitions>
</Configuration>
"@ -replace "`r`n?|`n", ""
try
{
$testfilename = [guid]::NewGuid().ToString('N')
$testfile = Join-Path -Path $TestDrive -ChildPath "$testfilename.ps1xml"
Set-Content -Path $testfile -Value $xmlContent
$sessionState = [System.Management.Automation.Runspaces.InitialSessionState]::CreateDefault()
$sessionState.Formats.Clear()
$sessionState.Types.Clear()
$runspace = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspace($sessionState)
$runspace.Open()
$runspace.CreatePipeline("Update-FormatData -prependPath $testfile").Invoke()
$runspace.CreatePipeline("Get-FormatData -TypeName 'ExportFormatDataTypeName' | Export-FormatData -Path $testOutput").Invoke()
$content = (Get-Content $testOutput -Raw) -replace "`r`n?|`n", ""
$content | Should -BeExactly $expected
}
finally
{
$runspace.Close()
}
}
}
|
combined_dataset/train/non-malicious/sample_57_87.ps1 | sample_57_87.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudguard'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '416303ec-c9d6-4a65-8413-14973e520be8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudguard Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardAdhocQueriesList',
'Get-OCICloudguardAdhocQuery',
'Get-OCICloudguardAdhocQueryResultContent',
'Get-OCICloudguardAdhocQueryResultsList',
'Get-OCICloudguardConditionMetadataType',
'Get-OCICloudguardConditionMetadataTypesList',
'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule',
'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource',
'Get-OCICloudguardDataSourceEventsList',
'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector',
'Get-OCICloudguardDetectorRecipe',
'Get-OCICloudguardDetectorRecipeDetectorRule',
'Get-OCICloudguardDetectorRecipeDetectorRulesList',
'Get-OCICloudguardDetectorRecipesList',
'Get-OCICloudguardDetectorRule',
'Get-OCICloudguardDetectorRulesList',
'Get-OCICloudguardDetectorsList',
'Get-OCICloudguardImpactedResourcesList',
'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList',
'Get-OCICloudguardManagedListTypesList',
'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem',
'Get-OCICloudguardProblemEndpointsList',
'Get-OCICloudguardProblemEntitiesList',
'Get-OCICloudguardProblemHistoriesList',
'Get-OCICloudguardProblemsList',
'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResource',
'Get-OCICloudguardResourcePortsList',
'Get-OCICloudguardResourceProfile',
'Get-OCICloudguardResourceProfileEndpointsList',
'Get-OCICloudguardResourceProfileImpactedResourcesList',
'Get-OCICloudguardResourceProfilesList',
'Get-OCICloudguardResourcesList',
'Get-OCICloudguardResourceTypesList',
'Get-OCICloudguardResourceVulnerabilitiesList',
'Get-OCICloudguardResourceVulnerability',
'Get-OCICloudguardResponderActivitiesList',
'Get-OCICloudguardResponderExecution',
'Get-OCICloudguardResponderExecutionsList',
'Get-OCICloudguardResponderRecipe',
'Get-OCICloudguardResponderRecipeResponderRule',
'Get-OCICloudguardResponderRecipeResponderRulesList',
'Get-OCICloudguardResponderRecipesList',
'Get-OCICloudguardResponderRule',
'Get-OCICloudguardResponderRulesList',
'Get-OCICloudguardSavedQueriesList', 'Get-OCICloudguardSavedQuery',
'Get-OCICloudguardSecurityPoliciesList',
'Get-OCICloudguardSecurityPolicy',
'Get-OCICloudguardSecurityRecipe',
'Get-OCICloudguardSecurityRecipesList',
'Get-OCICloudguardSecurityZone',
'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting',
'Get-OCICloudguardSightingEndpointsList',
'Get-OCICloudguardSightingImpactedResourcesList',
'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList',
'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe',
'Get-OCICloudguardTargetDetectorRecipeDetectorRule',
'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList',
'Get-OCICloudguardTargetDetectorRecipesList',
'Get-OCICloudguardTargetResponderRecipe',
'Get-OCICloudguardTargetResponderRecipeResponderRule',
'Get-OCICloudguardTargetResponderRecipeResponderRulesList',
'Get-OCICloudguardTargetResponderRecipesList',
'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList',
'Get-OCICloudguardWlpAgent', 'Get-OCICloudguardWlpAgentsList',
'Get-OCICloudguardWorkRequest',
'Get-OCICloudguardWorkRequestErrorsList',
'Get-OCICloudguardWorkRequestLogsList',
'Get-OCICloudguardWorkRequestsList',
'Invoke-OCICloudguardExecuteResponderExecution',
'Invoke-OCICloudguardRequestRiskScores',
'Invoke-OCICloudguardRequestSecurityScores',
'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend',
'Invoke-OCICloudguardRequestSummarizedActivityProblems',
'Invoke-OCICloudguardRequestSummarizedProblems',
'Invoke-OCICloudguardRequestSummarizedResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedRiskScores',
'Invoke-OCICloudguardRequestSummarizedSecurityScores',
'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendProblems',
'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores',
'Invoke-OCICloudguardSkipBulkResponderExecution',
'Invoke-OCICloudguardSkipResponderExecution',
'Invoke-OCICloudguardTriggerResponder',
'Move-OCICloudguardDataSourceCompartment',
'Move-OCICloudguardDetectorRecipeCompartment',
'Move-OCICloudguardManagedListCompartment',
'Move-OCICloudguardResponderRecipeCompartment',
'Move-OCICloudguardSavedQueryCompartment',
'Move-OCICloudguardSecurityRecipeCompartment',
'Move-OCICloudguardSecurityZoneCompartment',
'New-OCICloudguardAdhocQuery', 'New-OCICloudguardDataMaskRule',
'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe',
'New-OCICloudguardDetectorRecipeDetectorRule',
'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe',
'New-OCICloudguardSavedQuery', 'New-OCICloudguardSecurityRecipe',
'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget',
'New-OCICloudguardTargetDetectorRecipe',
'New-OCICloudguardTargetResponderRecipe',
'New-OCICloudguardWlpAgent', 'Remove-OCICloudguardAdhocQuery',
'Remove-OCICloudguardCompartment',
'Remove-OCICloudguardDataMaskRule',
'Remove-OCICloudguardDataSource',
'Remove-OCICloudguardDetectorRecipe',
'Remove-OCICloudguardDetectorRecipeDetectorRule',
'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource',
'Remove-OCICloudguardManagedList',
'Remove-OCICloudguardResponderRecipe',
'Remove-OCICloudguardSavedQuery',
'Remove-OCICloudguardSecurityRecipe',
'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget',
'Remove-OCICloudguardTargetDetectorRecipe',
'Remove-OCICloudguardTargetResponderRecipe',
'Remove-OCICloudguardWlpAgent', 'Stop-OCICloudguardWorkRequest',
'Update-OCICloudguardBulkProblemStatus',
'Update-OCICloudguardConfiguration',
'Update-OCICloudguardDataMaskRule',
'Update-OCICloudguardDataSource',
'Update-OCICloudguardDetectorRecipe',
'Update-OCICloudguardDetectorRecipeDetectorRule',
'Update-OCICloudguardManagedList',
'Update-OCICloudguardProblemStatus',
'Update-OCICloudguardResponderRecipe',
'Update-OCICloudguardResponderRecipeResponderRule',
'Update-OCICloudguardSavedQuery',
'Update-OCICloudguardSecurityRecipe',
'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget',
'Update-OCICloudguardTargetDetectorRecipe',
'Update-OCICloudguardTargetDetectorRecipeDetectorRule',
'Update-OCICloudguardTargetResponderRecipe',
'Update-OCICloudguardTargetResponderRecipeResponderRule',
'Update-OCICloudguardWlpAgent'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2521.ps1 | 2521.ps1 |
Param(
$Clients = ""
, $TableName = ""
, $DropIndexStatement = ""
, $IndexName = ""
)
$UnusedIndexesQuery =
"sel_SQLIndexesUnusedByDatabase"
function Run-Query()
{
param (
$SqlQuery,
$SqlServer,
$SqlCatalog
)
$SqlConnection = New-Object System.Data.SqlClient.SqlConnection("Data Source=$SqlServer;Integrated Security=SSPI;Initial Catalog=$SqlCatalog;");
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand
$sqlCmd.CommandTimeout = "300"
$SqlCmd.CommandText = $SqlQuery
$SqlCmd.Connection = $SqlConnection
$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter
$SqlAdapter.SelectCommand = $SqlCmd
$DataSet = New-Object System.Data.DataSet
$a = $SqlAdapter.Fill($DataSet)
$SqlConnection.Close()
$DataSet.Tables | Select-Object -ExpandProperty Rows
}
$indexes = Run-Query -SqlQuery $UnusedIndexesQuery -SqlServer XSQLUTIL18 -SqlCatalog Status
$SpreadSheet = ("E:\Dexma\logs\IndexesUnused-" + (Get-Date -Format ddMMyyyy) + ".xlsx")
$TempCSV = ($env:TEMP + "\" + ([System.GUID]::NewGuid()).ToString() + ".csv")
$indexes | Export-Csv -Path $TempCSV -NoTypeInformation
if (Test-Path -Path $SpreadSheet) { Remove-Item -Path $SpreadSheet }
$erroractionpreference = "SilentlyContinue"
$OutBook = New-Object -comobject Excel.Application
$OutBook.visible = $False
$Workbook = $OutBook.Workbooks.Open($TempCSV)
$Workbook.Title = ("Unused Indexes reported by SQL Server DMVs" + (Get-Date -Format D))
$Workbook.Author = "Michael J. Messano"
$Worksheet = $Workbook.Worksheets.Item(1)
$List = $Worksheet.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $Worksheet.UsedRange, $null, [Microsoft.Office.Interop.Excel.X1YesNoGuess]::xlYes, $null)
$List.Name = "Item Table"
$LastRow = ($worksheet.UsedRange.Rows.Count + 1)
for ( $i = 2; $i -lt $LastRow; $i++) {
$Worksheet.Cells.item($i,4) = "=SUM(RC[1]" + ':' + "RC[" + ($worksheet.UsedRange.Columns.Count - 4) + "])"
}
$order = [Microsoft.Office.Interop.Excel.XlSortOrder]::xlDescending
$xlDescending = 2
$hasHead = [Microsoft.Office.Interop.Excel.XlYesNoGuess]::xlYes
$range = $worksheet.UsedRange
$sortcolumn = $worksheet.Columns.Item(4)
$range.Sort($sortcolumn, $xlDescending)
$LastColumn = ($worksheet.UsedRange.Columns.Count + 1 )
for ( $i = 1; $i -lt $LastColumn; $i++) {
$Worksheet.Cells.item(1,$i).Interior.ColorIndex = 15
$Worksheet.Cells.item(1,$i).Font.ColorIndex = 5
$Worksheet.Cells.item(1,$i).Font.Bold = $True
if ($i -gt 3) {
$Worksheet.Cells.item(1,$i).Orientation = 90
}
}
$Worksheet.UsedRange.EntireColumn.Autofit() | Out-Null
$Worksheet.Name = "Unused Indexes"
$Workbook.SaveAs($SpreadSheet, 51)
$Workbook.Saved = $true
$Workbook.Close()
[System.Runtime.InteropServices.Marshal]::ReleaseComObject($Workbook) | Out-Null
$SpreadSheet.Quit()
[System.Runtime.InteropServices.Marshal]::ReleaseComObject($SpreadSheet) | Out-Null
[System.GC]::Collect()
[System.GC]::WaitForPendingFinalizers()
if (Test-Path -Path $TempCSV) { Remove-Item -Path $TempCSV } |
combined_dataset/train/non-malicious/3348.ps1 | 3348.ps1 |
function About {
[PoshBot.BotCommand(
Permissions = 'view'
)]
[cmdletbinding()]
param(
[parameter(Mandatory)]
$Bot
)
$path = "$PSScriptRoot/../../../PoshBot.psd1"
$manifest = Import-PowerShellDataFile -Path $path
$ver = $manifest.ModuleVersion
$msg = @"
PoshBot v$ver
$($manifest.CopyRight)
https://github.com/poshbotio/PoshBot
"@
New-PoshBotTextResponse -Text $msg -AsCode
}
|
combined_dataset/train/non-malicious/Get-AclMisconfiguration..ps1 | Get-AclMisconfiguration..ps1 | ##############################################################################\n##\n## Get-AclMisconfiguration\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nDemonstration of functionality exposed by the Get-Acl cmdlet. This script\ngoes through all access rules in all files in the current directory, and\nensures that the Administrator group has full control of that file.\n\n#>\n\nSet-StrictMode -Version Latest\n\n## Get all files in the current directory\nforeach($file in Get-ChildItem)\n{\n ## Retrieve the ACL from the current file\n $acl = Get-Acl $file\n if(-not $acl)\n {\n continue\n }\n\n $foundAdministratorAcl = $false\n\n ## Go through each access rule in that ACL\n foreach($accessRule in $acl.Access)\n {\n ## If we find the Administrator, Full Control access rule,\n ## then set the $foundAdministratorAcl variable\n if(($accessRule.IdentityReference -like "*Administrator*") -and\n ($accessRule.FileSystemRights -eq "FullControl"))\n {\n $foundAdministratorAcl = $true\n }\n }\n\n ## If we didn't find the administrator ACL, output a message\n if(-not $foundAdministratorAcl)\n {\n "Found possible ACL Misconfiguration: $file"\n }\n}
|
combined_dataset/train/non-malicious/sample_43_10.ps1 | sample_43_10.ps1 | #!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\sucrase@3.35.0\node_modules\sucrase\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\sucrase@3.35.0\node_modules\sucrase\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\sucrase@3.35.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/sucrase@3.35.0/node_modules/sucrase/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/sucrase@3.35.0/node_modules/sucrase/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/sucrase@3.35.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$new_node_path$pathsep$env_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../sucrase/bin/sucrase-node" $args
} else {
& "$basedir/node$exe" "$basedir/../sucrase/bin/sucrase-node" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../sucrase/bin/sucrase-node" $args
} else {
& "node$exe" "$basedir/../sucrase/bin/sucrase-node" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/sample_37_7.ps1 | sample_37_7.ps1 | @{
GUID="eb74e8da-9ae2-482a-a648-e96550fb8733"
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="© Microsoft Corporation. All rights reserved."
Description='PowerShell module for working with ZIP archives.'
ModuleVersion="1.2.5"
PowerShellVersion="3.0"
FunctionsToExport = @('Compress-Archive', 'Expand-Archive')
DotNetFrameworkVersion = 4.5
CmdletsToExport = @()
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Archive.psm1"
HelpInfoURI = 'https://go.microsoft.com/fwlink/?LinkId=2113631'
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAgseQYNytK1g1h
# 9FUbgEFrpyXsmaTUaHw3dw1AixKKnKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKKSPNdOG9BJ1RGJnxRzOOll
# q/tUtoNT6PVdCCM/RNHyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAseIPlAIg9qkotyIdxvNJrmc0b3N/nyvM7gQZFEw2zPsKAFzkQqSY6IDF
# g+WTgTAOgddmbnBbq/bj0b39dDPKjCGFOsyhCmg8z1k64y0xBRYi/8Gt0bCu78jv
# zhGSPy0EoRBezCnJVAgA7su9AyZrOMsgkq8MSg57+JapOTqe6Nw2uooxNLAzYkS2
# KbFLShdyWimRNW3Q+fTFUWeHU1eN1r2pfkREpm/4DjB2CayOxUQyt3AgVA05ZNVI
# h9QOPWQVPVfANLMKFwfZYWTfERBbgTwm4FpwhpdGoE5sGrqbl7EMtOmqnRpzskur
# 25F8QIxgo0EPuyKyi8VCak9uhkQ0RKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBPbAWVTZ4DRJ6rs9t6SuPigd3eB/F9EaEKo5pj/uz4dAIGZbqfZ73C
# GBMyMDI0MDIxNDIxMDAyOC4yMjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl3kJMwIhgPMjAyNDAyMTUwMzE4NDNaGA8yMDI0MDIxNjAzMTg0M1owdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6XeQkwIBADAKAgEAAgICsgIB/zAHAgEAAgISVDAK
# AgUA6XjiEwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABYIlfTD6DvNgZdf
# NbQtUqWNr0qC08R6BMCkSGgggx8ePLM7APkzZmeHhPYzrpniefTFS1U4/hVJm3kD
# YEAx7M6OQ9L5TcnXJ9DdefXYD7A4GvVOmGoajCpKAXU9gyxvsxRX4BnlXPJDjXEq
# 6U/sr3rAWmM2VjGeMma9CTy6czjpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgAmFBZvEN0koyADoYUeIs+MzMOYOL/scdm5TH5vuGY4YwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC
# Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 2o7VyVoA0RGxAAEAAAHaMCIEIKaaEoOXEjjHeAD99MmoMlDVtIg/PdqddyY0aIfg
# 87njMA0GCSqGSIb3DQEBCwUABIICAIcquqjPvlL2h/9gTut49qv7XUcYkIn1Fp0e
# K1E5Vh1zl/EhvTv+G4S/DquasWgCPOZBbg2flx8dAxNuSUcx8gKEryhfN6hGCD/Q
# nY1nvnOzCu0+3jldZPPLQvDFE9gqVf87hBg4R3f7DpQN3G1zSugqM4R6nSqFfCoq
# l9UiOhERiQ7CMNL7bF6p1Uzef7x8jJYMQk2TOlhOrnATgHhbdVwgqXdksVsTi1XB
# PF1DfRgf2NLlDhkLswdHakSlNa7otet+lUODLXKH3z7PUjudlOTXv5wPXT9ZyfB1
# gyd4UI9TriGxUqMv/YRL+U6eYaRyMjNp/D3Xy6moOT3WhK5t5TCecAuRK34IX/bm
# ZWZPtR5u2Ng7w8rJ8KGQYDt1YRmprBHwD1dQjgPTTybqjcHxIUvOk45KRbq/qQgJ
# PtX9aIWTcDdaArplFkwglsF9hoLqpNpFHbxY2WnV3X79tlyetXQlUWso9hEMeOvM
# 80rDYKf4v8SZDPTCeyNTKkufpL66Hs+n2JuDVCxZpkNIQjUxHMr5W7yO/BT0saEH
# bYVugi5Q2nuGtD3yPkMES1KazI/3GoS+5HE2qGUwy5sv4Ax87wySDZWMdZkj+X2Y
# ihIVoVVBExoYUIovFvhsFUKLEciTtA9LbeFaR6AxQeGWUiJUPepsmS/WN3YwZOIv
# IXkD6/fN
# SIG # End signature block
|
combined_dataset/train/non-malicious/2563.ps1 | 2563.ps1 |
Function Get-LocalDomainController($objectDomain) {
return ([System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite()).Servers | Where-Object { $_.Domain.Name -eq $objectDomain } | ForEach-Object { $_.Name } | Select-Object -first 1
}
Function Get-ObjectADDomain($distinguishedName) {
return ((($distinguishedName -replace "(.*?)DC=(.*)",'$2') -replace "DC=","") -replace ",",".")
}
Function Get-ActiveDirectoryObject($distinguishedName) {
return [ADSI]("LDAP://" + (Get-LocalDomainController (Get-ObjectADDomain $distinguishedName)) + "/" + ($distinguishedName -replace "/","\/"))
}
Function Get-CarrierNetwork($carrier) {
if($carrier -eq "100") { $network = "T-Mobile US"
} elseif($carrier -eq "101") { $network = "Cingular Wireless"
} elseif($carrier -eq "102") { $network = "AT&T Wireless"
} elseif($carrier -eq "103") { $network = "Nextel"
} elseif($carrier -eq "104") { $network = "Sprint PCS"
} elseif($carrier -eq "105") { $network = "Verizon Wireless"
} elseif($carrier -eq "106") { $network = "Alltel"
} elseif($carrier -eq "107") { $network = "Rogers AT&T"
} elseif($carrier -eq "108") { $network = "Microcell"
} elseif($carrier -eq "109") { $network = "Bell Mobility"
} elseif($carrier -eq "110") { $network = "BT Cellnet"
} elseif($carrier -eq "111") { $network = "O2 Germany"
} elseif($carrier -eq "112") { $network = "Digifone"
} elseif($carrier -eq "113") { $network = "Telfort"
} elseif($carrier -eq "114") { $network = "T-Mobile Germany Austria"
} elseif($carrier -eq "115") { $network = "Tim Italy"
} elseif($carrier -eq "116") { $network = "Hutchison"
} elseif($carrier -eq "117") { $network = "Bouygues Telecom"
} elseif($carrier -eq "118") { $network = "Vodafone SFR France"
} elseif($carrier -eq "119") { $network = "Orange France"
} elseif($carrier -eq "120") { $network = "Vodafone UK Netherlands"
} elseif($carrier -eq "121") { $network = "Telcel Mexico"
} elseif($carrier -eq "122") { $network = "Telstra"
} elseif($carrier -eq "123") { $network = "T-Mobile UK"
} elseif($carrier -eq "124") { $network = "Vodafone Germany"
} elseif($carrier -eq "125") { $network = "O2 UK Ireland Isle Of Man Netherlands"
} elseif($carrier -eq "126") { $network = "Telus"
} elseif($carrier -eq "127") { $network = "Smart"
} elseif($carrier -eq "128") { $network = "Starhub"
} elseif($carrier -eq "129") { $network = "Telefonica Spain"
} elseif($carrier -eq "130") { $network = "Vodafone Switzerland Swisscom"
} elseif($carrier -eq "131") { $network = "Cable Wireless West Indies"
} elseif($carrier -eq "132") { $network = "Vodafone Italy"
} elseif($carrier -eq "133") { $network = "Vodafone Spain"
} elseif($carrier -eq "134") { $network = "T-Mobile Netherlands"
} elseif($carrier -eq "135") { $network = "Cincinnati Bell"
} elseif($carrier -eq "136") { $network = "Telefonica Mexico"
} elseif($carrier -eq "137") { $network = "Vodafone Austria"
} elseif($carrier -eq "138") { $network = "Vodafone Australia Fiji"
} elseif($carrier -eq "139") { $network = "Vodafone Ireland"
} elseif($carrier -eq "140") { $network = "Telenor Sweden"
} elseif($carrier -eq "141") { $network = "CSL"
} elseif($carrier -eq "142") { $network = "Orange UK"
} elseif($carrier -eq "143") { $network = "Vodafone New Zealand"
} elseif($carrier -eq "144") { $network = "Singtel"
} elseif($carrier -eq "145") { $network = "Globe"
} elseif($carrier -eq "146") { $network = "Optus"
} elseif($carrier -eq "147") { $network = "Orange Be Mobistar"
} elseif($carrier -eq "148") { $network = "Vodafone Hungary"
} elseif($carrier -eq "149") { $network = "Bharti"
} elseif($carrier -eq "150") { $network = "KPN NL"
} elseif($carrier -eq "151") { $network = "Wind Hellas Tim Greece"
} elseif($carrier -eq "152") { $network = "Vodafone Belgium"
} elseif($carrier -eq "153") { $network = "Vodafone Portugal"
} elseif($carrier -eq "154") { $network = "Tim Brazil"
} elseif($carrier -eq "155") { $network = "BT-Mobile"
} elseif($carrier -eq "156") { $network = "Earthlink"
} elseif($carrier -eq "157") { $network = "Aether"
} elseif($carrier -eq "158") { $network = "E Plus"
} elseif($carrier -eq "159") { $network = "Base"
} elseif($carrier -eq "160") { $network = "Dobson Communications"
} elseif($carrier -eq "161") { $network = "Vodafone Egypt"
} elseif($carrier -eq "162") { $network = "Orange Switzerland"
} elseif($carrier -eq "163") { $network = "Rim Wlan"
} elseif($carrier -eq "164") { $network = "T-Mobile Suncom"
} elseif($carrier -eq "165") { $network = "Maxis"
} elseif($carrier -eq "166") { $network = "Vodafone Denmark TDC"
} elseif($carrier -eq "167") { $network = "Vodafone Singapore M1"
} elseif($carrier -eq "168") { $network = "Vodacom South Africa"
} elseif($carrier -eq "169") { $network = "T-Mobile Poland"
} elseif($carrier -eq "170") { $network = "T-Mobile Czech"
} elseif($carrier -eq "171") { $network = "T-Mobile Hungary"
} elseif($carrier -eq "172") { $network = "AT&T Sprint"
} elseif($carrier -eq "173") { $network = "Mtn South Africa"
} elseif($carrier -eq "174") { $network = "Tim Chile Entel PCS"
} elseif($carrier -eq "175") { $network = "Orange Spain"
} elseif($carrier -eq "176") { $network = "Vodafone Smartone Hong Kong"
} elseif($carrier -eq "177") { $network = "TCS Telecommunication Systems"
} elseif($carrier -eq "178") { $network = "Avea"
} elseif($carrier -eq "179") { $network = "Fast 100"
} elseif($carrier -eq "180") { $network = "Turkcell"
} elseif($carrier -eq "181") { $network = "Partner Communications"
} elseif($carrier -eq "183") { $network = "Orange Romania"
} elseif($carrier -eq "186") { $network = "Telkomsel"
} elseif($carrier -eq "188") { $network = "Vodafone Greece"
} elseif($carrier -eq "189") { $network = "United States Cellular Corp"
} elseif($carrier -eq "190") { $network = "Mobilink"
} elseif($carrier -eq "191") { $network = "Velocita Wireless"
} elseif($carrier -eq "192") { $network = "Vodafone Croatia"
} elseif($carrier -eq "193") { $network = "Vodafone Slovenia"
} elseif($carrier -eq "194") { $network = "Vodafone Luxembourg"
} elseif($carrier -eq "195") { $network = "Vodafone Iceland"
} elseif($carrier -eq "196") { $network = "Vodafone Fiji"
} elseif($carrier -eq "197") { $network = "Vodafone Romania"
} elseif($carrier -eq "198") { $network = "Vodafone Czech"
} elseif($carrier -eq "199") { $network = "Vodafone Bahrain"
} elseif($carrier -eq "200") { $network = "Vodafone Kuwait"
} elseif($carrier -eq "201") { $network = "T-Mobile Croatia"
} elseif($carrier -eq "202") { $network = "T-Mobile Slovakia"
} elseif($carrier -eq "203") { $network = "Nortel"
} elseif($carrier -eq "204") { $network = "China Mobile"
} elseif($carrier -eq "205") { $network = "Movilnet"
} elseif($carrier -eq "209") { $network = "Sympac"
} elseif($carrier -eq "210") { $network = "Personal Argentina"
} elseif($carrier -eq "212") { $network = "Etisalat UAE"
} elseif($carrier -eq "213") { $network = "Cbeyond"
} elseif($carrier -eq "214") { $network = "AMX"
} elseif($carrier -eq "215") { $network = "Telefonica Venezuela"
} elseif($carrier -eq "216") { $network = "Telefonica Brazil"
} elseif($carrier -eq "217") { $network = "Orange Romania"
} elseif($carrier -eq "218") { $network = "Ktpowertel Korea"
} elseif($carrier -eq "219") { $network = "Rolling Stones"
} elseif($carrier -eq "220") { $network = "Docomo"
} elseif($carrier -eq "222") { $network = "Vodafone Bulgaria"
} elseif($carrier -eq "223") { $network = "Nextel International"
} elseif($carrier -eq "224") { $network = "PCCW Sunday"
} elseif($carrier -eq "225") { $network = "Hawaiian Telcom Credo Mobile"
} elseif($carrier -eq "226") { $network = "Verizon Mvno"
} elseif($carrier -eq "227") { $network = "Mobily"
} elseif($carrier -eq "228") { $network = "BWA"
} elseif($carrier -eq "229") { $network = "O2 Czech Republic"
} elseif($carrier -eq "230") { $network = "Hutchison India"
} elseif($carrier -eq "231") { $network = "Celcom"
} elseif($carrier -eq "234") { $network = "Dialog"
} elseif($carrier -eq "235") { $network = "XL"
} elseif($carrier -eq "236") { $network = "Reliance"
} elseif($carrier -eq "237") { $network = "Verizon Wireless Wholesale"
} elseif($carrier -eq "238") { $network = "Vodafone Turkey"
} elseif($carrier -eq "239") { $network = "Telefonica Morocco Meditel"
} elseif($carrier -eq "240") { $network = "Indosat"
} elseif($carrier -eq "241") { $network = "Alcatel Shanghai Bell"
} elseif($carrier -eq "245") { $network = "3 UK Italy Sweden Denmark Austria Ireland"
} elseif($carrier -eq "247") { $network = "Vodafone Essar"
} elseif($carrier -eq "248") { $network = "Centennial Wireless"
} elseif($carrier -eq "250") { $network = "T-Mobile Austria"
} elseif($carrier -eq "254") { $network = "OI Brazil"
} elseif($carrier -eq "255") { $network = "Telecom New Zealand"
} elseif($carrier -eq "258") { $network = "Hutchinson 3G Australia"
} elseif($carrier -eq "259") { $network = "Cable & Wireless Trinidad Tobago"
} elseif($carrier -eq "268") { $network = "Bmobile"
} elseif($carrier -eq "269") { $network = "Tata Teleservices India"
} elseif($carrier -eq "271") { $network = "T-Mobile Croatia"
} elseif($carrier -eq "273") { $network = "BT Italy"
} elseif($carrier -eq "274") { $network = "1&1"
} elseif($carrier -eq "277") { $network = "MTS Mobility"
} elseif($carrier -eq "278") { $network = "Virgin Mobile"
} elseif($carrier -eq "280") { $network = "Orange Slovakia"
} elseif($carrier -eq "282") { $network = "Taiwan Mobile"
} elseif($carrier -eq "285") { $network = "Orange Austria"
} elseif($carrier -eq "286") { $network = "Vodafone Malta"
} elseif($carrier -eq "288") { $network = "Base Jim Mobile"
} elseif($carrier -eq "295") { $network = "CMCC Peoples"
} elseif($carrier -eq "298") { $network = "Digitel Wireless"
} elseif($carrier -eq "299") { $network = "SK Telecom"
} elseif($carrier -eq "300") { $network = "Solo Mobile"
} elseif($carrier -eq "301") { $network = "Carphone Warehouse"
} elseif($carrier -eq "302") { $network = "20:20 Mobile Group"
} elseif($carrier -eq "308") { $network = "XL Indonesia"
} elseif($carrier -eq "309") { $network = "Fido Solutions"
} elseif($carrier -eq "310") { $network = "Wind Italy"
}
return $network
}
Set-Variable forestRootDn -option Constant -value ([ADSI]("LDAP://" + (([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).name) + "/rootDSE")).defaultNamingContext
Set-Variable sqlServers -option Constant -value @("east-coast-sql.usa.ad.mydomain.local","west-coast-sql.usa.ad.mydomain.local","remote-bes-server.japan.ad.mydomain.local")
$blackberryUsers = @()
$objectConnection = New-Object -comObject "ADODB.Connection"
$objectCommand = New-Object -comObject "ADODB.Command"
$objectConnection.Open("Provider=ADsDSOObject;")
$objectCommand.ActiveConnection = $objectConnection
$ldapBase = "GC://$forestRootDn"
$ldapAttr = "distinguishedName,sAMAccountName,givenName,sn,homeMDB,telephoneNumber,streetAddress,l,st,postalCode,c"
$ldapScope = "subtree"
foreach($sqlServer in $sqlServers) {
$sqlConnection = New-Object System.Data.SQLClient.SQLConnection
$sqlConnection.ConnectionString = "server=$sqlServer;database=BESMgmt;trusted_connection=true;"
$sqlConnection.Open()
$sqlCommand = New-Object System.Data.SQLClient.SQLCommand
$sqlCommand.Connection = $sqlConnection
$sqlCommand.CommandText = "SELECT u.DisplayName as DisplayName, u.MailboxSMTPAddr as MailboxSMTPAddr, u.PIN as PIN, d.phonenumber as phonenumber, d.ModelName as ModelName, d.VendorID as VendorID, d.IMEI as IMEI, d.HomeNetwork as HomeNetwork, d.PasswordEnabled as PasswordEnabled, s.MachineName as MachineName FROM UserConfig u, SyncDeviceMgmtSummary d, ServerConfig s WHERE u.id = d.userconfigid and u.ServerConfigId = s.id"
$sqlDataReader = $sqlCommand.ExecuteReader()
if($sqlDataReader.HasRows -eq $true) {
while($sqlDataReader.Read()) {
$displayName = $sqlDataReader.Item("DisplayName")
$proxyAddress = $sqlDataReader.Item("MailboxSMTPAddr")
$pin = $sqlDataReader.Item("PIN")
$phoneNumber = $sqlDataReader.Item("phonenumber")
$modelName = $sqlDataReader.Item("ModelName")
$vendorId = $sqlDataReader.Item("VendorID")
$imei = $sqlDataReader.Item("IMEI")
$homeNetwork = $sqlDataReader.Item("homeNetwork")
$passwordEnabled = $sqlDataReader.Item("PasswordEnabled")
$blackberryServer = $sqlDataReader.Item("MachineName")
if($passwordEnabled -eq 1) {
$passwordEnabled = $true
} else {
$passwordEnabled = $false
}
$phoneNumber = $phoneNumber -Replace "^\+",""
if(($phoneNumber).length -eq 10) {
$phoneNumber = ("(" + ($phoneNumber).SubString(0,3) + ") " + ($phoneNumber).SubString(3,3) + "-" + ($phoneNumber).SubString(6,4))
}
if(($phoneNumber).length -eq 11 -and ($phoneNumber).SubString(0,1) -eq "1") {
$phoneNumber = ("(" + ($phoneNumber).SubString(1,3) + ") " + ($phoneNumber).SubString(4,3) + "-" + ($phoneNumber).SubString(7,4))
}
if($homeNetwork -eq "" -or $homeNetwork -cmatch "vodafone") {
$homeNetwork = Get-CarrierNetwork $vendorId
}
$ldapFilter = ("(&(objectCategory=person)(objectClass=user)(proxyAddresses=smtp:$proxyAddress))")
$ldapQuery = "<$ldapBase>;$ldapFilter;$ldapAttr;$ldapScope"
$objectCommand.CommandText = $ldapQuery
$objectRecordSet = $objectCommand.Execute()
while(!$objectRecordSet.EOF) {
$domain = ((Get-ObjectADDomain $objectRecordSet.Fields.Item('distinguishedName').Value).Split(".")[0]).ToUpper()
$exchangeServer = ((((((Get-ActiveDirectoryObject $objectRecordSet.Fields.Item('homeMDB').Value).psbase.parent).psbase.parent).psbase.parent).networkAddress[4]).ToString() -replace "ncacn_ip_tcp:","").ToLower()
$sAMAccountName = $objectRecordSet.Fields.Item('sAMAccountName').Value
$firstName = $objectRecordSet.Fields.Item('givenName').Value
$lastName = $objectRecordSet.Fields.Item('sn').Value
$telephoneNumber = $objectRecordSet.Fields.Item('telephoneNumber').Value
$streetAddress = ($objectRecordSet.Fields.Item('streetAddress').Value -replace "`r`n",", ")
$city = $objectRecordSet.Fields.Item('l').Value
$state = $objectRecordSet.Fields.Item('st').Value
$zipCode = $objectRecordSet.Fields.Item('postalCode').Value
$country = $objectRecordSet.Fields.Item('c').Value
$objectRecordSet.MoveNext()
}
$blackberryUser = New-Object -typeName PSObject
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Domain" -value $domain
Add-Member -inputObject $blackberryUser -type NoteProperty -name "User ID" -value $sAMAccountName
Add-Member -inputObject $blackberryUser -type NoteProperty -name "First Name" -value $firstName
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Last Name" -value $firstName
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Display Name" -value $displayName
Add-Member -inputObject $blackberryUser -type NoteProperty -name "E-Mail Address" -value $proxyAddress
Add-Member -inputObject $blackberryUser -type NoteProperty -name "PIN" -value $pin
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Cell Phone Number" -value $phoneNumber
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Desk Phone Number" -value $telephoneNumber
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Street Address" -value $streetAddress
Add-Member -inputObject $blackberryUser -type NoteProperty -name "City" -value $city
Add-Member -inputObject $blackberryUser -type NoteProperty -name "State" -value $state
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Zip Code" -value $zipCode
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Country" -value $country
Add-Member -inputObject $blackberryUser -type NoteProperty -name "BlackBerry Model" -value $modelName
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Carrier" -value $homeNetwork
Add-Member -inputObject $blackberryUser -type NoteProperty -name "IMEI" -value $imei
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Password Enabled" -value $passwordEnabled
Add-Member -inputObject $blackberryUser -type NoteProperty -name "Exchange Server" -value $exchangeServer
Add-Member -inputObject $blackberryUser -type NoteProperty -name "BlackBerry Server" -value $blackberryServer
$blackberryUsers += $blackberryUser
}
} else {
Write-Warning "Unable to obtain BES data from $sqlServer"
exit
}
}
$blackberryUsers = $blackberryUsers | Sort-Object "BlackBerry Server", "Last Name", "First Name"
$excelFile = ("\\fileserver.ad.mydomain.local\it_reports\blackberry\" + (Get-Date -format yyyyMMdd) + "-BlackBerry User Report.xlsx")
$temporaryCsvFile = ($env:temp + "\" + ([System.Guid]::NewGuid()).ToString() + ".csv")
$blackberryUsers | Export-Csv -path $temporaryCsvFile -noTypeInformation
if(Test-Path -path $excelFile) { Remove-Item -path $excelFile }
$excelObject = New-Object -comObject Excel.Application
$excelObject.Visible = $false
$workbookObject = $excelObject.Workbooks.Open($temporaryCsvFile)
$workbookObject.Title = ("BlackBerry User List for " + (Get-Date -Format D))
$workbookObject.Author = "Robert M. Toups, Jr."
$worksheetObject = $workbookObject.Worksheets.Item(1)
$worksheetObject.UsedRange.Columns.Autofit() | Out-Null
$worksheetObject.Name = "BlackBerry Users"
$listObject = $worksheetObject.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $worksheetObject.UsedRange, $null,[Microsoft.Office.Interop.Excel.XlYesNoGuess]::xlYes,$null)
$listObject.Name = "User Table"
$listObject.TableStyle = "TableStyleMedium4"
$workbookObject.SaveAs($excelFile,51)
$workbookObject.Saved = $true
$workbookObject.Close()
[System.Runtime.Interopservices.Marshal]::ReleaseComObject($workbookObject) | Out-Null
$excelObject.Quit()
[System.Runtime.Interopservices.Marshal]::ReleaseComObject($excelObject) | Out-Null
[System.GC]::Collect()
[System.GC]::WaitForPendingFinalizers()
if(Test-Path -path $temporaryCsvFile) { Remove-Item -path $temporaryCsvFile } |
combined_dataset/train/non-malicious/Out-Balloon.ps1 | Out-Balloon.ps1 | <#
.Synopsis
Makes a baloon tip in the notification area
.Description
With just a few arguments, it is easy to make some text appear in a little balloon.
You can specify an icon file (*.ico) with the -icon argument, if you don't then
the embedded ! icon is used. It's blue.
out-balloon accepts pipeline input, strings only please.
It blocks for the duration of the balloon display, 3 seconds by default. Simple
fixes for this are welcome.
timeout should be an integer value.
INSTALLATION:
um, save this text in a file named out-balloon.ps1 in your path
.Example
out-balloon "hey, your job is done." -icon "C:\\Program Files\\Microsoft Office\\Office12\\MYSL.ICO"
"job done." | out-balloon
#>
param(
[Parameter(ValueFromPipeline=$true,Position=0,Mandatory=$true)]
[Alias('output')]
[string]$text,
[string]$icon,
[int32]$timeout = 3
)
begin
{
$not = new-object System.Windows.Forms.NotifyIcon
if ($icon -eq $null)
{
#create icon object from embedded string
$qmark_icon_string = `
"AAABAAEAgIAAAAEAIAAoCAEAFgAAACgAAACAAAAAAAEAAAEAIAAAAAAAAAgBAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAANHR0gfT09Qp1NTVOtXV1kbW1tdS19fYYNfX2G7X19h619fYetfX2G7W1tdg1dXW" + `
"UtTU1UbT09Q60dHSKdDQ0QcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0tLT" + `
"DNXV1j/Y2Nho29vbjd3d3bPf39/b4ODh/OLi4//j4+T/5OTl/+Xl5v/m5uf/5ubn/+bm5//m5u" + `
"f/5ubn/+Xl5v/k5OX/4+Pk/+Li4//g4OH/39/f/N3d3dvb29uz2NjYjdXV1mjS0tM/0NDRDAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANLS0wjW1t" + `
"dA2tragd7e3sPh4eL55OTl/+fn6P/p6er/7Ozt/+7u7//w8PD/8vLy//Pz8//09PT/9fX1//b2" + `
"9v/29vb/9vb2//b29v/29vb/9fX1//T09P/z8/P/8vLy//Dw8P/u7u//7Ozt/+np6v/n5+j/5O" + `
"Tl/+Hh4v/e3t752traw9bW14HS0tNAz8/QCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1NTVE9nZ" + `
"2Wrd3d274eHi9uXl5v/p6er/7e3u//Dw8P/z8/P/9vb2//n5+f/8/Pz//v7+//7+/v/+/v7//v" + `
"7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/8" + `
"/Pz/+fn5//b29v/z8/P/8PDw/+3t7v/p6er/5eXm/+Hh4v/d3d322dnZu9TU1WrPz9ATAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADS0tMH2N" + `
"jYUt3d3a/i4uP55+fo/+zs7f/w8PD/9PT0//j4+P/8/Pz//v7+//7+/v/+/v7//v7+//7+/v/+" + `
"/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//" + `
"7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//Pz8//j4+P/09PT/8PDw/+zs7f/n5+j/" + `
"4uLj/93d3fnY2Niv0tLTUs3NzgcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADV" + `
"1dYl29vbl+Dg4e7m5uf/7Ozt//Hx8f/29vb/+/v7//7+/v/+/v7//v7+//7+/v/+/v7//v7+//" + `
"7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + `
"/v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v" + `
"/+/v7/+/v7//b29v/x8fH/7Ozt/+bm5//g4OH/29vb7tXV1pfQ0NElAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAADW1tcs3d3dpePj5Pzp6er/7+/v//X19f/7+/v//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + `
"/v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v" + `
"/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+" + `
"//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/7+/v/9fX1/+/v7//p6er/4+Pk/93d3fzW1t" + `
"el0NDRLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAADW1tcz3t7ereTk5f3r6+z/8fHx//j4+P/+/v7//v7+//7+/v/+/v7//v7+//7+/v" + `
"/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/vz/+fPr" + `
"//Dk0f/p1rj/4sqk/92/kf/dv5H/4sqk/+nWuP/w5NH/+fPr//7+/P/+/v7//v7+//7+/v/+/v" + `
"7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//j4" + `
"+P/x8fH/6+vs/+Tk5f/e3t791tbXrdDQ0TMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAADV1dYf3d3druTk5f7r6+z/8vLy//n5+f/+/v7//v7+//7+/v/+/v7//v7+" + `
"//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//Ln1v/bvY7/yp5Z/76GMP+2dh" + `
"T/sm0D/7FsAP+ybQD/sm0A/7JtAP+ybQD/sm0A/7JtAP+ybQD/sm0A/7JtAP+xbAD/sWwA/7Jt" + `
"A/+1dhT/voYw/8qdWf/bvY7/8ufW//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v" + `
"7+//7+/v/+/v7//v7+//7+/v/5+fn/8vLy/+vr7P/k5OX/3d3d/tXV1q7Ozs8fAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAADT09QG29vbeuLi4/Xq6uv/8vLy//n5+f/+/v7//v7+//7+/v/+/v" + `
"7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/0697/1K93/72FL/+xbgf/sGwA/7Bs" + `
"AP+xbAD/sWwA/7JtAP+ybQD/sm0A/7JuAP+ybgD/sm4A/7JuAP+ybgD/sm4A/7JuAP+ybgD/sm" + `
"4A/7JtAP+ybQD/sm0A/7FsAP+xbAD/sGwA/7BsAP+vawD/sW4H/72EL//Trnf/9Ove//7+/v/+" + `
"/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/+fn5//Ly8v/q6uv/4uLj/9" + `
"vb2/XT09R6zMzNBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2NjYQ+Dg4dfo6On/8PDw//j4+P/+/v7//v7+//7+" + `
"/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+/+/iz//FlUv/sW8K/69qAP+vawD/r2" + `
"sA/7BsAP+xbAD/sWwA/7JtAP+ybQD/sm4A/7JuAP+ybgD/s24A/7NuAP+zbgD/s24A/7NuAP+z" + `
"bgD/s24A/7NuAP+zbgD/sm4A/7JuAP+ybgD/sm0A/7JtAP+xbAD/sWwA/7BsAP+vawD/r2sA/6" + `
"9qAP+uaQD/sW8K/8WVS//v4s///v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + `
"/v7+//j4+P/w8PD/6Ojp/+Dg4f/Y2NjX0NDRQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1NTVDt3d3aLk5OX/7e3u//b29v/+/v7//v" + `
"7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/+PPr/86mav+zdBT/rmkA/65pAP+v" + `
"agD/r2sA/7BsAP+wbAD/sWwA/7FsAP+ybQD/sm0A/7BsAP+wawD/r2oA/65oAP+taAD/rWgA/6" + `
"xnAP+sZwD/rGYA/6xmAP+sZwD/rGcA/61oAP+taAD/rmgA/69qAP+vawD/sGwA/7JsAP+xbAD/" + `
"sWwA/7BsAP+wbAD/r2sA/69qAP+uaQD/rmkA/61pAP+ycxT/zqZq//jz6//+/v7//v7+//7+/v" + `
"/+/v7//v7+//7+/v/+/v7//v7+//7+/v/29vb/7e3u/+Tk5f/d3d3/1NTVosvLzA4AAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANfX2DDg4OHa6enq//Ly8v/7" + `
"+/v//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/7+HN/7yFMv+saAD/rWkA/6" + `
"1pAP+uaQD/r2oA/69rAP+wbAD/sGwA/7BrAP+vagD/rWgA/6xmAP+rZgD/q2YA/6xnAP+sZwD/" + `
"rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6tmAP" + `
"+rZgD/q2YA/6xmAP+taAD/rmkA/69rAP+wbAD/r2sA/69qAP+uaQD/rWkA/61pAP+saAD/rGcA" + `
"/7uEMv/v4c3//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/7+/v/8vLy/+np6v/g4O" + `
"H/19fY2s/P0DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADb29to4+Pk9+" + `
"3t7v/29vb//v7+//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/69zE/7mAK/+sZwD/" + `
"rGgA/6xoAP+taQD/rmkA/69qAP+vawD/rmkA/61oAP+sZgD/q2YA/6xnAP+sZwD/rGcA/6xnAP" + `
"+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA" + `
"/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+rZgD/q2YA/6xmAP+taAD/rmkA/69qAP+uaQ" + `
"D/rWkA/6xoAP+saAD/rGcA/6pmAP+5gCv/69zE//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+" + `
"/v/+/v7/9vb2/+3t7v/j4+T/29vb99HR0moAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADT09QP" + `
"3d3dqubm5//w8PD/+vr6//7+/v/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/7eDL/7Z6JP" + `
"+qZQD/q2YA/6xnAP+saAD/rWkA/65pAP+uaQD/rWgA/6tmAP+sZwD/rGcA/6xnAP+sZwD/rGcA" + `
"/6xnAP+sZwD/rGcA/6xnAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saA" + `
"D/rGgA/6xoAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xn" + `
"AP+rZgD/q2YA/61oAP+taAD/rWkA/6xoAP+sZwD/q2YA/6plAP+pZAD/tnok/+3gy//+/v7//v" + `
"7+//7+/v/+/v7//v7+//7+/v/+/v7/+vr6//Dw8P/m5uf/3d3d/9PT1KrKyssPAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAA1dXWHN/f4NTp6er/8/Pz//39/f/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7//Pr3" + `
"/8OUTf+pZAD/qmUA/6pmAP+sZwD/rGgA/6xoAP+saAD/rGYA/6tmAP+sZwD/rGcA/6xnAP+sZw" + `
"D/rGcA/6xnAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xo" + `
"AP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rG" + `
"cA/6xnAP+sZwD/rGcA/6xnAP+sZwD/q2YA/6tmAP+rZgD/q2cA/6xoAP+sZwD/qmYA/6plAP+p" + `
"ZAD/qGQA/8OTTf/8+vf//v7+//7+/v/+/v7//v7+//7+/v/+/v7//f39//Pz8//p6er/39/g/9" + `
"XV1tTMzM0cAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAANfX2Cjh4eLh6+vs//X19f/+/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v" + `
"7//v7+/9q8kf+raAf/qGQA/6lkAP+qZQD/q2YA/6xnAP+sZwD/q2YA/6xnAP+sZwD/rGcA/6xn" + `
"AP+sZwD/rGcA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rWkA/61pAP+taQD/rW" + `
"kA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rGgA/6xoAP+s" + `
"aAD/rGgA/6xoAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6xnAP+rZgD/q2YA/6" + `
"tmAP+rZgD/qmUA/6lkAP+oZAD/qGMA/6pnB//avJH//v7+//7+/v/+/v7//v7+//7+/v/+/v7/" + `
"/v7+//X19f/r6+z/4eHi/9fX2OHNzc4oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAADY2Ng34uLj7O3t7v/39/f//v7+//7+/v/+/v7//v7+//7+" + `
"/v/+/v7//v7+//jy6f+1eib/qGMA/6hkAP+pZAD/qmUA/6pmAP+rZgD/q2YA/6xnAP+sZwD/rG" + `
"cA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/6xoAP+saAD/rWkA/61pAP+taQD/rWkA/61pAP+t" + `
"aQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/6" + `
"1pAP+taQD/rWkA/61pAP+taQD/rWkA/6xoAP+saAD/rGgA/6xoAP+saAD/rGgA/6xnAP+sZwD/" + `
"rGcA/6xnAP+sZwD/q2YA/6tmAP+qZgD/qmUA/6lkAP+oZAD/qGMA/6diAP+0eib/+PLp//7+/v" + `
"/+/v7//v7+//7+/v/+/v7//v7+//f39//t7e7/4uLj/9jY2OzOzs83AAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2dnZSePj5PTu7u//+Pj4//7+/v/+/v7//v" + `
"7+//7+/v/+/v7//v7+//7+/v/kz7D/qWYG/6diAP+oYwD/qGQA/6lkAP+qZQD/q2YA/6xnAP+s" + `
"ZwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/6xoAP+taQD/rWkA/61pAP+taQD/rWkA/6" + `
"1pAP+taQD/rWkA/65pAP+uaQD/rmkA/65pAP+uaQD/rmkA/65pAP+uaQD/rmkA/65pAP+uaQD/" + `
"rmkA/65pAP+uaQD/rmkA/61pAP+taQD/rWkA/61pAP+taQD/rWkA/61pAP+taQD/rGgA/6xoAP" + `
"+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/rGcA/6tmAP+rZgD/qWQA/6hkAP+oYwD/p2IA" + `
"/6ZhAP+oZQb/5M+w//7+/v/+/v7//v7+//7+/v/+/v7//v7+//j4+P/u7u//4+Pk/9nZ2fTOzs" + `
"9JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANnZ2Unj4+T67u7v//n5+f/+" + `
"/v7//v7+//7+/v/+/v7//v7+//7+/v/+/v7/x5td/6VgAP+mYQD/p2IA/6hjAP+oZAD/qmUA/6" + `
"tmAP+sZwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/61pAP+taQD/" + `
"rWkA/61pAP+uaQD/rmkA/65pAP+uaQD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP" + `
"+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/rmkA/65pAP+uaQD/rmkA/61pAP+taQD/rWkA" + `
"/61pAP+taQD/rWkA/61pAP+saAD/rGgA/6xoAP+saAD/rGcA/6xnAP+sZwD/rGcA/6tmAP+rZg" + `
"D/qWUA/6hjAP+nYgD/pmEA/6VgAP+kXwD/x5td//7+/v/+/v7//v7+//7+/v/+/v7//v7+//n5" + `
"+f/u7u//4+Pk/9nZ2frOzs9JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADY2Ng34+Pk9O" + `
"7u7//6+vr//v7+//7+/v/+/v7//v7+//7+/v/+/v7/+vbv/7J2If+lYAD/pmEA/6diAP+nYgD/" + `
"qWQA/6tmAP+sZwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/61pAP" + `
"+taQD/rmkA/65pAP+uaQD/rmkA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA" + `
"/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vag" + `
"D/rmkA/65pAP+uaQD/rmkA/61pAP+taQD/rWkA/61pAP+taQD/rGgA/6xoAP+saAD/rGgA/6xn" + `
"AP+sZwD/rGcA/6xnAP+rZgD/q2YA/6hjAP+nYgD/pmEA/6VgAP+kXwD/sXYh//r27//+/v7//v" + `
"7+//7+/v/+/v7//v7+//r6+v/u7u//4+Pk/9jY2PTNzc43AAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"19fYKeLi4+zu7u//+fn5//7+/v/+/v7//v7+//7+/v/+/v7//v7+//bu4/+raxD/pF8A/6VgAP" + `
"+mYQD/p2IA/6pkAP+rZgD/rGcA/6xnAP+sZwD/rGgA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA" + `
"/61pAP+taQD/rmkA/65pAP+uaQD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vag" + `
"D/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69q" + `
"AP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/65pAP+taQD/rWkA/61pAP+taQD/rW" + `
"kA/6xoAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+rZgD/q2YA/6lkAP+mYQD/pWAA/6RfAP+k" + `
"XwD/qmoQ//bu4//+/v7//v7+//7+/v/+/v7//v7+//n5+f/u7u//4uLj/9fX2OzMzM0pAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAANXV1hvh4eLh7e3u//j4+P/+/v7//v7+//7+/v/+/v7//v7+//7+/v/w5NL/qGUJ" + `
"/6RfAP+kXwD/pWAA/6dhAP+qZQD/rGcA/6xnAP+sZwD/rGcA/6xoAP+saAD/rGgA/61pAP+taQ" + `
"D/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69q" + `
"AP+vagD/r2oA/69rAP+vawD/r2sA/69rAP+vawD/r2sA/69rAP+vawD/r2sA/69rAP+vawD/r2" + `
"sA/69rAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA/65pAP+u" + `
"aQD/rWkA/61pAP+taQD/rWkA/61pAP+saAD/rGgA/6xoAP+sZwD/rGcA/6xnAP+sZwD/q2YA/6" + `
"llAP+mYAD/pF8A/6RfAP+jXgD/p2QJ//Dk0v/+/v7//v7+//7+/v/+/v7//v7+//j4+P/t7e7/" + `
"4eHi/9XV1uHKyssbAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAADT09QO39/g1Ovr7P/39/f//v7+//7+/v/+/v7//v7+//7+/v/+/v" + `
"7/6Na9/6VhBP+jXgD/pF8A/6RfAP+mYQD/q2UA/6xnAP+sZwD/rGcA/6xoAP+saAD/rGgA/6xo" + `
"AP+taQD/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2" + `
"oA/69rAP+vawD/r2sA/69rAP+vawD/sGsA/7BrAP+wawD/sGsA/7BrAP+wawD/sGsA/7BrAP+w" + `
"awD/sGsA/7BrAP+wawD/sGsA/69rAP+vawD/r2sA/69rAP+vawD/r2oA/69qAP+vagD/r2oA/6" + `
"9qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rWkA/61pAP+saAD/rGgA/6xoAP+saAD/" + `
"rGcA/6xnAP+sZwD/q2YA/6tlAP+lYAD/pF8A/6NeAP+iXQD/pWAE/+jWvf/+/v7//v7+//7+/v" + `
"/+/v7//v7+//f39//r6+z/39/g/9PT1NTIyMkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN3d3anp6er/9fX1//7+/v/+/v7//v7+//7+" + `
"/v/+/v7//v7+/+jWvf+kXgL/ol0A/6NeAP+kXwD/pmEA/6tmAP+sZwD/rGcA/6xnAP+saAD/rG" + `
"gA/6xoAP+taQD/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+v" + `
"agD/r2sA/69rAP+vawD/sGsA/7V1Ef+2dxT/tHIV/7JwFv+ycRb/snEW/7JxFv+ycRb/snEW/7" + `
"JxFv+ycRb/snEW/7JxFv+ycRb/snEW/7JxFv+ycRb/snAW/7JwFv+ycBb/snAW/7FuE/+qZAP/" + `
"qmQD/69rAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/rmkA/65pAP+taQD/rWkA/61pAP" + `
"+taQD/rGgA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6tlAP+mYQD/o14A/6JdAP+iXAD/o14C" + `
"/+jWvf/+/v7//v7+//7+/v/+/v7//v7+//X19f/p6er/3d3d/9HR0qkAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADb29tp5ubn//Pz8//+/v7//v" + `
"7+//7+/v/+/v7//v7+//7+/v/u4tH/pGAE/6JcAP+iXQD/o14A/6ZhAP+rZgD/rGcA/6xnAP+s" + `
"ZwD/rGgA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/6" + `
"9qAP+vagD/r2sA/69rAP+wawD/sGsA/7BrAP+wbAD/9Ora////////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"//////697g/28WKP9vFij/r2oA/69rAP+vawD/r2oA/69qAP+vagD/r2oA/69qAP+vagD/r2oA" + `
"/65pAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6tmAP+lYA" + `
"D/ol0A/6JcAP+hXAD/o18E/+7i0f/+/v7//v7+//7+/v/+/v7//v7+//Pz8//m5uf/29vb/8/P" + `
"0GkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA19fYMePj5Pfw" + `
"8PD//f39//7+/v/+/v7//v7+//7+/v/+/v7/9Ozh/6ViCP+hXAD/olwA/6JdAP+mYQD/q2YA/6" + `
"xnAP+sZwD/rGcA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/" + `
"r2oA/69qAP+vagD/r2sA/69rAP+wawD/sGsA/7BsAP+wbAD/sGwA/7BsAP/06tr///////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////////////////////r3uD/bxYo/28WKP+vawD/sGsA/7BrAP+vawD/r2sA/69qAP+vag" + `
"D/r2oA/69qAP+vagD/r2oA/65pAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+saAD/rGcA/6xn" + `
"AP+sZwD/q2YA/6tmAP+lYAD/olwA/6FcAP+gWwD/pWEI//Ts4f/+/v7//v7+//7+/v/+/v7//f" + `
"39//Dw8P/j4+T/19fY98vLzDEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN" + `
"TU1Q3g4OHa7e3u//r6+v/+/v7//v7+//7+/v/+/v7//v7+//r28f+oZxD/oFsA/6FcAP+iXAD/" + `
"pWAA/6tmAP+sZwD/rGcA/6xoAP+saAD/rGgA/61pAP+taQD/rWkA/61pAP+uaQD/r2oA/69qAP" + `
"+vagD/r2oA/69qAP+vagD/r2sA/69rAP+wawD/sGsA/7BsAP+wbAD/sGwA/7FsAP+xbAD/sWwA" + `
"//Tq2v////////////////////////////////////////////////////////////////////" + `
"///////////////////////////////////////+ve4P9vFij/bxYo/69rAP+wbAD/sGwA/7Br" + `
"AP+wawD/r2sA/69rAP+vagD/r2oA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+taQD/rW" + `
"kA/6xoAP+saAD/rGgA/6xnAP+sZwD/q2YA/6tmAP+lXwD/oVwA/6BbAP+gWgD/p2YQ//r28f/+" + `
"/v7//v7+//7+/v/+/v7/+vr6/+3t7v/g4OH/1NTV2sfHyA0AAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAA3d3dounp6v/29vb//v7+//7+/v/+/v7//v7+//7+/v/+/v7/r3Ih/6BaAP" + `
"+gWwD/oVwA/6ReAP+rZgD/rGcA/6xnAP+saAD/rGgA/6xoAP+taQD/rWkA/61pAP+uaQD/rmkA" + `
"/69qAP+vagD/r2oA/69qAP+vagD/r2sA/69rAP+wawD/sGsA/7BsAP+wbAD/sWwA/7FsAP+xbA" + `
"D/sWwA/7FsAP+xbAD/9Ora////////////////////////////////////////////////////" + `
"////////////////////////////////////////////////////////697g/28WKP9vFij/sG" + `
"sA/7FsAP+xbAD/sGwA/7BsAP+wawD/sGsA/69rAP+vawD/r2oA/69qAP+vagD/r2oA/69qAP+u" + `
"aQD/rmkA/61pAP+taQD/rWkA/6xoAP+saAD/rGgA/6xnAP+sZwD/q2YA/6tmAP+jXgD/oFsA/6" + `
"BaAP+fWQD/rXEh//7+/v/+/v7//v7+//7+/v/+/v7/9vb2/+np6v/d3d3/0NDRogAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAANjY2ETk5OX/8vLy//7+/v/+/v7//v7+//7+/v/+/v7//v7+" + `
"/8aaYP+fWQD/oFoA/6BbAP+jXgD/q2UA/6xnAP+sZwD/rGgA/6xoAP+saAD/rWkA/61pAP+taQ" + `
"D/rmkA/65pAP+vagD/r2oA/69qAP+vagD/r2oA/69rAP+wawD/sGsA/7BsAP+wbAD/sWwA/7Fs" + `
"AP+xbAD/sWwA/7FsAP+xbQD/sW0A/7FtAP/06tr///////////////////////////////////" + `
"/////////////////////////////////////////////////////////////////////////r" + `
"3uD/bxYo/28WKP+wawD/sWwA/7FsAP+xbAD/sWwA/7BsAP+wbAD/sGsA/7BrAP+vawD/r2oA/6" + `
"9qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rWkA/6xoAP+saAD/rGgA/6xnAP+sZwD/" + `
"q2YA/6tlAP+iXQD/oFoA/59ZAP+eWAD/xZpg//7+/v/+/v7//v7+//7+/v/+/v7/8vLy/+Tk5f" + `
"/Y2Nj/zMzNRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADT09QG4ODh1+3t7v/7+/v//v7+//7+/v/+/v" + `
"7//v7+//7+/v/izrD/n1kA/59ZAP+gWgD/oVwA/6plAP+sZwD/rGcA/6xnAP+saAD/rGgA/61p" + `
"AP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/r2oA/69rAP+vawD/sGsA/7BrAP+wbAD/sG" + `
"wA/7FsAP+xbAD/sWwA/7FsAP+xbQD/sW0A/7JtAP+ybQD/sm0A//Tq2v//////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////////////+ve4P9vFij/bxYo/7BsAP+xbQD/sWwA/7FsAP+xbAD/sWwA/7BsAP+wbAD/" + `
"sGsA/7BrAP+vawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rWkA/6xoAP" + `
"+saAD/rGcA/6xnAP+sZwD/q2YA/6llAP+hWwD/n1kA/55YAP+eWQD/4s2w//7+/v/+/v7//v7+" + `
"//7+/v/7+/v/7e3u/+Dg4f/T09TXxsbHBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANvb23ro6On/9vb2//7+" + `
"/v/+/v7//v7+//7+/v/+/v7/+PLr/6JeB/+eWAD/n1kA/6BaAP+oYwD/rGcA/6xnAP+sZwD/rG" + `
"gA/6xoAP+taQD/rWkA/61pAP+uaQD/r2oA/69qAP+vagD/r2oA/69qAP+vawD/r2sA/7BrAP+w" + `
"bAD/sGwA/7FsAP+xbAD/sWwA/7FsAP+xbQD/sW0A/7JtAP+ybQD/sm4A/7JuAP+ybgD/9Ora//" + `
"//////////////////////////////////////////////////////////////////////////" + `
"////////////////////////////////697g/28WKP9vFij/sWwA/7JtAP+xbQD/sW0A/7FsAP" + `
"+xbAD/sWwA/7FsAP+wbAD/sGwA/7BrAP+vawD/r2sA/69qAP+vagD/r2oA/69qAP+vagD/rmkA" + `
"/61pAP+taQD/rWkA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6djAP+fWQD/nlgA/51YAP+hXg" + `
"f/+PLr//7+/v/+/v7//v7+//7+/v/29vb/6Ojp/9vb2//Ozs96AAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADV1dYg4u" + `
"Lj9fDw8P/+/v7//v7+//7+/v/+/v7//v7+//7+/v+vdCb/nVgA/55YAP+fWQD/pWAA/6xnAP+s" + `
"ZwD/rGcA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69qAP+vagD/r2sA/7" + `
"BrAP+wawD/sGwA/7BsAP+xbAD/sWwA/7FsAP+xbQD/sW0A/7JtAP+ybQD/sm4A/7JuAP+ybgD/" + `
"s24A/7NuAP/06tr///////////////////////////////////////////////////////////" + `
"/////////////////////////////////////////////////r3uD/bxYo/28WKP+xbQD/sm4A" + `
"/7JtAP+ybQD/sW0A/7FtAP+xbAD/sWwA/7FsAP+wbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vag" + `
"D/r2oA/69qAP+vagD/rmkA/61pAP+taQD/rWkA/6xoAP+saAD/rGcA/6xnAP+sZwD/q2YA/6Rf" + `
"AP+eWAD/nVgA/5xXAP+vcyb//v7+//7+/v/+/v7//v7+//7+/v/w8PD/4uLj/9XV1vXIyMkgAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAN3d3a/q6uv/+Pj4//7+/v/+/v7//v7+//7+/v/+/v7/2LuT/5xXAP+dWAD/nlgA/6" + `
"FbAP+rZgD/rGcA/6xnAP+saAD/rGgA/6xoAP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/" + `
"r2oA/69rAP+wawD/sGsA/7BsAP+xbAD/sWwA/7FsAP+xbAD/sW0A/7JtAP+ybQD/sm4A/7JuAP" + `
"+zbgD/s24A/7NuAP+zbgD/s24A//Tq2v//////////////////////////////////////////" + `
"/////////////////////////////////////////////////////////////////+ve4P9vFi" + `
"j/bxYo/7JtAP+zbgD/sm4A/7JuAP+ybQD/sm0A/7FtAP+xbAD/sWwA/7FsAP+xbAD/sGwA/7Br" + `
"AP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/rGgA/6xoAP+saAD/rG" + `
"cA/6xnAP+rZgD/q2YA/6FbAP+dWAD/nFcA/5xWAP/XupP//v7+//7+/v/+/v7//v7+//j4+P/q" + `
"6uv/3d3d/9DQ0a8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAADW1tc05OTl//Ly8v/+/v7//v7+//7+/v/+/v7//v7+//z49f+gXAf/" + `
"nFYA/5xXAP+eWQD/qmQA/6xnAP+sZwD/rGgA/6xoAP+saAD/rWkA/61pAP+uaQD/rmkA/69qAP" + `
"+vagD/r2oA/69qAP+vawD/sGsA/7BrAP+wbAD/sWwA/7FsAP+xbAD/sW0A/7FtAP+ybQD/sm0A" + `
"/7JuAP+ybgD/s24A/7NuAP+zbgD/s24A/7RvAP+0bwD/9eva//////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"////////697g/28WKP9vFij/sm0A/7NuAP+zbgD/sm4A/7JuAP+ybQD/sm0A/7FtAP+xbQD/sW" + `
"wA/7FsAP+xbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+t" + `
"aQD/rGgA/6xoAP+saAD/rGcA/6xnAP+rZgD/qWQA/51YAP+cVgD/m1UA/6BcB//8+PX//v7+//" + `
"7+/v/+/v7//v7+//Ly8v/k5OX/1tbX/8nJyjQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN7e3q/r6+z/+fn5//7+/v/+/v7//v7+//7+/v" + `
"/+/v7/vYxM/5tVAP+cVgD/nFcA/6VgAP+sZwD/rGcA/6xnAP+saAD/rGgA/61pAP+taQD/rWkA" + `
"/65pAP+vagD/r2oA/69qAP+vagD/r2sA/7BrAP+wawD/sGwA/7FsAP+xbAD/sWwA/7FtAP+xbQ" + `
"D/sm0A/7JuAP+ybgD/s24A/7NuAP+zbgD/s24A/7RvAP+0bwD/tG8A/7RvAP/169r/////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////////////////////r3uD/bxYo/28WKP+zbgD/s24A/7NuAP+zbgD/s24A/7JuAP+y" + `
"bgD/sm0A/7FtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vagD/r2oA/6" + `
"9qAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6xnAP+rZgD/pF8A/5xWAP+bVQD/" + `
"m1UA/7yLTP/+/v7//v7+//7+/v/+/v7/+fn5/+vr7P/e3t7/0NDRrwAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADW1tcs5OTl/vLy8v/+/v7//v7+" + `
"//7+/v/+/v7//v7+/+zey/+cVgD/m1UA/5xWAP+fWgD/q2YA/6xnAP+sZwD/rGgA/6xoAP+taQ" + `
"D/rWkA/61pAP+uaQD/r2oA/69qAP+vagD/r2oA/69rAP+wawD/sGsA/7BsAP+xbAD/sWwA/7Fs" + `
"AP+xbQD/sm0A/7JtAP+ybgD/sm4A/7NuAP+zbgD/s24A/7RvAP+0bwD/tG8A/7RvAP+1cAD/tX" + `
"AA//Xr2v//////////////////////////////////////////////////////////////////" + `
"/////////////////////////////////////////+ve4P9vFij/bxYo/7NuAP+0bwD/tG8A/7" + `
"NuAP+zbgD/s24A/7JuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+wawD/" + `
"r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6tmAP" + `
"+rZgD/n1kA/5tVAP+bVQD/m1UA/+zey//+/v7//v7+//7+/v/+/v7/8vLy/+Tk5f/W1tf+ycnK" + `
"LAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN3d3abr6+" + `
"z/+fn5//7+/v/+/v7//v7+//7+/v/+/v7/rHAj/5tVAP+bVQD/nFYA/6hjAP+sZwD/rGcA/6xo" + `
"AP+saAD/rGgA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69qAP+vawD/sGsA/7BrAP+wbAD/sW" + `
"wA/7FsAP+xbAD/sW0A/7JtAP+ybQD/sm4A/7NuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7RvAP+1" + `
"cAD/tXAA/7VwAP+1cAD/9eva//////////////////////////////////////////////////" + `
"//////////////////////////////////////////////////////////697g/28WKP9vFij/" + `
"tG8A/7RvAP+0bwD/tG8A/7NuAP+zbgD/s24A/7NuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP" + `
"+xbAD/sGwA/7BrAP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+saAD/rGgA" + `
"/6xoAP+sZwD/rGcA/6tmAP+nYgD/m1UA/5tVAP+aVAD/q3Aj//7+/v/+/v7//v7+//7+/v/5+f" + `
"n/6+vs/93d3f/Q0NGmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AADV1dYl4+Pk/PHx8f/+/v7//v7+//7+/v/+/v7//v7+/+jYwf+aVAD/m1UA/5tVAP+iXAD/rG" + `
"cA/6xnAP+sZwD/rGgA/6xoAP+taQD/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/r2sA/69rAP+w" + `
"awD/sGwA/7FsAP+xbAD/sWwA/7FtAP+ybQD/sm0A/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7" + `
"RvAP+0bwD/tXAA/7VwAP+1cAD/tXAA/7ZxAP/169r/////////////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/r3uD/bxYo/28WKP+0bwD/tXAA/7RvAP+0bwD/tG8A/7RvAP+zbgD/s24A/7NuAP+ybgD/sm0A" + `
"/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+vawD/r2sA/69qAP+vagD/r2oA/65pAP+uaQ" + `
"D/rWkA/61pAP+saAD/rGgA/6xnAP+sZwD/rGcA/6tmAP+hWwD/m1UA/5pUAP+ZUwD/6NjB//7+" + `
"/v/+/v7//v7+//7+/v/x8fH/4+Pk/9XV1vzHx8glAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAANvb25Xp6er/+Pj4//7+/v/+/v7//v7+//7+/v/+/v7/rnMq/5lTAP+a" + `
"VAD/m1UA/6lkAP+sZwD/rGcA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/6" + `
"9qAP+vawD/sGsA/7BsAP+xbAD/sWwA/7FsAP+xbQD/sm0A/7JtAP+ybgD/s24A/7NuAP+zbgD/" + `
"tG8A/7RvAP+0bwD/tXAA/7VwAP+1cAD/tXAA/7ZxAP+2cQD/tnEA//Xr2v////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////////////+ve4P9vFij/bxYo/7RvAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbg" + `
"D/s24A/7NuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+vawD/r2oA/69q" + `
"AP+vagD/r2oA/65pAP+taQD/rWkA/61pAP+saAD/rGgA/6xnAP+sZwD/q2YA/6hkAP+aVAD/mV" + `
"MA/5hSAP+tcyr//v7+//7+/v/+/v7//v7+//j4+P/p6er/29vb/83NzpUAAAAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAADS0tMH4ODh7e/v7//+/v7//v7+//7+/v/+/v7//v7+/+" + `
"vey/+ZUgD/mVMA/5pUAP+hWwD/rGcA/6xnAP+sZwD/rGgA/6xoAP+taQD/rWkA/65pAP+vagD/" + `
"r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sGwA/7FsAP+xbAD/sW0A/7JtAP+ybQD/sm4A/7NuAP" + `
"+zbgD/s24A/7RvAP+0bwD/tG8A/7VwAP+1cAD/tXAA/7ZxAP+2cQD/tnEA/7ZxAP+2cQD/9eva" + `
"//////////////////////////////////////////////////////////////////////////" + `
"//////////////////////////////////697g/28WKP9vFij/tXAA/7ZxAP+1cAD/tXAA/7Vw" + `
"AP+0bwD/tG8A/7RvAP+zbgD/s24A/7NuAP+ybgD/sm0A/7JtAP+xbQD/sWwA/7FsAP+wbAD/sG" + `
"wA/7BrAP+vawD/r2oA/69qAP+vagD/r2oA/65pAP+taQD/rWkA/6xoAP+saAD/rGcA/6xnAP+s" + `
"ZwD/q2YA/6BbAP+ZUwD/mFIA/5hRAP/r3sv//v7+//7+/v/+/v7//v7+/+/v7//g4OH/0tLT7c" + `
"TExQcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANjY2FLm5uf/9fX1//7+/v/+/v7/" + `
"/v7+//7+/v/+/v7/sHcw/5hSAP+ZUwD/mlQA/6ljAP+sZwD/rGcA/6xoAP+saAD/rWkA/61pAP" + `
"+taQD/rmkA/69qAP+vagD/r2oA/69rAP+wawD/sGsA/7BsAP+xbAD/sWwA/7FtAP+xbQD/sm0A" + `
"/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7RvAP+1cAD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+2cQ" + `
"D/tnEA/7ZxAP/169r/////////////////////////////////////////////////////////" + `
"///////////////////////////////////////////////////r3uD/bxYo/28WKP+1cAD/tn" + `
"EA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbgD/s24A/7NuAP+ybgD/sm0A/7FtAP+x" + `
"bQD/sWwA/7FsAP+wbAD/sGsA/7BrAP+vawD/r2oA/69qAP+vagD/rmkA/61pAP+taQD/rWkA/6" + `
"xoAP+saAD/rGcA/6xnAP+rZgD/qGMA/5lTAP+YUgD/l1EA/7B3MP/+/v7//v7+//7+/v/+/v7/" + `
"9fX1/+bm5//Y2Nj/ysrLUgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3d3dr+zs7f" + `
"/7+/v//v7+//7+/v/+/v7//v7+//fx6f+YUgD/mFIA/5lTAP+fWQD/rGcA/6xnAP+sZwD/rGgA" + `
"/6xoAP+taQD/rWkA/65pAP+vagD/r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sWwA/7FsAP+xbA" + `
"D/sW0A/7JtAP+ybgD/s24A/7NuAP+zbgD/tG8A/7RvAP+0bwD/tXAA/7VwAP+1cAD/tnEA/7Zx" + `
"AP+2cQD/tnEA/7ZxAP+3cgD/t3IA//Xr2v////////////////////////////////////////" + `
"///////////////////////////////////////////////////////////////////+ve4P9v" + `
"Fij/bxYo/7VwAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbgD/s24A/7" + `
"NuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7FsAP+wbAD/sGsA/69rAP+vagD/r2oA/69qAP+vagD/" + `
"rmkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6xnAP+rZgD/n1kA/5hSAP+XUQD/mFEA//fx6f" + `
"/+/v7//v7+//7+/v/7+/v/7Ozt/93d3f/Pz9CvAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" + `
"ANTU1RPi4uP58fHx//7+/v/+/v7//v7+//7+/v/+/v7/xpxn/5dQAP+XUQD/mFIA/6hiAP+sZw" + `
"D/rGcA/6xoAP+saAD/rWkA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69rAP+wawD/sGwA/7Bs" + `
"AP+xbAD/sWwA/7FtAP+ybQD/sm4A/7JuAP+zbgD/s24A/7RvAP+0bwD/tG8A/7VwAP+1cAD/tX" + `
"AA/7ZxAP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP+3cgD/9eva////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"//////////697g/28WKP9vFij/tnAA/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/" + `
"tG8A/7RvAP+zbgD/s24A/7JuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7BsAP+wbAD/sGsA/69rAP" + `
"+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+taQD/rGgA/6xoAP+sZwD/rGcA/6tmAP+nYgD/l1EA" + `
"/5dQAP+WTwD/xZxn//7+/v/+/v7//v7+//7+/v/x8fH/4uLj/9TU1fnFxcYTAAAAAAAAAAAAAA" + `
"AAAAAAAAAAAAAAAAAA2dnZaufn6P/29vb//v7+//7+/v/+/v7//v7+//7+/v+iYBP/l1AA/5dR" + `
"AP+bVQD/q2YA/6xnAP+sZwD/rGgA/6xoAP+taQD/rWkA/65pAP+vagD/r2oA/69qAP+vagD/r2" + `
"sA/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JtAP+ybgD/s24A/7NuAP+0bwD/tG8A/7RvAP+1" + `
"cAD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+2cQD/t3IA/7dyAP+3cgD/t3IA/7dyAP/169r///////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////////////////////////r3uD/bxYo/28WKP+2cAD/t3IA/7ZxAP+2cQD/tnEA/7ZxAP" + `
"+1cAD/tXAA/7VwAP+0bwD/tG8A/7RvAP+zbgD/s24A/7JuAP+ybQD/sm0A/7FtAP+xbAD/sWwA" + `
"/7BsAP+wawD/r2sA/69qAP+vagD/r2oA/69qAP+uaQD/rWkA/61pAP+saAD/rGgA/6xnAP+sZw" + `
"D/q2YA/6tmAP+aVAD/l1AA/5ZPAP+hYBP//v7+//7+/v/+/v7//v7+//b29v/n5+j/2dnZ/8rK" + `
"y2oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADd3d297Ozt//v7+//+/v7//v7+//7+/v/+/v7/7d" + `
"/N/5ZPAP+XUAD/l1EA/6JdAP+taAH/snIS/61pAf+saAD/rWkA/61pAP+taQD/rmkA/69qAP+v" + `
"agD/r2oA/69rAP+wawD/sGwA/7FsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/s24A/7" + `
"RvAP+0bwD/tXAA/7VwAP+1cAD/tnEA/7ZxAP+2cQD/tnEA/7dyAP+3cgD/t3IA/7dyAP+3cgD/" + `
"uHMA//Xr2v////////////////////////////////////////////////////////////////" + `
"///////////////////////////////////////////+ve4P9vFij/bxYo/7ZwAP+3cgD/t3IA" + `
"/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7NuAP+zbgD/s24A/7JuAP+ybQ" + `
"D/sW0A/7FsAP+xbAD/sWwA/7BsAP+wawD/r2sA/69qAP+vagD/r2oA/65pAP+taQD/rWkA/61p" + `
"AP+saAD/rGgA/61oAf+ychL/rGcB/6FcAP+XUAD/lk8A/5VPAP/s383//v7+//7+/v/+/v7/+/" + `
"v7/+zs7f/d3d3/z8/QvQAAAAAAAAAAAAAAAAAAAAAAAAAA0tLTCOHh4vfw8PD//v7+//7+/v/+" + `
"/v7//v7+//7+/v+4h0r/lU8A/5ZPAP+XUAD/qWQA/61oAv+5fyj/snIR/6xoAP+taQD/rWkA/6" + `
"5pAP+vagD/r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JuAP+ybgD/" + `
"s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tXAA/7ZxAP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP" + `
"+3cgD/uHMA/7hzAP+5cwD/9eva////////////////////////////////////////////////" + `
"////////////////////////////////////////////////////////////697g/28WKP9vFi" + `
"j/tnAA/7dyAP+3cgD/t3IA/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7VwAP+0bwD/tG8A/7Nu" + `
"AP+zbgD/sm4A/7JuAP+ybQD/sW0A/7FsAP+xbAD/sGwA/7BrAP+vawD/r2oA/69qAP+vagD/r2" + `
"oA/65pAP+taQD/rWkA/6xoAP+saAD/snER/7l/KP+sZwL/qGQA/5ZPAP+VTwD/lE4A/7iHSv/+" + `
"/v7//v7+//7+/v/+/v7/8PDw/+Hh4v/S0tP3xMTFCAAAAAAAAAAAAAAAAAAAAADW1tdB5eXm//" + `
"T09P/+/v7//v7+//7+/v/+/v7//v7+/5xZCv+VTwD/lk8A/51WAP+sZwD/sG4M/72FMv+4fiX/" + `
"rGgA/61pAP+taQD/rmkA/69qAP+vagD/r2oA/69rAP+wawD/sGwA/7FsAP+xbAD/sWwA/7FtAP" + `
"+ybQD/sm4A/7NuAP+zbgD/tG8A/7RvAP+0bwD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+2cQD/t3IA" + `
"/7dyAP+3cgD/t3IA/7hzAP+4cwD/uXMA/7lzAP/169r///////////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///r3uD/bxYo/28WKP+3cQD/t3IA/7dyAP+3cgD/t3IA/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tX" + `
"AA/7RvAP+0bwD/tG8A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7FsAP+xbAD/sGwA/7BrAP+v" + `
"awD/r2oA/69qAP+vagD/rmkA/61pAP+taQD/rGgA/6xoAP+4fSX/vYUy/7BuDP+rZgD/nFUA/5" + `
"VPAP+UTgD/nFgK//7+/v/+/v7//v7+//7+/v/09PT/5eXm/9bW1//IyMlBAAAAAAAAAAAAAAAA" + `
"AAAAANra2oPp6er/+Pj4//7+/v/+/v7//v7+//7+/v/z6d7/lE4A/5VPAP+WTwD/o10A/61oAf" + `
"+2eB3/vYYz/7yEL/+xcQ3/rWkA/65pAP+uaQD/r2oA/69qAP+vagD/r2sA/7BrAP+wbAD/sWwA" + `
"/7FsAP+xbQD/sm0A/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tnEA/7ZxAP+2cQ" + `
"D/tnEA/7dyAP+3cgD/t3IA/7dyAP+4cwD/uXMA/7lzAP+5cwD/uXMA//Xr2v//////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////////////////+ve4P9vFij/bxYo/7hxAP+4cwD/t3IA/7dyAP+3cgD/t3IA/7ZxAP+2" + `
"cQD/tnEA/7ZxAP+1cAD/tXAA/7RvAP+0bwD/s24A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7" + `
"FsAP+wbAD/sGsA/69rAP+vagD/r2oA/69qAP+uaQD/rmkA/61pAP+taQD/sHAN/7yEL/+9hTP/" + `
"tngd/6xnAf+iXQD/lU8A/5ROAP+UTQD/8+ne//7+/v/+/v7//v7+//j4+P/p6er/2tra/8zMzY" + `
"MAAAAAAAAAAAAAAAAAAAAA3t7exe3t7v/8/Pz//v7+//7+/v/+/v7//v7+/8uld/+UTQD/lE4A" + `
"/5VPAP+oYwD/rWgC/7uBLP+9hjP/vYYy/7l+JP+uagH/rmkA/69qAP+vagD/r2oA/69rAP+waw" + `
"D/sGwA/7BsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/tG8A/7RvAP+1cAD/tXAA/7Vw" + `
"AP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP+3cgD/uHMA/7lzAP+5cwD/uXMA/7l0AP+5dAD/9e" + `
"va////////////////////////////////////////////////////////////////////////" + `
"////////////////////////////////////697g/28WKP9vFij/uHEA/7lzAP+4cwD/t3IA/7" + `
"dyAP+3cgD/t3IA/7ZxAP+2cQD/tnEA/7VwAP+1cAD/tXAA/7RvAP+0bwD/s24A/7NuAP+ybgD/" + `
"sm0A/7FtAP+xbAD/sWwA/7BsAP+wbAD/sGsA/69rAP+vagD/r2oA/69qAP+uaQD/rWkA/65qAf" + `
"+4fST/vYYy/72FM/+7gSz/rGcC/6djAP+UTgD/lE0A/5NMAP/LpXf//v7+//7+/v/+/v7//Pz8" + `
"/+3t7v/e3t7/0NDRxQAAAAAAAAAAAAAAANLS0wzh4eL68PDw//7+/v/+/v7//v7+//7+/v/+/v" + `
"7/rXMv/5RNAP+UTgD/mFIA/6tmAP+vbAj/vYUz/72GM/+9hjP/vIUv/7JyEP+uaQD/r2oA/69q" + `
"AP+vagD/r2sA/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JuAP+ybgD/s24A/7NuAP+0bwD/tG" + `
"8A/7VwAP+1cAD/tnEA/7ZxAP+2cQD/tnEA/7dyAP+3cgD/t3IA/7hzAP+4cwD/uXMA/7lzAP+5" + `
"dAD/uXQA/7p1AP/269r///////////////////////////////////////////////////////" + `
"/////////////////////////////////////////////////////r3uD/bxYo/28WKP+4cQD/" + `
"uXMA/7hzAP+4cwD/t3IA/7dyAP+3cgD/tnEA/7ZxAP+2cQD/tnEA/7VwAP+1cAD/tG8A/7RvAP" + `
"+zbgD/s24A/7JuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7BsAP+wawD/r2sA/69qAP+vagD/r2oA" + `
"/65pAP+taQD/snIQ/7yEL/+9hjP/vYUz/72FM/+uawj/qmYA/5dRAP+UTQD/k0wA/6xzL//+/v" + `
"7//v7+//7+/v/+/v7/8PDw/+Hh4v/S0tP6w8PEDAAAAAAAAAAA1dXWQOTk5f/z8/P//v7+//7+" + `
"/v/+/v7//v7+//7+/v+aVQf/k0wA/5RNAP+dVwD/rGcA/7NzFf+9hjP/vYYz/76HM/+9hjL/uX" + `
"8m/69qAv+vagD/r2oA/69qAP+vawD/sGsA/7BsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7NuAP+z" + `
"bgD/tG8A/7RvAP+1cAD/tXAA/7VwAP+2cQD/tnEA/7ZxAP+3cgD/t3IA/7dyAP+3cgD/uHMA/7" + `
"lzAP+5cwD/uXQA/7l0AP+2cQD/s24A//Tq2v//////////////////////////////////////" + `
"/////////////////////////////////////////////////////////////////////+ve4P" + `
"9vFij/bxYo/7hyAP+5cwD/uXMA/7hzAP+3cgD/t3IA/7dyAP+3cgD/tnEA/7ZxAP+2cQD/tXAA" + `
"/7VwAP+1cAD/tG8A/7RvAP+zbgD/s24A/7JuAP+ybQD/sW0A/7FsAP+xbAD/sGwA/7BrAP+vaw" + `
"D/r2oA/69qAP+vagD/rmkA/65qAv+5fyb/vYYy/72GM/+9hjP/vYUz/7NzFf+rZgD/nFYA/5NM" + `
"AP+TTAD/mVQH//7+/v/+/v7//v7+//7+/v/z8/P/5OTl/9XV1v/GxsdAAAAAAAAAAADY2Nho5+" + `
"fo//b29v/+/v7//v7+//7+/v/+/v7/7+XW/5JLAP+TTAD/lE0A/6NdAP+sZwD/t3sh/72GM/+9" + `
"hjP/vocz/76HM/+9hS//tncX/69qAP+vagD/r2sA/7BrAP+wbAD/sGwA/7FsAP+xbAD/sW0A/7" + `
"JtAP+ybgD/s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tnEA/7ZxAP+2cQD/tnEA/7dyAP+3cgD/" + `
"t3IA/7hzAP+5cwD/t3EA/7JtAP+uaQD/qmUA/6lkAP+qZQD/8+na//////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"////////////697g/28WKP9vFij/qWQA/65pAP+ybQD/t3EA/7hzAP+3cgD/t3IA/7dyAP+2cQ" + `
"D/tnEA/7ZxAP+2cQD/tXAA/7VwAP+0bwD/tG8A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7Fs" + `
"AP+wbAD/sGwA/7BrAP+vawD/r2oA/69qAP+vagD/tnYX/7yFL/++hzP/vYYz/72GM/+9hTP/t3" + `
"sh/6tmAP+iXQD/k0wA/5JLAP+SSgD/7+TW//7+/v/+/v7//v7+//b29v/n5+j/2NjY/8nJymgA" + `
"AAAAAAAAANvb24/p6er/+fn5//7+/v/+/v7//v7+//7+/v/Ts43/kksA/5NMAP+TTAD/qGIA/6" + `
"1oAf+7gSz/vYYz/72GM/++hzP/vocz/76GMv+9gyv/sm8J/69qAP+vawD/sGsA/7BsAP+xbAD/" + `
"sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/s24A/7RvAP+0bwD/tXAA/7VwAP+2cQD/tnEA/7ZxAP" + `
"+3cgD/t3IA/7dyAP+3cgD/smwA/6xmAP+oYwD/qGMA/6hkAP+oZAD/qWQA/6lkAP/z6dr/////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////////////////////////r3uD/bxYo/28WKP+nYwD/qGMA/6hjAP+nYgD/rGYA/7Fs" + `
"AP+2cQD/t3IA/7dyAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7RvAP+0bwD/s24A/7NuAP+zbgD/sm" + `
"4A/7JtAP+xbQD/sWwA/7FsAP+wbAD/sGsA/69rAP+vagD/r2oA/7JvCf+8giv/vYYy/76HM/+9" + `
"hjP/vYYz/72FM/+7gSz/rGcB/6diAP+TTAD/kksA/5JKAP/Ts43//v7+//7+/v/+/v7/+fn5/+" + `
"np6v/b29v/zMzNjwAAAAAAAAAA3d3dtuzs7f/8/Pz//v7+//7+/v/+/v7//v7+/76QWf+SSgD/" + `
"kksA/5RNAP+rZgD/rmoF/72FM/+9hjP/vYYz/76HM/++hzP/vocz/7+HMf+6fSH/sGsC/69rAP" + `
"+wawD/sGwA/7FsAP+xbAD/sW0A/7JtAP+ybgD/s24A/7NuAP+0bwD/tG8A/7VwAP+1cAD/tnEA" + `
"/7ZxAP+2cQD/tnEA/7dyAP+0bwD/rWcA/6ZhAP+mYQD/pmEA/6diAP+nYgD/qGMA/6hjAP+oZA" + `
"D/qGQA//Pp2v//////////////////////////////////////////////////////////////" + `
"/////////////////////////////////////////////+ve4P9vFij/bxYo/6diAP+nYgD/p2" + `
"IA/6ZhAP+mYQD/pWAA/6ZhAP+sZwD/tG8A/7ZxAP+2cQD/tnEA/7ZxAP+1cAD/tXAA/7RvAP+0" + `
"bwD/s24A/7NuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7BsAP+wawD/r2sA/69qAP+wawL/un0h/7" + `
"6GMf++hzP/vocz/72GM/+9hjP/vYUz/72FM/+taQX/qmYA/5NMAP+SSgD/kUkA/72PWf/+/v7/" + `
"/v7+//7+/v/8/Pz/7Ozt/93d3f/Ozs+2AAAAAAAAAADf39/c7u7v//7+/v/+/v7//v7+//7+/v" + `
"/+/v7/rXMx/5JKAP+SSwD/l1AA/6tmAP+wbw3/vYUz/72GM/+9hjP/vocz/76HM/++hzP/v4gz" + `
"/76FLv+2dhX/sGwB/7BrAP+wbAD/sWwA/7FsAP+xbQD/sm0A/7JuAP+zbgD/s24A/7RvAP+0bw" + `
"D/tXAA/7VwAP+2cQD/tnEA/7ZxAP+ybQD/qmUA/6RfAP+kXwD/pF8A/6VgAP+lYAD/pmEA/6Zh" + `
"AP+nYgD/p2IA/6hjAP+oYwD/8+na//////////////////////////////////////////////" + `
"//////////////////////////////////////////////////////////////697g/28WKP9v" + `
"Fij/pmEA/6ZhAP+mYQD/pWAA/6VgAP+kXwD/pF8A/6RfAP+kXwD/qWQA/7FsAP+2cQD/tnEA/7" + `
"VwAP+1cAD/tG8A/7RvAP+zbgD/s24A/7JuAP+ybQD/sW0A/7FsAP+xbAD/sGwA/7BrAP+vawD/" + `
"sGsB/7Z2Ff++hS7/vocz/76HM/++hzP/vYYz/72GM/+9hTP/vYUz/69uDf+qZgD/lk8A/5JKAP" + `
"+RSQD/rHMx//7+/v/+/v7//v7+//7+/v/u7u//39/f/9DQ0d0AAAAA0dHSB+Dg4fzw8PD//v7+" + `
"//7+/v/+/v7//v7+//7+/v+fXRX/kUkA/5JKAP+aVAD/rGcA/7NzFP+9hjP/vYYz/76HM/++hz" + `
"P/vocz/7+IM/+/iDP/v4cy/72DK/+zcgz/sGsA/7BsAP+xbAD/sWwA/7FtAP+ybQD/sm4A/7Nu" + `
"AP+zbgD/tG8A/7RvAP+1cAD/tXAA/7ZxAP+zbQD/qGMA/6JdAP+jXgD/o14A/6RfAP+kXwD/pF" + `
"8A/6VgAP+lYAD/pmEA/6ZhAP+mYQD/p2IA/6diAP/z6dr/////////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////r3uD/bxYo/28WKP+lYAD/pmEA/6VgAP+lYAD/pF8A/6RfAP+kXwD/o14A/6NeAP+iXQD/" + `
"ol0A/6hiAP+ybQD/tXAA/7VwAP+0bwD/tG8A/7NuAP+zbgD/sm4A/7JtAP+xbQD/sWwA/7FsAP" + `
"+wbAD/sGsA/69rAP+zcQz/vYMr/7+HMv+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/s3MU" + `
"/6tmAP+aUwD/kUkA/5BIAP+fXRX//v7+//7+/v/+/v7//v7+//Dw8P/g4OH/0dHS/MLCwwfT09" + `
"Qo4uLj//Ly8v/+/v7//v7+//7+/v/+/v7//v7+/5VPBP+RSQD/kkoA/55YAP+sZwD/tXgc/72G" + `
"M/+9hjP/vocz/76HM/++hzP/v4gz/7+IM/+/iDP/v4cx/7yAJf+ycAf/sWwA/7FsAP+xbQD/sm" + `
"0A/7JuAP+zbgD/s24A/7NuAP+0bwD/tG8A/7VwAP+zbgD/qWQA/6FcAP+iXAD/olwA/6JdAP+j" + `
"XgD/o14A/6RfAP+kXwD/pF8A/6RfAP+lYAD/pWAA/6VgAP+mYQD/pmEA//Po2v////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////////////////+ve4P9vFij/bxYo/6RfAP+lYAD/pF8A/6RfAP+kXwD/pF8A/6NeAP" + `
"+jXgD/ol0A/6JcAP+iXAD/oVwA/6FcAP+oYwD/s24A/7RvAP+0bwD/s24A/7NuAP+zbgD/sm4A" + `
"/7JtAP+xbQD/sWwA/7FsAP+wbAD/sm8H/7uAJf+/hzH/v4gz/7+IM/++hzP/vocz/76HM/+9hj" + `
"P/vYYz/72FM/+1eBz/q2YA/55XAP+RSQD/kEgA/5RPBP/+/v7//v7+//7+/v/+/v7/8vLy/+Li" + `
"4//T09T/xMTFKNTU1Tnj4+T/8/Pz//7+/v/+/v7//v7+//7+/v/+/vz/kEgA/5BIAP+RSQD/oV" + `
"sA/6xnAP+4fCP/vYYz/72GM/++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+/iTP/v4cw/7p+H/+y" + `
"bgT/sWwA/7FtAP+ybQD/sm4A/7NuAP+zbgD/tG8A/7RvAP+1cAD/rWcA/6JbAP+gWwD/oFsA/6" + `
"FcAP+iXAD/olwA/6JdAP+iXQD/o14A/6NeAP+kXwD/pF8A/6RfAP+kXwD/pWAA/6VgAP+lYAD/" + `
"8+ja//////////////////////////////////////////////////////////////////////" + `
"//////////////////////////////////////697g/28WKP9vFij/o14A/6RfAP+kXwD/pF8A" + `
"/6NeAP+jXgD/ol0A/6JdAP+iXAD/olwA/6FcAP+gWwD/oFsA/6BaAP+iWwD/rWcA/7RvAP+0bw" + `
"D/s24A/7NuAP+ybgD/sm0A/7FtAP+xbAD/sWwA/7FuBP+6fR//vocw/7+IM/+/iDP/v4gz/76H" + `
"M/++hzP/vocz/72GM/+9hjP/vYUz/7h8I/+rZgD/oFsA/5BIAP+PSAD/kEgA//7+/P/+/v7//v" + `
"7+//7+/v/z8/P/4+Pk/9TU1f/FxcY51dXWReTk5f/09PT//v7+//7+/v/+/v7//v7+//fy6/+P" + `
"SAD/kEgA/5FJAP+jXQD/rGcA/7l/KP+9hjP/vYYz/76HM/++hzP/vocz/7+IM/+/iDP/v4gz/7" + `
"+JM//AiTP/v4cv/7l7Gv+ybgP/sW0A/7JtAP+ybgD/s24A/7NuAP+0bwD/sWwA/6ReAP+fWQD/" + `
"n1kA/6BaAP+gWwD/oFsA/6FcAP+hXAD/olwA/6JcAP+iXQD/ol0A/6NeAP+jXgD/pF8A/6RfAP" + `
"+kXwD/pF8A/6RfAP/y6Nr/////////////////////////////////////////////////////" + `
"///////////////////////////////////////////////////////r3uD/bxYo/28WKP+jXg" + `
"D/pF8A/6NeAP+jXgD/ol0A/6JdAP+iXAD/olwA/6FcAP+hXAD/oFsA/6BbAP+gWgD/n1kA/59Z" + `
"AP+eWAD/o14A/7FsAP+zbgD/s24A/7JuAP+ybQD/sW0A/7FsAP+ybgP/uHsa/7+GL/+/iTP/v4" + `
"gz/7+IM/+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/uX8o/6tmAP+iXQD/kEgA/49IAP+P" + `
"RwD/9/Hp//7+/v/+/v7//v7+//T09P/k5OX/1dXW/8fHyEXW1tdS5eXm//X19f/+/v7//v7+//" + `
"7+/v/+/v7/7uLS/49HAP+PSAD/kEgA/6ReAP+sZwD/uoAq/72GM/+9hjP/vocz/76HM/++hzP/" + `
"v4gz/7+IM/+/iDP/v4kz/8CJM//AiTP/v4Yt/7h5Fv+ybwP/sm0A/7JuAP+zbgD/s24A/61oAP" + `
"+fWQD/nVgA/55YAP+fWQD/n1kA/6BaAP+gWgD/oFsA/6FcAP+hXAD/olwA/6JcAP+iXQD/ol0A" + `
"/6JdAP+jXgD/o14A/6RfAP+kXwD/pF8A//Lo2v////////////////////////////////////" + `
"///////////////////////////////////////////////////////////////////////+ve" + `
"4P9vFij/bxYo/6JdAP+jXgD/ol0A/6JdAP+iXQD/olwA/6JcAP+hXAD/oVwA/6BbAP+gWgD/oF" + `
"oA/59ZAP+fWQD/nlgA/51YAP+dWAD/nlkA/6xnAP+zbgD/sm4A/7JtAP+xbQD/sm4D/7h5Fv++" + `
"hi3/wIkz/7+JM/+/iDP/v4gz/7+IM/++hzP/vocz/76HM/+9hjP/vYYz/72FM/+6gCr/q2YA/6" + `
"NeAP+PSAD/j0cA/49HAP/u4tL//v7+//7+/v/+/v7/9fX1/+Xl5v/W1tf/x8fIUtfX2F/m5uf/" + `
"9vb2//7+/v/+/v7//v7+//7+/v/k0rv/j0cA/49IAP+QSAD/pV8A/6xnAP+7gi3/vYYz/72GM/" + `
"++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+/iTP/wIkz/8CJM//BiTP/v4Us/7d4FP+zbwP/sm4A" + `
"/7NtAP+nYQD/nFYA/5xXAP+dWAD/nVgA/55YAP+eWAD/n1kA/6BaAP+gWgD/oFsA/6BbAP+hXA" + `
"D/oVwA/6JcAP+iXAD/ol0A/6JdAP+iXQD/o14A/6NeAP+jXgD/8uja////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"//////////////697g/28WKP9vFij/oVwA/6JdAP+iXQD/olwA/6JcAP+hXAD/oVwA/6BbAP+g" + `
"WwD/oFoA/6BaAP+fWQD/nlgA/55YAP+dWAD/nVgA/5xXAP+cVgD/nFYA/6ZgAP+ybQD/sm0A/7" + `
"JvA/+3dxT/v4Us/8CJM//AiTP/v4kz/7+IM/+/iDP/v4gz/76HM/++hzP/vocz/72GM/+9hjP/" + `
"vYUz/7uCLf+rZgD/pF8A/49IAP+PRwD/jkYA/+TSu//+/v7//v7+//7+/v/29vb/5ubn/9fX2P" + `
"/IyMlf19fYbObm5//29vb//v7+//7+/v/+/v7//v7+/9zDpv+ORgD/j0cA/49IAP+mYQD/rGcA" + `
"/7yDL/+9hjP/vYYz/76HM/++hzP/vocz/7+IM/+/iDP/v4gz/7+JM//AiTP/wIkz/8GJM//BiT" + `
"L/v4Ys/7h4FP+ybgP/oVsA/5tVAP+cVgD/nFYA/5xXAP+cVwD/nVgA/55YAP+eWAD/n1kA/59Z" + `
"AP+gWgD/oFoA/6BbAP+gWwD/oVwA/6FcAP+iXAD/olwA/6JcAP+iXQD/ol0A/6JdAP/y6Nr///" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////////////////////////////r3uD/bxYo/28WKP+hWwD/olwA/6JcAP+hXAD/oVwA/6" + `
"BbAP+gWwD/oFoA/6BaAP+fWQD/n1kA/55YAP+eWAD/nVgA/5xXAP+cVwD/nFYA/5xWAP+bVQD/" + `
"m1UA/6FbAP+ybQP/t3gU/7+FLP/BiTL/wIkz/8CJM/+/iTP/v4gz/7+IM/+/iDP/vocz/76HM/" + `
"++hzP/vYYz/72GM/+9hTP/vIMv/6tmAP+lYQD/j0cA/45GAP+ORQD/3MOm//7+/v/+/v7//v7+" + `
"//b29v/m5uf/19fY/8jIyWzX19h55ubn//b29v/+/v7//v7+//7+/v/+/v7/1LWR/45GAP+PRw" + `
"D/j0cA/6hiAP+sZwD/vIQx/72GM/+9hjP/vocz/76HM/++hzP/v4gz/7+IM/+/iDP/v4kz/8CJ" + `
"M//AiTP/wYkz/8GJM//BijL/vYMr/6ZmFf+cVwT/m1UA/5tVAP+bVQD/nFYA/5xXAP+cVwD/nV" + `
"gA/51YAP+eWAD/nlgA/59ZAP+gWgD/oFoA/6BaAP+gWwD/oFsA/6FcAP+hXAD/olwA/6JcAP+i" + `
"XAD/olwA//Lo2v////////////////////////////////////////////////////////////" + `
"///////////////////////////////////////////////+ve4P9vFij/bxYo/6FbAP+hXAD/" + `
"oVwA/6BbAP+gWwD/oFoA/6BaAP+gWgD/n1kA/55YAP+eWAD/nVgA/51YAP+cVwD/nFcA/5xWAP" + `
"+bVQD/m1UA/5tVAP+aVAD/nFcE/6VlFf+8gyv/wYky/8GJM//AiTP/wIkz/7+JM/+/iDP/v4gz" + `
"/7+IM/++hzP/vocz/76HM/+9hjP/vYYz/72FM/+8hDH/q2YA/6diAP+PRwD/jkYA/45FAP/UtZ" + `
"H//v7+//7+/v/+/v7/9vb2/+bm5//X19j/yMjJedfX2Hnm5uf/9vb2//7+/v/+/v7//v7+//7+" + `
"/v/UtZH/jkUA/45GAP+PRwD/qGIA/6xnAP+8hDH/vYYz/72GM/++hzP/vocz/76HM/+/iDP/v4" + `
"gz/7+IM/+/iTP/wIkz/8CJM//BiTP/wYkz/76GM/+vdjP/q3Es/6RkGP+cWAb/m1UA/5tVAP+b" + `
"VQD/nFYA/5xWAP+cVwD/nVgA/51YAP+eWAD/nlgA/59ZAP+fWQD/oFoA/6BaAP+gWgD/oFsA/6" + `
"BbAP+hXAD/oVwA/6FcAP+iXAD/8uja////////////////////////////////////////////" + `
"////////////////////////////////////////////////////////////////697g/28WKP" + `
"9vFij/oFsA/6BbAP+gWwD/oFoA/6BaAP+gWgD/n1kA/59ZAP+eWAD/nlgA/51YAP+dWAD/nFcA" + `
"/5xWAP+cVgD/m1UA/5tVAP+bVQD/mlQA/5xYBv+jYxj/qnAs/652M/+9hTP/wYkz/8CJM//AiT" + `
"P/v4kz/7+IM/+/iDP/v4gz/76HM/++hzP/vocz/72GM/+9hjP/vYUz/7yEMf+rZgD/p2IA/45G" + `
"AP+ORQD/jUQA/9S1kf/+/v7//v7+//7+/v/29vb/5ubn/9fX2P/IyMl519fYbObm5//29vb//v" + `
"7+//7+/v/+/v7//v7+/9zDpv+ORQD/jkUA/45GAP+mYAD/rGcA/7uCLv+9hjP/vYYz/76HM/++" + `
"hzP/vocz/7+IM/+/iDP/v4gz/7+JM//AiTP/wIkz/8GJM/+9hTP/rnUz/611M/+tdTP/rHIu/6" + `
"VnHP+dWQj/nFYB/5tVAP+bVQD/nFYA/5xWAP+cVwD/nFcA/51YAP+dWAD/nlgA/55YAP+fWQD/" + `
"n1kA/6BaAP+gWgD/oFoA/6BbAP+gWwD/oFsA/6FcAP/y6Nr///////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////r3uD/bxYo/28WKP+fWgD/oFoA/6BaAP+gWgD/n1kA/59ZAP+eWAD/nlgA/51YAP+dWA" + `
"D/nFcA/5xXAP+cVgD/nFYA/5tVAP+bVQD/m1UA/5tVAf+dWQj/pGYc/6txLv+tdTP/rHQz/651" + `
"M/+9hTP/wIkz/8CJM/+/iTP/v4gz/7+IM/+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/u4" + `
"Iu/6tmAP+lYAD/jkUA/45FAP+NRAD/3MOm//7+/v/+/v7//v7+//b29v/m5uf/19fY/8jIyWzW" + `
"1tdf5eXm//X19f/+/v7//v7+//7+/v/+/v7/5NK7/41EAP+ORQD/jkYA/6VfAP+sZwD/u4Es/7" + `
"2GM/+9hjP/vocz/76HM/++hzP/v4gz/7+IM/+/iDP/v4kz/8CJM//AiTP/vYUz/651M/+sczP/" + `
"rHQz/611M/+tdTP/rHMw/6ZpIf+fXQ3/nFYC/5tVAP+bVQD/m1UA/5xWAP+cVgD/nFcA/5xXAP" + `
"+dWAD/nVgA/55YAP+eWAD/n1kA/59ZAP+fWQD/oFoA/6BaAP+gWgD/oFsA//Lo2v//////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"///////////////////////+ve4P9vFij/bxYo/59ZAP+fWQD/n1kA/59ZAP+eWAD/nlgA/51Y" + `
"AP+dWAD/nFcA/5xXAP+cVgD/nFYA/5tVAP+bVQD/m1UA/5tVAP+bVQL/nlwN/6ZpIf+sczD/rX" + `
"Uz/6x0M/+sczP/rHMz/610M/+8hTP/wIkz/7+JM/+/iDP/v4gz/7+IM/++hzP/vocz/76HM/+9" + `
"hjP/vYYz/72FM/+7gSz/q2YA/6RfAP+ORQD/jUQA/4xDAP/k0rv//v7+//7+/v/+/v7/9fX1/+" + `
"Xl5v/W1tf/x8fIX9XV1lLk5OX/9PT0//7+/v/+/v7//v7+//7+/v/u4tL/jEMA/41EAP+ORQD/" + `
"o10A/6xnAP+6fyn/vYYz/72GM/++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+/iTP/wIkz/72GM/" + `
"+sdDP/q3Iz/6xzM/+sczP/rHQz/6x0M/+tdTP/rXUy/6ltJ/+iYRP/nFcF/5tVAP+bVQD/m1UA" + `
"/5xWAP+cVgD/nFcA/5xXAP+cVwD/nVgA/51YAP+eWAD/nlgA/55YAP+fWQD/n1kA/59ZAP+gWg" + `
"D/8ufa////////////////////////////////////////////////////////////////////" + `
"////////////////////////////////////////697g/28WKP9vFij/nlgA/55YAP+eWAD/nl" + `
"gA/51YAP+dWAD/nFcA/5xXAP+cVwD/nFYA/5xWAP+bVQD/m1UA/5tVAP+aVAD/nFcF/6FgE/+p" + `
"bSf/rHQy/6x0M/+sdDP/rHMz/6xzM/+rcjP/qnIz/6tzM/+9hTP/v4kz/7+IM/+/iDP/v4gz/7" + `
"6HM/++hzP/vocz/72GM/+9hjP/vYUz/7p/Kf+rZgD/o10A/41EAP+MQwD/jEMA/+7i0//+/v7/" + `
"/v7+//7+/v/09PT/5OTl/9XV1v/Hx8hS1NTVRePj5P/z8/P//v7+//7+/v/+/v7//v7+//fx6/" + `
"+MQwD/jUQA/41EAP+iWwD/rGcA/7l+J/+9hjP/vYYz/76HM/++hzP/vocz/7+IM/+/iDP/v4gz" + `
"/7+JM/++hzP/rXUz/6pxM/+qcjP/q3Iz/6tyM/+sczP/rHQz/6x0M/+tdTP/rXUz/6txLP+lZh" + `
"v/nlsL/5xWAv+bVQD/m1UA/5tVAP+cVgD/nFYA/5xXAP+cVwD/nFcA/51YAP+dWAD/nVgA/55Y" + `
"AP+eWAD/nlgA/59ZAP/y59r///////////////////////////////////////////////////" + `
"/////////////////////////////////////////////////////////r3uD/bxYo/28WKP+d" + `
"VwD/nVgA/51YAP+dWAD/nFcA/5xXAP+cVwD/nFYA/5xWAP+bVQD/m1UA/5tVAP+bVQD/m1UC/5" + `
"5bC/+kZRv/qnAs/611M/+sdDP/rHQz/6xzM/+rcjP/q3Iz/6pyM/+qcTP/qnEz/610M/++hzP/" + `
"v4gz/7+IM/+/iDP/vocz/76HM/++hzP/vYYz/72GM/+9hTP/uX4n/6tmAP+hWwD/jUQA/4xDAP" + `
"+LQgH/9/Hp//7+/v/+/v7//v7+//Pz8//j4+T/1NTV/8XFxkXT09Q54uLj//Ly8v/+/v7//v7+" + `
"//7+/v/+/v7//v79/4xCAP+MQwD/jUQA/59YAP+sZwD/t3si/72GM/+9hjP/vocz/76HM/++hz" + `
"P/v4gz/7+IM/+/iDP/vogz/651M/+qcTP/qnEz/6pxM/+qcjP/q3Iz/6tyM/+sczP/rHMz/6x0" + `
"M/+tdTP/rXUz/610Mf+obCX/omET/51ZB/+cVgH/m1UA/5tVAP+bVQD/nFYA/5xWAP+cVgD/nF" + `
"cA/5xXAP+dWAD/nVgA/51YAP+dWAD/nlgA//Hn2v//////////////////////////////////" + `
"/////////////////////////////////////////////////////////////////////////+" + `
"ve4P9vFij/bxYo/5xXAP+dWAD/nFcA/5xXAP+cVgD/nFYA/5xWAP+bVQD/m1UA/5tVAP+bVQD/" + `
"m1UB/51ZB/+hYBP/qGwl/6xzMf+tdTP/rHQz/6xzM/+sczP/q3Iz/6tyM/+qcjP/qnEz/6pxM/" + `
"+qcTP/qXAz/651M/++hzP/v4gz/7+IM/++hzP/vocz/76HM/+9hjP/vYYz/72FM/+3eyL/q2YA" + `
"/55YAP+MQwD/i0IA/4xBAv/+/v3//v7+//7+/v/+/v7/8vLy/+Li4//T09T/xMTFOdHR0ijg4O" + `
"H/8PDw//7+/v/+/v7//v7+//7+/v/+/v7/kUkF/4tCAP+MQwD/mlMA/6xnAP+1dxv/vYYz/72G" + `
"M/++hzP/vocz/76HM/+/iDP/v4gz/7+IM/+yeTP/qXAz/6lwM/+qcTP/qnEz/6pxM/+qcjP/qn" + `
"Iz/6tyM/+sczP/rHMz/6x0M/+sdDP/rXUz/611M/+rcS3/pmgf/6BfEP+cVwX/m1UA/5tVAP+b" + `
"VQD/m1UA/5xWAP+cVgD/nFYA/5xXAP+cVwD/nFcA/5xXAP+dWAD/8efa//////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"////////////////697g/28WKP9vFij/m1YA/5xXAP+cVgD/nFYA/5xWAP+bVQD/m1UA/5tVAP" + `
"+bVQD/mlQA/5xXBf+gXhD/pmgf/6pwLf+tdTP/rHQz/6x0M/+sczP/rHMz/6tyM/+qcjP/qnIz" + `
"/6pxM/+qcTP/qnEz/6lwM/+pcDP/qG8z/7J5M/+/iDP/v4gz/76HM/++hzP/vocz/72GM/+9hj" + `
"P/vYUz/7V3G/+rZgD/mVIA/4tCAP+LQgH/kUkH//7+/v/+/v7//v7+//7+/v/w8PD/4ODh/9HR" + `
"0v/CwsMo0NDRB9/f3/zu7u///v7+//7+/v/+/v7//v7+//7+/v+bWBf/i0IB/4xDAP+VTQD/q2" + `
"YA/7JyE/+9hTP/vYYz/72GM/++hzP/vocz/76HM/+/iDP/t38z/6huM/+obzP/qXAz/6lwM/+q" + `
"cTP/qnEz/6pxM/+qcjP/qnIz/6tyM/+rcjP/rHMz/6x0M/+sdDP/rXUz/611M/+tdTL/qnAr/6" + `
"VnHP+gXQ7/nFcF/5tVAP+bVQD/m1UA/5tVAP+bVQD/nFYA/5xWAP+cVgD/nFYA/5xXAP/x59r/" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////////////////////////////r3uD/bxYo/28WKP+bVQD/nFYA/5tVAP+bVQD/m1UA" + `
"/5tVAP+bVQD/mlQA/5xXBf+gXQ7/pGYc/6pwK/+sdDL/rXUz/6x0M/+sdDP/rHMz/6tyM/+rcj" + `
"P/qnIz/6pyM/+qcTP/qnEz/6pxM/+pcDP/qXAz/6hvM/+objP/qG4z/7d/M/++hzP/vocz/76H" + `
"M/+9hjP/vYYz/72FM/+9hTP/sXET/6pmAP+VTQD/i0IB/4tBA/+aWBj//v7+//7+/v/+/v7//v" + `
"7+/+7u7//f39//0NDR/MHBwgcAAAAA3d3d3Ozs7f/8/Pz//v7+//7+/v/+/v7//v7+/6lvNP+L" + `
"QQL/i0IB/5FIAP+rZgD/sG0L/72FM/+9hjP/vYYz/76HM/++hzP/vocz/7yEM/+pbzP/p20z/6" + `
"huM/+obzP/qG8z/6lwM/+qcTP/qnEz/6pxM/+qcTP/qnIz/6tyM/+rcjP/rHMz/6xzM/+sdDP/" + `
"rHQz/611M/+tdTP/rXUy/6pvKv+kZhz/oF8Q/51ZB/+cVgH/m1UA/5tVAP+bVQD/m1UA/5tVAP" + `
"+cVgD/nFYA//Hn2v//////////////////////////////////////////////////////////" + `
"/////////////////////////////////////////////////+ve4P9vFij/bxYo/5pUAP+bVQ" + `
"D/m1UA/5tVAP+bVQD/m1UB/51ZB/+gXhD/pGYc/6pvKv+sdDL/rXUz/6x0M/+sdDP/rHMz/6xz" + `
"M/+rcjP/q3Iz/6pyM/+qcTP/qnEz/6pxM/+qcTP/qXAz/6hvM/+obzP/qG4z/6dtM/+nbTP/qG" + `
"4z/7uDM/++hzP/vocz/72GM/+9hjP/vYUz/72FM/+vbQv/qmYA/5BHAP+LQQL/ikEE/6lvNP/+" + `
"/v7//v7+//7+/v/8/Pz/7Ozt/93d3f/Ozs/dAAAAAAAAAADb29u26enq//n5+f/+/v7//v7+//" + `
"7+/v/+/v7/u4xa/4pBBP+LQQL/jEMA/6tlAP+taQT/vYUy/72GM/+9hjP/vocz/76HM/++hzP/" + `
"q3Iz/6ZtM/+nbTP/p20z/6huM/+obzP/qG8z/6lwM/+pcDP/qnEz/6pxM/+qcTP/qnIz/6pyM/" + `
"+rcjP/q3Iz/6xzM/+sczP/rHQz/6x0M/+tdTP/rXUz/611Mv+rcSz/pmgf/6JhFP+fXAz/nFcE" + `
"/5tVAP+bVQD/m1UA/5tVAP+bVQD/8efa//////////////////////////////////////////" + `
"//////////////////////////////////////////////////////////////////697g/28W" + `
"KP9vFij/mlQA/5tVAP+aVAD/nFcE/59cDP+hYBT/pmgf/6txLP+sdDL/rXUz/6x0M/+sdDP/rH" + `
"Mz/6xzM/+rcjP/q3Iz/6pyM/+qcjP/qnEz/6pxM/+qcTP/qXAz/6lwM/+obzP/qG8z/6huM/+n" + `
"bTP/p20z/6ZtM/+mbTP/q3Iz/76HM/++hzP/vYYz/72GM/+9hTP/vYUy/6xoBP+qZQD/jEIB/4" + `
"pBBP+KQQT/uoxb//7+/v/+/v7//v7+//n5+f/p6er/29vb/8zMzbYAAAAAAAAAANjY2I/n5+j/" + `
"9vb2//7+/v/+/v7//v7+//7+/v/RsY7/ikEE/4tBBP+LQQL/pV8A/61oAf+6gSv/vYYz/72GM/" + `
"++hzP/vocz/7R7M/+mbTP/pm0z/6ZtM/+nbTP/p20z/6huM/+objP/qG8z/6lwM/+pcDP/qnEz" + `
"/6pxM/+qcTP/qnEz/6pyM/+qcjP/q3Iz/6tyM/+sczP/rHMz/6x0M/+sdDP/rXUz/611M/+tdT" + `
"P/rHMv/6htJv+kZhz/omET/59cDP+cWAb/nFYB/5tVAP/x59r/////////////////////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////r3uD/bxYo/28WKP+bVwb/n1wM/6FgE/+kZhz/qG0m/6tyL/+tdTP/rXUz/6x0M/+s" + `
"dDP/rHMz/6xzM/+rcjP/q3Iz/6pyM/+qcjP/qnEz/6pxM/+qcTP/qnEz/6lwM/+pcDP/qG8z/6" + `
"huM/+objP/p20z/6dtM/+mbTP/pm0z/6ZtM/+mbDP/s3sz/76HM/+9hjP/vYYz/72FM/+6gSv/" + `
"rGcB/6VfAP+LQQT/ikEE/4lABv/RsI///v7+//7+/v/+/v7/9vb2/+fn6P/Y2Nj/ycnKjwAAAA" + `
"AAAAAA1dXWaOTk5f/z8/P//v7+//7+/v/+/v7//v7+/+7k1/+JQAX/ikEE/4tBA/+dVgD/rGcA" + `
"/7Z5H/+9hjP/vYYz/76HM/+7hDP/pmwz/6ZsM/+mbTP/pm0z/6ZtM/+mbTP/p20z/6huM/+obj" + `
"P/qG8z/6hvM/+pcDP/qnEz/6pxM/+qcTP/qnEz/6pyM/+qcjP/q3Iz/6tyM/+sczP/rHMz/6xz" + `
"M/+sdDP/rHQz/611M/+tdTP/rXUz/611Mv+sci7/qG0m/6VnHv+jYxb/oF8Q//Lo3P////////" + `
"//////////////////////////////////////////////////////////////////////////" + `
"/////////////////////////+ve4P9vFij/bxYo/6RmHv+obSb/rHIu/6x0Mv+tdTP/rXUz/6" + `
"x0M/+sdDP/rHMz/6xzM/+sczP/q3Iz/6tyM/+qcjP/qnIz/6pxM/+qcTP/qnEz/6pxM/+pcDP/" + `
"qG8z/6hvM/+objP/qG4z/6dtM/+mbTP/pm0z/6ZtM/+mbTP/pmwz/6VrM/+mbDP/u4Qz/72GM/" + `
"+9hjP/vYUz/7Z5H/+rZgD/nVYB/4pBBP+JQAb/iT8H/+7k1//+/v7//v7+//7+/v/z8/P/5OTl" + `
"/9XV1v/GxsdoAAAAAAAAAADS0tNA4eHi//Dw8P/+/v7//v7+//7+/v/+/v7//v7+/5FKDv+JQA" + `
"X/ikEE/5VNAv+rZgD/snIT/72FM/+9hjP/vYYz/61zM/+lajP/pWsz/6ZsM/+mbDP/pm0z/6Zt" + `
"M/+mbTP/p20z/6dtM/+objP/qG8z/6hvM/+pcDP/qXAz/6pxM/+qcTP/qnEz/6pxM/+qcjP/qn" + `
"Iz/6tyM/+rcjP/q3Iz/6xzM/+sczP/rHQz/6x0M/+sdDP/rXUz/611M/+tdTP/rXUz/610Mf+r" + `
"cSz/8+rg//////////////////////////////////////////////////////////////////" + `
"//////////////////////////////////////////697g/28WKP9vFij/rHMz/611M/+tdTP/" + `
"rHQz/6x0M/+sdDP/rHMz/6xzM/+rcjP/q3Iz/6tyM/+qcjP/qnIz/6pxM/+qcTP/qnEz/6pxM/" + `
"+pcDP/qXAz/6hvM/+obzP/qG4z/6dtM/+nbTP/pm0z/6ZtM/+mbTP/pmwz/6ZsM/+lazP/pWoz" + `
"/6VqM/+scjP/vYYz/72FM/+9hTP/sXET/6pmAP+VTQL/iUAF/4k/CP+RSg///v7+//7+/v/+/v" + `
"7//v7+//Dw8P/h4eL/0tLT/8PDxEAAAAAAAAAAANDQ0Qze3t767e3u//z8/P/+/v7//v7+//7+" + `
"/v/+/v7/p2w0/4lACP+JQAX/jUQD/6tmAP+uawf/vIQx/72GM/+3fzP/pGkz/6VqM/+lajP/pW" + `
"sz/6ZsM/+mbDP/pm0z/6ZtM/+mbTP/p20z/6dtM/+objP/qG4z/6hvM/+obzP/qXAz/6lwM/+q" + `
"cTP/qnEz/6pxM/+qcTP/qnIz/6pyM/+rcjP/q3Iz/6tyM/+sczP/rHMz/6xzM/+sdDP/rHQz/6" + `
"x0M/+sdDP/rX
|
combined_dataset/train/non-malicious/sample_64_81.ps1 | sample_64_81.ps1 | #
# Module manifest for module 'OCI.PSModules.Functions'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Functions.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Functions Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList',
'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList',
'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList',
'Get-OCIFunctionsPbfListingVersion',
'Get-OCIFunctionsPbfListingVersionsList',
'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction',
'Move-OCIFunctionsApplicationCompartment',
'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction',
'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction',
'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/New Switch and Portgroup.ps1 | New Switch and Portgroup.ps1 | get-vc vcservername
Get-VMHost | New-VirtualSwitch -Name SwitchName
Get-VMHost | Get-VirtualSwitch -Name SwitchName | New-VirtualPortGroup -Name portgroupname -VLANID vlan_number
|
combined_dataset/train/non-malicious/188.ps1 | 188.ps1 | function New-SCCMDeviceVariable
{
[cmdletbinding()]
PARAM (
[parameter(Mandatory = $true)]
[Alias('SiteServer')]
[System.String]$ComputerName,
[parameter(Mandatory = $true)]
[System.String]$SiteCode,
[Alias("RunAs")]
[System.Management.Automation.Credential()]
$Credential = [System.Management.Automation.PSCredential]::Empty,
[parameter(Mandatory = $true)]
[int]$ResourceID,
[parameter(Mandatory = $true)]
[Alias("VariableName")]
[System.String]$Name,
[parameter(Mandatory = $true)]
[Alias("VariableValue")]
[System.String]$Value,
[System.Boolean]$IsMasked = $false
)
PROCESS
{
TRY
{
Write-Verbose -Message "$ResourceID - Create splatting"
$SCCM_Splatting = @{
ComputerName = $ComputerName
NameSpace = "root\sms\site_$SiteCode"
}
IF ($PSBoundParameters['Credential'])
{
$SCCM_Splatting.Credential = $Credential
}
Write-Verbose -Message "$ResourceID - Verify if machine settings exist"
$MachineSettingsClass = Get-WmiObject @SCCM_Splatting -Query "SELECT ResourceID FROM SMS_MachineSettings WHERE ResourceID = '$ResourceID'"
if ($MachineSettingsClass)
{
Write-Verbose -Message "$ResourceID - Machine Settings Exists"
Write-Verbose -Message "$ResourceID - Create Variable"
$MachineVariablesClass = Get-WmiObject -list @SCCM_Splatting -Class "SMS_MachineVariable"
$NewMachineVariableInstance = $MachineVariablesClass.CreateInstance()
$NewMachineVariableInstance.psbase.Properties['Name'].Value = $Name
$NewMachineVariableInstance.psbase.Properties['Value'].Value = $Value
$NewMachineVariableInstance.psbase.Properties['IsMasked'].Value = $IsMasked
$MachineSettingsClass.get()
Write-Verbose -Message "$ResourceID - Insert machine Variable into machine settings"
$MachineSettingsClass.MachineVariables += $NewMachineVariableInstance
Write-Verbose -Message "$ResourceID - Save Change"
$MachineSettingsClass.Put()
}
else
{
Write-Verbose -Message "$ResourceID - Machine Settings does NOT Exists"
Write-Verbose -Message "$ResourceID - Machine Settings - Creation"
$MachineSettingsClass = Get-WmiObject @SCCM_Splatting -List -Class 'SMS_MachineSettings'
$NewMachineSettingsClassInstance = $MachineSettingsClass.CreateInstance()
$NewMachineSettingsClassInstance.psbase.properties["ResourceID"].value = $ResourceID
$NewMachineSettingsClassInstance.psbase.properties["SourceSite"].value = $SiteCode
Write-Verbose -Message "$ResourceID - Machine Variable - Creation"
$MachineVariablesClass = Get-WmiObject -list @SCCM_Splatting -Class "SMS_MachineVariable"
$NewMachineVariablesInstance = $MachineVariablesClass.CreateInstance()
$NewMachineVariablesInstance.psbase.Properties['Name'].Value = $Name
$NewMachineVariablesInstance.psbase.Properties['Value'].Value = $Value
$NewMachineVariablesInstance.psbase.Properties['IsMasked'].Value = $IsMasked
Write-Verbose -Message "$ResourceID - Insert machine Variable into machine settings"
$NewMachineSettingsClassInstance.MachineVariables += $NewMachineVariablesInstance
Write-Verbose -Message "$ResourceID - Save Change"
$NewMachineSettingsClassInstance.Put()
}
}
CATCH
{
Write-Warning -Message "$ResourceID - Issue while processing the Device"
$Error[0]
}
FINALLY
{ }
}
}
|
combined_dataset/train/non-malicious/297.ps1 | 297.ps1 | function Test-PSFParameterBinding
{
[CmdletBinding(HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Test-PSFParameterBinding')]
Param (
[Parameter(Mandatory = $true, Position = 0)]
[string[]]
$ParameterName,
[Alias('Reverse')]
[switch]
$Not,
[switch]
$And,
[ValidateSet('Any', 'Explicit', 'PipeScript')]
[string]
$Mode = 'Any',
[object]
$BoundParameters = (Get-PSCallStack)[0].InvocationInfo.BoundParameters
)
if ($And)
{
$test = $true
}
else
{
$test = $false
}
$pipeScriptForbidden = $Mode -eq "Explicit"
$explicitForbidden = $Mode -eq "PipeScript"
foreach ($name in $ParameterName)
{
$isPipeScript = ($BoundParameters.$name.PSObject.TypeNames -eq 'System.Management.Automation.CmdletParameterBinderController+DelayedScriptBlockArgument') -as [bool]
if ($And)
{
if (-not $BoundParameters.ContainsKey($name))
{
$test = $false
continue
}
if ($isPipeScript -and $pipeScriptForbidden) { $test = $false }
if (-not $isPipeScript -and $explicitForbidden) { $test = $false }
}
else
{
if ($BoundParameters.ContainsKey($name))
{
if ($isPipeScript -and -not $pipeScriptForbidden) { $test = $true }
if (-not $isPipeScript -and -not $explicitForbidden) { $test = $true }
}
}
}
return ((-not $Not) -eq $test)
}
if (-not (Test-Path Alias:Was-Bound)) { Set-Alias -Value Test-PSFParameterBinding -Name Was-Bound -Scope Global } |
combined_dataset/train/non-malicious/sample_4_98.ps1 | sample_4_98.ps1 | ConvertFrom-StringData @'
id_veritasvxiobadconfigflags_sd=VXIO device has a bad state flag and this may cause shadown copies of Veritas volumes to fail.
'@
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJCxSgeLCkPjtq
# 4aJqqaUIJ5jkd0XsShszCl1fUFyw8qCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINFA
# UGuC7St8zDAiichfXYKm3yc5bDyjomCMVDCfXybnMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAHElhR28/czbUM2y3Kx4FGqCXiwUGwoBZjc2K
# xFlDeQByumUal3gzWxhALTQn4/5H2VZ4pWXt2RePYHpHEuv9GDQhfZlsQJ7y0vfZ
# kaizTIXEOZovDsbSCY+3qKSQkep3v82P/XUZjM+c9E3aPoKrc92LscukGVe4Cdzd
# b3bT7nx/qeBgGEF2Gox4J+4GUw6ARt2QC29H2/1ZxYCI21xP8LJpCqnFDLri5Ohi
# AwW0Idy+UE7CJjhL9IGTHOJBPx424y99M5cIz+83kXhuXA3fl2wpN/1xXdHTBzRG
# G4hxQ0YC7tXKQj1IKilAJSvd5Sgp3wFFLhu6YxDAh3j5vkV4wKGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB6lEKYQWY0+wEbc7uVpuA6+LiIanfZs4cg
# vmHfZ5+7NgIGZut+oGFiGBMyMDI0MTAyODExNDA0MC41MzdaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big
# r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF
# RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts
# urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF
# 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83
# 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ
# t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l
# RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT
# shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+
# vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7
# 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A
# SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt
# weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc
# D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL
# 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO
# RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H
# WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn
# jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va
# iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC
# 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K
# tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW
# wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w
# fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0
# MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA
# AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l
# eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L
# fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M
# Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a
# tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao
# 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgr33lNN6+NtvjMrY1TNkGYL/L4GvpPeIWOVVtULKtya0wgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3
# d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU
# R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICABlKEOTqm6jJcaMUNTHvnOPwUpEJ46+s
# Fxbl9GNCHP6kA/e6Yw/EHaWLcEhlsgKw5YPGs6DdxFq9fOamullMvhQVU3kbd7ep
# FsicWXYXkefcTthpgM4kpW9q54lln6RuIEDb01STKioCr+KSTQtw74z9F7R0dhdc
# ndJ1Mell4LYJW9HkendAkRL6QBQAxWmuLU1N1jRydD8HBYO2hsb9o2otr/YH5TSH
# jCMVq/57eoghioogkzUrYblJgruJeQLjA/xwrtfIIFJGhc1hxLNtpHUOr64BZN2d
# CzrU89NRFNJhJeSYRVbtC0KA2TC8xm2XW6nDTnxbrAxfTpP74vOFe1pKIb+7O79d
# WiTtZ2WLg5RIc4Szo1X4lzTfc3cGHC2R6HHRTzEfNun2x4txObxKHtkTZmLL9SkY
# FLhSyn5JA5b46axW79u5ooUOpR19ZRVc+diDtl6zcTbFSDghN3x5QjzQ074OgQhD
# z4ILawwgXCxwaq6l5AqYoiTgc+tFqo5zUO2td54QuMngx/A3hnk6LKzS0k87l2ef
# vbNIAOTbvYjBz6QmVJ38/KaRahWjnpBrCBjre61hL8LUr688uxiNDuSmxp5IsWkB
# c5O7Ae7M058D5jVA9eWkEkdZy3BBjQrqLY+v2hFbpx0n2/RMc4EKsE9tEr8ZQgJ+
# MRPgkGPBXih4
# SIG # End signature block
|
combined_dataset/train/non-malicious/1027.ps1 | 1027.ps1 |
$ApplicationPackagePath = "C:\Users\sfuser\documents\visual studio 2017\Projects\Voting\Voting\pkg\Debug"
$ApplicationName = "fabric:/Voting"
$ApplicationTypeName = "VotingType"
$ApplicationTypeVersion = "1.3.0"
$imageStoreConnectionString = "fabric:ImageStore"
$CopyPackageTimeoutSec = 600
$CompressPackage = $false
$oldApplication = Get-ServiceFabricApplication -ApplicationName $ApplicationName
if (!$oldApplication)
{
$errMsg = "Application '$ApplicationName' doesn't exist in cluster."
throw $errMsg
}
else
{
$upgradeStatus = Get-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName
if ($upgradeStatus.UpgradeState -ne "RollingBackCompleted" -and $upgradeStatus.UpgradeState -ne "RollingForwardCompleted" -and $upgradeStatus.UpgradeState -ne "Failed")
{
$errMsg = "An upgrade for the application '$ApplicationTypeName' is already in progress."
throw $errMsg
}
$reg = Get-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $ApplicationTypeVersion }
if ($reg)
{
Write-Host 'Application Type '$ApplicationTypeName' and Version '$ApplicationTypeVersion' was already registered with Cluster, unregistering it...'
$reg | Unregister-ServiceFabricApplicationType -Force
}
$applicationPackagePathInImageStore = $ApplicationTypeName
Write-Host "Copying application package to image store..."
Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $ApplicationPackagePath -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -TimeOutSec $CopyPackageTimeoutSec -CompressPackage:$CompressPackage
if(!$?)
{
throw "Copying of application package to image store failed. Cannot continue with registering the application."
}
Write-Host "Registering application type..."
Register-ServiceFabricApplicationType -ApplicationPathInImageStore $applicationPackagePathInImageStore
if(!$?)
{
throw "Registration of application type failed."
}
Remove-ServiceFabricApplicationPackage -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore
if(!$?)
{
Write-Host "Removing the application package failed."
}
try
{
Write-Host "Start upgrading application..."
Start-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName -ApplicationTypeVersion $ApplicationTypeVersion -HealthCheckStableDurationSec 60 -UpgradeDomainTimeoutSec 1200 -UpgradeTimeout 3000 -FailureAction Rollback -Monitored
}
catch
{
Write-Host ("Error starting upgrade. " + $_)
Write-Host "Unregister application type '$ApplicationTypeName' and version '$ApplicationTypeVersion' ..."
Unregister-ServiceFabricApplicationType -ApplicationTypeName $ApplicationTypeName -ApplicationTypeVersion $ApplicationTypeVersion -Force
throw
}
do
{
Write-Host "Waiting for upgrade..."
Start-Sleep -Seconds 3
$upgradeStatus = Get-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName
} while ($upgradeStatus.UpgradeState -ne "RollingBackCompleted" -and $upgradeStatus.UpgradeState -ne "RollingForwardCompleted" -and $upgradeStatus.UpgradeState -ne "Failed")
if($upgradeStatus.UpgradeState -eq "RollingForwardCompleted")
{
Write-Host "Upgrade completed successfully."
}
elseif($upgradeStatus.UpgradeState -eq "RollingBackCompleted")
{
Write-Error "Upgrade was Rolled back."
}
elseif($upgradeStatus.UpgradeState -eq "Failed")
{
Write-Error "Upgrade Failed."
}
} |
combined_dataset/train/non-malicious/1802.ps1 | 1802.ps1 |
Describe "Control Service cmdlet tests" -Tags "Feature","RequireAdminOnWindows" {
BeforeAll {
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
if ( -not $IsWindows ) {
$PSDefaultParameterValues["it:skip"] = $true
}
}
AfterAll {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
It "StopServiceCommand can be used as API for '<parameter>' with '<value>'" -TestCases @(
@{parameter="Force";value=$true},
@{parameter="Force";value=$false},
@{parameter="NoWait";value=$true},
@{parameter="NoWait";value=$false}
) {
param($parameter, $value)
$stopservicecmd = [Microsoft.PowerShell.Commands.StopServiceCommand]::new()
$stopservicecmd.$parameter = $value
$stopservicecmd.$parameter | Should -Be $value
}
It "RestartServiceCommand can be used as API for '<parameter>' with '<value>'" -TestCases @(
@{parameter="Force";value=$true},
@{parameter="Force";value=$false}
) {
param($parameter, $value)
$restartservicecmd = [Microsoft.PowerShell.Commands.RestartServiceCommand]::new()
$restartservicecmd.$parameter = $value
$restartservicecmd.$parameter | Should -Be $value
}
It "Stop/Start/Restart-Service works" {
$wasStopped = $false
try {
$spooler = Get-Service Spooler
$spooler | Should -Not -BeNullOrEmpty
if ($spooler.Status -ne "Running") {
$wasStopped = $true
$spooler = Start-Service Spooler -PassThru
}
$spooler.Status | Should -BeExactly "Running"
$spooler = Stop-Service Spooler -PassThru
$spooler.Status | Should -BeExactly "Stopped"
(Get-Service Spooler).Status | Should -BeExactly "Stopped"
$spooler = Start-Service Spooler -PassThru
$spooler.Status | Should -BeExactly "Running"
(Get-Service Spooler).Status | Should -BeExactly "Running"
Stop-Service Spooler
(Get-Service Spooler).Status | Should -BeExactly "Stopped"
$spooler = Restart-Service Spooler -PassThru
$spooler.Status | Should -BeExactly "Running"
(Get-Service Spooler).Status | Should -BeExactly "Running"
} finally {
if ($wasStopped) {
Stop-Service Spooler
}
}
}
It "Suspend/Resume-Service works" {
try {
$originalState = "Running"
$serviceName = "WerSvc"
$service = Get-Service $serviceName
if ($service.Status -ne $originalState) {
$originalState = $service.Status
Start-Service $serviceName
}
$service | Should -Not -BeNullOrEmpty
Suspend-Service $serviceName
(Get-Service $serviceName).Status | Should -BeExactly "Paused"
Resume-Service $serviceName
(Get-Service $serviceName).Status | Should -BeExactly "Running"
} finally {
Set-Service $serviceName -Status $originalState
}
}
It "Failure to control service with '<script>'" -TestCases @(
@{script={Stop-Service dcomlaunch -ErrorAction Stop};errorid="ServiceHasDependentServices,Microsoft.PowerShell.Commands.StopServiceCommand"},
@{script={Suspend-Service winrm -ErrorAction Stop};errorid="CouldNotSuspendServiceNotSupported,Microsoft.PowerShell.Commands.SuspendServiceCommand"},
@{script={Resume-Service winrm -ErrorAction Stop};errorid="CouldNotResumeServiceNotSupported,Microsoft.PowerShell.Commands.ResumeServiceCommand"},
@{script={Stop-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.StopServiceCommand"},
@{script={Start-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.StartServiceCommand"},
@{script={Resume-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.ResumeServiceCommand"},
@{script={Suspend-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.SuspendServiceCommand"},
@{script={Restart-Service $(new-guid) -ErrorAction Stop};errorid="NoServiceFoundForGivenName,Microsoft.PowerShell.Commands.RestartServiceCommand"}
) {
param($script,$errorid)
{ & $script } | Should -Throw -ErrorId $errorid
}
}
|
combined_dataset/train/non-malicious/538.ps1 | 538.ps1 |
function Add-SPOUserFieldtoList
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string] $listTitle,
[Parameter(Mandatory=$true, Position=2)]
[string] $fieldName
)
$newField = "<Field Type='UserMulti' DisplayName='$fieldName' Name='$fieldName' StaticName='$fieldName' UserSelectionScope='0' UserSelectionMode='PeopleAndGroups' Sortable='FALSE' Required='FALSE' Mult='FALSE'/>"
Add-SPOField $listTitle $fieldName $newField
}
|
combined_dataset/train/non-malicious/Write-DataTable_3.ps1 | Write-DataTable_3.ps1 | #######################
<#
.SYNOPSIS
Creates a DataTable for an object
.DESCRIPTION
Creates a DataTable based on an objects properties.
.INPUTS
Object
Any object can be piped to Out-DataTable
.OUTPUTS
System.Data.DataTable
.EXAMPLE
$dt = Get-Alias | Out-DataTable
This example creates a DataTable from the properties of Get-Alias and assigns output to $dt variable
.NOTES
Adapted from script by Marc van Orsouw see link
Version History
v1.0 - Chad Miller - Initial Release
v1.1 - Chad Miller - Fixed Issue with Properties
v1.2 - Chad Miller - Added setting column datatype by property as suggested by emp0
v1.3 - Chad Miller - Correct issue with setting datatype on empty properties
.LINK
http://thepowershellguy.com/blogs/posh/archive/2007/01/21/powershell-gui-scripblock-monitor-script.aspx
#>
function Out-DataTable
{
[CmdletBinding()]
param([Parameter(Position=0, Mandatory=$true, ValueFromPipeline = $true)] [PSObject[]]$InputObject)
Begin
{
$dt = new-object Data.datatable
$First = $true
}
Process
{
foreach ($object in $InputObject)
{
$DR = $DT.NewRow()
foreach($property in $object.PsObject.get_properties())
{
if ($first)
{
$Col = new-object Data.DataColumn
$Col.ColumnName = $property.Name.ToString()
if ($property.value)
{ $Col.DataType = $property.value.gettype() }
$DT.Columns.Add($Col)
}
if ($property.IsArray)
{ $DR.Item($property.Name) =$property.value | ConvertTo-XML -AS String -NoTypeInformation -Depth 1 }
else { $DR.Item($property.Name) = $property.value }
}
$DT.Rows.Add($DR)
$First = $false
}
}
End
{
Write-Output @(,($dt))
}
} #Out-DataTable
|
combined_dataset/train/non-malicious/2854.ps1 | 2854.ps1 | function Task {
[CmdletBinding(DefaultParameterSetName = 'Normal')]
param(
[Parameter(Mandatory = $true, Position = 0)]
[string]$name,
[Parameter(Position = 1)]
[scriptblock]$action = $null,
[Parameter(Position = 2)]
[scriptblock]$preaction = $null,
[Parameter(Position = 3)]
[scriptblock]$postaction = $null,
[Parameter(Position = 4)]
[scriptblock]$precondition = {$true},
[Parameter(Position = 5)]
[scriptblock]$postcondition = {$true},
[Parameter(Position = 6)]
[switch]$continueOnError,
[ValidateNotNull()]
[Parameter(Position = 7)]
[string[]]$depends = @(),
[ValidateNotNull()]
[Parameter(Position = 8)]
[string[]]$requiredVariables = @(),
[Parameter(Position = 9)]
[string]$description = $null,
[Parameter(Position = 10)]
[string]$alias = $null,
[parameter(Mandatory = $true, ParameterSetName = 'SharedTask', Position = 11)]
[ValidateNotNullOrEmpty()]
[string]$FromModule,
[Alias('Version')]
[parameter(ParameterSetName = 'SharedTask', Position = 12)]
[string]$requiredVersion,
[parameter(ParameterSetName = 'SharedTask', Position = 13)]
[string]$minimumVersion,
[parameter(ParameterSetName = 'SharedTask', Position = 14)]
[string]$maximumVersion,
[parameter(ParameterSetName = 'SharedTask', Position = 15)]
[string]$lessThanVersion
)
function CreateTask {
@{
Name = $Name
DependsOn = $depends
PreAction = $preaction
Action = $action
PostAction = $postaction
Precondition = $precondition
Postcondition = $postcondition
ContinueOnError = $continueOnError
Description = $description
Duration = [System.TimeSpan]::Zero
RequiredVariables = $requiredVariables
Alias = $alias
Success = $true
ErrorMessage = $null
ErrorDetail = $null
ErrorFormatted = $null
}
}
if ($name -eq 'default') {
Assert (!$action) ($msgs.error_shared_task_cannot_have_action)
}
if ($PSCmdlet.ParameterSetName -eq 'SharedTask') {
Assert (!$action) ($msgs.error_shared_task_cannot_have_action -f $Name, $FromModule)
}
$currentContext = $psake.context.Peek()
if ($PSCmdlet.ParameterSetName -eq 'SharedTask') {
$testModuleParams = @{
minimumVersion = $minimumVersion
maximumVersion = $maximumVersion
lessThanVersion = $lessThanVersion
}
if(![string]::IsNullOrEmpty($requiredVersion)){
$testModuleParams.minimumVersion = $requiredVersion
$testModuleParams.maximumVersion = $requiredVersion
}
if ($taskModule = Get-Module -Name $FromModule) {
$testModuleParams.currentVersion = $taskModule.Version
$taskModule = Where-Object -InputObject $taskModule -FilterScript {Test-ModuleVersion @testModuleParams}
} else {
$getModuleParams = @{
ListAvailable = $true
Name = $FromModule
ErrorAction = 'Ignore'
Verbose = $false
}
$taskModule = Get-Module @getModuleParams |
Where-Object -FilterScript {Test-ModuleVersion -currentVersion $_.Version @testModuleParams} |
Sort-Object -Property Version -Descending |
Select-Object -First 1
}
$referenceTask = CreateTask
Assert (-not $psake.ReferenceTasks.ContainsKey($referenceTask.Name)) ($msgs.error_duplicate_task_name -f $referenceTask.Name)
$referenceTaskKey = $referenceTask.Name.ToLower()
$psake.ReferenceTasks.Add($referenceTaskKey, $referenceTask)
Assert ($null -ne $taskModule) ($msgs.error_unknown_module -f $FromModule)
$psakeFilePath = Join-Path -Path $taskModule.ModuleBase -ChildPath 'psakeFile.ps1'
if (-not $psake.LoadedTaskModules.ContainsKey($psakeFilePath)) {
Write-Debug -Message "Loading tasks from task module [$psakeFilePath]"
. $psakeFilePath
$psake.LoadedTaskModules.Add($psakeFilePath, $null)
}
} else {
$newTask = CreateTask
$taskKey = $newTask.Name.ToLower()
$refTask = $psake.ReferenceTasks[$taskKey]
if ($refTask) {
if ($refTask.PreAction -ne $newTask.PreAction) {
$newTask.PreAction = $refTask.PreAction
}
if ($refTask.PostAction -ne $newTask.PostAction) {
$newTask.PostAction = $refTask.PostAction
}
if ($refTask.PreCondition -ne $newTask.PreCondition) {
$newTask.PreCondition = $refTask.PreCondition
}
if ($refTask.PostCondition -ne $newTask.PostCondition) {
$newTask.PostCondition = $refTask.PostCondition
}
if ($refTask.ContinueOnError) {
$newTask.ContinueOnError = $refTask.ContinueOnError
}
if ($refTask.DependsOn.Count -gt 0 -and (Compare-Object -ReferenceObject $refTask.DependsOn -DifferenceObject $newTask.DependsOn)) {
$newTask.DependsOn = $refTask.DependsOn
}
if ($refTask.RequiredVariables.Count -gt 0 -and (Compare-Object -ReferenceObject.RequiredVariables -DifferenceObject $newTask.RequiredVariables)) {
$newTask.RequiredVariables += $refTask.RequiredVariables
}
}
Assert (-not $currentContext.tasks.ContainsKey($taskKey)) ($msgs.error_duplicate_task_name -f $taskKey)
Write-Debug "Adding task [$taskKey)]"
$currentContext.tasks[$taskKey] = $newTask
if ($alias) {
$aliasKey = $alias.ToLower()
Assert (-not $currentContext.aliases.ContainsKey($aliasKey)) ($msgs.error_duplicate_alias_name -f $alias)
$currentContext.aliases[$aliasKey] = $newTask
}
}
}
|
combined_dataset/train/non-malicious/sample_18_58.ps1 | sample_18_58.ps1 | # --------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All Rights Reserved.
# Microsoft Corporation (or based on where you live, one of its affiliates) licenses this sample code for your internal testing purposes only.
# Microsoft provides the following sample code AS IS without warranty of any kind. The sample code arenot supported under any Microsoft standard support program or services.
# Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose.
# The entire risk arising out of the use or performance of the sample code remains with you.
# In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the code be liable for any damages whatsoever
# (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss)
# arising out of the use of or inability to use the sample code, even if Microsoft has been advised of the possibility of such damages.
# ---------------------------------------------------------------
Import-Module -Name "$PSScriptRoot\..\Common\RoleHelpers.psm1"
Import-Module -Name "$PSScriptRoot\..\..\Common\NetworkHelpers.psm1"
Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1"
Import-Module -Name "$PSScriptRoot\..\..\Common\ClusterHelpers.psm1"
<#
.Synopsis
Function to shut down all provisioning machines from any role context
.Parameter OOBManagementModulePath
A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package.
.Parameter Parameters
This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as
public information of all other roles. It is passed down by the deployment engine.
.Example
Stop-DeployingMachines -Parameters $Parameters
This will shut down all hosts that are in provisioning state
#>
function Stop-DeployingMachines {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[string]
$OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll",
[Parameter(Mandatory=$true)]
[CloudEngine.Configurations.EceInterfaceParameters]
$Parameters
)
# After deployment, the source of this module changes
Import-Module -Name $OOBManagementModulePath
Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll"
# Shut down all machines to avoid IP conflicts
$physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
$bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters
$OEMRole = $Parameters.Roles["OEM"].PublicConfiguration
$OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model
if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name))
{
Trace-Execution "Target to all physical nodes since node list not set in execution context"
[Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node
}
else
{
Trace-Execution "Get node list from execution context"
# Determine whether the context of the operation is a cluster scale out
if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster")
{
$nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name
}
else
{
$nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name
}
[Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name }
}
# If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens
foreach ($node in $provisioningNodes)
{
$bmcIP = $node.BmcIPAddress
$nodeName = $node.Name
$nodeInstance = $node.NodeInstance
$oobProtocol = $node.OOBProtocol
if ($OEMModel -match "Hyper-V")
{
$trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value
if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(',')))
{
Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force
}
Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop
Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force
}
else
{
Trace-Execution "Shut down $nodeName ($bmcIP)."
Stop-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol -Verbose -Wait
}
}
}
<#
.Synopsis
Function to start-up all provisioning machines from any role context
.Parameter OOBManagementModulePath
A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package.
.Parameter Parameters
This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as
public information of all other roles. It is passed down by the deployment engine.
.Example
Start-DeployingMachines -Parameters $Parameters
This will startup all hosts that are in provisioning state
#>
function Start-DeployingMachines {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[string]
$OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll",
[Parameter(Mandatory=$true)]
[CloudEngine.Configurations.EceInterfaceParameters]
$Parameters
)
# After deployment, the source of this module changes
Import-Module -Name $OOBManagementModulePath
Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll"
$physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
$bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters
$OEMRole = $Parameters.Roles["OEM"].PublicConfiguration
$OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model
if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name))
{
Trace-Execution "Target to all physical nodes since node list not set in execution context"
[Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node
}
else
{
Trace-Execution "Get node list from execution context"
# Determine whether the context of the operation is a cluster scale out
if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster")
{
$nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name
}
else
{
$nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name
}
[Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name }
}
# If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens
foreach ($node in $provisioningNodes)
{
$bmcIP = $node.BmcIPAddress
$nodeName = $node.Name
$nodeInstance = $node.NodeInstance
$oobProtocol = $node.OOBProtocol
# TODO: For now this function will not support virtual hosts.
# Due to time constraints and TZL requirements to get
# SED support and clean up in CI, we will comment this
# part of handling Virtual environments. MUST FIX soon.
if ($OEMModel -match "Hyper-V")
{
Trace-Warning "Virtual environments are not supported in this version."
Trace-Warning "This function is FOR NOW only designed to be called for SED cleanup on physical machines"
Trace-Warning "Virtual environments will be handled here with the coming version."
<#
$trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value
if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(',')))
{
Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force
}
Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop
Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force
#>
}
else
{
Trace-Execution "Starting physical node: $nodeName ($bmcIP)."
Start-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $NodeInstance -OOBProtocol $oobProtocol -Verbose -Wait
}
}
}
<#
.Synopsis
Function to add a DHCP MAC-based reservation for a given machine.
.Parameter NetworkName
The network name within the infrastructure network where the IP should be reserved.
.Parameter NodeName
The node name to be associated with the reservation.
.Parameter IPv4Address
An IPv4 Address from the speficied network scope that the node will have reserved.
.Parameter MacAddress
The MAC address to associate with the reservation -- this can be in either dash or dashless format, but not comma format.
.Parameter RemoteDHCPServerName
The remote server that will act as the DHCP server to configure.
.Parameter RemoteDHCPServerNameCredentials
Credentials used to add the reservation only used on a remote computer when specified.
.Example
Add-DeployingMachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -MACAddress '7C-FE-90-AF-1A-00'
This will add a reservation for node foo with MAC 7C-FE-90-AF-1A-00 using the local credentials on the local DHCP server
#>
function Add-DeployingMachineNetworkReservation {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[String]
$NetworkName,
[Parameter(Mandatory=$true)]
[String]
$NodeName,
[Parameter(Mandatory=$true)]
[String]
$IPv4Address,
[Parameter(Mandatory=$true)]
[String]
$MacAddress,
[Parameter(Mandatory=$false)]
[String]
$RemoteDHCPServerName,
[Parameter(Mandatory=$false)]
[PSCredential]
$RemoteDHCPServerNameCredentials
)
$scriptBlock =
{
$scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName }
$reservation = $scope | Get-DhcpServerv4Reservation | Where-Object { $_.ClientId.Replace(':','').Replace('-','') -eq ($using:MacAddress).Replace(':','').Replace('-','') }
foreach ($entry in $reservation)
{
# Always clear existing reservations that apply to this client ID
Remove-DhcpServerv4Reservation -ClientId $entry.ClientId -ScopeId $entry.ScopeId
}
$scope | Add-DhcpServerv4Reservation -Name $using:NodeName -IPAddress $using:IPv4Address -ClientId $using:MacAddress -Description $using:NodeName
}
if ($remoteDHCPServerName)
{
$session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials
}
else
{
$session = New-PSSession
}
try
{
Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address - $MacAddress."
Invoke-Command -Session $session -ScriptBlock $scriptBlock
}
catch
{
Trace-Error "Failed with error: $_"
throw
}
finally
{
Remove-PSSession -Session $session -ErrorAction Ignore
}
}
<#
.Synopsis
Function to add a DHCP MAC-based reservation for a given machine.
.Parameter NetworkName
The network name within the infrastructure network where the IP should be reserved.
.Parameter NodeName
The node name to be associated with the reservation.
.Parameter IPv4Address
An IPv4 Address from the speficied network scope that the node will have reserved.
.Parameter RemoteDHCPServerName
The remote server that will act as the DHCP server to configure.
.Parameter RemoteDHCPServerNameCredentials
Credentials used to add the reservation only used on a remote computer when specified.
.Example
Remove-MachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -RemoteDHCPServerName 'Machine' -RemoteDHCPServerNameCredentials $cred
This will remove a reservation and its leases for node foo with IP address specified
#>
function Remove-MachineNetworkReservation {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[String]
$NetworkName,
[Parameter(Mandatory=$true)]
[String]
$IPv4Address,
[Parameter(Mandatory=$true)]
[String]
$RemoteDHCPServerName,
[Parameter(Mandatory=$true)]
[PSCredential]
$RemoteDHCPServerNameCredentials
)
$scriptBlock =
{
$scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName }
$scope | Get-DhcpServerv4Reservation | Where-Object { $_.IPAddress -eq ($using:IPv4Address) } | Remove-DhcpServerv4Reservation
# Remove the DHCP lease for the machine that is being removed as well
Get-DhcpServerv4Lease -ScopeId $scope.ScopeId | Where-Object { $_.IPAddress -eq $using:IPv4Address } | Remove-DhcpServerv4Lease
}
try
{
$session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials
Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address ."
Invoke-Command -Session $session -ScriptBlock $scriptBlock
}
catch
{
Trace-Error "Failed with error: $_"
throw
}
finally
{
$session | Remove-PSSession -ErrorAction Ignore
}
}
<#
.Synopsis
Function to force a machine to boot in to PXE using BMC controls only.
.Parameter OOBManagementModulePath
A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package.
.Parameter PhysicalNode
Information about the node to start in to PXE.
.Parameter BMCCredential
Credentials used to interact with the BMC controller.
.Example
Start-PXEBoot -NodeName $Name -BmcIPAddress $BmcIPAddress -BMCCredential $cred
This will force the machine to boot in to PXE
#>
function Start-PXEBoot {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[string]
$OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll",
[Parameter(Mandatory=$true)]
[string]
$NodeName,
[Parameter(Mandatory=$true)]
[string]
$BmcIPAddress,
[Parameter(Mandatory=$true)]
[PSCredential]
$BMCCredential,
[Parameter(Mandatory=$true)]
[string]
$NodeInstance,
[Parameter(Mandatory=$true)]
[string]
$OOBProtocol
)
# After deployment, the source of this module changes
Import-Module -Name $OOBManagementModulePath
Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll"
$logText = "Initiate PXE boot for $NodeName (BMC: $BmcIPAddress). `r`n"
$logText += "Shutdown $NodeName (BMC: $BmcIPAddress). `r`n"
# Normally the following line should do nothing, because the machine is expected to have been powered off in an earlier step, unless this is a deployment
# restart, in which case the machine may be running.
$logText += (Stop-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1)
$logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress). `r`n"
# Some machines will set the next boot device correctly only if the machine is currently powered off.
$logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1)
$logText += "`n Start $NodeName (BMC: $BmcIPAddress). `r`n"
$logText += (Start-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1)
$logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n"
# Some machines (Dell R630) will set the next boot device correctly only if the machine is currently powered on and gets power cycled (not reset, but
# specifically power cycled) after the request to set one-time PXE boot.
$logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1)
$logText += "`n Restart $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n"
$logText += (Restart-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1)
$retObj = @{LogText = $logText}
return $retObj
}
<#
.Synopsis
Function to force a machine to reboot out of band from any context that can access BMC.
.Parameter OOBManagementModulePath
A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package.
.Parameter PhysicalNode
Information about the node to restart.
.Parameter BMCCredential
Credentials used to interact with the BMC controller.
.Example
Restart-Node -PhysicalNode $node -BMCCredential $cred
This will force the machine to reboot
#>
function Restart-Node {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[string]
$OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll",
[Parameter(Mandatory=$true)]
[System.Xml.XmlElement]
$PhysicalNode,
[Parameter(Mandatory=$true)]
[PSCredential]
$BMCCredential,
[Parameter(Mandatory=$true)]
[string]
$NodeInstance,
[Parameter(Mandatory=$true)]
[string]
$OOBProtocol
)
# After deployment, the source of this module changes
Import-Module -Name $OOBManagementModulePath
Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll"
$nodeName = $PhysicalNode.Name
$bmcIP = $PhysicalNode.BmcIPAddress
Trace-Execution "Initiate IPMI-based restart for $nodeName (BMC: $bmcIP)."
Restart-IpmiDevice -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose -Wait
}
<#
.Synopsis
Function to get product information of a physical node.
.Parameter OOBManagementModulePath
A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package.
.Parameter PhysicalNode
Information about the node.
.Parameter BMCCredential
Credentials used to interact with the BMC controller.
.Example
Restart-Node -PhysicalNode $node -BMCCredential $cred
#>
function Get-ProductInfo {
[CmdletBinding()]
param (
[Parameter(Mandatory = $false)]
[string]
$OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll",
[Parameter(Mandatory=$true)]
[System.Xml.XmlElement]
$PhysicalMachinesRole,
[Parameter(Mandatory=$true)]
[PSCredential]
$BMCCredential,
[Parameter(Mandatory=$true)]
[string]
$OEMModel
)
# After deployment, the source of this module changes
Import-Module -Name $OOBManagementModulePath
Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll"
if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name))
{
Trace-Execution "Target to all physical nodes since node list not set in execution context"
[Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node
}
else
{
Trace-Execution "Get node list from execution context"
# Determine whether the context of the operation is a cluster scale out
if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster")
{
$nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name
}
else
{
$nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name
}
[Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name }
}
foreach ($node in $provisioningNodes)
{
$bmcIP = $node.BmcIPAddress
$nodeName = $node.Name
$nodeInstance = $node.NodeInstance
$oobProtocol = $node.OOBProtocol
try
{
Trace-Execution "Initiate IPMI-based cmd to get Fru log for $nodeName (BMC: $bmcIP)."
$fru = Get-IpmiDeviceFruLogs -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol
if ($fru)
{
return @{"Model" = $fru.ProductInfo.ProductName
"Vendor" = $fru.ProductInfo.ManufacturerName
"Serial" = $fru.ProductInfo.SerialNumber
}
}
}
catch
{
Trace-Execution "Fail to Get-IpmiDeviceFruLogs for $nodeName (BMC: $bmcIP): $_"
}
}
return $null
}
<#
.Synopsis
Function to wait for ping, CIM, recent OS installation (with a deployment artifact) and WinRM to be available on a machine
.Parameter StartTime
The start time of the operation, used to check that OS boot time was strictly after the wait period.
.Parameter StopTime
The stop time for the wait operation after which the operation is considered failed.
.Parameter PhysicalNodeArray
A list of physical machine nodes to wait.
.Parameter RemoteCIMCredential
The credential to use to connect to CIM and WinRM.
.Parameter DeploymentID
A unique identifier meant to signify the deployment that the machine is associated with.
.Parameter IgnoreOldOSCheckResult
Whether to consider it a failure if the OS discovered on the machine is from before the waiting period began.
#>
function Wait-RemoteCimInitializedOneNodeBareMetal {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[DateTime]
$StartTime,
[Parameter(Mandatory=$true)]
[DateTime]
$StopTime,
[Parameter(Mandatory=$true)]
[System.Xml.XmlElement[]]
$PhysicalNodeArray,
[Parameter(Mandatory=$true)]
[PSCredential]
$RemoteCIMCredential,
[Parameter(Mandatory=$true)]
[Guid]
$DeploymentID,
[Parameter(Mandatory=$true)]
[bool]
$IgnoreOldOSCheckResults
)
$ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop
$remainingNodes = $PhysicalNodeArray
$failedNodeNames = @()
do {
$nodes = $remainingNodes
foreach ($node in $nodes)
{
$nodeName = $node.Name
$nodeIP = $node.IPv4Address
# Default to HostNIC if we cant find any IPv4Addresses
if (-not $nodeIP)
{
$hostNICNetworkName = Get-NetworkNameForCluster -ClusterName "s-cluster" -NetworkName "HostNIC"
$nodeIP = ($node.NICs.NIC | Where-Object NetworkId -eq $hostNICNetworkName | ForEach-Object IPv4Address)[0].Split('/')[0]
}
if (Test-IPConnection $nodeIP)
{
$cimSession = $null
$session = $null
try
{
$errorCountBefore = $global:error.Count
#try the node name first because in some scenario IP is not trusted
$cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue
if ($null -eq $cimSession)
{
$cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue
}
$os = $null
if ($cimSession)
{
$os = Get-CimInstance win32_operatingsystem -CimSession $cimSession -ErrorAction SilentlyContinue
}
$errorCountAfter = $global:error.Count
$numberOfNewErrors = $errorCountAfter - $errorCountBefore
if ($numberOfNewErrors -gt 0)
{
$global:error.RemoveRange(0, $numberOfNewErrors)
}
if ($os)
{
$osLastBootUpTime = $os.LastBootUpTime
$osInstallTime = $os.InstallDate
#try the node name first because in some scenario IP is not trusted
$session = New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue
if ($null -eq $session)
{
$session = New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue
}
}
else
{
Trace-Execution "$nodeName could not query an OS."
}
}
catch
{
if ($session)
{
Trace-Execution "Caught exception after session to new OS was created: $_"
Remove-PSSession $session -ErrorAction SilentlyContinue
$session = $null
}
$global:error.RemoveAt(0)
}
if ($session)
{
$isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" }
if ($isNewDeployment)
{
Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())."
$failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName
}
else
{
Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())."
if (-not $IgnoreOldOSCheckResult)
{
$failedNodeNames += $nodeName
}
}
$remainingNodes = $remainingNodes | Where-Object Name -ne $node.Name
}
elseif ($cimSession)
{
Remove-CimSession $cimSession
}
else
{
Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name."
}
}
else
{
Trace-Execution "$nodeName did not respond to ping with IP $nodeIP ."
}
}
if (-not $remainingNodes) { break }
Start-Sleep -Seconds 15
} until ([DateTime]::Now -gt $StopTime)
$remainingNodeNames = @($remainingNodes | ForEach-Object Name)
$totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes
if ($failedNodeNames -or $remainingNodeNames)
{
Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $(($failedNodeNames + $remainingNodeNames) -join ',')."
}
else
{
Trace-Execution "Bare metal deployment has completed on the target node."
}
}
function Wait-ForISOImageBareMetal {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[DateTime]
$StartTime,
[Parameter(Mandatory=$true)]
[DateTime]
$StopTime,
[Parameter(Mandatory=$true)]
[Array]
$PhysicalNodeArray,
[Parameter(Mandatory=$true)]
[PSCredential]
$RemoteCIMCredential,
[Parameter(Mandatory=$true)]
[Guid]
$DeploymentID,
[Parameter(Mandatory=$true)]
[bool]
$IgnoreOldOSCheckResults
)
$ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop
[Array]$remainingNodes = $PhysicalNodeArray | Sort-Object Name
$failedNodeNames = @()
$wait = $true
while ($wait)
{
if ([DateTime]::Now -lt $StopTime)
{
foreach ($node in $remainingNodes)
{
$nodeName = $node.Name
$nodeIP = $node.IPv4Address
if (Test-IPConnection $nodeIP)
{
Trace-Execution "$nodeName is responding to ping"
$cimSession = $null
$session = $null
try
{
$errorCountBefore = $global:error.Count
# Try the node name first because in some scenario IP is not trusted
$cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue
if ($null -eq $cimSession)
{
$cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue
}
$os = $null
if ($null -ne $cimSession)
{
Trace-Execution "$nodeName CIM was session created - getting Win32_OperatingSystem data"
$os = Get-CimInstance Win32_OperatingSystem -CimSession $cimSession -ErrorAction SilentlyContinue
}
$errorCountAfter = $global:error.Count
$numberOfNewErrors = $errorCountAfter - $errorCountBefore
if ($numberOfNewErrors -gt 0)
{
$global:error.RemoveRange(0, $numberOfNewErrors)
}
if ($null -ne $os)
{
$osLastBootUpTime = $os.LastBootUpTime
$osInstallTime = $os.InstallDate
Trace-Execution "$nodeName attempting to create PS session as '$($RemoteCIMCredential.UserName)'"
# Try the node name first because in some scenario IP is not trusted
try
{
$session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential
if ($null -eq $session)
{
$session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential
}
}
catch
{
Trace-Execution "$nodeName failed to created PS session with error: $($PSItem.Exception.Message)"
}
}
else
{
Trace-Execution "$nodeName could not query Win32_OperatingSystem"
}
}
catch
{
if ($null -ne $session)
{
Trace-Execution "Caught exception after session to new OS was created: $($PSItem.Exception.Message)"
Remove-PSSession $session -ErrorAction SilentlyContinue
$session = $null
}
$global:error.RemoveAt(0)
}
if ($null -ne $session)
{
Trace-Execution "$nodeName PS session was created - looking for $DeploymentID.txt file on this node"
Trace-Execution "Waiting for 5 min after successful network connection so that setupcomplete can converge on the physical machine."
Start-Sleep -Seconds 300
$isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path -Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" }
if ($true -eq $isNewDeployment)
{
Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())"
$failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName
}
else
{
Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())"
if (-not $IgnoreOldOSCheckResult)
{
$failedNodeNames += $nodeName
}
}
Trace-Execution "$nodeName has completed bare metal deployment"
$remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName
}
else
{
Trace-Execution "$nodeName could not establish Powershell session using IP $nodeIP or name"
Trace-Execution "$nodeName attempt to map network drive to C`$"
try
{
$fileFound = $false
$netShare = New-PSDrive -Name $nodeName -PSProvider FileSystem -Root "\\$nodeName\C`$" -Credential $RemoteCIMCredential
if ($null -ne $netShare)
{
$fileFound = Test-Path -Path "$($nodeName):\CloudBuilderTemp\$($DeploymentID).txt"
}
}
catch
{
Trace-Execution "$nodeName failed to map network drive with error: $($PSItem.Exception.Message)"
}
if ($true -eq $fileFound)
{
Trace-Execution "$nodeName has completed bare metal deployment"
$remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName
}
}
if ($null -ne $cimSession)
{
Remove-CimSession $cimSession
}
else
{
Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name"
}
if ($null -ne $netShare)
{
Remove-PSDrive -Name $nodeName -ErrorAction SilentlyContinue
$netShare = $null
}
}
else
{
Trace-Execution "$nodeName did not respond to ping with IP $nodeIP"
}
}
if ($remainingNodes.Count -eq 0)
{
Trace-Execution "All nodes have completed bare metal deployment"
$wait = $false
}
else
{
Trace-Execution "Still waiting for $($remainingNodes.Count) node(s) to complete"
Start-Sleep -Seconds 60
}
}
else
{
Trace-Execution "Timed out waiting for all nodes to complete bare metal deployment"
Trace-Execution "$($remainingNodes.Count) node(s) did not respond in time"
$wait = $false
}
}
if ($remainingNodes.Count -eq 0)
{
$remainingNodeNames = @()
}
else
{
$remainingNodeNames = @($remainingNodes | ForEach-Object Name)
}
$totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes
if (($failedNodeNames.Count + $remainingNodeNames.Count) -gt 0)
{
[string]$badNodes = ($failedNodeNames + $remainingNodeNames) -join ','
Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $badNodes."
}
else
{
Trace-Execution "Bare metal deployment has completed on the target nodes."
}
}
<#
.SYNOPSIS
While a host is being restarted and brought back online, this function is used to select a different host on the same cluster
to perform remote PowerShell operations on.
#>
function Get-HostNameForRemoting {
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true)]
[CloudEngine.Configurations.EceInterfaceParameters]
$Parameters,
[Parameter(Mandatory=$true)]
[string]
$HostBeingRebooted
)
$ErrorActionPreference = "Stop"
$clusterName = Get-NodeRefClusterId -Parameters $Parameters -RoleName "BareMetal" -NodeName $HostBeingRebooted
$availableHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName
$availableHosts = $availableHosts | Where-Object { $_ -ne $HostBeingRebooted }
if ($availableHosts.Count -eq 0)
{
Trace-Error "There are no available hosts on which to perform remote operations."
}
else
{
Trace-Execution "Selected host $($availableHosts[0])."
return $availableHosts[0]
}
}
<#
.SYNOPSIS
This function is used to do cluster aware update based on different Cau Plugins.
#>
function Invoke-CauRunHelper {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[System.Collections.Hashtable]
$cauParams
)
$ErrorActionPreference = "Stop"
Trace-Execution "Start invoke caurun"
Invoke-CauRun @cauParams
}
Export-ModuleMember -Function Start-PXEBoot
Export-ModuleMember -Function Restart-Node
Export-ModuleMember -Function Stop-DeployingMachines
Export-ModuleMember -Function Start-DeployingMachines
Export-ModuleMember -Function Add-DeployingMachineNetworkReservation
Export-ModuleMember -Function Remove-MachineNetworkReservation
Export-ModuleMember -Function Wait-RemoteCimInitializedOneNodeBareMetal
Export-ModuleMember -Function Wait-ForISOImageBareMetal
Export-ModuleMember -Function Get-HostNameForRemoting
Export-ModuleMember -Function Get-ProductInfo
Export-ModuleMember -Function Invoke-CauRunHelper
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD0NXoJNEboxNGW
# ZU2YnPu9GkeV561/p/S/GGxHF9S7X6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDyDubBbNjKcac35c9njzJLp
# b+TlCMDwT8eiEKZZxaAfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAL4Q/EI37VVze5XAlmCPbW9a+rk4jnEtEAgGKV422SiZiU7+5eWPoX8UJ
# KXYm3DAcmYV8mZxeP1d1UV3lf1vvvMaFA75bCNFVNSJaSpSf5UO+f8AOu8wmUJmV
# fnx8+U8ua+7qTSj2dJ7xEU1CgFr5j7fzic6PDEu7RCWwzB7vLA3E8TL/dBR+Foqe
# 11XYUUmCHIhSmw+UT7ZSh0HbI25WhCO0SSlpYLsJpR+04dObMxz8AArb1Kchse3R
# eqHfSNc6kP5lLHPC062/YEtxnugfyqWmK9vDEAfKVgDDFJdXQrt3m1K6+JtJ85YO
# GO3xEjx7QnnSEH388xvzJ0JAvFcWaaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBxO3IjOswz9C+0CFqg3gELpqj27VtoQ3ZeHJp5KaRkSwIGZbwS80Vj
# GBMyMDI0MDIxMjE0MDUyNy45NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy
# MloYDzIwMjQwMjEzMDk1MTIyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGia
# AgEAMAoCAQACAiQnAgH/MAcCAQACAhNpMAoCBQDpdboaAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAHhDZT8ty0+HTaXE1QfKEhJH/rvJzWEO4nHtcHJIH8yq
# k0objav8hh+sDUiNDqhoN+F+mA+2mpGuR3E0YvquPCG+T/EdDAOiXEjZ0cQhSNYJ
# w2MnVzd0PXYYSpICmGfYW2uHiVfG8juh7Mbk2dNQtq1PXM9ELZihLw0vis6sxXLy
# CebMHHwx/2j/s27g2kEN9BLs+Ih8v5HTno3kZMsGmqB+HX3G78m7y/FCJ8Z0+fbr
# tWnsIF71r8O3t/M7eX6HlekXNNAu2MdxOlGHKirfwsJ80Atfl9wcHkVbpfi4dffm
# bZ381cZNMRaMTKymjgs7CJhj2Y3lVr/2Tw8LKfMJZCExggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDRgpNWMZsJSxP+H/Z6VMgvKWujJKEo9RPoOwrg76OR
# fTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg3D/byHCyRT6F6OS8ZCWcS+7X
# bbnGEcjZ7MC8fdRvYZYwDQYJKoZIhvcNAQELBQAEggIAqaEuHZdXm8uHL1hKu/vA
# Q0necChJAP9/6ZkVQCLtxGraT8ncFSaOkrYNT3QIsB07LGiSmAePhGh6S8Ms4T55
# E7E7v3XQoK/poDIbP2oUZsemkT5iuVky0kIf6ZPLhiezMN5gaWaVXJkVeHlW88rl
# QjX+5Fk4MQuyYzvGlUfes4rr9U/BDs4dFA7gpF6pf8U+PbkBcRrjPeJoS5NS76Qo
# 0oQ/MpaJg8AT8JKlx9si2FGTgLirivgWp1/bWuzUoewAxGvVxdLbaTdVrECGgRSM
# RKNLymbC+lpYk9GTV3HNd5ELBTgKgYeLQ8bNHFd02nuI4XE4qlTpqdoFCGYEyYtn
# Wa3vdMeE6yhDoYcf+ct7rzlNvD9WziZEgnkmYz+COfCMAXPkjL3GCEHqLZbm3l6I
# STk9NzIyP7VY3pwifcQ9QiHWaWOF3u1i94RmanxqACgwJvO3lugB41c1WVZF8qpV
# MINscEK7XPEJc8mCM6xp5DhFO9l1G8HqKUYzKrtSBfsii53t0enk0ekw3Kin9Zvu
# VGOVfNnVvuxSCBg/Yaj+Al3NijuoE3nsIgQ4psYJGrn6h4Z7MOhVq9+LjM/vLIX5
# gWIR+WBu+mDr94sDjGeeOqd/s6wbpasnw2/5WkR2vmEd1DXkxwD+ELfxbV+u78+E
# J5BD8ycBuFM/NwcDNKye4E0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_37.ps1 | sample_48_37.ps1 | # Localized 05/11/2024 04:06 AM (GMT) 303:7.2.30118 CL_LocalizationData.psd1
ConvertFrom-StringData @'
###PSLOC
Troubleshoot_Title=Troubleshooting
Troubleshoot_DetectDVDDevice=Checking DVD device ...
Troubleshoot_DetectDVDvideoDecoder=Checking video decoder for DVD playback ...
Troubleshoot_DetectDVDAudioDecoder=Checking audio decoder for DVD playback ...
Resolution_Title=Resolution
CDRomDeviceName=Name
PnPDeviceID=ID
Status=Status
Report_Name_CDRomDeviceInformation=DVD/CD-ROM drives
Report_Description_CDRomDeviceInformation=Information for DVD/CD-ROM drives
###PSLOC
'@
|
combined_dataset/train/non-malicious/Get-DomainPasswordPolicy.ps1 | Get-DomainPasswordPolicy.ps1 | function Get-DomainPasswordPolicy
{
$domain = [ADSI]"WinNT://$env:userdomain"
$Name = @{Name="DomainName";Expression={$_.Name}}
$MinPassLen = @{Name="Minimum Password Length (Chars)";Expression={$_.MinPasswordLength}}
$MinPassAge = @{Name="Minimum Password Age (Days)";Expression={$_.MinPasswordAge.value/86400}}
$MaxPassAge = @{Name="Maximum Password Age (Days)";Expression={$_.MaxPasswordAge.value/86400}}
$PassHistory = @{Name="Enforce Password History (Passwords remembered)";Expression={$_.PasswordHistoryLength}}
$AcctLockoutThreshold = @{Name="Account Lockout Threshold (Invalid logon attempts)";Expression={$_.MaxBadPasswordsAllowed}}
$AcctLockoutDuration = @{Name="Account Lockout Duration (Minutes)";Expression={if ($_.AutoUnlockInterval.value -eq -1) {'Account is locked out until administrator unlocks it.'} else {$_.AutoUnlockInterval.value/60}}}
$ResetAcctLockoutCounter = @{Name="Reset Account Lockout Counter After (Minutes)";Expression={$_.LockoutObservationInterval.value/60}}
$domain | Select-Object $Name,$MinPassLen,$MinPassAge,$MaxPassAge,$PassHistory,$AcctLockoutThreshold,$AcctLockoutDuration,$ResetAcctLockoutCounter
}
|
combined_dataset/train/non-malicious/1309.ps1 | 1309.ps1 |
function Get-CPathProvider
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$Path
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$pathQualifier = Split-Path -Qualifier $Path -ErrorAction SilentlyContinue
if( -not $pathQualifier )
{
$Path = Join-Path -Path (Get-Location) -ChildPath $Path
$pathQualifier = Split-Path -Qualifier $Path -ErrorAction SilentlyContinue
if( -not $pathQualifier )
{
Write-Error "Qualifier for path '$Path' not found."
return
}
}
$pathQualifier = $pathQualifier.Trim(':')
$drive = Get-PSDrive -Name $pathQualifier -ErrorAction Ignore
if( -not $drive )
{
$drive = Get-PSDrive -PSProvider $pathQualifier -ErrorAction Ignore
}
if( -not $drive )
{
Write-Error -Message ('Unable to determine the provider for path {0}.' -f $Path)
return
}
$drive |
Select-Object -First 1 |
Select-Object -ExpandProperty 'Provider'
}
|
combined_dataset/train/non-malicious/sample_38_28.ps1 | sample_38_28.ps1 | #
# Module manifest for module 'OCI.PSModules.Datascience'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datascience.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e310e88b-80a4-4419-8054-2984936bf580'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datascience Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datascience.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIDatascienceModel',
'Enable-OCIDatascienceModelDeployment',
'Enable-OCIDatascienceNotebookSession',
'Export-OCIDatascienceModelArtifact',
'Get-OCIDatascienceFastLaunchJobConfigsList',
'Get-OCIDatascienceJob', 'Get-OCIDatascienceJobArtifactContent',
'Get-OCIDatascienceJobRun', 'Get-OCIDatascienceJobRunsList',
'Get-OCIDatascienceJobShapesList', 'Get-OCIDatascienceJobsList',
'Get-OCIDatascienceModel', 'Get-OCIDatascienceModelArtifactContent',
'Get-OCIDatascienceModelDeployment',
'Get-OCIDatascienceModelDeploymentShapesList',
'Get-OCIDatascienceModelDeploymentsList',
'Get-OCIDatascienceModelProvenance', 'Get-OCIDatascienceModelsList',
'Get-OCIDatascienceModelVersionSet',
'Get-OCIDatascienceModelVersionSetsList',
'Get-OCIDatascienceNotebookSession',
'Get-OCIDatascienceNotebookSessionShapesList',
'Get-OCIDatascienceNotebookSessionsList',
'Get-OCIDatasciencePipeline', 'Get-OCIDatasciencePipelineRun',
'Get-OCIDatasciencePipelineRunsList',
'Get-OCIDatasciencePipelinesList',
'Get-OCIDatasciencePrivateEndpoint',
'Get-OCIDatasciencePrivateEndpointsList',
'Get-OCIDatascienceProject', 'Get-OCIDatascienceProjectsList',
'Get-OCIDatascienceStepArtifactContent',
'Get-OCIDatascienceWorkRequest',
'Get-OCIDatascienceWorkRequestErrorsList',
'Get-OCIDatascienceWorkRequestLogsList',
'Get-OCIDatascienceWorkRequestsList',
'Import-OCIDatascienceModelArtifact',
'Invoke-OCIDatascienceDeactivateModel',
'Invoke-OCIDatascienceDeactivateModelDeployment',
'Invoke-OCIDatascienceDeactivateNotebookSession',
'Invoke-OCIDatascienceHeadJobArtifact',
'Invoke-OCIDatascienceHeadModelArtifact',
'Invoke-OCIDatascienceHeadStepArtifact',
'Move-OCIDatascienceJobCompartment',
'Move-OCIDatascienceJobRunCompartment',
'Move-OCIDatascienceModelCompartment',
'Move-OCIDatascienceModelDeploymentCompartment',
'Move-OCIDatascienceModelVersionSetCompartment',
'Move-OCIDatascienceNotebookSessionCompartment',
'Move-OCIDatasciencePipelineCompartment',
'Move-OCIDatasciencePipelineRunCompartment',
'Move-OCIDatasciencePrivateEndpointCompartment',
'Move-OCIDatascienceProjectCompartment', 'New-OCIDatascienceJob',
'New-OCIDatascienceJobArtifact', 'New-OCIDatascienceJobRun',
'New-OCIDatascienceModel', 'New-OCIDatascienceModelArtifact',
'New-OCIDatascienceModelDeployment',
'New-OCIDatascienceModelProvenance',
'New-OCIDatascienceModelVersionSet',
'New-OCIDatascienceNotebookSession', 'New-OCIDatasciencePipeline',
'New-OCIDatasciencePipelineRun',
'New-OCIDatasciencePrivateEndpoint', 'New-OCIDatascienceProject',
'New-OCIDatascienceStepArtifact', 'Remove-OCIDatascienceJob',
'Remove-OCIDatascienceJobRun', 'Remove-OCIDatascienceModel',
'Remove-OCIDatascienceModelDeployment',
'Remove-OCIDatascienceModelVersionSet',
'Remove-OCIDatascienceNotebookSession',
'Remove-OCIDatasciencePipeline', 'Remove-OCIDatasciencePipelineRun',
'Remove-OCIDatasciencePrivateEndpoint',
'Remove-OCIDatascienceProject', 'Stop-OCIDatascienceJobRun',
'Stop-OCIDatasciencePipelineRun', 'Stop-OCIDatascienceWorkRequest',
'Update-OCIDatascienceJob', 'Update-OCIDatascienceJobRun',
'Update-OCIDatascienceModel',
'Update-OCIDatascienceModelDeployment',
'Update-OCIDatascienceModelProvenance',
'Update-OCIDatascienceModelVersionSet',
'Update-OCIDatascienceNotebookSession',
'Update-OCIDatasciencePipeline', 'Update-OCIDatasciencePipelineRun',
'Update-OCIDatasciencePrivateEndpoint',
'Update-OCIDatascienceProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datascience'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Custom Accelerators CTP3.ps1 | Custom Accelerators CTP3.ps1 | #requires -version 2.0
## Custom Accelerators for PowerShell 2 (CTP3)
####################################################################################################
## A script module for CTP3 which allows the user to create their own custom type accelerators.
## Thanks to "Oisin Grehan for the discovery":http://www.nivot.org/2008/12/25/ListOfTypeAcceleratorsForPowerShellCTP3.aspx.
####################################################################################################
## Revision History
## v1.0 - Modularization, by Joel 'Jaykul' Bennett
####################################################################################################
# get a reference to the Type
$xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators")
function Add-Accelerator {
<#
.Synopsis
Add a type accelerator to the current session
.Description
The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]).
.Example
Add-Accelerator list [System.Collections.Generic.List``1]
$list = New-Object list[string]
Creates an accelerator for the generic List[T] collection type, and then creates a list of strings.
.Example
Add-Accelerator list, glist [System.Collections.Generic.List``1]
Creates two accelerators for the generic List[T] collection type.
.Parameter Accelerator
The short form accelerator should be just the name you want to use (without square brackets).
.Parameter Type
The type you want the accelerator to accelerate.
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accel string, regex".
Also see the help for Get-Accelerator and Remove-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding()]
PARAM(
[Parameter(Position=0)]
[string[]]$Accelerator
,
[Parameter(Position=1)]
[type]$Type
)
PROCESS {
# add a user-defined accelerator
foreach($a in $Accelerator) { $xlr8r::Add( $a, $Type) }
}
}
function Get-Accelerator {
<#
.Synopsis
Get one or more type accelerator definitions
.Description
The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type
.Example
Get-Accelerator string
Returns the KeyValue pair for the accelerator definition(s)
.Example
Get-Accelerator ps*,wmi*
Returns the KeyValue pair for the matching accelerator definitions
.Parameter Accelerator
One or more short form accelerators to search for
Accepts Wildcards.
.Parameter Type
One or more types to search for.
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accel string, regex".
Also see the help for Add-Accelerator and Remove-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding(DefaultParameterSetName="ByType")]
PARAM(
[Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Key")]
[string[]]$Accelerator
,
[Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Value")]
[type[]]$Type
)
PROCESS {
# add a user-defined accelerator
switch($PSCmdlet.ParameterSetName) {
"ByAccelerator" {
$xlr8r::get.GetEnumerator() | % {
foreach($a in $Accelerator) {
if($_.Key -like $a) { $_ }
}
}
break
}
"ByType" {
if($Type -and $Type.Count) {
$xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value }
}
else {
$xlr8r::get.GetEnumerator() | %{ $_ }
}
break
}
}
}
}
function Remove-Accelerator {
<#
.Synopsis
Remove a type accelerator from the current session
.Description
The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators.
.Example
Remove-Accelerator int
Add-Accelerator int [Int64]
Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works:
So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64"
.Example
Get-Accelerator System.Single | Remove-Accelerator
Removes both of the default accelerators for System.Single: [float] and [single]
.Example
Get-Accelerator System.Single | Remove-Accelerator -WhatIf
Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print:
What if: Removes the alias [float] for type [System.Single]
What if: Removes the alias [single] for type [System.Single]
.Parameter Accelerator
The short form accelerator should be just the name you want to use (without square brackets).
.Parameter Type
The type you want the accelerator to accelerate.
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accel string, regex".
Also see the help for Add-Accelerator and Get-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding(SupportsShouldProcess=$true)]
PARAM(
[Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Key")]
[string[]]$Accelerator
)
PROCESS {
$xlr8r::get.GetEnumerator() | % {
foreach($a in $Accelerator) {
if($_.Key -like $a) {
if($PSCmdlet.ShouldProcess( "Removes the alias [$($_.Key)] for type [$($_.Value.FullName)]",
"Removing alias [$($_.Key)] for type [$($_.Value.FullName)]?",
"Remove Alias" )) {
# remove a user-defined accelerator
$xlr8r::remove($_.Key)
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/2199.ps1 | 2199.ps1 | [CmdletBinding()]
param(
[parameter(Mandatory=$true)]
[string]$SiteServer,
[parameter(Mandatory=$true)]
[string]$SiteCode
)
function Load-Form {
$Form.Controls.AddRange(@($SBStatus, $CBAuto, $CBManual, $DGVAuto, $DGVManual, $ButtonStart, $ButtonClear, $ButtonAuto, $ButtonManual, $RTBInput, $OutputBox, $GBOutputBox, $GBInput, $GBAuto, $GBManual))
$ButtonAuto.Enabled = $false
$ButtonManual.Enabled = $false
$Form.Add_Shown({Get-CMCollections})
$Form.Add_Shown({
$Form.Activate()
$RTBInput.Select()
})
[void]$Form.ShowDialog()
}
function Write-OutputBox {
param(
[parameter(Mandatory=$true)]
[string]$OutputBoxMessage,
[ValidateSet("WARNING: ","ERROR: ","INFO: ")]
[string]$Type,
[switch]$NoNewLine
)
Process {
$DateTime = (Get-Date).ToLongTimeString()
if ($NoNewLine -eq $true) {
if ($OutputBox.Text.Length -eq 0) {
$OutputBox.Text = "$($OutputBoxMessage)"
[System.Windows.Forms.Application]::DoEvents()
$OutputBox.SelectionStart = $OutputBox.Text.Length
$OutputBox.ScrollToCaret()
}
else {
$OutputBox.AppendText("$($OutputBoxMessage)")
[System.Windows.Forms.Application]::DoEvents()
$OutputBox.SelectionStart = $OutputBox.Text.Length
$OutputBox.ScrollToCaret()
}
}
else {
if ($OutputBox.Text.Length -eq 0) {
$OutputBox.Text = "$($DateTime) $($Type)$($OutputBoxMessage)"
[System.Windows.Forms.Application]::DoEvents()
$OutputBox.SelectionStart = $OutputBox.Text.Length
$OutputBox.ScrollToCaret()
}
else {
$OutputBox.AppendText("`n$($DateTime) $($Type)$($OutputBoxMessage)")
[System.Windows.Forms.Application]::DoEvents()
$OutputBox.SelectionStart = $OutputBox.Text.Length
$OutputBox.ScrollToCaret()
}
}
}
}
function Get-CMCollections {
$Collections = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '%- Scheduled' OR Name like '%- Manual' OR Name like '%- Run now'"
$SortedCollections = $Collections | Sort-Object -Property Name
Write-OutputBox -OutputBoxMessage "Processing available collections" -Type "INFO: "
$ButtonStart.Enabled = $false
foreach ($Collection in $SortedCollections) {
$CBAuto.Items.Add($Collection.Name)
$CBManual.Items.Add($Collection.Name)
}
$ButtonStart.Enabled = $true
$CollectionCount = ($Collections | Measure-Object).Count
Write-OutputBox -OutputBoxMessage "Processed $($CollectionCount) collections" -Type "INFO: "
}
function Get-CMDeviceCollectionMembership {
param(
[parameter(Mandatory=$true)]
[string]$ResourceID
)
$GetDeviceCollectionMembership = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_FullCollectionMembership -ComputerName $SiteServer -Filter "ResourceID='$($ResourceID)' AND (CollectionID='GT000049' OR CollectionID='GT00002D')"
if ($GetDeviceCollectionMembership -ne $null) {
if ($GetDeviceCollectionMembership.CollectionID -like "GT000049") {
if ($ButtonAuto.Enabled -eq $false) {
$ButtonAuto.Enabled = $true
}
$DGVAuto.Rows.Add($GetDeviceCollectionMembership.Name)
}
if ($GetDeviceCollectionMembership.CollectionID -like "GT00002D") {
if ($ButtonManual.Enabled -eq $false) {
$ButtonManual.Enabled = $true
}
$DGVManual.Rows.Add($GetDeviceCollectionMembership.Name)
}
}
}
function Get-CMDevice {
param(
[parameter(Mandatory=$true)]
[string]$DeviceName,
[parameter(Mandatory=$true)]
[int]$Count,
[parameter(Mandatory=$true)]
[int]$TotalCount
)
$GetDevice = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_R_System -ComputerName $SiteServer -Filter "Name='$($DeviceName)'"
if ($GetDevice -ne $null) {
if ($GetDevice.Obsolete -eq 0) {
Write-OutputBox -OutputBoxMessage "Found device: $($GetDevice.Name)" -Type "INFO: "
$SBPProcessingCount.Text = "Processing device $($Count) of $($TotalCount)"
Get-CMDeviceCollectionMembership -ResourceID $GetDevice.ResourceID
}
}
else {
Write-OutputBox -OutputBoxMessage "Not found: $($DeviceName)" -Type "WARNING: "
}
}
function Add-DirectMembership {
param(
[parameter(Mandatory=$true)]
[string]$DeviceName,
[parameter(Mandatory=$true)]
[string]$CollectionName
)
if ((Get-DeviceMembership -DeviceName $DeviceName -CollectionName $CollectionName) -eq $false) {
$ResourceID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_R_System -ComputerName $SiteServer -Filter "Name='$($DeviceName)'" | Select-Object -ExpandProperty ResourceID
$CollectionQuery = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name='$($CollectionName)'"
$NewRule = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_CollectionRuleDirect").CreateInstance()
$NewRule.ResourceClassName = "SMS_R_SYSTEM"
$NewRule.ResourceID = $ResourceID
$NewRule.Rulename = $DeviceName
$CollectionQuery.AddMemberShipRule($NewRule) | Out-Null
if ($Error[0]) {
$Global:ProcessedError++
Write-OutputBox -OutputBoxMessage "Error adding $($DeviceName) to '$($CollectionName)'" -Type "ERROR: "
}
else {
$Global:ProcessedSuccess++
Write-OutputBox -OutputBoxMessage "Successfully added $($DeviceName) to '$($CollectionName)'" -Type "INFO: "
}
}
else {
$Global:ProcessedWarning++
Write-OutputBox -OutputBoxMessage "$($DeviceName) is already a member of '$($CollectionName)'" -Type "WARNING: "
}
}
function Get-DeviceMembership {
param(
[parameter(Mandatory=$true)]
[string]$DeviceName,
[parameter(Mandatory=$true)]
[string]$CollectionName
)
$CollectionID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name='$($CollectionName)'" | Select-Object -ExpandProperty CollectionID
$DeviceCollectionMembershipQuery = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_FullCollectionMembership -ComputerName $SiteServer -Filter "Name='$($DeviceName)' AND CollectionID='$($CollectionID)'" -ErrorAction SilentlyContinue
if ($DeviceCollectionMembershipQuery) {
return $true
}
else {
return $false
}
}
function Start-AddDeviceToCollection {
param(
[parameter(Mandatory=$true)]
[string]$CollectionName,
[parameter(Mandatory=$true)]
[ValidateSet("Auto","Manual")]
[string]$Type
)
if ($Type -like "Auto") {
for ($RowCount = 0; $RowCount -lt $DGVAuto.RowCount; $RowCount++) {
$ButtonAuto.Enabled = $false
$SBPProcessingCount.Text = "Processing device $($RowCount+1) of $($DGVAuto.RowCount)"
Write-OutputBox -OutputBoxMessage "Adding '$($DGVAuto.Rows[$RowCount].Cells["Device"].Value)' to collection: '$($CollectionName)'" -Type "INFO: "
Add-DirectMembership -DeviceName "$($DGVAuto.Rows[$RowCount].Cells["Device"].Value)" -CollectionName $CollectionName
}
$ButtonAuto.Enabled = $true
$SBPProcessingCount.Text = ""
}
if ($Type -like "Manual") {
for ($RowCount = 0; $RowCount -lt $DGVManual.RowCount; $RowCount++) {
$ButtonManual.Enabled = $false
$SBPProcessingCount.Text = "Processing device $($RowCount+1) of $($DGVManual.RowCount)"
Write-OutputBox -OutputBoxMessage "Adding '$($DGVManual.Rows[$RowCount].Cells["Device"].Value)' to collection: '$($CollectionName)'" -Type "INFO: "
Add-DirectMembership -DeviceName "$($DGVManual.Rows[$RowCount].Cells["Device"].Value)" -CollectionName $CollectionName
}
$ButtonManual.Enabled = $true
$SBPProcessingCount.Text = ""
}
$RowCount = 0
Write-OutputBox -OutputBoxMessage "Showing results:" -Type "INFO: "
Write-OutputBox -OutputBoxMessage "Success: $($Global:ProcessedSuccess)" -Type "INFO: "
Write-OutputBox -OutputBoxMessage "Warning: $($Global:ProcessedWarning)" -Type "INFO: "
Write-OutputBox -OutputBoxMessage "Error: $($Global:ProcessedError)" -Type "INFO: "
}
function Start-Search {
$ButtonStart.Enabled = $false
$SBPStatus.Text = "Processing"
$CurrentCount = 0
$Devices = $RTBInput.Text
$DeviceArray = $Devices.Split("`n")
if ($DeviceArray -ne $null) {
foreach ($Device in $DeviceArray) {
$CurrentCount++
Get-CMDevice -DeviceName $Device -Count $CurrentCount -TotalCount ($DeviceArray | Measure-Object).Count
}
}
else {
Write-OutputBox -OutputBoxMessage "No devices has been added to the list" -Type "WARNING: "
}
$ButtonStart.Enabled = $true
$SBPStatus.Text = "Ready"
$SBPProcessingCount.Text = ""
}
function Start-Clear {
$RTBInput.ResetText()
$DGVAuto.Rows.Clear()
$DGVManual.Rows.Clear()
$OutputBox.ResetText()
if ($ButtonAuto.Enabled -eq $true) {
$ButtonAuto.Enabled = $false
}
if ($ButtonManual.Enabled -eq $true) {
$ButtonManual.Enabled = $false
}
}
$Global:ProcessedSuccess = 0
$Global:ProcessedWarning = 0
$Global:ProcessedError = 0
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Drawing")
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
$Form = New-Object System.Windows.Forms.Form
$Form.Size = New-Object System.Drawing.Size(950,700)
$Form.MinimumSize = New-Object System.Drawing.Size(950,700)
$Form.MaximumSize = New-Object System.Drawing.Size(950,700)
$Form.SizeGripStyle = "Hide"
$Form.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($PSHome + "\powershell.exe")
$Form.Text = "Add Devices to Collection 1.0"
$Form.ControlBox = $true
$Form.TopMost = $true
$SBPStatus = New-Object Windows.Forms.StatusBarPanel
$SBPStatus.Text = "Ready"
$SBPStatus.Width = "100"
$SBPTotalCount = New-Object Windows.Forms.StatusBarPanel
$SBPTotalCount.Text = ""
$SBPTotalCount.Width = "100"
$SBPProcessingCount = New-Object Windows.Forms.StatusBarPanel
$SBPProcessingCount.Text = ""
$SBPProcessingCount.Width = "740"
$SBStatus = New-Object Windows.Forms.StatusBar
$SBStatus.ShowPanels = $true
$SBStatus.SizingGrip = $false
$SBStatus.AutoSize = "Full"
$SBStatus.Panels.AddRange(@($SBPStatus, $SBPTotalCount, $SBPProcessingCount))
$GBOutputBox = New-Object System.Windows.Forms.GroupBox
$GBOutputBox.Location = New-Object System.Drawing.Size(10,480)
$GBOutputBox.Size = New-Object System.Drawing.Size(920,150)
$GBOutputBox.Text = "Logging"
$GBInput = New-Object System.Windows.Forms.GroupBox
$GBInput.Location = New-Object System.Drawing.Size(10,10)
$GBInput.Size = New-Object System.Drawing.Size(220,460)
$GBInput.Text = "Device List"
$GBAuto = New-Object System.Windows.Forms.GroupBox
$GBAuto.Location = New-Object System.Drawing.Size(240,10)
$GBAuto.Size = New-Object System.Drawing.Size(340,460)
$GBAuto.Text = "Auto"
$GBManual = New-Object System.Windows.Forms.GroupBox
$GBManual.Location = New-Object System.Drawing.Size(590,10)
$GBManual.Size = New-Object System.Drawing.Size(340,460)
$GBManual.Text = "Manual"
$ButtonStart = New-Object System.Windows.Forms.Button
$ButtonStart.Location = New-Object System.Drawing.Size(125,427)
$ButtonStart.Size = New-Object System.Drawing.Size(95,30)
$ButtonStart.Text = "Start"
$ButtonStart.TabIndex = 1
$ButtonStart.Add_Click({Start-Search})
$ButtonClear = New-Object System.Windows.Forms.Button
$ButtonClear.Location = New-Object System.Drawing.Size(20,427)
$ButtonClear.Size = New-Object System.Drawing.Size(95,30)
$ButtonClear.Text = "Clear"
$ButtonClear.TabIndex = 2
$ButtonClear.Add_Click({Start-Clear})
$ButtonAuto = New-Object System.Windows.Forms.Button
$ButtonAuto.Location = New-Object System.Drawing.Size(475,427)
$ButtonAuto.Size = New-Object System.Drawing.Size(95,30)
$ButtonAuto.Text = "Add"
$ButtonAuto.TabIndex = 1
$ButtonAuto.Add_MouseClick({
if ($CBAuto.SelectedItem -ne $null) {
Start-AddDeviceToCollection -CollectionName "$($CBAuto.SelectedItem)" -Type "Auto"
}
else {
Write-OutputBox -OutputBoxMessage "No collection was selected from the drop down list" -Type "WARNING: "
}
})
$ButtonManual = New-Object System.Windows.Forms.Button
$ButtonManual.Location = New-Object System.Drawing.Size(825,427)
$ButtonManual.Size = New-Object System.Drawing.Size(95,30)
$ButtonManual.Text = "Add"
$ButtonManual.TabIndex = 1
$ButtonManual.Add_MouseClick({
if ($CBManual.SelectedItem -ne $null) {
Start-AddDeviceToCollection -CollectionName $CBManual.SelectedItem -Type "Manual"
}
else {
Write-OutputBox -OutputBoxMessage "No collection was selected from the drop down list" -Type "WARNING: "
}
})
$CBAuto = New-Object System.Windows.Forms.ComboBox
$CBAuto.Location = New-Object System.Drawing.Size(250,395)
$CBAuto.Size = New-Object System.Drawing.Size(320,20)
$CBAuto.DropDownStyle = "DropDownList"
$CBAuto.DropDownHeight = "250"
$CBManual = New-Object System.Windows.Forms.ComboBox
$CBManual.Location = New-Object System.Drawing.Size(600,395)
$CBManual.Size = New-Object System.Drawing.Size(320,20)
$CBManual.DropDownStyle = "DropDownList"
$CBManual.DropDownHeight = "250"
$OutputBox = New-Object System.Windows.Forms.RichTextBox
$OutputBox.Location = New-Object System.Drawing.Size(20,500)
$OutputBox.Size = New-Object System.Drawing.Size(900,120)
$OutputBox.Font = "Courier New"
$OutputBox.BackColor = "white"
$OutputBox.ReadOnly = $true
$OutputBox.MultiLine = $True
$RTBInput = New-Object System.Windows.Forms.RichTextBox
$RTBInput.Location = New-Object System.Drawing.Size(20,27)
$RTBInput.Size = New-Object System.Drawing.Size(200,390)
$RTBInput.TabIndex = 1
$RTBInput.Add_TextChanged({
$InputText = $RTBInput.Text
$InputText = $InputText.Split("`n")
$InputCount = ($InputText | Measure-Object).Count
$SBPTotalCount.Text = "Row count: $($InputCount)"
})
$DGVAuto = New-Object System.Windows.Forms.DataGridView
$DGVAuto.Location = New-Object System.Drawing.Size(250,30)
$DGVAuto.Size = New-Object System.Drawing.Size(320,360)
$DGVAuto.Anchor = "Top, Bottom, Left, Right"
$DGVAuto.ColumnCount = 1
$DGVAuto.ColumnHeadersVisible = $true
$DGVAuto.Columns[0].Name = "Device"
$DGVAuto.Columns[0].AutoSizeMode = "Fill"
$DGVAuto.AllowUserToAddRows = $false
$DGVAuto.AllowUserToDeleteRows = $false
$DGVAuto.ReadOnly = $true
$DGVAuto.MultiSelect = $false
$DGVAuto.ColumnHeadersHeightSizeMode = "DisableResizing"
$DGVAuto.RowHeadersWidthSizeMode = "DisableResizing"
$DGVAuto.RowHeadersVisible = $false
$DGVManual = New-Object System.Windows.Forms.DataGridView
$DGVManual.Location = New-Object System.Drawing.Size(600,30)
$DGVManual.Size = New-Object System.Drawing.Size(320,360)
$DGVManual.Anchor = "Top, Bottom, Left, Right"
$DGVManual.ColumnCount = 1
$DGVManual.ColumnHeadersVisible = $true
$DGVManual.Columns[0].Name = "Device"
$DGVManual.Columns[0].AutoSizeMode = "Fill"
$DGVManual.AllowUserToAddRows = $false
$DGVManual.AllowUserToDeleteRows = $false
$DGVManual.ReadOnly = $true
$DGVManual.MultiSelect = $false
$DGVManual.ColumnHeadersHeightSizeMode = "DisableResizing"
$DGVManual.RowHeadersWidthSizeMode = "DisableResizing"
$DGVManual.RowHeadersVisible = $false
Load-Form |
combined_dataset/train/non-malicious/8c4d244d-22ac-4bfe-8ddf-c0a5ee0b552c.ps1 | 8c4d244d-22ac-4bfe-8ddf-c0a5ee0b552c.ps1 | function out-default() {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
[System.Management.Automation.PSObject]
${InputObject})
begin
{
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer) -and $outBuffer -gt 1024)
{
$PSBoundParameters['OutBuffer'] = 1024
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Out-Default', [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters }
$steppablePipeline = $scriptCmd.GetSteppablePipeline()
$steppablePipeline.Begin($PSCmdlet)
} catch {
throw
}
}
process
{
try {
$steppablePipeline.Process($_)
if ($last_output -eq $null)
{
$last_output = @()
}
if ($last_output.Length -lt 10)
{
$last_output += $_
}
else
{
$null, $last_output = $last_output
$last_output += $_
}
} catch {
throw
}
}
end
{
try {
$steppablePipeline.End()
$global:last_output = $last_output
} catch {
throw
}
}
<#
.ForwardHelpTargetName Out-Default
.ForwardHelpCategory Cmdlet
#>
}
|
combined_dataset/train/non-malicious/Invoke-RemoteExpression..ps1 | Invoke-RemoteExpression..ps1 | ##############################################################################\n##\n## Invoke-RemoteExpression\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nInvoke a PowerShell expression on a remote machine. Requires PsExec from\nhttp://live.sysinternals.com/tools/psexec.exe. If the remote machine\nsupports PowerShell version two, use PowerShell remoting instead.\n\n.EXAMPLE\n\nInvoke-RemoteExpression \\\\LEE-DESK { Get-Process }\nRetrieves the output of a simple command from a remote machine\n\n.EXAMPLE\n\n(Invoke-RemoteExpression \\\\LEE-DESK { Get-Date }).AddDays(1)\nInvokes a command on a remote machine. Since the command returns one of\nPowerShell's primitive types (a DateTime object,) you can manipulate\nits output as an object afterward.\n\n.EXAMPLE\n\nInvoke-RemoteExpression \\\\LEE-DESK { Get-Process } | Sort Handles\nInvokes a command on a remote machine. The command does not return one of\nPowerShell's primitive types, but you can still use PowerShell's filtering\ncmdlets to work with its structured output.\n\n#>\n\nparam(\n ## The computer on which to invoke the command.\n $ComputerName = "\\\\$ENV:ComputerName",\n\n ## The scriptblock to invoke on the remote machine.\n [Parameter(Mandatory = $true)]\n [ScriptBlock] $ScriptBlock,\n\n ## The username / password to use in the connection\n $Credential,\n\n ## Determines if PowerShell should load the user's PowerShell profile\n ## when invoking the command.\n [switch] $NoProfile\n)\n\nSet-StrictMode -Version Latest\n\n## Prepare the command line for PsExec. We use the XML output encoding so\n## that PowerShell can convert the output back into structured objects.\n## PowerShell expects that you pass it some input when being run by PsExec\n## this way, so the 'echo .' statement satisfies that appetite.\n$commandLine = "echo . | powershell -Output XML "\n\nif($noProfile)\n{\n $commandLine += "-NoProfile "\n}\n\n## Convert the command into an encoded command for PowerShell\n$commandBytes = [System.Text.Encoding]::Unicode.GetBytes($scriptblock)\n$encodedCommand = [Convert]::ToBase64String($commandBytes)\n$commandLine += "-EncodedCommand $encodedCommand"\n\n## Collect the output and error output\n$errorOutput = [IO.Path]::GetTempFileName()\n\nif($Credential)\n{\n ## This lets users pass either a username, or full credential to our\n ## credential parameter\n $credential = Get-Credential $credential\n $networkCredential = $credential.GetNetworkCredential()\n $username = $networkCredential.Username\n $password = $networkCredential.Password\n\n $output = psexec $computername /user $username /password $password `\n /accepteula cmd /c $commandLine 2>$errorOutput\n}\nelse\n{\n $output = psexec /acceptEula $computername `\n cmd /c $commandLine 2>$errorOutput\n}\n\n## Check for any errors\n$errorContent = Get-Content $errorOutput\nRemove-Item $errorOutput\nif($errorContent -match "(Access is denied)|(failure)|(Couldn't)")\n{\n $OFS = "`n"\n $errorMessage = "Could not execute remote expression. "\n $errorMessage += "Ensure that your account has administrative " +\n "privileges on the target machine.`n"\n $errorMessage += ($errorContent -match "psexec.exe :")\n\n Write-Error $errorMessage\n}\n\n## Return the output to the user\n$output
|
combined_dataset/train/non-malicious/sample_43_42.ps1 | sample_43_42.ps1 | #
# Module manifest for module 'OCI.PSModules.Operatoraccesscontrol'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment',
'Get-OCIOperatoraccesscontrolAccessRequest',
'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList',
'Get-OCIOperatoraccesscontrolAccessRequestsList',
'Get-OCIOperatoraccesscontrolAssignmentValidationStatus',
'Get-OCIOperatoraccesscontrolAuditLogReport',
'Get-OCIOperatoraccesscontrolInteractionsList',
'Get-OCIOperatoraccesscontrolOperatorAction',
'Get-OCIOperatoraccesscontrolOperatorActionsList',
'Get-OCIOperatoraccesscontrolOperatorControl',
'Get-OCIOperatoraccesscontrolOperatorControlAssignment',
'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList',
'Get-OCIOperatoraccesscontrolOperatorControlsList',
'Invoke-OCIOperatoraccesscontrolApproveAccessRequest',
'Invoke-OCIOperatoraccesscontrolInteractionRequest',
'Invoke-OCIOperatoraccesscontrolRejectAccessRequest',
'Invoke-OCIOperatoraccesscontrolReviewAccessRequest',
'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest',
'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment',
'Move-OCIOperatoraccesscontrolOperatorControlCompartment',
'New-OCIOperatoraccesscontrolOperatorControl',
'New-OCIOperatoraccesscontrolOperatorControlAssignment',
'Remove-OCIOperatoraccesscontrolOperatorControl',
'Remove-OCIOperatoraccesscontrolOperatorControlAssignment',
'Update-OCIOperatoraccesscontrolOperatorControl',
'Update-OCIOperatoraccesscontrolOperatorControlAssignment'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/743.ps1 | 743.ps1 | [CmdletBinding()]
param (
[string]$Path,
[string]$Version = 'master'
)
$localpath = $(Join-Path -Path (Split-Path -Path $profile) -ChildPath '\Modules\ReportingServicesTools')
try
{
if ($Path.length -eq 0)
{
if ($PSCommandPath.Length -gt 0)
{
$path = Split-Path $PSCommandPath
if ($path -match "github")
{
$path = $localpath
}
}
else
{
$path = $localpath
}
}
}
catch
{
$path = $localpath
}
if ($path.length -eq 0)
{
$path = $localpath
}
if ((Get-Command -Module ReportingServicesTools).count -ne 0)
{
Write-Output "Removing existing ReportingServiceTools Module..."
Remove-Module ReportingServicesTools -ErrorAction Stop
}
$url = "https://github.com/Microsoft/ReportingServicesTools/archive/$Version.zip"
$temp = ([System.IO.Path]::GetTempPath()).TrimEnd("\")
$zipfile = "$temp\ReportingServicesTools.zip"
if (!(Test-Path -Path $path))
{
try
{
Write-Output "Creating directory: $path..."
New-Item -Path $path -ItemType Directory | Out-Null
}
catch
{
throw "Can't create $Path. You may need to Run as Administrator!"
}
}
else
{
try
{
Write-Output "Deleting previously installed module..."
Remove-Item -Path "$path\*" -Force -Recurse
}
catch
{
throw "Can't delete $Path. You may need to Run as Administrator!"
}
}
Write-Output "Downloading archive from ReportingServiceTools GitHub..."
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
try
{
Invoke-WebRequest $url -OutFile $zipfile
}
catch
{
Write-Output "...Probably using a proxy for internet access. Trying default proxy settings..."
(New-Object System.Net.WebClient).Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials
Invoke-WebRequest $url -OutFile $zipfile -ErrorAction Stop
}
Unblock-File $zipfile -ErrorAction SilentlyContinue
Write-Output "Unzipping archive..."
$shell = New-Object -COM Shell.Application
$zipPackage = $shell.NameSpace($zipfile)
$destinationFolder = $shell.NameSpace($temp)
$destinationFolder.CopyHere($zipPackage.Items())
Move-Item -Path "$temp\ReportingServicesTools-$Version\*" $path
Write-Output "ReportingServicesTools has been successfully downloaded to $path!"
Write-Output "Cleaning up..."
Remove-Item -Path "$temp\ReportingServicesTools-$Version"
Remove-Item -Path $zipfile
Write-Output "Importing ReportingServicesTools Module..."
Import-Module "$path\ReportingServicesTools\ReportingServicesTools.psd1" -Force
Write-Output "ReportingServicesTools Module was successfully imported!"
Get-Command -Module ReportingServicesTools
Write-Output "`n`nIf you experience any function missing errors after update, please restart PowerShell or reload your profile."
|
combined_dataset/train/non-malicious/sample_45_37.ps1 | sample_45_37.ps1 | import { BundledLanguageInfo, DynamicImportLanguageRegistration } from '@shikijs/core';
declare const bundledLanguagesInfo: BundledLanguageInfo[];
declare const bundledLanguagesBase: {
[k: string]: DynamicImportLanguageRegistration;
};
declare const bundledLanguagesAlias: {
[k: string]: DynamicImportLanguageRegistration;
};
type BundledLanguage = 'abap' | 'actionscript-3' | 'ada' | 'adoc' | 'angular-html' | 'angular-ts' | 'apache' | 'apex' | 'apl' | 'applescript' | 'ara' | 'asciidoc' | 'asm' | 'astro' | 'awk' | 'ballerina' | 'bash' | 'bat' | 'batch' | 'be' | 'beancount' | 'berry' | 'bibtex' | 'bicep' | 'blade' | 'c' | 'c#' | 'c++' | 'cadence' | 'cdc' | 'clarity' | 'clj' | 'clojure' | 'closure-templates' | 'cmake' | 'cmd' | 'cobol' | 'codeowners' | 'codeql' | 'coffee' | 'coffeescript' | 'common-lisp' | 'console' | 'cpp' | 'cql' | 'crystal' | 'cs' | 'csharp' | 'css' | 'csv' | 'cue' | 'cypher' | 'd' | 'dart' | 'dax' | 'desktop' | 'diff' | 'docker' | 'dockerfile' | 'dream-maker' | 'elisp' | 'elixir' | 'elm' | 'emacs-lisp' | 'erb' | 'erl' | 'erlang' | 'f' | 'f#' | 'f03' | 'f08' | 'f18' | 'f77' | 'f90' | 'f95' | 'fennel' | 'fish' | 'fluent' | 'for' | 'fortran-fixed-form' | 'fortran-free-form' | 'fs' | 'fsharp' | 'fsl' | 'ftl' | 'gdresource' | 'gdscript' | 'gdshader' | 'genie' | 'gherkin' | 'git-commit' | 'git-rebase' | 'gjs' | 'gleam' | 'glimmer-js' | 'glimmer-ts' | 'glsl' | 'gnuplot' | 'go' | 'gql' | 'graphql' | 'groovy' | 'gts' | 'hack' | 'haml' | 'handlebars' | 'haskell' | 'haxe' | 'hbs' | 'hcl' | 'hjson' | 'hlsl' | 'hs' | 'html' | 'html-derivative' | 'http' | 'hxml' | 'hy' | 'imba' | 'ini' | 'jade' | 'java' | 'javascript' | 'jinja' | 'jison' | 'jl' | 'js' | 'json' | 'json5' | 'jsonc' | 'jsonl' | 'jsonnet' | 'jssm' | 'jsx' | 'julia' | 'kotlin' | 'kql' | 'kt' | 'kts' | 'kusto' | 'latex' | 'less' | 'liquid' | 'lisp' | 'log' | 'logo' | 'lua' | 'make' | 'makefile' | 'markdown' | 'marko' | 'matlab' | 'md' | 'mdc' | 'mdx' | 'mediawiki' | 'mermaid' | 'mojo' | 'move' | 'nar' | 'narrat' | 'nextflow' | 'nf' | 'nginx' | 'nim' | 'nix' | 'nu' | 'nushell' | 'objc' | 'objective-c' | 'objective-cpp' | 'ocaml' | 'pascal' | 'perl' | 'perl6' | 'php' | 'plsql' | 'po' | 'postcss' | 'pot' | 'potx' | 'powerquery' | 'powershell' | 'prisma' | 'prolog' | 'properties' | 'proto' | 'ps' | 'ps1' | 'pug' | 'puppet' | 'purescript' | 'py' | 'python' | 'ql' | 'qml' | 'qmldir' | 'qss' | 'r' | 'racket' | 'raku' | 'razor' | 'rb' | 'reg' | 'regex' | 'regexp' | 'rel' | 'riscv' | 'rs' | 'rst' | 'ruby' | 'rust' | 'sas' | 'sass' | 'scala' | 'scheme' | 'scss' | 'sh' | 'shader' | 'shaderlab' | 'shell' | 'shellscript' | 'shellsession' | 'smalltalk' | 'solidity' | 'soy' | 'sparql' | 'spl' | 'splunk' | 'sql' | 'ssh-config' | 'stata' | 'styl' | 'stylus' | 'svelte' | 'swift' | 'system-verilog' | 'systemd' | 'tasl' | 'tcl' | 'terraform' | 'tex' | 'tf' | 'tfvars' | 'toml' | 'ts' | 'tsp' | 'tsv' | 'tsx' | 'turtle' | 'twig' | 'typ' | 'typescript' | 'typespec' | 'typst' | 'v' | 'vala' | 'vb' | 'verilog' | 'vhdl' | 'vim' | 'viml' | 'vimscript' | 'vue' | 'vue-html' | 'vy' | 'vyper' | 'wasm' | 'wenyan' | 'wgsl' | 'wiki' | 'wikitext' | 'wl' | 'wolfram' | 'xml' | 'xsl' | 'yaml' | 'yml' | 'zenscript' | 'zig' | 'zsh' | '文言';
declare const bundledLanguages: Record<BundledLanguage, DynamicImportLanguageRegistration>;
export { type BundledLanguage, bundledLanguages, bundledLanguagesAlias, bundledLanguagesBase, bundledLanguagesInfo };
|
combined_dataset/train/non-malicious/2978.ps1 | 2978.ps1 | $VerbosePreference = 'Continue'
$ErrorActionPreference = 'Stop'
$baseDir = $PSScriptRoot
try {
$buildDir = "$baseDir\build\psgallery\Pester"
$null = New-Item -Path $buildDir -ItemType Directory -Verbose
Write-Verbose "Copying release files to build folder '$buildDir'"
Copy-Item $baseDir\Pester.ps?1 $buildDir\
Copy-Item $baseDir\LICENSE $buildDir\
Copy-Item $baseDir\nunit_schema_2.5.xsd $buildDir\
Copy-Item $baseDir\junit_schema_4.xsd $buildDir\
Copy-Item $baseDir\bin $buildDir\ -Recurse
Copy-Item $baseDir\Functions $buildDir\ -Recurse
Copy-Item $baseDir\Dependencies $buildDir\ -Recurse
Copy-Item $baseDir\Snippets $buildDir\ -Recurse
Copy-Item $baseDir\en-US $buildDir\ -Recurse
Copy-Item $baseDir\lib $buildDir\ -Recurse
Write-Verbose 'Copy complete. Contents:'
Get-ChildItem $buildDir -Recurse | Out-Host
}
catch {
Write-Error -ErrorRecord $_
exit 1
}
|
combined_dataset/train/non-malicious/sample_65_18.ps1 | sample_65_18.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Deletes an existing Azure Front Door Standard or Azure Front Door Premium or CDN profile with the specified parameters.
Deleting a profile will result in the deletion of all of the sub-resources including endpoints, origins and custom domains.
.Description
Deletes an existing Azure Front Door Standard or Azure Front Door Premium or CDN profile with the specified parameters.
Deleting a profile will result in the deletion of all of the sub-resources including endpoints, origins and custom domains.
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.ICdnIdentity
.Outputs
System.Boolean
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <ICdnIdentity>: Identity Parameter
[CustomDomainName <String>]: Name of the domain under the profile which is unique globally.
[EndpointName <String>]: Name of the endpoint under the profile which is unique globally.
[Id <String>]: Resource identity path
[OriginGroupName <String>]: Name of the origin group which is unique within the endpoint.
[OriginName <String>]: Name of the origin which is unique within the profile.
[PolicyName <String>]: The name of the CdnWebApplicationFirewallPolicy.
[ProfileName <String>]: Name of the Azure Front Door Standard or Azure Front Door Premium or CDN profile which is unique within the resource group.
[ResourceGroupName <String>]: Name of the Resource group within the Azure subscription.
[RouteName <String>]: Name of the routing rule.
[RuleName <String>]: Name of the delivery rule which is unique within the endpoint.
[RuleSetName <String>]: Name of the rule set under the profile which is unique globally.
[SecretName <String>]: Name of the Secret under the profile.
[SecurityPolicyName <String>]: Name of the security policy under the profile.
[SubscriptionId <String>]: Azure Subscription ID.
.Link
https://learn.microsoft.com/powershell/module/az.cdn/remove-azfrontdoorcdnprofile
#>
function Remove-AzFrontDoorCdnProfile {
[OutputType([System.Boolean])]
[CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='Delete', Mandatory)]
[Alias('ProfileName')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[System.String]
# Name of the Azure Front Door Standard or Azure Front Door Premium or CDN profile which is unique within the resource group.
${Name},
[Parameter(ParameterSetName='Delete', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[System.String]
# Name of the Resource group within the Azure subscription.
${ResourceGroupName},
[Parameter(ParameterSetName='Delete')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# Azure Subscription ID.
${SubscriptionId},
[Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.ICdnIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Returns true when the command succeeds
${PassThru},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$hasAsJob = $PSBoundParameters.Remove('AsJob')
$hasNoWait = $PSBoundParameters.Remove('NoWait')
$hasPassThru = $PSBoundParameters.Remove('PassThru')
if ($PSCmdlet.ParameterSetName -eq 'Delete') {
$frontDoorCdnProfile = Get-AzFrontDoorCdnProfile @PSBoundParameters
} elseif ($PSCmdlet.ParameterSetName -eq 'DeleteViaIdentity') {
$frontDoorCdnProfile = Get-AzFrontDoorCdnProfile @PSBoundParameters
} else {
throw "Not supported ParameterSetName."
}
if($null -eq $frontDoorCdnProfile) {
throw "Provided FrontDoorCdnProfile does not exist."
} else {
if ($hasAsJob) {
$PSBoundParameters.Add('AsJob', ${AsJob})
}
if ($hasNoWait) {
$PSBoundParameters.Add('NoWait', ${NoWait})
}
if ($hasPassThru) {
$PSBoundParameters.Add('PassThru', ${PassThru})
}
if(ISFrontDoorCdnProfile($frontDoorCdnProfile.SkuName)) {
Az.Cdn.internal\Remove-AzCdnProfile @PSBoundParameters
} else {
throw "Provided FrontDoorCdnProfile does not exist."
}
}
}
}
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBTbgHdmnsEJBDv
# dInngNZGF7FFDywtwQCIKB7tRpcPiqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGKHusIx7US6o4KiZk/7NU2w
# VB/a9kvYhwZTdhmw/hE4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAZMAzLL7EXkAvUR0OA330//n+vGBUh3AbobYJm7WnpsOJXUnj32VmJFLB
# yfLfrAqOzVnDMKLsfBnRUOpdd3mWM+0pmlqBTtyasxbNATWG1wY0l8VtZpB4h+nC
# Kk5bWPFfigdgXnpk/m6/RDJmNd1X3GkPSqGXHBF8VOY3bKaXYpi5XyNhmUpYUk19
# 3GgLR3vIwO3tT3KVN9M+gRfppNTh00fWnqvnZpJr78fpP87cVGlUD7tUcBXVeJT+
# XQ5Wrl7ET9D/MQVvK6/WiYPZOKLX0JxDNv27V4za6KVEAXa/I3bvboraUbo2E1Tg
# bFj7amnw5GB7/58xzr2wIE1OgtFM26GCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCC7A1s6HZRYzsfT9aBUPt1H0TTZzi5GoSXJO/yUHiByuwIGZpV4rwn7
# GBIyMDI0MDczMTA3MDA0MC42NFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# Ee0wggcgMIIFCKADAgECAhMzAAAB7eFfy9X3pV1zAAEAAAHtMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU0
# MVoXDTI1MDMwNTE4NDU0MVowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAKgwwmySuupqnJwvE8LUfvMPuDzw2lsRpDpKNxMhFvMJ
# XJhA2zPxNovWmoVMQA8vVfuiMvj8RoRb5SM2pmz9rIzJbhgikU9k/bHgUExUJ12x
# 4XaL5owyMMeLQtxNBnEzazeYUysJkBZJ8thdgMiKYUHPyPSgtYbLdWAuYFMozjEu
# q/sNlTPwHZKgCZsS2nraeBKXSE6g3vdIXAT5jbhK8ZAxaHKSkb69cPByla/AN75O
# CestHsBNEVc3klLbp2bbLLpJgUxFicwTd0wcJD9RAhBA0LycuYi90qQChYQxe0mw
# YSjdCszZLZIG/g+kdHNG6TNO0/5QBx4bEz0nKvBRA/k4ISZbphyETJENLA/iFT1/
# sHQDKHXg/D28mjuN7A2N4w8iSad7ItKLSu6/ajH/FEa1wn3IE0LkFpGS2PPuy09q
# iNH48MDZ+4G0KjzEqWS3neZRvsBj4JkceqEubvql0wXoEe/ZO/CVUF5BE3bZeNpV
# VHAKCOAmc17C3s96NyulSfSocuAur7UE3UPNi6RaROvvBPTOXSJev422pSRZI6dZ
# F97w3bW0Hq6/dWRbycV0KG1ttlnPbil4u0kRm42s3xd/09M8zNlcMkEjURyJH/3V
# BwahkWZVsVVvatQgCzTX5mR7C9uGYZUN59f2hkbj8riAZSxO9Nb6vUlkzFRPYzCp
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUzhvw7PfeECoER8qUBl/Q0qHgIhkwHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAJ3WArZF354YvR4eL6ITr+oNjyxtuw7h6Zqd
# ynoo837GrlkBq2IFHiOZFGGb71WKTQWjQMtaL83bxsUjt1djDT2ne8KKluPLgSiJ
# +bQ253v/hTfSL37tG9btc5DevHfv5Tu+r2WTrJikYI2nSOUnXzz8K5E+Comd+rkR
# 15p8fYCgbjqEpZN4HsO5dqwa3qykk56cZ51Kt7fgxZmp5MhDSto4i1mcW4YPLj7G
# gPWpHPZBb67aAIdobwBCOFhQzi5OL23qS22PpztdqavbOta5x4OHPuwou20tMnvC
# zlisDYjxxOVswB/YpbQZWMptgZ34tkZ24Qrv/t+zgZSQypznUWw10bWf7OBzvMe7
# agYZ4IGDizxlHRkXLHuOyCb2xIUIpDkKxsC+Wv/rQ12TlN4xHwmzaQ1SJy7YKpnT
# fzfdOy9OCTuIPUouB9LXocS+M3qbhUokqCMns4knNpu1LglCBScmshl/KiyTgPXy
# tmeL2lTA3TdaBOZ3XRZPCJk67iDxSfqIpw8xj+IWpO7ie2TMVTEEGlsUbqTUIg1m
# aiKsRaYK0beXJnYh12aO0h59OQi8ZZvgnHPPuXab8TaQY6LEMkexqFlWbCyg2+HL
# mS7+KdT751cfPD6GW+pNIVPz2sgVWFyaxY8Mk81FJKkyGgnfdXZlr+WQpxuRQzRJ
# tCBL2qx3MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw
# ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAO4d
# rIpMJpixjEmH6hZPHq5U8XD5oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqU7xlMCIYDzIwMjQwNzMwMTkyNDIx
# WhgPMjAyNDA3MzExOTI0MjFaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOpTvGUC
# AQAwCgIBAAICAd8CAf8wBwIBAAICE4wwCgIFAOpVDeUCAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAXPsuwAOWP25E2cX2F+ZzC7+F+B3hQP2N3BBLnJrHmoIh
# s7AB9eKAmdDY35066bWrrS96jBmnlYE5cWcY9IlsFb6UUYy6JVmhkdludwe9fXNz
# YyM8+9r/32cJIav8keoFnpR4bLuC7dOReAQchNX9BcZhUNmsOVGLXsQ62cblX+Fq
# f2NacgAv1BvdBKPItuFAd1HF0RAwT+nxznxwI4oH5VFxwczAi4/6d8bmt6ln7osT
# epi9zlskuKo41mDA455mJtBHwWVFn88PoIMkrDjQzYs8D/45h9wo6OlCBIbwRdtu
# /KXStSQAWMstNnev1woznT2WZalRDf0ssCHvoj3fNDGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7eFfy9X3pV1zAAEAAAHt
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIHAKdOHZPiIQxDUhfBD+CEr1MG+W47rsBGX2DHK6QfgX
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgjS4NaDQIWx4rErcDXqXXCsjC
# uxIOtdnrFJ/QXjFsyjkwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAiBCD+WiQ24JjmUF1a/9zfWS+YM56G
# EnfC5JQAiBZLaDB/BTANBgkqhkiG9w0BAQsFAASCAgBsr5eDJThVWGR/u8o2OXwk
# 6VOcZ3LSOonWwJAKSUuGfdpeKEzpO4BK0GQgX+iuUI0wBV6LW9g5+aoklEPRdeaK
# p/21oDK1MbJuvi2BCrsZa1wfG63UuyLyABCzZr38pls7eBpWBK8P8kGn25Y3/KTx
# m8V3wcDnXtYB5tnEs6NTdR7PwZUB4RbAtnFS+2uQ3OMOQCaXsYUUJKOIGoshpYpN
# FC7S2rlm4TPZNkgtApUfIEnUoFpd58ZK1/eVE814CddVl2w8nLxRSj6FH/U9QESO
# Pxj35GxGF18PnWOaCEbxL3SK1ueuawBd6virUiewVtsmBFVrMwO80cbf/C79rc6P
# uTcRlP6M5WlwfZ5u7QQc0LwYAAJrCjVXtqIwgqYuE05JOmTRPL64/aOWjITAzke1
# ud5FIiZJjWe1FM8OW41iRliPHEjJIs1pzRX6O6+dWOKkg8CGElYaP6V/fcbE5gGL
# CY78n1AsvoUvdVP6YOEATJdgM2+BqOkWAqyz7MUp5vTYAPKNXYWTumzTRYVPIou3
# H7qrH+TmZIHASSwy76I9JfDVZ7aMXpqA5c4Lv+DvT+OqsYJQNpR4TVKnGnyxp7+z
# LKqhGSkykJi/MAKFlfGqPLj+W+GNbpMQFSzWAGpRxhz44DFavrU58S8Aob06DEfq
# X5epc/PC/pfKqaDIkxDeqw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/3697.ps1 | 3697.ps1 |
function Get-ResourceGroupName
{
return getAssetName
}
function Get-ResourceName
{
return getAssetName
}
function TestSetup-CreateResourceGroup
{
$resourceGroupName = getAssetName
$rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$resourceGroup = New-AzResourceGroup -Name $resourceGroupName -location $rglocation -Force
return $resourceGroup
}
function Assert-Tags($tags1, $tags2)
{
if($tags1.count -ne $tags2.count)
{
throw "Tag size not equal. Tag1: $tags1.count Tag2: $tags2.count"
}
foreach($key in $tags1.Keys)
{
if($tags1[$key] -ne $tags2[$key])
{
throw "Tag content not equal. Key:$key Tags1:" + $tags1[$key] + "Tags2:" + $tags2[$key]
}
}
} |
combined_dataset/train/non-malicious/Custom Speech Commands.ps1 | Custom Speech Commands.ps1 | @@#Filename commands.ps1
import-module "G:\\Documents\\Speech Macros\\custom.psm1"
import-module "G:\\Documents\\Speech Macros\\alice.psm1"
Add-SpeechCommands @{
"test command" = { Say $(Respond "3:2,4:0-2") }
" * the percentages * " = { Say $(Percentages) }
" * star date * " = { Say "Current, Star date, $("$((Get-Date).year).$([math]::round($((Get-Date).dayofyear)/365, 2)*100)" -replace "([A-Za-z0-9.]){1}","`$1 " -replace "\\.","point")" }
" * mail * " = { Start-Process "https://mail.google.com" }
"Google * please" = { $term = $_ -replace "$Computer(.+?)Google (.+?) please", '$2'; Start-Process "http://www.google.com/search?q=$term" }
"What * time * " = { Say "It is $(Get-Date -f "h:mm tt")" }
"What is * time * " = { Say "It is $(Get-Date -f "h:mm tt")" }
"What time * " = { Say "It is $(Get-Date -f "h:mm tt")" }
" * some music * " = { Start-Process "grooveshark.exe" }
"What * date today" = { Say $(Get-Date -f "dddd, MMMM dd") }
#list processes
"What's running?" = {
$proc = ps | sort ws -desc
Say $("$($proc.Count) processes, including $($proc[0].name), which is using " +
"$([int]($proc[0].ws/1mb)) megabytes of memory")
}
#Word Definition
" * the definition for * please" = {$define = $_ -replace "$Computer(.+?)the definition for (.+?) please", '$2' ;$outtext = Get-Definition("$define");Say "Definitions for $define, , , $outtext"}
} -Computer "alice" -Verbose
#eof
@@#Filename custom.psm1
function Get-Definition($word) {
#.Synopsis
# Polls wiktionary for top text definitons for a given $word input
#.Description
# This Function parses the top $lines definitions for a given
# $term into one string formatted for speech synthesis
#
#
Say "Sure"
if($word -match " "){Say "Fail, one word at a time please"; break}
$page = "http://simple.wiktionary.org/wiki/$word"
$ie = new-object -com "InternetExplorer.Application"
$ie.visible = $false
$ie.navigate($page)
while($ie.busy){Start-Sleep 1}
$output = " "
$lines = 0
for($d=0;$d -le $lines;$d++) { ## grab the definition strings from each table
$ol = @($ie.Document.getElementsByTagName("ol"))[0]
$li = @($ol.getElementsByTagName("li"))[$d]
$def = @($li.innerHTML)
$output += "$def"
if($d -lt $lines){ $output += ", or, " }
}
$ie.Quit()
$closeIE = [System.Runtime.Interopservices.Marshal]::FinalReleaseComObject($ie)
Remove-Variable ie
return Clean-String($output)
}
function Clean-String([string]$str){
#.Synopsis
# Cleans string from web (most concerned about x/html tags)
#.Description
# Cleans input string of xml tags
# returns $str
#
#
$str = $str -replace "\\<[^<]*\\>", " "
$str = $str.replace(" ", "")
return $str
}
function Respond($in, [string]$del = ","){
#.Synopsis
# Recursive.
# Returns a random response from $responses via the three dimensional array of choices: $choices[<groups>][<dimensions>][<values>]
# This function takes in a string indicating which responses from the $responses array
# to to choose from. It supports ranges (-) and direct selections (/) in each seed separated by (,).
#.Description
# the idea here is to respond based on this format: $in = "3:2,4:1-2,0/2-4/6:1"
# where 3:2 is a direct seed, 4:1-2 is a range seed (from 4:1 to 4:2),
# and 0/2-4/6:1 combines the two (effectively adds 0:1, 2:1, 3:1, 4:1, 5:1, 6:1 to the choices)
# In heap, the above example would effectively add 3:2, 4:1, 4:2, 0:1, 2:1, 3:1, 4:1, 5:1, 6:1 to the
# available choices, and will appear as $choices(@($xs(3),$ys(2)),@($xs(4),$ys(1,2)),@($xs(0,2,3,4,6),$ys(1)))
#
switch -wildcard ($del){
"`,"{
if($in -match "`,"){ #if more than one coordset, handle each
$coordsets = $in -split "`," #split coordsets apart
foreach($coordset in $coordsets){
$choices += ,(Respond $coordset "`:")
}
}
else{ #else pass the string to the next step,
$choices = ,(Respond $in "`:")
}
$choice = $choices[(get-random -min 0 -max $choices.count)] #choose one of the groups randomly
$responses[$choice[0]][$choice[1]];#pass response out of the function
}
"`:"{
$coords = $in -split "`:" #split coordset apart
foreach ($coord in $coords){
if(($coord -match "`/")-or($coord -match "`-")){ #if there's an or operator or a range
$dimensions += ,(Respond $coord "`/") # handle them, and add all values (in array) to this dimension (split fails elegantly)
}
else{
$dimensions += ,$coord #else just add the coord value (in an array) via comma operator
}
}
$dimensions #pass dimensions out dimensions is two dimensional array
}
"`/"{
$ranges = $in -split "`/" #split ORs apart (if theres not OR, the string is still added to $ranges[0])
foreach($range in $ranges){
if($range -match "`-"){#if theres a range to handle, do so
foreach ($val in (Respond $range "`-")){
$orVals += ,$val #append all values in returned range array to new array
}
}
else{# else just append the value to teh new array
$orVals += ,$range
}
}
,($orVals | get-random) #pass out single element array of random value from vals array
}
"`-"{
$vals = $in -split "`-" #split ranges apart
$vals[0]..$vals[1] # pass out array containing all values in range
}
}
}
$responses = (#Response Array
(##0-correct
"Right",
"Correct"
),
(##1-incorrect
"Wrong",
"Incorrect"
),
(##2-positive
"Yes",
"Aye",
"I'll give it a shot"
),
(##3-negative
"No",
"Negative",
"Not going to happen"
),
(##4-affirmation
"Sure",
"OK",
"Lets See"
),
(##5-retort
"your mom",
"your face"
),
(##6-insult
"You\\'re dumb",
"you fail"
),
(##7-eager
"I'm ready",
"Lets check it out"
),
(##8-apprehensive
"I don't know",
"Just a seck"
),
(##9-neutral
"oh",
"Hum"
)
)
function Percentages {
#.Synopsis
# Specific speech command that reads back
# remaining percentages of year, month, week, and day
#.Description
# Pretty self explanitory, basic maths, elucidatory var names
#
#
$date = get-date #capture date object
$daysInYear = [int]$(if([datetime]::IsLeapYear($date.year)){366}else{365}) #if leap year, 366, else 365
$daysInMonth = [int]$([datetime]::DaysInMonth($date.year, $date.month)) #capture days in month
$dayOfYear = [int]$date.dayofyear #days past (including today)
$dayOfMonth = [int]$date.day #days past (including today)
$hoursOfDay = [int]$date.hour #hours past (including current)
$minutesOfHour = [int]$date.minute #minutes past (including current)
switch ($date.dayofweek.toString()){ #assumes start of week is sunday
Sunday { [int]$dayOfWeek="1"; break }
Monday { [int]$dayOfWeek="2"; break }
Tuesday { [int]$dayOfWeek="3"; break }
Wednesday { [int]$dayOfWeek="4"; break }
Thursday { [int]$dayOfWeek="5"; break }
Friday { [int]$dayOfWeek="6"; break }
Saturday { [int]$dayOfWeek="7"; break }
}
$percentYearGone = $dayOfYear/$daysInYear #days of this year (including today) divided by total days in this year
$percentMonthGone = ((($dayOfMonth*24)-24)+$hoursOfDay)/($daysInMonth*24) #hours of this month divided by total hours in this month
$percentWeekGone = ((($dayOfWeek*24)-24)+$hoursOfDay)/(7*24) #hours of this week divided by total hours in a week
$percentDayGone = ((($hoursOfDay*60)-60)+$minutesOfDay)/(24*60) #minutes of today divided by total minutes in a day
$percentYearLeft = [math]::round((1-$percentYearGone)*100,1) #opposite percentages rounded to one decimal place
$percentMonthLeft = [math]::round((1-$percentMonthGone)*100,1) #^
$percentWeekLeft = [math]::round((1-$percentWeekGone)*100,1) #^
$percentDayLeft = [math]::round((1-$percentDayGone)*100,1) #^
$str = ""
$str += "There's "
$str += $percentYearLeft
$str += "% of this year, "
$str += $percentMonthLeft
$str += "% of this month, "
$str += $percentWeekLeft
$str += "% of this week, and "
$str += $percentDayLeft
$str += "% of today remaining, what will you do with it?"
return $str
}
#eof
|
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_3.ps1 | Send-HTMLFormattedEmail_3.ps1 | #-------------------------------------------------
# Send-HTMLFormattedEmail
#-------------------------------------------------
# Usage: Used to send an HTML Formatted Email that is based on an XSLT template.
#-------------------------------------------------
function Send-HTMLFormattedEmail{
param ( [string] $To,
[string] $ToDisName,
[string] $BCC,
[string] $From,
[string] $FromDisName,
[string] $Subject,
[string] $Content,
[string] $Relay,
[string] $XSLPath)
try {
# Load XSL Argument List
$XSLArg = New-Object System.Xml.Xsl.XsltArgumentList
$XSLArg.Clear()
$XSLArg.AddParam("To", $Null, $ToDisName)
$XSLArg.AddParam("Content", $Null, $Content)
# Load Documents
$BaseXMLDoc = New-Object System.Xml.XmlDocument
$BaseXMLDoc.LoadXml("<root/>")
$XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform
$XSLTrans.Load($XSLPath)
#Perform XSL Transform
$FinalXMLDoc = New-Object System.Xml.XmlDocument
$MemStream = New-Object System.IO.MemoryStream
$XMLWriter = [System.Xml.XmlWriter]::Create($MemStream)
$XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter)
$XMLWriter.Flush()
$MemStream.Position = 0
# Load the results
$FinalXMLDoc.Load($MemStream)
$Body = $FinalXMLDoc.Get_OuterXML()
# Create from, To, BCC and the message strucures
$MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName
$MessTo = New-Object System.Net.Mail.Mailaddress $To
$MessBCC = New-Object System.Net.Mail.Mailaddress $BCC
$Message = New-Object System.Net.Mail.MailMessage $MessFrom, $MessTo
# Populate message
$Message.Subject = $Subject
$Message.Body = $Body
$Message.IsBodyHTML = $True
# Add BCC
$Message.BCC.Add($MessBCC)
# Create SMTP Client
$Client = New-Object System.Net.Mail.SmtpClient $Relay
# Send The Message
$Client.Send($Message)
}
catch {
return $Error[0]
}
}
### XSLT Template Example
<?xml version="1.0"?>
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:output media-type="xml" omit-xml-declaration="yes" />
<xsl:param name="To"/>
<xsl:param name="Content"/>
<xsl:template match="/">
<html>
<head>
<title>My First Formatted Email</title>
</head>
<body>
<div width="400px">
<p>Dear <xsl:value-of select="$To" />,</p>
<p></p>
<p><xsl:value-of select="$Content" /></p>
<p></p>
<p><strong>Please do not respond to this email!</strong><br />
An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p>
<p></p>
<Address>
Many thanks from your:<br />
Really Cool IT Team<br />
</Address>
</div>
</body>
</html>
</xsl:template>
</xsl:stylesheet>
|
combined_dataset/train/non-malicious/sample_42_13.ps1 | sample_42_13.ps1 | #
# Module manifest for module 'OCI.PSModules.Apmcontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2656b809-7098-428e-b605-696525730fec'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain',
'Get-OCIApmcontrolplaneApmDomainsList',
'Get-OCIApmcontrolplaneApmDomainWorkRequestsList',
'Get-OCIApmcontrolplaneDataKeysList',
'Get-OCIApmcontrolplaneWorkRequest',
'Get-OCIApmcontrolplaneWorkRequestErrorsList',
'Get-OCIApmcontrolplaneWorkRequestLogsList',
'Get-OCIApmcontrolplaneWorkRequestsList',
'Move-OCIApmcontrolplaneApmDomainCompartment',
'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys',
'Remove-OCIApmcontrolplaneApmDomain',
'Remove-OCIApmcontrolplaneDataKeys',
'Update-OCIApmcontrolplaneApmDomain'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/forever.ps1 | forever.ps1 | forever
|
combined_dataset/train/non-malicious/sample_45_40.ps1 | sample_45_40.ps1 | #
# Module manifest for module 'OCI.PSModules.Networkloadbalancer'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend',
'Get-OCINetworkloadbalancerBackendHealth',
'Get-OCINetworkloadbalancerBackendSet',
'Get-OCINetworkloadbalancerBackendSetHealth',
'Get-OCINetworkloadbalancerBackendSetsList',
'Get-OCINetworkloadbalancerBackendsList',
'Get-OCINetworkloadbalancerHealth',
'Get-OCINetworkloadbalancerHealthChecker',
'Get-OCINetworkloadbalancerHealthsList',
'Get-OCINetworkloadbalancerListener',
'Get-OCINetworkloadbalancerListenersList',
'Get-OCINetworkloadbalancersList',
'Get-OCINetworkloadbalancersPoliciesList',
'Get-OCINetworkloadbalancersProtocolsList',
'Get-OCINetworkloadbalancerWorkRequest',
'Get-OCINetworkloadbalancerWorkRequestErrorsList',
'Get-OCINetworkloadbalancerWorkRequestLogsList',
'Get-OCINetworkloadbalancerWorkRequestsList',
'Move-OCINetworkloadbalancerCompartment',
'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend',
'New-OCINetworkloadbalancerBackendSet',
'New-OCINetworkloadbalancerListener',
'Remove-OCINetworkloadbalancer',
'Remove-OCINetworkloadbalancerBackend',
'Remove-OCINetworkloadbalancerBackendSet',
'Remove-OCINetworkloadbalancerListener',
'Update-OCINetworkloadbalancer',
'Update-OCINetworkloadbalancerBackend',
'Update-OCINetworkloadbalancerBackendSet',
'Update-OCINetworkloadbalancerHealthChecker',
'Update-OCINetworkloadbalancerListener',
'Update-OCINetworkloadbalancerNetworkSecurityGroups'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2410.ps1 | 2410.ps1 |
[CmdletBinding()]
[OutputType([bool])]
param (
[Parameter(Mandatory,
ValueFromPipeline,
ValueFromPipelineByPropertyName)]
[ValidatePattern('.*\.ps1$')]
[string]$ScriptFilePath,
[string]$ScriptParameters,
[Parameter(Mandatory)]
[string]$LocalScriptFolderPath,
[Parameter(Mandatory)]
[hashtable]$TaskTriggerOptions,
[Parameter(Mandatory)]
[string]$TaskName,
[Parameter(Mandatory)]
[string]$TaskRunAsUser,
[Parameter(Mandatory)]
[string]$TaskRunAsPassword,
[ValidateScript({ Test-Connection -ComputerName $_ -Quiet -Count 1})]
[string]$Computername = 'localhost',
[ValidateSet('x86', 'x64')]
[string]$PowershellRunAsArch
)
begin {
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version Latest
function Test-PsRemoting {
param (
[Parameter(Mandatory)]
$computername
)
try {
$errorActionPreference = "Stop"
$result = Invoke-Command -ComputerName $computername { 1 }
} catch {
return $false
}
if ($result -ne 1) {
Write-Verbose "Remoting to $computerName returned an unexpected result."
return $false
}
$true
}
function Get-ComputerArchitecture {
if ((Get-CimInstance -ComputerName $Computername Win32_ComputerSystem -Property SystemType).SystemType -eq 'x64-based PC') {
'x64'
} else {
'x86'
}
}
function Get-PowershellFilePath {
if (($PowershellRunAsArch -eq 'x86') -and ((Get-ComputerArchitecture) -eq 'x64')) {
if ($Computername -eq 'localhost') {
"$($PsHome.Replace('System32','SysWow64'))\powershell.exe"
} else {
Invoke-Command -ComputerName $Computername -ScriptBlock { "$($PsHome.Replace('System32','SysWow64'))\powershell.exe" }
}
} else {
if ($Computername -eq 'localhost') {
"$PsHome\powershell.exe"
} else {
Invoke-Command -ComputerName $Computername -ScriptBlock { "$PsHome\powershell.exe" }
}
}
}
function New-MyScheduledTask {
try {
$PowershellFilePath = Get-PowershellFilePath
if ($Computername -ne 'localhost') {
$ScriptBlock = {
$Action = New-ScheduledTaskAction -Execute $using:PowershellFilePath -Argument "-NonInteractive -NoLogo -NoProfile -File $using:ScriptFilePath $using:ScriptParameters"
$TaskTriggerOptions = $using:TaskTriggerOptions
$Trigger = New-ScheduledTaskTrigger @TaskTriggerOptions
$RunAsUser = $using:TaskRunAsUser
$Task = New-ScheduledTask -Action $Action -Trigger $Trigger -Settings (New-ScheduledTaskSettingsSet);
Register-ScheduledTask -TaskName $using:TaskName -InputObject $Task -User $using:TaskRunAsUser -Password $using:TaskRunAsPassword
}
$Params = @{
'Scriptblock' = $ScriptBlock
'Computername' = $Computername
}
Invoke-Command @Params
} else {
$Action = New-ScheduledTaskAction -Execute $PowershellFilePath -Argument "-NonInteractive -NoLogo -NoProfile -File $ScriptFilePath"
$Trigger = New-ScheduledTaskTrigger @TaskTriggerOptions
$Task = New-ScheduledTask -Action $Action -Trigger $Trigger -Settings (New-ScheduledTaskSettingsSet);
Register-ScheduledTask -TaskName $TaskName -InputObject $Task -User $TaskRunAsUser -Password $TaskRunAsPassword
}
} catch {
Write-Error "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)"
$false
}
}
function Get-UncPath ($HostName,$LocalPath) {
$NewPath = $LocalPath -replace (":", "$")
if ($NewPath.EndsWith("\")) {
$NewPath = [Regex]::Replace($NewPath, "\\$", "")
}
"\\$HostName\$NewPath"
}
try {
if (($Computername -ne 'localhost') -and !(Test-PsRemoting -computername $Computername)) {
throw "PS remoting not available on the computer $Computername"
}
$LocalScriptFolderPath = $LocalScriptFolderPath.TrimEnd('\')
} catch {
Write-Error "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)"
exit
}
}
process {
try {
if ($ScriptFilePath.StartsWith('\\') -or ($Computername -ne 'localhost')) {
Copy-Item -Path $ScriptFilePath -Destination (Get-UncPath -HostName $Computername -LocalPath $LocalScriptFolderPath)
$ScriptFilePath = "$LocalScriptFolderPath\$($ScriptFilePath | Split-Path -Leaf)"
}
New-MyScheduledTask | Out-Null
$true
} catch {
Write-Error "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)"
$false
}
} |
combined_dataset/train/non-malicious/sample_10_28.ps1 | sample_10_28.ps1 | #
# Module manifest for module 'OCI.PSModules.Fleetsoftwareupdate'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Fleetsoftwareupdate.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e830226f-46c5-4916-992f-740cc29d35ab'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Fleetsoftwareupdate Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Fleetsoftwareupdate.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIFleetsoftwareupdateFsuCollectionTargets',
'Get-OCIFleetsoftwareupdateFsuAction',
'Get-OCIFleetsoftwareupdateFsuActionOutputContent',
'Get-OCIFleetsoftwareupdateFsuActionsList',
'Get-OCIFleetsoftwareupdateFsuCollection',
'Get-OCIFleetsoftwareupdateFsuCollectionsList',
'Get-OCIFleetsoftwareupdateFsuCollectionTargetsList',
'Get-OCIFleetsoftwareupdateFsuCycle',
'Get-OCIFleetsoftwareupdateFsuCyclesList',
'Get-OCIFleetsoftwareupdateFsuDiscoveriesList',
'Get-OCIFleetsoftwareupdateFsuDiscovery',
'Get-OCIFleetsoftwareupdateFsuDiscoveryTargetsList',
'Get-OCIFleetsoftwareupdateFsuJob',
'Get-OCIFleetsoftwareupdateFsuJobOutputContent',
'Get-OCIFleetsoftwareupdateFsuJobOutputsList',
'Get-OCIFleetsoftwareupdateFsuJobsList',
'Get-OCIFleetsoftwareupdateWorkRequest',
'Get-OCIFleetsoftwareupdateWorkRequestErrorsList',
'Get-OCIFleetsoftwareupdateWorkRequestLogsList',
'Get-OCIFleetsoftwareupdateWorkRequestsList',
'Invoke-OCIFleetsoftwareupdateCloneFsuCycle',
'Invoke-OCIFleetsoftwareupdateResumeFsuAction',
'Invoke-OCIFleetsoftwareupdateRetryFsuJob',
'Move-OCIFleetsoftwareupdateFsuActionCompartment',
'Move-OCIFleetsoftwareupdateFsuCollectionCompartment',
'Move-OCIFleetsoftwareupdateFsuCycleCompartment',
'Move-OCIFleetsoftwareupdateFsuDiscoveryCompartment',
'New-OCIFleetsoftwareupdateFsuAction',
'New-OCIFleetsoftwareupdateFsuCollection',
'New-OCIFleetsoftwareupdateFsuCycle',
'New-OCIFleetsoftwareupdateFsuDiscovery',
'Remove-OCIFleetsoftwareupdateFsuAction',
'Remove-OCIFleetsoftwareupdateFsuCollection',
'Remove-OCIFleetsoftwareupdateFsuCollectionTargets',
'Remove-OCIFleetsoftwareupdateFsuCycle',
'Remove-OCIFleetsoftwareupdateFsuDiscovery',
'Remove-OCIFleetsoftwareupdateFsuJob',
'Stop-OCIFleetsoftwareupdateFsuAction',
'Stop-OCIFleetsoftwareupdateFsuDiscovery',
'Update-OCIFleetsoftwareupdateFsuAction',
'Update-OCIFleetsoftwareupdateFsuCollection',
'Update-OCIFleetsoftwareupdateFsuCycle',
'Update-OCIFleetsoftwareupdateFsuDiscovery',
'Update-OCIFleetsoftwareupdateFsuJob'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Fleetsoftwareupdate'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_30_86.ps1 | sample_30_86.ps1 | @{
GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @('MSFT_MpPerformanceRecording.psm1')
FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml')
CompatiblePSEditions = @('Desktop', 'Core')
FunctionsToExport = @( 'New-MpPerformanceRecording',
'Get-MpPerformanceReport'
)
HelpInfoUri="https://aka.ms/winsvr-2022-pshelp"
PowerShellVersion = '5.1'
}
# SIG # Begin signature block
# MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALMtnQG5KhaVi8
# /j7ONkfb/EMugE0iBrx7n8hqD9uLdaCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ
# mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIBhT7C0VQ9IYyvNiupSGOc577LyiUPub5f/VTSflWIz9MEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEABnd+pUQ4k5yl5TYH2YYljaLO
# QqZkt831g916A4Fg/2dZRv7x7s/CjT8pIgDof5Os6he6myd8yvjOgT5zP4lIBwcH
# KPBKs82WWDV+2DA9klZWXtNTinEQ9ReWdHsrssOJnN+b1NqOE42L/MQ6tgGv6BRh
# HGhbsEICgPEspM1yje8AO+Q+fVZRa2W7ELRGsppiqK0rcJQRFJnnaHfkFoVOg216
# eKFzRAwl2KDkTGqz9ZC4Ib6asXzAEgOxKHNiFeePYbuFBDa+NCRuCqDCa9MVov6L
# GHUDSBaJsCVd6pTP/6v6g8LvDIGlCxfXHLDOccZk4SaSeRTFqKm3EN7+NYSQhqGC
# FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCArC/flbu72ERc3T9Rswp/f
# NlBI8mMLmSRKQplEOsjrYgIGZa67cqcTGBMyMDI0MDEyNzAzMjkxMS44MjFaMASA
# AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC
# EzMAAAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5
# WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE
# CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL
# Ex1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC
# AgoCggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2Dtri
# QP+T52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzI
# HHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0m
# Aq3earyH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5
# EW6NVnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgD
# FjHUpcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7kt
# FAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5
# gpv+YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSv
# tFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zlj
# EjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnS
# eOXePT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJ
# MIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt
# cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw
# AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv
# ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw
# ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI
# hvcNAQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/ea
# O2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+m
# bXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcG
# dXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+
# zvGJNAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+O
# dAquBiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9
# PNlyEHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbM
# P+/vdYUqaJspupBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM
# 9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4Q
# QQj3KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegce
# J9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIH
# cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB
# iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp
# TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw
# OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh
# C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx
# WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc
# UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc
# nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo
# veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi
# YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9
# fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH
# GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X
# KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE
# R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/
# eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3
# FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd
# BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE
# AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI
# MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB
# Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud
# HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By
# b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO
# MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy
# dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC
# AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk
# bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng
# ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3
# lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC
# gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6
# MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU
# BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh
# VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+
# fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp
# NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI
# qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB
# AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt
# MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw
# JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMc
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNH
# GWXbNaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOlef7cwIhgPMjAyNDAxMjcwMzAwMDda
# GA8yMDI0MDEyODAzMDAwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6V5/twIB
# ADAHAgEAAgIVHzAHAgEAAgIRXzAKAgUA6V/RNwIBADA2BgorBgEEAYRZCgQCMSgw
# JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
# DQEBBQUAA4GBAHzzIpkqwNZ0k7HrdztNkWw9S4R6sXz7UpRGLKzsGrtVWa17g9pD
# aymsznf/C0wIYjr0RwFtDyuCmu/VL0b9wXPOWzPMFe1CEW19EWNt0ne8fTrarVRE
# I2hfxaJUcx/b1viZ8SpbLzl7TVoDe4WrWlgsIcJ6STTlwvrJTm4btqCmMYIEDTCC
# BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd
# ldStqhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq
# hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg7jeBAtXQCql8ekCZSidOedQnfq7U
# tscPRHYC8LVvCoswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWs
# T3iZnHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEILaIRaGjn6f8
# 8Dt5jGhn8FZpGIafZDDzkYBkO3Obk2G6MA0GCSqGSIb3DQEBCwUABIICAB0bC38B
# dvcelvPclt0injgjlefSMGDMMkytm4w+D9Y7sXKxjy6zx/8m3Ya9ScVjqHCfajKQ
# uEqQMQ63CZVjcjgLkUeBAjgYW1pQ2dO4uM0AQv1SGxjF8nneXvAvv/67Ca0aYa0N
# JU5Pxb3qpIcaZaN0q54BptOoTn46mrOWGDM8cSs2/5YzyaoBt5fF178ZXWtfuR7A
# jBdBv+sko/PMKXT3ga5X+NcgGPF7Li4JifHek0CanUgfbsVS5zv5fCzcIr3ZMlPx
# Ni97IqHydxg8R3FhPlUnEf8584xSGGQylZbuNqqT16lw8AKdddFAz+WfF6NzfHU6
# 6Gk8NExSkUhGPGQDjvuaH1xkX/RQXij8PuBlxMbcZIDwoHVDWf0nRrXE6MVdfC7Q
# TPjrk03GuRm554MvD2KT1rHkI/wRoiwcg67TLTfr/oGJDcy+ehg5AaFLmtihAY9l
# WvUuR1haKGcLuPNUlcKEjT5kRIut251B4xrzUMnZRRboJrJT2yD4oRykRU/aCXOS
# uklYw3unZ5avpPwUfmxo7WnVl1t4GrnM98xWfSVqqzRIyCtX80z6xcrQQkEyjgTb
# GRbZLaYP57Fn+NQOPgwKhxxSbSBndB4dpnEGmbTsKzko3wIyHOyFrLuXjk1joJKS
# 0WtZNLsJXh+nNeKlt3NbSnYl3lv9AtMcdEQk
# SIG # End signature block
|
combined_dataset/train/non-malicious/3027.ps1 | 3027.ps1 | Set-StrictMode -Version Latest
InModuleScope Pester {
Describe "the In statement" {
Setup -Dir "test_path"
It "executes a command in that directory" {
In "$TestDrive" -Execute { "" | Out-File "test_file" }
"$TestDrive\test_file" | Should -Exist
}
It "updates the `$pwd variable when executed" {
In "$TestDrive\test_path" -Execute { $env:Pester_Test = $pwd }
$env:Pester_Test | Should -Match "test_path"
$env:Pester_Test = ""
}
}
}
|
combined_dataset/train/non-malicious/3039.ps1 | 3039.ps1 | Set-StrictMode -Version Latest
InModuleScope Pester {
Describe "Should -BeTrue" {
Context "Basic functionality" {
It "given true it passes" {
$true | Should -BeTrue
}
It "given truthy it passes" {
1 | Should -BeTrue
}
It "given false it fails" {
{ $false | Should -BeTrue } | Verify-AssertionFailed
}
}
Context "Testing messages" {
It "given false it returns the correct assertion message" {
$err = { $false | Should -BeTrue } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal 'Expected $true, but got $false.'
}
It "given false and a reason it returns the correct assertion message" {
$err = { $false | Should -BeTrue -Because "we said so" } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal 'Expected $true, because we said so, but got $false.'
}
}
}
Describe "Should -Not -BeTrue" {
Context "Basic functionality" {
It "given false it passes" {
$false | Should -Not -BeTrue
}
It "given falsy '<value>' it passes" -TestCases @(
@{ Value = $null }
@{ Value = @() }
@{ Value = 0 }
) {
param($Value)
$Value | Should -Not -BeTrue
}
It "given true it fails" {
{ $true | Should -Not -BeTrue } | Verify-AssertionFailed
}
}
Context "Testing messages" {
It "given true it returns the correct assertion message" {
$err = { $true | Should -Not -BeTrue } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal 'Expected $false, but got $true.'
}
}
}
Describe "Should -BeFalse" {
Context "Basic functionality" {
It "given false it passes" {
$false | Should -BeFalse
}
It "given true it fails" {
{ $true | Should -BeFalse } | Verify-AssertionFailed
}
}
Context "Testing messages" {
It "given true it returns the correct assertion message" {
$err = { $true | Should -BeFalse } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal 'Expected $false, but got $true.'
}
}
It "given true and a reason it returns the correct assertion message" {
$err = { $true | Should -BeFalse -Because "we said so" } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal 'Expected $false, because we said so, but got $true.'
}
}
Describe "Should -Not -BeFalse" {
Context "Basic functionality" {
It "given true it passes" {
$true | Should -Not -BeFalse
}
It "given false it fails" {
{ $false | Should -Not -BeFalse } | Verify-AssertionFailed
}
}
Context "Testing messages" {
It "given false it returns the correct assertion message" {
$err = { $false | Should -Not -BeFalse } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal 'Expected $true, but got $false.'
}
}
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.