full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/sample_37_21.ps1 | sample_37_21.ps1 | ---
parameters:
- name: agent_pool
type: string
- name: country
type: string
- name: devops_security_alerts_packages_source_exclusion_paths
type: object
default: []
- name: environment
type: string
- name: gh_token
type: string
- name: job_name
type: string
- name: protect_environment
type: string
default: 'Prod'
jobs:
- job: DevOps_API_Repository_Check_${{ parameters.job_name }}
displayName: DevSecOps - Check For Security Alerts
pool: ${{ parameters.agent_pool }}
condition: eq('${{ parameters.environment }}', '${{ parameters.protect_environment }}')
steps:
- checkout: none
- task: PowerShell@2
name: Alert_Check
displayName: Calling DevOps Pipeline Security API For Alerts
continueOnError: true
inputs:
targetType: inline
pwsh: true
script: |
Add-Type -AssemblyName System.Web
$repository=(Split-Path -Path $(Build.Repository.Name) -Leaf)
$country = "${{ parameters.country }}"
if($country.StartsWith("AU"))
{
$devops_pipeline_security_api_address = 'https://prod-k8.infotrack.com.au/devops-pipeline-security'
}
elseif($country -eq 'UK')
{
$devops_pipeline_security_api_address = 'https://prod-k8.infotrack.co.uk/devops-pipeline-security'
}
elseif($country -eq 'US')
{
$devops_pipeline_security_api_address = 'https://prod-k8.infotrack.com/devops-pipeline-security'
}
elseif($country -eq 'CA')
{
$devops_pipeline_security_api_address = 'https://prod-k8.infotrackcanada.com/devops-pipeline-security'
}
Write-host "Devops Security Endpoint: $devops_pipeline_security_api_address"
Write-host "##vso[task.setvariable variable=devops_pipeline_security_api_address;isOutput=true]$devops_pipeline_security_api_address"
$alertsData= Invoke-WebRequest -Uri "$devops_pipeline_security_api_address/alerts?repositoryName=$repository&tokens[github]=${{ parameters.gh_token }}"
$alerts = ConvertFrom-Json $alertsData.content
$devops_security_alerts_packages_source_exclusion_paths = '${{ convertToJson(parameters.devops_security_alerts_packages_source_exclusion_paths) }}' | ConvertFrom-Json
if($devops_security_alerts_packages_source_exclusion_paths.Length) {
$pattern = @($devops_security_alerts_packages_source_exclusion_paths | ForEach-Object {"^" + [regex]::Escape($_) + ".*"}) -join '|'
}
if($pattern) {
Write-Host $pattern
$alertsRequiringManualApproval = $alerts | Where-Object -FilterScript {($_.requiresManualApproval -EQ 'true') -and ($_.manifestPath -notmatch $pattern) }
} else {
Write-Host 'No devops_security_alerts_packages_source_exclusion_paths provided'
$alertsRequiringManualApproval = $alerts | Where-Object -FilterScript {($_.requiresManualApproval -EQ 'true')}
}
$filteredAlerts = $alertsRequiringManualApproval.requiresManualApproval
$requiresManualApproval = $filteredAlerts -Contains 'true'
Write-host "##vso[task.setvariable variable=requiresManualApproval;isOutput=true]$requiresManualApproval"
- job: Manual_Security_Approval_${{ parameters.job_name }}
displayName: Manual Approval For Actionable Security Alerts
dependsOn: DevOps_API_Repository_Check_${{ parameters.job_name }}
condition: in(dependencies.DevOps_API_Repository_Check_${{ parameters.job_name }}.result, 'Succeeded', 'Skipped')
variables:
requiresManualApproval: $[ dependencies.DevOps_API_Repository_Check_${{ parameters.job_name }}.outputs['Alert_Check.requiresManualApproval'] ]
pool: server
timeoutInMinutes: 4320
steps:
- task: ManualValidation@0
condition: eq(variables['requiresManualApproval'],'True')
timeoutInMinutes: 1440
displayName: Manual Approval For Actionable Security Alerts - ${{ parameters.country }} - ${{ parameters.job_name }}
inputs:
instructions: 'Actionable security alerts exist for this application. Please confirm you acknowledge you are about to release an application which contains known security alerts'
onTimeout: 'reject'
- job: DevOps_API_Record_Manual_Approval_${{ parameters.job_name }}
displayName: Record Manual Approval For Actionable Security Alerts
pool: ${{ parameters.agent_pool }}
dependsOn:
- DevOps_API_Repository_Check_${{ parameters.job_name }}
- Manual_Security_Approval_${{ parameters.job_name }}
condition: succeeded()
variables:
devops_pipeline_security_api_address: $[ dependencies.DevOps_API_Repository_Check_${{ parameters.job_name }}.outputs['Alert_Check.devops_pipeline_security_api_address'] ]
steps:
- checkout: none
- task: PowerShell@2
name: Record_Manual_Approval_${{ parameters.job_name }}
displayName: Record Manual Approval
continueOnError: true
env:
SYSTEM_ACCESSTOKEN: $(System.AccessToken)
inputs:
targetType: inline
pwsh: true
script: |
Add-Type -AssemblyName System.Web
$timelineData= Invoke-WebRequest -Uri "$($env:SYSTEM_TEAMFOUNDATIONCOLLECTIONURI)$env:SYSTEM_TEAMPROJECTID/_apis/build/builds/$(Build.BuildId)/Timeline?api-version=5.1" -Headers @{Authorization = "Bearer $env:SYSTEM_ACCESSTOKEN"}
$timelineEvents = ConvertFrom-Json $timelineData.content
Write-Output "------- TimeLine Events Start ----"
Write-Output $timelineEvents
Write-Output "------- TimeLine Events End ----"
$manualApprovals = $timelineEvents.records | Where-Object -FilterScript {($_.type -EQ 'Task') -and ($_.identifier) -and ($_.name -EQ 'Manual Approval For Actionable Security Alerts - ${{ parameters.country }} - ${{ parameters.job_name }}') }
if ($manualApprovals) {
foreach($manualApproval in $manualApprovals) {
Write-Output "------- Manual Approval Start ----"
Write-Output $manualApproval
Write-Output "------- Manual Approval End ----"
$approvalData= Invoke-WebRequest -Uri "$($env:SYSTEM_TEAMFOUNDATIONCOLLECTIONURI)$env:SYSTEM_TEAMPROJECTID/_apis/pipelines/approvals/$($manualApproval.identifier)?api-version=7.0-preview.1&`$expand=steps" -Headers @{Authorization = "Bearer $env:SYSTEM_ACCESSTOKEN"}
Write-Output "------- ApprovalData Start ----"
Write-Output $approvalData
Write-Output "------- ApprovalData End ----"
$approval = ConvertFrom-Json $approvalData.content
$approvalId= $($manualApproval.identifier)
$approvalUserDisplayName= $($approval.steps[0].actualApprover.displayName)
$approvalUserEmail= $($approval.steps[0].actualApprover.uniqueName)
$approvalComment= $($approval.steps[0].comment)
$approvalDate= $($approval.steps[0].lastModifiedOn)
$pipelineBuildUri= "$($env:SYSTEM_TEAMFOUNDATIONCOLLECTIONURI)$env:SYSTEM_TEAMPROJECTID/_build/results?buildId=$(Build.BuildId)"
$pipelineName= "$(Build.DefinitionName)"
$repositoryName= "$(Build.Repository.Name)"
Write-Output "Approval Id: $($approvalId)"
Write-Output "Approval User Display Name: $($approvalUserDisplayName)"
Write-Output "Approval User Email: $($approvalUserEmail)"
Write-Output "Approval Comment: $($approvalComment)"
Write-Output "Approval Date: $($approvalDate)"
Write-Output "Pipeline BuildUri: $($pipelineBuildUri)"
Write-Output "Pipeline Name: $($pipelineName)"
Write-Output "Repository Name: $($repositoryName)"
$postParams = @{
approvalId=$approvalId;
approvalUserDisplayName=$approvalUserDisplayName;
approvalUserEmail=$approvalUserEmail;
approvalComment=$approvalComment;
approvalDate=$approvalDate;
pipelineBuildUri=$pipelineBuildUri;
pipelineName=$pipelineName;
repositoryName=$repositoryName;
}
$body = $postParams | ConvertTo-JSON
Invoke-WebRequest -Uri "$(devops_pipeline_security_api_address)/pipeline" -ContentType "application/json" -Method POST -Body $body
}
} else {
Write-Output "None Found"
}
|
combined_dataset/train/non-malicious/sample_64_59.ps1 | sample_64_59.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudbridge'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '23fab747-5070-4685-94b0-d91859b2fd98'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudbridge Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent',
'Get-OCICloudbridgeAgentDependenciesList',
'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList',
'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset',
'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource',
'Get-OCICloudbridgeAssetSourceConnectionsList',
'Get-OCICloudbridgeAssetSourcesList',
'Get-OCICloudbridgeDiscoverySchedule',
'Get-OCICloudbridgeDiscoverySchedulesList',
'Get-OCICloudbridgeEnvironment',
'Get-OCICloudbridgeEnvironmentsList',
'Get-OCICloudbridgeHistoricalMetricsList',
'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory',
'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest',
'Get-OCICloudbridgeWorkRequestErrorsList',
'Get-OCICloudbridgeWorkRequestLogsList',
'Get-OCICloudbridgeWorkRequestsList',
'Import-OCICloudbridgeInventory',
'Invoke-OCICloudbridgeAnalyzeAssets',
'Invoke-OCICloudbridgeRefreshAssetSource',
'Invoke-OCICloudbridgeSubmitHistoricalMetrics',
'Move-OCICloudbridgeAgentCompartment',
'Move-OCICloudbridgeAgentDependencyCompartment',
'Move-OCICloudbridgeAssetCompartment',
'Move-OCICloudbridgeAssetSourceCompartment',
'Move-OCICloudbridgeAssetTags',
'Move-OCICloudbridgeDiscoveryScheduleCompartment',
'Move-OCICloudbridgeEnvironmentCompartment',
'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency',
'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource',
'New-OCICloudbridgeDiscoverySchedule',
'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory',
'Remove-OCICloudbridgeAgent',
'Remove-OCICloudbridgeAgentDependency',
'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource',
'Remove-OCICloudbridgeDiscoverySchedule',
'Remove-OCICloudbridgeEnvironment',
'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest',
'Update-OCICloudbridgeAgent',
'Update-OCICloudbridgeAgentDependency',
'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource',
'Update-OCICloudbridgeDiscoverySchedule',
'Update-OCICloudbridgeEnvironment',
'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1919.ps1 | 1919.ps1 |
Describe "Invoke-Expression" -Tags "CI" {
Context "Should execute the invoked command validly" {
It "Should return the echoed text" {
(Invoke-Expression -command "echo pestertest1") | Should -BeExactly "pestertest1"
}
It "Should return the echoed text from a script" {
$testfile = Join-Path -Path (Join-Path $PSScriptRoot -ChildPath assets) -ChildPath echoscript.ps1
$testcommand = "echo pestertestscript"
$testcommand | Add-Content -Path "$testfile"
(Invoke-Expression "& '$testfile'") | Should -BeExactly "pestertestscript"
Remove-Item "$testfile"
}
}
}
Describe "Invoke-Expression DRT Unit Tests" -Tags "CI" {
It "Invoke-Expression should work"{
$result=invoke-expression -Command 2+2
$result|Should -Be 4
}
}
|
combined_dataset/train/non-malicious/sample_43_68.ps1 | sample_43_68.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Get the access keys of the resource.
.Description
Get the access keys of the resource.
.Example
PS C:\> Get-AzWebPubSubKey -ResourceGroupName psdemo -ResourceName psdemo-wps | Format-List
PrimaryConnectionString : Endpoint=https://psdemo-wps.webpubsub.azure.com;AccessKey=********;Version=1.0;
PrimaryKey : ********
SecondaryConnectionString : Endpoint=https://psdemo-wps.webpubsub.azure.com;AccessKey=********;Version=1.0;
SecondaryKey : ********
.Example
PS C:\> $wps = Get-AzWebPubSub -ResourceGroupName psdemo -ResourceName psdemo-wps
PS C:\> $wps | Get-AzWebPubSubKey | Format-List
PrimaryConnectionString : Endpoint=https://psdemo-wps.webpubsub.azure.com;AccessKey=********;Version=1.0;
PrimaryKey : ********
SecondaryConnectionString : Endpoint=https://psdemo-wps.webpubsub.azure.com;AccessKey=********;Version=1.0;
SecondaryKey : ********
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.IWebPubSubIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.Api20220801Preview.IWebPubSubKeys
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IWebPubSubIdentity>: Identity Parameter
[HubName <String>]: The hub name.
[Id <String>]: Resource identity path
[Location <String>]: the region
[PrivateEndpointConnectionName <String>]: The name of the private endpoint connection
[ResourceGroupName <String>]: The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.
[ResourceName <String>]: The name of the resource.
[SharedPrivateLinkResourceName <String>]: The name of the shared private link resource
[SubscriptionId <String>]: Gets subscription Id which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.
#>
function Get-AzWebPubSubKey_ListViaIdentity
{
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.Api20220801Preview.IWebPubSubKeys])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='ListViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Models.IWebPubSubIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.WebPubSub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process
{
try
{
$null = $InputObject.Id -match '/subscriptions/(?<SubscriptionId>[a-zA-Z0-9-]{36})/resourceGroups/(?<ResourceGroupName>[^/]+)/providers/Microsoft.SignalRService/WebPubSub/(?<ResourceName>.+$)'
$PSBoundParameters.Add("ResourceGroupName", $Matches.ResourceGroupName)
$PSBoundParameters.Add("ResourceName", $Matches.ResourceName)
$PSBoundParameters.Add("SubscriptionId", $Matches.SubscriptionId)
$null = $PSBoundParameters.Remove("InputObject")
Az.SignalR\Get-AzWebPubSubKey @PSBoundParameters
} catch
{
throw
}
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBhzef/WGBkxC5D
# 7WD+ZkJwLytEp2p+nmNjFqxoKBd+26CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEVL8f4ijeoSwsByME1t2rMc
# UO09flQW/1GzkQy/EmoJMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHgTIBhYGcNGGOjQeYx0ns5IetKJUNLvSaIxlFja0VB4Ye3XhkTXFSonx
# LX1vTkpcpSxoScq1PhMBwq30EpwIR96E15Pj2ARpi9sifX1kVZEX0GapMl3eTSnT
# gTgJt+W1RxT0fyf7SCfdb/GPcwGg0JqLyYS/MObhdByNAXN5K1lv7D5PWSQL/T01
# fhaSsyNyPywFMulcPhn760PXBzeXSFGXOT8BSDwDr71VyqHjh3rDUWJUk+SEV3Fa
# KgqTPl8b9l9vnR/PgvNlQt5CZgEZNnAND79nbjPh+5mHEhCdM4G9i+cZ8tr+vOWc
# waLXLwNyrFKgkl8Yy7fw0yLr2A4cg6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD8tKecICcbZAre+oDls0J2IrlIYP1uwTiZoacKnSlP5AIGZh/SmF7h
# GBMyMDI0MDQyMzEzMTUyMS42NjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQyNDA5NDMyMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS7DAHAgEAAgISrzAKAgUA
# 6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADCABKpo/NApeGAt90g9
# 7xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2fGPvThUiQemQ8jwI/aA1i
# 5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60f1cT69nPDTDg+i6ONCMm
# CZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQggO51fNL7QGo4Ljd4uIhOUHn7dePsCHGoaVtu8hB3U+owgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNawncfq1eDXUwS6ExT0PRgi
# MA0GCSqGSIb3DQEBCwUABIICABHlMwaK6z0MTEKx8/pJjFooVKCaPWxDbs9LajIe
# llsWeJfU7t9/S9OZC/gB32qHymtkuI0JZqLjj1EQuZZHUSMEPBkp6hJcbrqosGdz
# ISt/lQ1HERI5zRQ4pJhZSZgehIIs6tZWdv2h3R58PBR8j9jX1wFjQufh/rPKhUGx
# KdecWrz+VcofLAxRAcBnzP+BtLbwXgwAPs1hjDMLiF1pIJjf8nK+3HSVuQLwWmBY
# XyXN6z443y9HwbJfFD4gY6Q79c7WnsUb5NDVhel9w52DqQWs+UwOdUaOaBtAd0Up
# GOm8Tro/JKNKNeM2wK0cenOWhMoPUc5OW38EF2w3XXhHMevIlO0JSqkQ4oeMrqRY
# mYFk6aLUwC8gXWIHR82/nMOBdd7XHCO5Ph6M0nAtb3mUa8+Eps2Vc80Rf1y8k21/
# LUvYpITiIuIxLQPI9yp3zcCFNdVFHAEyKrrogBiX+4WjDP/8ZheMFU5874rWU6qd
# 6PFMP6EIYx9aSUTB8/+0hIghVSS09GQHDsUIeH9kCPD/g+0RPk6eCFPdyqNCDZvi
# XqapfnOIR+VHr18vAkEBDnQadWrQkMKd5Q8+PZsBLo7J4VL0pFwHRXuPUUm7USNM
# kxTS3I/lOIEcub7WMOhQdsxw8kLtruPqOMItdrkUYRFRGcHW8ZaPf1N5qQGjo34w
# vQ1Z
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_42_95.ps1 | sample_42_95.ps1 | ConvertFrom-StringData @'
FailoverClustersModuleRequired=Необходимый модуль PowerShell (FailoverClusters) не найден. Используйте инструмент "Роли и компоненты", чтобы установить следующие элементы: средства удаленного администрирования сервера | Средства администрирования компонентов | Средства отказоустойчивой кластеризации | Модуль отказоустойчивости кластеров для Windows PowerShell.
HyperVModuleRequired=Необходимый модуль PowerShell (Hyper-V) не найден. Используйте инструмент "Роли и компоненты", чтобы установить следующие элементы: средства удаленного администрирования сервера | Средства администрирования ролей | Средства управления Hyper-V | Модуль Hyper-V для Windows PowerShell.
CimCmdletsModuleRequired=Требуемый модуль PowerShell (CimCmdlets) не найден.
HypervisorSchedulerTypeNotSupported=Нельзя задать тип планировщика гипервизора в серверах Windows Server ниже, чем Windows Server 2016.
InvalidLoadBalancingAlgorithmType=Параметр "Алгоритм балансировки нагрузки" был предоставлен, когда Switch Embedded Teaming (SET) не поддерживается.
DeviceIdNotFound=Не удалось найти устройство с идентификатором {0} в виртуальной машине {1} (vmId = {2})
PhysicalNetworkAdapterRequired=Имя физического сетевого адаптера должно быть предоставлено для внешнего виртуального коммутатора.
StartVirtualMachineStartingMessage=Запуск виртуальной машины {0}...
StartVirtualMachineSuccessMessage=Виртуальная машина {0} успешно запущена.
StartVirtualMachineFailureMessage=Не удалось запустить виртуальную машину {0}. Ошибка: {1}
StartVirtualMachineOperationMessage=Виртуальные машины успешно запущены: {0}. Не удалось запустить виртуальные машины: {1}.
ShutdownVirtualMachineStartingMessage=Завершение работы виртуальной машины {0}...
ShutdownVirtualMachineSuccessMessage=Работа виртуальной машины {0} успешно завершена.
ShutdownVirtualMachineFailureMessage=Не удалось завершить работу виртуальной машины {0}. Сообщение об ошибке: {1}
ShutdownVirtualMachineOperationMessage=Работа виртуальных машин успешно завершена: {0}. Не удалось завершить работу виртуальных машин: {1}.
TurnoffVirtualMachineStartingMessage=Выключение виртуальной машины {0}...
TurnoffVirtualMachineSuccessMessage=Виртуальная машина {0} успешно выключена.
TurnoffVirtualMachineFailureMessage=Не удалось выключить виртуальную машину {0}. Сообщение об ошибке: {1}
TurnoffVirtualMachineOperationMessage=Виртуальные машины успешно выключены: {0}. Не удалось выключить виртуальные машины: {1}.
DeleteSavedStateVirtualMachineStartingMessage=Выполняется удаление сохраненного состояния виртуальной машины {0}...
DeleteSavedStateVirtualMachineSuccessMessage=Сохраненное состояние виртуальной машины {0} успешно удалено.
DeleteSavedStateVirtualMachineFailureMessage=Не удалось удалить сохраненное состояние виртуальной машины {0}. Сообщение об ошибке: {1}
DeleteSavedStateVirtualMachineOperationMessage=Сохраненное состояние для виртуальных машин ({0}) успешно сохранено. Не удалось удалить сохраненное состояние для виртуальных машин: {1}.
SaveVirtualMachineStartingMessage=Сохранение виртуальной машины {0}...
SaveVirtualMachineSuccessMessage=Виртуальная машина {0} успешно сохранена.
SaveVirtualMachineFailureMessage=Не удалось сохранить виртуальную машину {0}. Сообщение об ошибке: {1}
SaveVirtualMachineOperationMessage=Виртуальные машины успешно сохранены: {0}. Не удалось сохранить виртуальные машины: {1}.
ResetVirtualMachineStartingMessage=Сброс виртуальной машины {0}...
ResetVirtualMachineSuccessMessage=Виртуальная машина {0} успешно сброшена.
ResetVirtualMachineFailureMessage=Не удалось сбросить виртуальную машину {0}. Сообщение об ошибке: {1}
ResetVirtualMachineOperationMessage=Виртуальные машины успешно сброшены: {0}. Не удалось сбросить виртуальные машины: {1}.
ResumeVirtualMachineStartingMessage=Возобновление работы виртуальной машины {0}...
ResumeVirtualMachineSuccessMessage=Работа виртуальной машины {0} успешно возобновлена.
ResumeVirtualMachineFailureMessage=Не удалось возобновить работу виртуальной машины {0}. Сообщение об ошибке: {1}
ResumeVirtualMachineOperationMessage=Работа виртуальных машин успешно возобновлена: {0}. Не удалось возобновить работу виртуальных машин {1}.
SuspendVirtualMachineStartingMessage=Приостановка работы виртуальной машины {0}...
SuspendVirtualMachineSuccessMessage=Работа виртуальной машины {0} успешно приостановлена.
SuspendVirtualMachineFailureMessage=Не удалось приостановить работу виртуальной машины {0}. Сообщение об ошибке: {1}
SuspendVirtualMachineOperationMessage=Работа виртуальных машин успешно приостановлена: {0}. Не удалось приостановить работу виртуальных машин: {1}.
VirtualMachineDiskDeleteDiskNotFound=Диск с идентификатором {0} не удается удалить с виртуальной машины {1}, поскольку он не найден.
VirtualMachineDvdDeleteDiskNotFound=Компакт- или DVD-диск с идентификатором {0} не удается удалить с виртуальной машины {1}, поскольку он не найден.
VirtualMachineDiskEditDiskNotFound=Диск с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку он не найден.
VirtualMachineDvdEditDiskNotFound=Компакт- или DVD-диск с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку он не найден.
VirtualMachineDiskPathNotFound=Диск с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку у него пустой параметр пути.
VirtualMachineDvdPathNotFound=Компакт- или DVD-диск с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку у него пустой параметр пути.
VirtualMachineNetworkDeleteAdapterNotFound=Виртуальный сетевой адаптер с идентификатором {0} не удается удалить с виртуальной машины {1}, поскольку он не найден.
VirtualMachineNetworkEditAdapterNotFound=Виртуальный сетевой адаптер с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку он не найден.
VirtualMachineNetworkEditAdapterVlanModeNotSupported=Виртуальный сетевой адаптер с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку режим виртуальной локальной сети {2} не поддерживается.
VirtualMachineNetworkEditAdapterIsolationModeNotSupported=Виртуальный сетевой адаптер с идентификатором {0} не удается изменить на виртуальной машине {1}, поскольку режим изоляции {2} не поддерживается.
VirtualMachineSdnConfigurationFailed=Виртуальная машина {0} создана, но настроить виртуальную сеть не удалось.
VirtualMachinesString=Виртуальные машины
VirtualMachinesSecuritySettingsNotSupported=Параметры безопасности виртуальной машины не поддерживаются в версиях сервера Windows, предшествующих Windows Server 2012 R2.
MoveVirtualMachineStorageParametersInvalid=Недействительные параметры, которые управляют способом перемещения хранилища виртуальной машины.
BritannicaNamespaceNotAvailable=Требуемое пространство имен CIM для программно-определяемого центра обработки данных (SDDC\Управление) не найдено.
MoveVirtualMachineInvalidParameters=Для перемещения виртуальной машины указаны недопустимые параметры.
MoveVirtualMachineVMIncompatible=Не удалось переместить виртуальную машину {0} на новый хост-сервер, так как обнаружены несовместимости. Дополнительные сведения о несовместимостях см. в журналах событий (журналы приложений и служб\\Microsoft-ServerManagementExperience) на {1}.
ImportVirtualMachineVMIncompatible=Не удалось импортировать виртуальную машину {0} на этот сервер узла, так как обнаружены проблемы с совместимостью. Дополнительные сведения о несовместимости см. в журналах событий (журналы приложений и служб\\Microsoft-ServerManagementExperience) на {1}.
NewVirtualMachineCreatedAddToClusterFailed=Виртуальная {0} успешно создана на сервере {1}. Он не был добавлен в отказоустойчивый кластер. Дополнительные сведения см. в журналах событий (журналы приложений и служб\\Microsoft-ServerManagementExperience) {1}.
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBkNtICqr2WfLqB
# jJpTPgALNlX4MMqc4Uj2wX95tmpviKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDpxlhvsUEDmD5FTVYFjNXa/
# 6Jv5PxOa4cLFQOrjc1bOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAQmlgJHKm9aTQn6A+jpkpqzwPWkkrBQwtcdJHe5bFUd8OnB5ZIzg+tkzV
# iOoR3Y7sMNYt3o/UY8U/GbnMKuYkdj7vPG1vzstjlChaIhBg+NzSsHMqRmuQ1IWC
# xjEIG38/roU3PEuTCLypnzCLAc5C/ISf0YTk/KQpch4hYY5y3egldLOtUs03/asC
# M5NCyBBu/REeynMEaCF/74u5pPVja+B5/RuWMR04J9WkeEj0qjD4MW/n4/v3tU96
# jphauCJ4Evtdt7JKxvWHkr7Y4Gj0MJy1jhkII7jPwzNxkB0yvfbsMU/UOiFvrVSk
# f7q7VSNO8e2vWGu/JSHyybgQSVfaVKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCQyd8aepIZ4sVodzr/3I3Fb9EVPQ8xpPqeFtX8v6DyAAIGZdX+KutZ
# GBMyMDI0MDMwNzIxMTkzMi4xMjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmUQH8wIhgPMjAyNDAzMDcyMTMyNDdaGA8yMDI0MDMwODIxMzI0N1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6ZRAfwIBADAHAgEAAgIMMTAHAgEAAgIR/zAKAgUA
# 6ZWR/wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJt4Hm6F5qAoKr5nAmTR
# eBWuHwyRVuLuUKAdWffKLrzMU1TJL8jbAr64WsIcYj31J/9hKpfaTx3iMPaZHH5/
# k4e7p0xHYibhgAFJWXH8zKbpqMT35CvHIFu1ANJFlfZYyv06T5+leffz5sQUHCJx
# pNFpNVetoUJ9yBYn5ISuyTX0MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgs1LlsxrgJL8OLDl3p6EuFAWbMiWXtVC8xUctLwu+UvAwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIChU0S/z79iCH5mGtyYJ7+2wUNgU4rueFLKo94yj+t+V
# MA0GCSqGSIb3DQEBCwUABIICAJYfN1MSsgPdiY6dQrBqwV81pSuJDLvTvCUVfsIh
# HuKD0U3/zbnoMtpCdqaks/0dunGEIvmmyBQKYYLgwP6+V4dOWe3dFrpGKHxFxM0K
# YZV6kHkR5aCCwdDbX8szqp2wkOfApILKfr5uAwEpuIqLo7Pl+9pnwzHGW9gsMPvG
# XJLlVfxTcvkQDKCbiSUVP7SB/6xtEr9h/nRULpKEHIhjGB1eBjIIkwxZxB4WPl6J
# vT5NlZuxI2C64dsKAh9ySWgoRqVBuiSvV3TSB/YYMDco3oNgxnfUSsC0VAPb/tsI
# M2wnTMvFnS40/M3w/VtcB0d45a0PjQn/O8M4Nxems8HMVf5AP6Ad15gnb2covUhg
# 10x5g3qqLLZyeeMJIybEbCv1kuZEiCrQcGzsDkIERMJI9BwhZrRXZrjFu9RNTHNF
# y2q/A+nQevn/9J8wY4ulh4P5Brx0dxkdCiz366dPjgEDUDluffAhgaR4l0kPIKQe
# d+tFbx6xTDVyaPoCrC8hxb2xIR0g8KS0ObzEKny8v157FXHZ/6fh8G5mHZOLFiVX
# NdzfsfmF40lUxBmCP+/sSdT/RpSi9snXDVT3x98FXh41kS/WpKFbZGKXhvhCCIqT
# 2tzH6byF5rzjR4Evq+ISHS1L3N9GtCm+GIby1uJ9l21FEMpYyvmpq+nRZDDBBhxl
# kXys
# SIG # End signature block
|
combined_dataset/train/non-malicious/Set-OutlookSignature_2.ps1 | Set-OutlookSignature_2.ps1 | ###########################################################################¡±
#
# NAME: Set-OutlookSignature.ps1
#
# AUTHOR: Jan Egil Ring
# Modifications by Darren Kattan
#
# COMMENT: Script to create an Outlook signature based on user information from Active Directory.
# Adjust the variables in the ¡°Custom variables¡±-section
# Create an Outlook-signature from Microsoft Word (logo, fonts etc) and copy this signature to \\\\domain\\NETLOGON\\sig_files\\$CompanyName\\$CompanyName.docx
# This script supports the following keywords:
# DisplayName
# Title
# Email
#
# See the following blog-posts for more information:
# http://blog.powershell.no/2010/01/09/outlook-signature-based-on-user-information-from-active-directory
# http://www.immense.net/deploying-unified-email-signature-template-outlook
#
# Tested on Office 2003, 2007 and 2010
#
# You have a royalty-free right to use, modify, reproduce, and
# distribute this script file in any way you find useful, provided that
# you agree that the creator, owner above has no warranty, obligations,
# or liability for such use.
#
# VERSION HISTORY:
# 1.0 09.01.2010 ¨C Initial release
# 1.1 11.09.2010 ¨C Modified by Darren Kattan
# - Removed bookmarks. Now uses simple find and replace for DisplayName, Title, and Email.
# - Email address is generated as a link
# - Signature is generated from a single .docx file
# - Removed version numbers for script to run. Script runs at boot up when it sees a change in the ¡°Date Modified¡± property of your signature template.
#
#
###########################################################################¡±
#Custom variables
$CompanyName = ¡®Contoso¡¯
$DomainName = ¡®contoso.local¡¯
$SigSource = ¡°\\\\$DomainName\\netlogon\\sig_files\\$CompanyName¡±
$ForceSignatureNew = ¡¯1¡ä #When the signature are forced the signature are enforced as default signature for new messages the next time the script runs. 0 = no force, 1 = force
$ForceSignatureReplyForward = ¡¯1¡ä #When the signature are forced the signature are enforced as default signature for reply/forward messages the next time the script runs. 0 = no force, 1 = force
#Environment variables
$AppData=(Get-Item env:appdata).value
$SigPath = ¡®\\Microsoft\\Signatures¡¯
$LocalSignaturePath = $AppData+$SigPath
$RemoteSignaturePathFull = $SigSource+¡¯\\'+$CompanyName+¡¯.docx¡¯
#Get Active Directory information for current user
$UserName = $env:username
$Filter = ¡°(&(objectCategory=User)(samAccountName=$UserName))¡±
$Searcher = New-Object System.DirectoryServices.DirectorySearcher
$Searcher.Filter = $Filter
$ADUserPath = $Searcher.FindOne()
$ADUser = $ADUserPath.GetDirectoryEntry()
$ADDisplayName = $ADUser.DisplayName
$ADEmailAddress = $ADUser.mail
$ADTitle = $ADUser.title
$ADTelePhoneNumber = $ADUser.TelephoneNumber
#Setting registry information for the current user
$CompanyRegPath = ¡°HKCU:\\Software\\¡±+$CompanyName
if (Test-Path $CompanyRegPath)
{}
else
{New-Item -path ¡°HKCU:\\Software¡± -name $CompanyName}
if (Test-Path $CompanyRegPath¡¯\\Outlook Signature Settings¡¯)
{}
else
{New-Item -path $CompanyRegPath -name ¡°Outlook Signature Settings¡±}
$SigVersion = (gci $RemoteSignaturePathFull).LastWriteTime #When was the last time the signature was written
$ForcedSignatureNew = (Get-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯).ForcedSignatureNew
$ForcedSignatureReplyForward = (Get-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯).ForcedSignatureReplyForward
$SignatureVersion = (Get-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯).SignatureVersion
Set-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯ -name SignatureSourceFiles -Value $SigSource
$SignatureSourceFiles = (Get-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯).SignatureSourceFiles
#Forcing signature for new messages if enabled
if ($ForcedSignatureNew -eq ¡¯1¡ä)
{
#Set company signature as default for New messages
$MSWord = New-Object -com word.application
$EmailOptions = $MSWord.EmailOptions
$EmailSignature = $EmailOptions.EmailSignature
$EmailSignatureEntries = $EmailSignature.EmailSignatureEntries
$EmailSignature.NewMessageSignature=$CompanyName
$MSWord.Quit()
}
#Forcing signature for reply/forward messages if enabled
if ($ForcedSignatureReplyForward -eq ¡¯1¡ä)
{
#Set company signature as default for Reply/Forward messages
$MSWord = New-Object -com word.application
$EmailOptions = $MSWord.EmailOptions
$EmailSignature = $EmailOptions.EmailSignature
$EmailSignatureEntries = $EmailSignature.EmailSignatureEntries
$EmailSignature.ReplyMessageSignature=$CompanyName
$MSWord.Quit()
}
#Copying signature sourcefiles and creating signature if signature-version are different from local version
if ($SignatureVersion -eq $SigVersion){}
else
{
#Copy signature templates from domain to local Signature-folder
Copy-Item ¡°$SignatureSourceFiles\\*¡± $LocalSignaturePath -Recurse -Force
$ReplaceAll = 2
$FindContinue = 1
$MatchCase = $False
$MatchWholeWord = $True
$MatchWildcards = $False
$MatchSoundsLike = $False
$MatchAllWordForms = $False
$Forward = $True
$Wrap = $FindContinue
$Format = $False
#Insert variables from Active Directory to rtf signature-file
$MSWord = New-Object -com word.application
$fullPath = $LocalSignaturePath+¡¯\\'+$CompanyName+¡¯.docx¡¯
$MSWord.Documents.Open($fullPath)
$FindText = ¡°DisplayName¡±
$ReplaceText = $ADDisplayName.ToString()
$MSWord.Selection.Find.Execute($FindText, $MatchCase, $MatchWholeWord, $MatchWildcards, $MatchSoundsLike, $MatchAllWordForms, $Forward, $Wrap, $Format, $ReplaceText, $ReplaceAll )
$FindText = ¡°Title¡±
$ReplaceText = $ADTitle.ToString()
$MSWord.Selection.Find.Execute($FindText, $MatchCase, $MatchWholeWord, $MatchWildcards, $MatchSoundsLike, $MatchAllWordForms, $Forward, $Wrap, $Format, $ReplaceText, $ReplaceAll )
$MSWord.Selection.Find.Execute(¡°Email¡±)
$MSWord.ActiveDocument.Hyperlinks.Add($MSWord.Selection.Range, ¡°mailto:¡±+$ADEmailAddress.ToString(), $missing, $missing, $ADEmailAddress.ToString())
$MSWord.ActiveDocument.Save()
$saveFormat = [Enum]::Parse([Microsoft.Office.Interop.Word.WdSaveFormat], ¡°wdFormatHTML¡±);
[ref]$BrowserLevel = ¡°microsoft.office.interop.word.WdBrowserLevel¡± -as [type]
$MSWord.ActiveDocument.WebOptions.OrganizeInFolder = $true
$MSWord.ActiveDocument.WebOptions.UseLongFileNames = $true
$MSWord.ActiveDocument.WebOptions.BrowserLevel = $BrowserLevel::wdBrowserLevelMicrosoftInternetExplorer6
$path = $LocalSignaturePath+¡¯\\'+$CompanyName+¡±.htm¡±
$MSWord.ActiveDocument.saveas([ref]$path, [ref]$saveFormat)
$saveFormat = [Enum]::Parse([Microsoft.Office.Interop.Word.WdSaveFormat], ¡°wdFormatRTF¡±);
$path = $LocalSignaturePath+¡¯\\'+$CompanyName+¡±.rtf¡±
$MSWord.ActiveDocument.SaveAs([ref] $path, [ref]$saveFormat)
$saveFormat = [Enum]::Parse([Microsoft.Office.Interop.Word.WdSaveFormat], ¡°wdFormatText¡±);
$path = $LocalSignaturePath+¡¯\\'+$CompanyName+¡±.rtf¡±
$MSWord.ActiveDocument.SaveAs([ref] $path, [ref]$saveFormat)
$path = $LocalSignaturePath+¡¯\\'+$CompanyName+¡±.txt¡±
$MSWord.ActiveDocument.SaveAs([ref] $path, [ref]$SaveFormat::wdFormatText)
$MSWord.ActiveDocument.Close()
$MSWord.Quit()
}
#Stamp registry-values for Outlook Signature Settings if they doesn`t match the initial script variables. Note that these will apply after the second script run when changes are made in the ¡°Custom variables¡±-section.
if ($ForcedSignatureNew -eq $ForceSignatureNew){}
else
{Set-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯ -name ForcedSignatureNew -Value $ForceSignatureNew}
if ($ForcedSignatureReplyForward -eq $ForceSignatureReplyForward){}
else
{Set-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯ -name ForcedSignatureReplyForward -Value $ForceSignatureReplyForward}
if ($SignatureVersion -eq $SigVersion){}
else
{Set-ItemProperty $CompanyRegPath¡¯\\Outlook Signature Settings¡¯ -name SignatureVersion -Value $SigVersion}
|
combined_dataset/train/non-malicious/sample_34_36.ps1 | sample_34_36.ps1 | #
# Module manifest for module 'GCArcService'
#
# Generated by: Microsoft
#
# Generated on: 08/09/2020
#
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'GCArcService.psm1'
# Version number of this module.
ModuleVersion = '1.0'
# ID used to uniquely identify this module
GUID = 'c5d905c4-c9a5-4a0a-8115-9216509a36f5'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module is used to install/uninstall Guest Configuration Service.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'
# Functions to export from this module
FunctionsToExport = @('Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService')
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBECPA5J5/o6uzP
# EAC976FTzZ20v0rLlWThfMKjQi2k+6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC55tAOOpy5cwx25UWLszMQ4
# l4N/S9Dkf8RTi9D1E8wwMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADFi5YbeLW7Xfgfk5PJ5fXGzmCMe6ZpfF0aDcPLQmHfMt+cVGDY6buiLf
# I19uu/5Uxv6IysN9u1n4XkQsKg/RJbFMuxuWPuAmwThlqmi4zga05HR6r4rBX2Dh
# yDoLwW5CbkOzdmcpslSn23ajoec8RGc4VYMqA57kbbZCraT6099mBRi7Pd2x3b0d
# zcZtPcolCSTXtb+IEnOw0v4hEJop50KG5BFtba3aNL8MAh4U1bLB4ywztzdc2f2J
# Pi/TLzMyBxcT8rcL5FoV7GcvNIsFBAWC/2hNlgvJiuzaY2QtkO+KrSjtLE2F5lV7
# FPXmm38OHTHA/MU2rGZHhcaxS3fCTqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCiaKF5j/wAI1BaQZyUf3+x1sxqr5gKxRjD979E2l6jAwIGZdXka4S3
# GBMyMDI0MDIyNjAzMDQwNC42MzFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmGUQ8wIhgPMjAyNDAyMjYwNzUxNDNaGA8yMDI0MDIyNzA3NTE0M1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6YZRDwIBADAHAgEAAgIEcjAHAgEAAgIRUzAKAgUA
# 6YeijwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEXucbh1tCcsJZWNnBcf
# 7jkJdUv4YIHByK+BElcS3eGuZnkZq6zVfDAPvRPGYzMhNpGNwYlkloeIzASLudYq
# bx7DNKo75D9n6pBRiXv44CFLBS9j7duhNIE5Bnf+5TgaYBQD3x8bUwbhQH0o9chw
# h4owHYvXt9yG/XVvbkBkpf+UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgD8UUnSarWH/JBxoB3LzLqkUB64Jb75p3gpKaN4TBiBEwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIHRiS6x7wpBZr2axMZanzXPRYDxQ+PGoOo0lbMr5jh5X
# MA0GCSqGSIb3DQEBCwUABIICAC1S2XwxnuMkxLgLlqCaCiLZ2ZBmal2VSrytJJF9
# qVhn517j2oGXID/Fp+vrEwarSePIFK9VConK8pdJqxeQgTMAlpaGADSlM1JIGCuI
# usf19C/WlwqshdfOZiKXmIEs+EDAcHvV7ZvbnfVcDchLjYdlvOpuvNUok3EPqtgn
# cglCR+O7FlfQOJvsihItfzfRNsa9HgqQOlMwMjNB4PtGqSpTWqBNmuuqCEPRpYzk
# UKFcWGWIEFWTCiG25tyJkC7cVNH8aR5oevAti5p3ei5DQuurvncxHth/0EIN27dZ
# 6SAxYH5/iqIXFC/EUTaTxNeG4c1H9htYpWehIpDmJihOZhaMc9uJs+v6cvETTIpC
# 9RMZWOxLaESKayS3+F2wO/W+9gs0GyS7iPCZHcgGPWbRqnB2bsI2Z4HRW9xlNJJt
# 8OQKW1A0eWBRZU0I3JdlB0JuqPshNouZTWI/6YdHHgyAI358ZlXgEMaW8/YuB/JD
# JsP1ZeIOmvcgOrYZlnxi21cSX7cO9tdzHq16U28jb+eSaYtA6DXwiiYT2wqduLB8
# GiV67iL3t8cj3lxEVdGuYw8wmqOPSld0UmOT5ad5pMnGAYuwQU3X+Hr6zZvshhro
# 4AVIz2J4NXHEEKzE0xz3BT0seJQhYrsFb10V8XQz/VG8XvUvp+cABzwwDlXRfSeT
# KUQ1
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_4_76.ps1 | sample_4_76.ps1 | #************************************************
# DC_SystemCollect.ps1
# Version 1.1
# Date: 2009-2019
# Author: Walter Eder (waltere@microsoft.com)
# Description: Collects additional System information and ETL Logs (tbd).
# Called from: TS_AutoAddCommands_Apps.ps1
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Write-verbose "$(Get-Date -UFormat "%R:%S") : Start of script DC_SystemCollect.ps1"
"==================== Starting DC_SystemCollect.ps1 script ====================" | WriteTo-StdOut
#_# Import-LocalizedData -BindingVariable ScriptStrings
# Registry keys
"Getting System Registry Keys" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_SystemFiles_Title -Status "Registry keys"
$Regkeys = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"
$OutputFile = $ComputerName + "_reg_SystemPolicies_HKLM.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "System Policies Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options", "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
$OutputFile = $ComputerName + "_reg_ImageFileExecutionRegistry.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "ImageFileExecution Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\MUI\UILanguages"
$OutputFile = $ComputerName + "_reg_UILanguages_HKLM.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "UI Languages Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKEY_LOCAL_MACHINE\SYSTEM\WPA"
$OutputFile = $ComputerName + "_reg_WPA_HKLM.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "WPA Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKCU\Software\Microsoft\Windows\CurrentVersion\DeviceAccess", "HKLM\Software\Microsoft\Windows\CurrentVersion\DeviceAccess"
$OutputFile = $ComputerName + "_reg_DeviceAccess.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Device Access Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKCU\Software\Classes\ActivatableClasses", "HKLM\Software\Classes\ActivatableClasses"
$OutputFile = $ComputerName + "_reg_ActivatableClasses.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Activatable Classes Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKCU\Software\Classes\Extensions"
$OutputFile = $ComputerName + "_reg_Extensions_HKCU.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Extensions Registry Key" -SectionDescription "Software Registry keys"
# Licensing
$Regkeys = "HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions"
$OutputFile = $ComputerName + "_reg_ProductOptions_HKLM.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Product Options Registry Key" -SectionDescription "Software Registry keys"
$Regkeys = "HKLM\SYSTEM\CurrentControlSet\Control\FastCache"
$OutputFile = $ComputerName + "_reg_FastCache_HKLM.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "FastCache Registry Key" -SectionDescription "Software Registry keys"
# Windows RunTime Key
$Regkeys = "HKLM\Software\Microsoft\WindowsRuntime"
$OutputFile = $ComputerName + "_reg_WindowsRuntime_HKLM.txt"
RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "WindowsRuntime Registry Key" -SectionDescription "Software Registry keys"
# Saved Directories
"Getting copies of System Files" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_SystemFiles_Title -Status $ScriptStrings.ID_SystemFiles_Status
$sectionDescription = "System Files"
if(test-path "$env:WinDir\Panther")
{
$DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString())
Copy-Item "$env:WinDir\Panther" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue
CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "Panther.zip" -fileDescription "Windows\Panther files" -sectionDescription $sectionDescription -Recursive
Remove-Item $DesinationTempFolder -Force -Recurse
}
if(test-path "$env:SystemDrive\ProgramData\Microsoft\Windows\WER")
{
$DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString())
Copy-Item "$env:SystemDrive\ProgramData\Microsoft\Windows\WER" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue
CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "WER.zip" -fileDescription "Windows Error Reporting files" -sectionDescription $sectionDescription -Recursive
Remove-Item $DesinationTempFolder -Force -Recurse
}
if(test-path "$env:WinDir\WinStore")
{
$DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString())
Copy-Item "$env:WinDir\WinStore" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue
CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "WinStore.zip" -fileDescription "Windows\WinStore files" -sectionDescription $sectionDescription -Recursive
Remove-Item $DesinationTempFolder -Force -Recurse
}
# Directory Listings
"Getting Directory Listing of System Files" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_SystemFilesDirectoryListings_Title -Status $ScriptStrings.ID_SystemFilesDirectoryListings_Status
$sectionDescription = "System Files Directory Listings"
if(test-path "$env:windir\System32")
{ $OutputFile= $Computername + "_DirList_System32.txt"
Get-ChildItem "$env:windir\System32" >> $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "System32 Directory Listings" -sectionDescription $sectionDescription
}
if(test-path "$env:windir\SysWow64")
{ $OutputFile= $Computername + "_DirList_SystemWow64.txt"
Get-ChildItem "$env:windir\SysWow64" >> $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "SysWow64 Directory Listings" -sectionDescription $sectionDescription
}
$OutputFile= $Computername + "_DirList_UsageLogs.txt"
Get-ChildItem "$env:LOCALAPPDATA\Packages\*\AC\Microsoft\CLR_v4.0_32\UsageLogs\*.log" >> $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "Usage Logs Directory Listings" -sectionDescription $sectionDescription
# Permission Data
"Getting ACL Listing of System Files" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_SystemFilesACLListings_Title -Status $ScriptStrings.ID_SystemFilesACLListings_Status
$sectionDescription = "System Files ACL Listings"
$OutputFile= $Computername + "_ACLs_WinSxs.txt"
Get-Acl "$env:windir\winsxs" | Format-List > $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "WinSxs ACL Listings" -sectionDescription $sectionDescription
$OutputFile= $Computername + "_ACLs_system32.txt"
Get-Acl "$env:windir\System32" | Format-List > $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "System32 ACL Listings" -sectionDescription $sectionDescription
$OutputFile= $Computername + "_ACLs_SystemApps.txt"
Get-Acl "$env:windir\SystemApps" | Format-List > $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "SystemApps ACL Listings" -sectionDescription $sectionDescription
$OutputFile= $Computername + "_ACLs_WindowsApps.txt"
Get-Acl "$env:ProgramFiles\WindowsApps" | Format-List > $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "WindowsApps ACL Listings" -sectionDescription $sectionDescription
# May need additional Work on these two.
$OutputFile= $Computername + "_ACLs.txt"
Get-ACL 'HKLM:\', 'HKCU:\', 'hklm:\software\microsoft\ole', 'hklm:\system\currentcontrolset'| Format-List > $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "ACLs" -sectionDescription $sectionDescription
"Getting DCOM Permissions" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_DCOMPermissions_Title -Status $ScriptStrings.ID_DCOMPermissions_Status
$sectionDescription = "DCOM Permissions"
$OutputFile = $Computername + "_DCOMPerms.txt"
$Reg = [WMIClass]"\\.\root\default:StdRegProv"
$DCOMMachineLaunchRestriction = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","MachineLaunchRestriction").uValue
$DCOMMachineAccessRestriction = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","MachineAccessRestriction").uValue
$DCOMDefaultLaunchPermission = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","DefaultLaunchPermission").uValue
$DCOMDefaultAccessPermission = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","DefaultAccessPermission").uValue
$converter = new-object system.management.ManagementClass Win32_SecurityDescriptorHelper
$CurrentDCOMSDDLMachineLaunchRestriction = $converter.BinarySDToSDDL($DCOMMachineLaunchRestriction)
$CurrentDCOMSDDLMachineAccessRestriction = $converter.BinarySDToSDDL($DCOMMachineAccessRestriction)
$CurrentDCOMSDDLDefaultLaunchPermission = $converter.BinarySDToSDDL($DCOMDefaultLaunchPermission)
$CurrentDCOMSDDLDefaultAccessPermission = $converter.BinarySDToSDDL($DCOMDefaultAccessPermission)
$CurrentDCOMSDDLMachineLaunchRestriction | Format-List | Out-File -FilePath $OutputFile -append
$CurrentDCOMSDDLMachineAccessRestriction | Format-List | Out-File -FilePath $OutputFile -append
$CurrentDCOMSDDLDefaultLaunchPermission | Format-List | Out-File -FilePath $OutputFile -append
$CurrentDCOMSDDLDefaultAccessPermission | Format-List | Out-File -FilePath $OutputFile -append
CollectFiles -filesToCollect $OutputFile -fileDescription "List of DCOM permissions" -sectionDescription $sectionDescription
# Event Logs
"Getting System Event Logs" | WriteTo-StdOut
$sectionDescription = "Event Logs"
$EventLogNames = "System", "Application"
Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription
$EventLogNames = "Microsoft-Windows-BitLocker\BitLocker Management", "Microsoft-Windows-BitLocker-DrivePreparationTool\Admin",
"Microsoft-Windows-BitLocker-DrivePreparationTool\Operational"
Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription
$EventLogNames = "Microsoft-Windows-User Profile Service\Operational"
Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription
$EventLogNames = "Microsoft-Windows-Bits-Client/Operational"
Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription
$EventLogNames = "Microsoft-Windows-AppID/Operational"
Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription
# Env Vars
"Getting Environment Variables" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_EnvironmentVariables_Title -Status $ScriptStrings.ID_EnvironmentVariables_Status
$OutputFile = $ComputerName + "_EnvironmentVariables.txt"
get-childitem env: |out-file $OutputFile
$fileDescription = "Environment Variables"
$sectionDescription = "Environment Variables"
CollectFiles -filesToCollect $outfile -fileDescription $fileDescription -sectionDescription $sectionDescription
# ipconfig
"Getting IPConfig" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_IPConfig_Title -Status $ScriptStrings.ID_IPConfig_Status
$OutputFile= $Computername + "_ipconfig.txt"
$CommandToExecute = "ipconfig /all > $OutputFile"
RunCmd -commandToRun $CommandToExecute -filesToCollect $OutputFile -fileDescription "IPConfig" -sectionDescription "IPConfig"
# System Policies
"Getting System Policies" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_SystemPolicies_Title -Status $ScriptStrings.ID_SystemPolicies_Status
$OutputFile= $Computername + "_SystemPolicies.txt"
$CommandToExecute = "GpResult /R > $OutputFile"
RunCmd -commandToRun $CommandToExecute -filesToCollect $OutputFile -fileDescription "Gpresult /r output" -sectionDescription "System Policies"
# Hosts file
"Getting Hosts File" | WriteTo-StdOut
$HostsFile = "$ENV:windir\system32\drivers\etc\hosts"
if (test-path $HostsFile)
{ $OutputFile = $ComputerName + "_Dns_Hosts-file.txt"
copy-item -Path $HostsFile -Destination $OutputFile -Force
CollectFiles -filesToCollect $HostsFile -fileDescription "Hosts File" -sectionDescription "Hosts"
}
else
{
"$Hostsfile Does not exist" | writeto-stdout
}
# Proxy Settings
"Getting Proxy Settings" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_ProxySettings_Title -Status $ScriptStrings.ID_ProxySettings_Status
$OutputFile= $Computername + "_netsh_proxy_settings.txt"
$CommandToExecute = "netsh winhttp show proxy >> $OutputFile"
RunCmd -commandToRun $CommandToExecute -filesToCollect $OutputFile -fileDescription "Proxy Settings" -sectionDescription "Proxy Settings"
# Get FireWall Service Status
"Getting FireWall Service Status" | WriteTo-StdOut
$MpsSvcStatus=(Get-Service -Name MpsSvc).Status
If ($MpsSvcStatus -eq "Running")
{
"Status of FireWall Service is Running" | WriteTo-StdOut
}
else
{
"Status of FireWall Service is NOT Running" | WriteTo-StdOut
}
# Root Certificates
Write-Host "$(Get-Date -UFormat "%R:%S") : Root Certificates"
"Getting Root Certificates" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_RootCertificates_Title -Status $ScriptStrings.ID_RootCertificates_Status
$OutputFile = $ComputerName + "_RootCerts.txt"
get-childitem 'cert:\LocalMachine\root' | Format-List |Out-File $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "List of Root Certificates" -sectionDescription "Root Certs"
# Running Services
"Getting Running Services" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_RunningServices_Title -Status $ScriptStrings.ID_RunningServices_Status
$OutputFile = $ComputerName + "_RunningServices.txt"
Get-Service | findstr /i 'running'|Out-File $Outputfile
CollectFiles -filesToCollect $OutputFile -sectionDescription "Running Services" -fileDescription "Running Services"
# Other logs
"Getting Logs" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status $ScriptStrings.ID_OtherLogs_Status
$sectionDescription = "CBS + Setupapi Logs"
$OutputFile = $ComputerName + "_CBS.log"
copy-item -Path "$env:windir\Logs\CBS\CBS.log" -Destination $OutputFile -Force
CollectFiles -filesToCollect $OutputFile -fileDescription "CBS Log" -sectionDescription $sectionDescription
$OutputFile = $ComputerName + "_setupapi.dev.log"
copy-item -Path "$env:windir\inf\setupapi.dev.log" -Destination $OutputFile -Force
CollectFiles -filesToCollect $OutputFile -fileDescription "Setupapi Log" -sectionDescription $sectionDescription
# Video Display Info
"Getting Video Display Logs" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status "Video Display Info"
$OutputFile = $ComputerName + "_VideoDisplayInfo.txt"
Get-CimInstance win32_displaycontrollerconfiguration |Out-File $Outputfile
CollectFiles -sectionDescription "Display Info" -fileDescription "Display Info" -filesToCollect $OutputFile
# Network Adapter Info
"Getting Network Adapter Logs" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status "Network Adapter Info"
$OutputFile = $ComputerName + "_NetworkAdapterInfo.txt"
Get-CimInstance Win32_NetworkAdapterConfiguration | out-file $Outputfile
CollectFiles -filesToCollect $Outputfile -fileDescription "Network Adapter Info" -sectionDescription "Network Adapter Info"
# OS Version Info
"Getting OS Version Info" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status "OS Version Info"
$OutputFile = $ComputerName + "_WindowsVersionInfo.txt"
Get-CimInstance Win32_OperatingSystem |Out-File $Outputfile
CollectFiles -sectionDescription "OS Version Info" -fileDescription "OS Version Info" -filesToCollect $OutputFile
# Collect ETL Logs
Write-Host "$(Get-Date -UFormat "%R:%S") : Collect ETL Logs (tbd)"
"Getting ETL Logs" | WriteTo-StdOut
Write-DiagProgress -Activity $ScriptStrings.ID_ETLLogs_Title -Status $ScriptStrings.ID_ETLLogs_Status
if ($Global:runFull -eq $True) { # $False = disabling for now for this long-lasting step
if(Test-Path "$env:localappdata\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState")
{
$DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString())
Copy-Item "$env:localappdata\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue
CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "LiveComm.zip" -fileDescription "Windows Live applications ETL" -sectionDescription "ETL Logs" -Recursive
Remove-Item $DesinationTempFolder -Force -Recurse
}
}
Write-verbose "$(Get-Date -UFormat "%R:%S") : end of script DC_SystemCollect.ps1"
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZkk5d7o2b1qYM
# GjiNJe8Re8cU3Bi/60sDPkyUrm049qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMQOGetVecGdsWoXHkoVVzUE
# c5KalL9+yO2uLhtNa7L/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADueZZRoPCtUliyFVWAWMD476dYg9I4KFmOl/NJa0SXh19Mwv0oG5dV9N
# OxZV1DPfJA8RHxtEynmFy9elrELshz8cCHuvxYbTi9VoQnTGLMlHrs/e7ovoNy4e
# ZLSP5xf28Zn77G9oiQn3WPs6gWQPhDNU4bCdw3c1F4GJhDg0qXqHrtnco7Kwqnk7
# WxkrrofA2ymqSJUPIc5pbEOKhDXimLpyKMS/ZA++K+9DTAgP6x5M4P2sBo6wsrtP
# qr/CBnHRG7kc+RdMpgzQAGqBkuX5tuyzCGLwxw6MjIp+SJ9q0orxbjt0mjeblUA0
# FU0BQY81wWISgeYsGsoHL9AhG0FHw6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDBl+9i5WOoKznA5uSu/uhwU5EN+38YnLY+IRh5sJ2oUgIGZut4BYy/
# GBMyMDI0MTAyODExNDA0My45MDFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJlLzxxlCMAAEAAAH1MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjY1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzO90cFQTWd/WP84IT7JM
# IW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot387LjE0TCiG93e6I0HzIFQ
# BnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxICfw5t/pTyIOHjKvo1lQOT
# WZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1DcmXjym2wFWv10sBH40aj
# Jfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMAao0SNR/R1J1Y6sLkiCJO
# 3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpTM4vc0xDLCmc6PGv03CtW
# u2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbBY5j+HvS0l3dXkjP3Hon8
# b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wou+T6Se6oa5LDiQgPTfWR
# /j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0PiaXsmgudNwVqn51zr+B
# i3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ884Yb9DFNcigmeVTYkyUXZ
# 6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvveU6p0+frthbF7MXv+i5q
# cD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRV4Hxb9Uo0
# oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAcwxmVPaA9xHf
# fuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/8/G6fGIQMr0zlpau8jy8
# 3I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4Lut4bbPfT0FEp77G76hh
# ysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6I0EnneotMqFs0Q3zHgVV
# r4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGaQnLzq+No8VEgq0UG7W1E
# LZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV5JtISBklTuVAlEkzXi9L
# IjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zSs+ul9WmzI0F8zImbhnZh
# UziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5WqXbS5s9OdMdUlW1gTI1
# r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q0Cycpa9QUH/Dy01k6tQo
# mNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSKCRoFE1Lkma31SyIaynbd
# YEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUiTWSKvv1DJadR1SUCO/Od
# 21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5YRg3WSBQCyjzdkvaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0MTAyOTAwNTA0NFowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEAAgIUjDAHAgEAAgIUCjAK
# AgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCjXPh2fTsMuBQC
# 04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3UQpZXoPQDP+vfvum15Jd
# ooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gSTwUk7hZ060ozBQBEDelh
# GRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3FyMaE9PqRohkoHLhl8vm
# IdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KORL3KvFgrx7XzEQvr2WlE
# waAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIBNChydfZETThcPXRdrz53
# AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgnrjl+1ZOnwxh
# ejJw+95di5RjupYRHQKN3EnIIp7DtuUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GThqaPNTCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9ZkJlLzxxlCMAAEAAAH1
# MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1KYILMA0GCSqGSIb3DQEB
# CwUABIICALLPMI9TRXOTlOdaN3NZz20eI1Z83a+q1FFk5J/eRkv4a+Fl7djn58d1
# s6vGbDcV4uTqHWTxxwtHe0Xjf8fymAMtZhoQnWqw+O5QaOaaqtnGw2ecm8h9HEgP
# 2e1SzK6Uocn7WGh17DLGZIMAuucanTfzdxSGTqzT/lKxc5ysfUt1LsyMtUcafFS8
# rs5zuPnfq2xpu9P/3LDugl56bAmN52lz3GTbmapUTqFGlyXJjPO5aDlP65vJSu78
# nzVbB/gWUd5SdyJbxVSmii4JtqAodnF5B2GKqdaqgpqCGQvcW3r6g1jWawonk7lU
# 5YDHRxPftF+LwX0m0Z9dbs/9feJrQT2GUK2hIzImGjC6Rt+7zClUFi0u+ErAy5Se
# Ksy5MO7T9aRCrrjz3n4sviQJaUwbl5rNRNnx7ANeNoSRM3XjmV6dfnlBCa6l8hEz
# SndFynGA/WP2w9rw+QRAiActHSEGYJ0QOCfuPwBfnld7iHtRStVJOgcggQDT2/IM
# PBPqMFw3+Pwu9fxJXhAn03C2JwmXg5SG39DHMt/nnE9t2rbcqe4Wk4XGhzI+rOpS
# yOJYi4+8Cze8VosEVe4SD+G+qfWW5Q1CeJkm2Ls+mxVKjsQ1AyCACGAK4JyvfjuJ
# uQE0OThT79iZ98kHPqyHmhLAaoNjN8ZpNOJIFntL3V27qjhJSxS4
# SIG # End signature block
|
combined_dataset/train/non-malicious/Start-Verify.ps1 | Start-Verify.ps1 | # Author: Steven Murawski http://www.mindofroot.com
# This script creates two functions (and a helper function). One starts logging all commands entered,
# and the second removes the logging.
# This script is similar to the Start-Transcript, but only logs the command line and not the output.
function New-ScriptBlock()
{
param ([string]$scriptblock)
$executioncontext.InvokeCommand.NewScriptBlock($scriptblock.trim())
}
function Start-Verify ()
{
param ($logfile = 'c:\\scripts\\powershell\\logs\\verify.txt')
$lastcmd = 'get-history | select -property CommandLine -Last 1 | Out-File -Append {0}' -f $logfile
Get-Content -Path function:\\prompt | ForEach-Object { $function:prompt = New-ScriptBlock ($_.toString() +"`n$lastcmd") } | Out-Null
}
function Stop-Verify ()
{
$lastcmd = 'get-history.*$'
Get-Content -Path function:\\prompt | ForEach-Object { $function:prompt = New-ScriptBlock ($_.tostring() -replace "$lastcmd")} | Out-Null
}
|
combined_dataset/train/non-malicious/3165.ps1 | 3165.ps1 | function Test-Credential {
[cmdletbinding(DefaultParameterSetName = 'Domain')]
param(
[parameter(ValueFromPipeline=$true)]
[System.Management.Automation.PSCredential]$Credential = $( Get-Credential -Message "Please provide credentials to test" ),
[validateset('Domain','Machine', 'ApplicationDirectory')]
[string]$Context = 'Domain',
[parameter(ParameterSetName = 'Machine')]
[string]$ComputerName,
[parameter(ParameterSetName = 'Domain')]
[string]$Domain = $null
)
Begin
{
Write-Verbose "ParameterSetName: $($PSCmdlet.ParameterSetName)`nPSBoundParameters: $($PSBoundParameters | Out-String)"
Try
{
Add-Type -AssemblyName System.DirectoryServices.AccountManagement
}
Catch
{
Throw "Could not load assembly: $_"
}
if ($Context -eq 'ApplicationDirectory' )
{
$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::$Context)
}
elseif ($PSCmdlet.ParameterSetName -eq 'Domain')
{
$Context = $PSCmdlet.ParameterSetName
$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::$Context, $Domain)
}
elseif ($PSCmdlet.ParameterSetName -eq 'Machine')
{
$Context = $PSCmdlet.ParameterSetName
$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::$Context, $ComputerName)
}
}
Process
{
$DS.ValidateCredentials($Credential.UserName, $Credential.GetNetworkCredential().password)
}
End
{
$DS.Dispose()
}
} |
combined_dataset/train/non-malicious/Get-ADGroupMembers_4.ps1 | Get-ADGroupMembers_4.ps1 | Function Get-ADGroupMembers
{
<#
.SYNOPSIS
Return a collection of users in an ActiveDirectory group.
.DESCRIPTION
This function returns an object that contains all the properties of a user object. This function
works for small groups as well as groups in excess of 1000.
.PARAMETER UserGroup
The name of the group to get membership from.
.PARAMETER UserDomain
The LDAP URL of the domain that the group resides in.
.EXAMPLE
Get-ADGroupMembers -UserGroup Managers |Format-Table -Property name, distinguishedName, cn
name distinguishedName cn
---- ----------------- --
{Steve Roberts} {CN=Steve Roberts,CN=Users,DC... {Steve Roberts}
{S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533...
{S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533...
{Matt Temple} {CN=Matt Temple,CN=Users,DC=c... {Matt Temple}
...
Description
-----------
This example shows passing in a group name, but leaving the default domain name in place.
.NOTES
The context under which this script is run must have rights to pull infromation from ActiveDirectory.
.LINK
http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement#Get-ADGroupMembers
#>
Param
(
$UserGroup = "Domain Users",
$UserDomain = ([ADSI]"LDAP://DC=company,DC=com")
)
Begin
{
$DirectoryEntry = New-Object System.DirectoryServices.DirectoryEntry($UserDomain.Path)
$DirectorySearcher = New-Object System.DirectoryServices.DirectorySearcher
$LDAPFilter = "(&(objectCategory=Group)(name=$($UserGroup)))"
$DirectorySearcher.SearchRoot = $DirectoryEntry
$DirectorySearcher.PageSize = 1000
$DirectorySearcher.Filter = $LDAPFilter
$DirectorySearcher.SearchScope = "Subtree"
$SearchResult = $DirectorySearcher.FindAll()
$UserAccounts = @()
}
Process
{
foreach ($Item in $SearchResult)
{
$Group = $Item.GetDirectoryEntry()
$Members = $Group.member
If ($Members -ne $Null)
{
foreach ($User in $Members)
{
$UserObject = New-Object System.DirectoryServices.DirectoryEntry("LDAP://$($User)")
If ($UserObject.objectCategory.Value.Contains("Group"))
{
}
Else
{
$ThisUser = New-Object -TypeName PSObject -Property @{
cn = $UserObject.cn
distinguishedName = $UserObject.distinguishedName
name = $UserObject.name
nTSecurityDescriptor = $UserObject.nTSecurityDescriptor
objectCategory = $UserObject.objectCategory
objectClass = $UserObject.objectClass
objectGUID = $UserObject.objectGUID
objectSID = $UserObject.objectSID
showInAdvancedViewOnly = $UserObject.showInAdvancedViewOnly
}
}
$UserAccounts += $ThisUser
}
}
}
}
End
{
Return $UserAccounts
}
}
|
combined_dataset/train/non-malicious/sample_33_98.ps1 | sample_33_98.ps1 | # Copyright (c) 2019-2024, The Khronos Group Inc.
# SPDX-License-Identifier: Apache-2.0
if (-not $env:VULKAN_SDK_VERSION) {
$env:VULKAN_SDK_VERSION = "1.1.114.0"
}
$SDK_VER = $env:VULKAN_SDK_VERSION
if (-not (Test-Path env:VULKAN_SDK)) {
if ($env:SYSTEM_DEFAULTWORKINGDIRECTORY) {
$env:VULKAN_SDK = "$env:SYSTEM_DEFAULTWORKINGDIRECTORY\vulkan_sdk\$SDK_VER"
} else {
$env:VULKAN_SDK = "c:\VulkanSDK\$SDK_VER"
}
}
$parent = Split-Path -path $env:VULKAN_SDK
Write-Output "Trying for Vulkan SDK $SDK_VER"
$FN = "vksdk-$SDK_VER-lite.7z"
$URL = "https://people.collabora.com/~rpavlik/ci_resources/$FN"
if (-not (Test-Path "$env:VULKAN_SDK/Include/vulkan/vulkan.h")) {
Write-Output "Downloading $URL"
$wc = New-Object System.Net.WebClient
$wc.DownloadFile($URL, "$(pwd)\$FN")
Write-Output "Extracting $FN in silent, blocking mode to $env:VULKAN_SDK"
Start-Process "c:\Program Files\7-Zip\7z" -ArgumentList "x", $FN, "-o$parent" -Wait
} else {
Write-Output "$env:VULKAN_SDK found and contains header"
}
|
combined_dataset/train/non-malicious/sample_43_84.ps1 | sample_43_84.ps1 | #
# Module manifest for module 'OCI.PSModules.Integration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Integration.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Integration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation',
'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList',
'Get-OCIIntegrationWorkRequest',
'Get-OCIIntegrationWorkRequestErrorsList',
'Get-OCIIntegrationWorkRequestLogsList',
'Get-OCIIntegrationWorkRequestsList',
'Move-OCIIntegrationInstanceCompartment',
'Move-OCIIntegrationInstanceNetworkEndpoint',
'Move-OCIIntegrationPrivateEndpointOutboundConnection',
'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance',
'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance',
'Update-OCIIntegrationInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/LibraryDirectory.ps1 | LibraryDirectory.ps1 | ## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n\nSet-StrictMode -Version Latest\n\n## Get the size of all the items in the current directory\nfunction Get-DirectorySize\n{\n <#\n\n .EXAMPLE\n\n PS > $DebugPreference = "Continue"\n PS > Get-DirectorySize\n DEBUG: Current Directory: D:\\lee\\OReilly\\Scripts\\Programs\n Directory size: 46,581 bytes\n PS > $DebugPreference = "SilentlyContinue"\n PS > $VerbosePreference = "Continue"\n PS > Get-DirectorySize\n VERBOSE: Getting size\n VERBOSE: Got size: 46581\n Directory size: 46,581 bytes\n PS > $VerbosePreference = "SilentlyContinue"\n\n #>\n\n Write-Debug "Current Directory: $(Get-Location)"\n\n Write-Verbose "Getting size"\n $size = (Get-ChildItem | Measure-Object -Sum Length).Sum\n Write-Verbose "Got size: $size"\n\n Write-Host ("Directory size: {0:N0} bytes" -f $size)\n}\n\n## Get the list of items in a directory, sorted by length\nfunction Get-ChildItemSortedByLength($path = (Get-Location), [switch] $Problematic)\n{\n <#\n \n .EXAMPLE\n\n PS > Get-ChildItemSortedByLength -Problematic\n out-lineoutput : Object of type "Microsoft.PowerShell.Commands.Internal.Fo\n rmat.FormatEntryData" is not legal or not in the correct sequence. This is\n likely caused by a user-specified "format-*" command which is conflicting\n with the default formatting.\n\n #>\n\n if($Problematic)\n {\n ## Problematic version\n Get-ChildItem $path | Format-Table | Sort Length\n }\n else\n {\n ## Fixed version\n Get-ChildItem $path | Sort Length | Format-Table\n }\n}
|
combined_dataset/train/non-malicious/sample_30_98.ps1 | sample_30_98.ps1 | # escape=`
# -----------------------------------------------------------------------------------------
# This file describes the standard way to build Docker in a container on Windows
# Server 2016 or Windows 10.
#
# Maintainer: @jhowardmsft
# -----------------------------------------------------------------------------------------
# Prerequisites:
# --------------
#
# 1. Windows Server 2016 or Windows 10 with all Windows updates applied. The major
# build number must be at least 14393. This can be confirmed, for example, by
# running the following from an elevated PowerShell prompt - this sample output
# is from a fully up to date machine as at mid-November 2016:
#
# >> PS C:\> $(gin).WindowsBuildLabEx
# >> 14393.447.amd64fre.rs1_release_inmarket.161102-0100
#
# 2. Git for Windows (or another git client) must be installed. https://git-scm.com/download/win.
#
# 3. The machine must be configured to run containers. For example, by following
# the quick start guidance at https://msdn.microsoft.com/en-us/virtualization/windowscontainers/quick_start/quick_start or
# https://github.com/docker/labs/blob/master/windows/windows-containers/Setup.md
#
# 4. If building in a Hyper-V VM: For Windows Server 2016 using Windows Server
# containers as the default option, it is recommended you have at least 1GB
# of memory assigned; For Windows 10 where Hyper-V Containers are employed, you
# should have at least 4GB of memory assigned. Note also, to run Hyper-V
# containers in a VM, it is necessary to configure the VM for nested virtualization.
# -----------------------------------------------------------------------------------------
# Usage:
# -----
#
# The following steps should be run from an (elevated*) Windows PowerShell prompt.
#
# (*In a default installation of containers on Windows following the quick-start guidance at
# https://msdn.microsoft.com/en-us/virtualization/windowscontainers/quick_start/quick_start,
# the docker.exe client must run elevated to be able to connect to the daemon).
#
# 1. Clone the sources from github.com:
#
# >> git clone https://github.com/docker/docker.git C:\gopath\src\github.com\docker\docker
# >> Cloning into 'C:\gopath\src\github.com\docker\docker'...
# >> remote: Counting objects: 186216, done.
# >> remote: Compressing objects: 100% (21/21), done.
# >> remote: Total 186216 (delta 5), reused 0 (delta 0), pack-reused 186195
# >> Receiving objects: 100% (186216/186216), 104.32 MiB | 8.18 MiB/s, done.
# >> Resolving deltas: 100% (123139/123139), done.
# >> Checking connectivity... done.
# >> Checking out files: 100% (3912/3912), done.
# >> PS C:\>
#
#
# 2. Change directory to the cloned docker sources:
#
# >> cd C:\gopath\src\github.com\docker\docker
#
#
# 3. Build a docker image with the components required to build the docker binaries from source
# by running one of the following:
#
# >> docker build -t nativebuildimage -f Dockerfile.windows .
# >> docker build -t nativebuildimage -f Dockerfile.windows -m 2GB . (if using Hyper-V containers)
#
#
# 4. Build the docker executable binaries by running one of the following:
#
# >> $DOCKER_GITCOMMIT=(git rev-parse --short HEAD)
# >> docker run --name binaries -e DOCKER_GITCOMMIT=$DOCKER_GITCOMMIT nativebuildimage hack\make.ps1 -Binary
# >> docker run --name binaries -e DOCKER_GITCOMMIT=$DOCKER_GITCOMMIT -m 2GB nativebuildimage hack\make.ps1 -Binary (if using Hyper-V containers)
#
#
# 5. Copy the binaries out of the container, replacing HostPath with an appropriate destination
# folder on the host system where you want the binaries to be located.
#
# >> docker cp binaries:C:\gopath\src\github.com\docker\docker\bundles\docker.exe C:\HostPath\docker.exe
# >> docker cp binaries:C:\gopath\src\github.com\docker\docker\bundles\dockerd.exe C:\HostPath\dockerd.exe
#
#
# 6. (Optional) Remove the interim container holding the built executable binaries:
#
# >> docker rm binaries
#
#
# 7. (Optional) Remove the image used for the container in which the executable
# binaries are build. Tip - it may be useful to keep this image around if you need to
# build multiple times. Then you can take advantage of the builder cache to have an
# image which has all the components required to build the binaries already installed.
#
# >> docker rmi nativebuildimage
#
# -----------------------------------------------------------------------------------------
# The validation tests can only run directly on the host. This is because they calculate
# information from the git repo, but the .git directory is not passed into the image as
# it is excluded via .dockerignore. Run the following from a Windows PowerShell prompt
# (elevation is not required): (Note Go must be installed to run these tests)
#
# >> hack\make.ps1 -DCO -PkgImports -GoFormat
# -----------------------------------------------------------------------------------------
# To run unit tests, ensure you have created the nativebuildimage above. Then run one of
# the following from an (elevated) Windows PowerShell prompt:
#
# >> docker run --rm nativebuildimage hack\make.ps1 -TestUnit
# >> docker run --rm -m 2GB nativebuildimage hack\make.ps1 -TestUnit (if using Hyper-V containers)
# -----------------------------------------------------------------------------------------
# To run unit tests and binary build, ensure you have created the nativebuildimage above. Then
# run one of the following from an (elevated) Windows PowerShell prompt:
#
# >> docker run nativebuildimage hack\make.ps1 -All
# >> docker run -m 2GB nativebuildimage hack\make.ps1 -All (if using Hyper-V containers)
# -----------------------------------------------------------------------------------------
# Important notes:
# ---------------
#
# Don't attempt to use a bind mount to pass a local directory as the bundles target
# directory. It does not work (golang attempts for follow a mapped folder incorrectly).
# Instead, use docker cp as per the example.
#
# go.zip is not removed from the image as it is used by the Windows CI servers
# to ensure the host and image are running consistent versions of go.
#
# Nanoserver support is a work in progress. Although the image will build if the
# FROM statement is updated, it will not work when running autogen through hack\make.ps1.
# It is suspected that the required GCC utilities (eg gcc, windres, windmc) silently
# quit due to the use of console hooks which are not available.
#
# The docker integration tests do not currently run in a container on Windows, predominantly
# due to Windows not supporting privileged mode, so anything using a volume would fail.
# They (along with the rest of the docker CI suite) can be run using
# https://github.com/kevpar/docker-w2wCIScripts/blob/master/runCI/Invoke-DockerCI.ps1.
#
# -----------------------------------------------------------------------------------------
# The number of build steps below are explicitly minimised to improve performance.
ARG WINDOWS_BASE_IMAGE=mcr.microsoft.com/windows/servercore
ARG WINDOWS_BASE_IMAGE_TAG=ltsc2022
FROM ${WINDOWS_BASE_IMAGE}:${WINDOWS_BASE_IMAGE_TAG}
# Use PowerShell as the default shell
SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"]
ARG GO_VERSION=1.21.6
ARG GOTESTSUM_VERSION=v1.8.2
ARG GOWINRES_VERSION=v0.3.1
ARG CONTAINERD_VERSION=v1.7.13
# Environment variable notes:
# - GO_VERSION must be consistent with 'Dockerfile' used by Linux.
# - CONTAINERD_VERSION must be consistent with 'hack/dockerfile/install/containerd.installer' used by Linux.
# - FROM_DOCKERFILE is used for detection of building within a container.
ENV GO_VERSION=${GO_VERSION} `
CONTAINERD_VERSION=${CONTAINERD_VERSION} `
GIT_VERSION=2.11.1 `
GOPATH=C:\gopath `
GO111MODULE=off `
GOTOOLCHAIN=local `
FROM_DOCKERFILE=1 `
GOTESTSUM_VERSION=${GOTESTSUM_VERSION} `
GOWINRES_VERSION=${GOWINRES_VERSION}
RUN `
Function Test-Nano() { `
$EditionId = (Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name 'EditionID').EditionId; `
return (($EditionId -eq 'ServerStandardNano') -or ($EditionId -eq 'ServerDataCenterNano') -or ($EditionId -eq 'NanoServer')); `
}`
`
Function Download-File([string] $source, [string] $target) { `
if (Test-Nano) { `
$handler = New-Object System.Net.Http.HttpClientHandler; `
$client = New-Object System.Net.Http.HttpClient($handler); `
$client.Timeout = New-Object System.TimeSpan(0, 30, 0); `
$cancelTokenSource = [System.Threading.CancellationTokenSource]::new(); `
$responseMsg = $client.GetAsync([System.Uri]::new($source), $cancelTokenSource.Token); `
$responseMsg.Wait(); `
if (!$responseMsg.IsCanceled) { `
$response = $responseMsg.Result; `
if ($response.IsSuccessStatusCode) { `
$downloadedFileStream = [System.IO.FileStream]::new($target, [System.IO.FileMode]::Create, [System.IO.FileAccess]::Write); `
$copyStreamOp = $response.Content.CopyToAsync($downloadedFileStream); `
$copyStreamOp.Wait(); `
$downloadedFileStream.Close(); `
if ($copyStreamOp.Exception -ne $null) { throw $copyStreamOp.Exception } `
} `
} else { `
Throw ("Failed to download " + $source) `
}`
} else { `
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; `
$webClient = New-Object System.Net.WebClient; `
$webClient.DownloadFile($source, $target); `
} `
} `
`
setx /M PATH $('C:\git\cmd;C:\git\usr\bin;'+$Env:PATH+';C:\gcc\bin;C:\go\bin;C:\containerd\bin'); `
`
Write-Host INFO: Downloading git...; `
$location='https://www.nuget.org/api/v2/package/GitForWindows/'+$Env:GIT_VERSION; `
Download-File $location C:\gitsetup.zip; `
`
Write-Host INFO: Downloading go...; `
$dlGoVersion=$Env:GO_VERSION; `
Download-File "https://go.dev/dl/go${dlGoVersion}.windows-amd64.zip" C:\go.zip; `
`
Write-Host INFO: Downloading compiler 1 of 3...; `
Download-File https://raw.githubusercontent.com/moby/docker-tdmgcc/master/gcc.zip C:\gcc.zip; `
`
Write-Host INFO: Downloading compiler 2 of 3...; `
Download-File https://raw.githubusercontent.com/moby/docker-tdmgcc/master/runtime.zip C:\runtime.zip; `
`
Write-Host INFO: Downloading compiler 3 of 3...; `
Download-File https://raw.githubusercontent.com/moby/docker-tdmgcc/master/binutils.zip C:\binutils.zip; `
`
Write-Host INFO: Extracting git...; `
Expand-Archive C:\gitsetup.zip C:\git-tmp; `
New-Item -Type Directory C:\git | Out-Null; `
Move-Item C:\git-tmp\tools\* C:\git\.; `
Remove-Item -Recurse -Force C:\git-tmp; `
`
Write-Host INFO: Expanding go...; `
Expand-Archive C:\go.zip -DestinationPath C:\; `
`
Write-Host INFO: Expanding compiler 1 of 3...; `
Expand-Archive C:\gcc.zip -DestinationPath C:\gcc -Force; `
Write-Host INFO: Expanding compiler 2 of 3...; `
Expand-Archive C:\runtime.zip -DestinationPath C:\gcc -Force; `
Write-Host INFO: Expanding compiler 3 of 3...; `
Expand-Archive C:\binutils.zip -DestinationPath C:\gcc -Force; `
`
Write-Host INFO: Removing downloaded files...; `
Remove-Item C:\gcc.zip; `
Remove-Item C:\runtime.zip; `
Remove-Item C:\binutils.zip; `
Remove-Item C:\gitsetup.zip; `
`
Write-Host INFO: Downloading containerd; `
Install-Package -Force 7Zip4PowerShell; `
$location='https://github.com/containerd/containerd/releases/download/'+$Env:CONTAINERD_VERSION+'/containerd-'+$Env:CONTAINERD_VERSION.TrimStart('v')+'-windows-amd64.tar.gz'; `
Download-File $location C:\containerd.tar.gz; `
New-Item -Path C:\containerd -ItemType Directory; `
Expand-7Zip C:\containerd.tar.gz C:\; `
Expand-7Zip C:\containerd.tar C:\containerd; `
Remove-Item C:\containerd.tar.gz; `
Remove-Item C:\containerd.tar; `
`
# Ensure all directories exist that we will require below....
$srcDir = """$Env:GOPATH`\src\github.com\docker\docker\bundles"""; `
Write-Host INFO: Ensuring existence of directory $srcDir...; `
New-Item -Force -ItemType Directory -Path $srcDir | Out-Null; `
`
Write-Host INFO: Configuring git core.autocrlf...; `
C:\git\cmd\git config --global core.autocrlf true;
RUN `
Function Install-GoTestSum() { `
$Env:GO111MODULE = 'on'; `
$tmpGobin = "${Env:GOBIN_TMP}"; `
$Env:GOBIN = """${Env:GOPATH}`\bin"""; `
Write-Host "INFO: Installing gotestsum version $Env:GOTESTSUM_VERSION in $Env:GOBIN"; `
&go install "gotest.tools/gotestsum@${Env:GOTESTSUM_VERSION}"; `
$Env:GOBIN = "${tmpGobin}"; `
$Env:GO111MODULE = 'off'; `
if ($LASTEXITCODE -ne 0) { `
Throw '"gotestsum install failed..."'; `
} `
} `
`
Install-GoTestSum
RUN `
Function Install-GoWinres() { `
$Env:GO111MODULE = 'on'; `
$tmpGobin = "${Env:GOBIN_TMP}"; `
$Env:GOBIN = """${Env:GOPATH}`\bin"""; `
Write-Host "INFO: Installing go-winres version $Env:GOWINRES_VERSION in $Env:GOBIN"; `
&go install "github.com/tc-hib/go-winres@${Env:GOWINRES_VERSION}"; `
$Env:GOBIN = "${tmpGobin}"; `
$Env:GO111MODULE = 'off'; `
if ($LASTEXITCODE -ne 0) { `
Throw '"go-winres install failed..."'; `
} `
} `
`
Install-GoWinres
# Make PowerShell the default entrypoint
ENTRYPOINT ["powershell.exe"]
# Set the working directory to the location of the sources
WORKDIR ${GOPATH}\src\github.com\docker\docker
# Copy the sources into the container
COPY . .
|
combined_dataset/train/non-malicious/sample_55_22.ps1 | sample_55_22.ps1 | #
# Module manifest for module 'OCI.PSModules.Datacatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datacatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatacatalogCatalogLock',
'Add-OCIDatacatalogCatalogPrivateEndpointLock',
'Add-OCIDatacatalogDataSelectorPatterns',
'Add-OCIDatacatalogMetastoreLock',
'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern',
'DisMount-OCIDatacatalogCatalogPrivateEndpoint',
'Export-OCIDatacatalogGlossary',
'Get-OCIDatacatalogAggregatedPhysicalEntitiesList',
'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList',
'Get-OCIDatacatalogAttributeTag',
'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog',
'Get-OCIDatacatalogCatalogPrivateEndpoint',
'Get-OCIDatacatalogCatalogPrivateEndpointsList',
'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection',
'Get-OCIDatacatalogConnectionsList',
'Get-OCIDatacatalogCustomPropertiesList',
'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset',
'Get-OCIDatacatalogDataAssetsList',
'Get-OCIDatacatalogDataAssetTag',
'Get-OCIDatacatalogDataAssetTagsList',
'Get-OCIDatacatalogDerivedLogicalEntitiesList',
'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity',
'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList',
'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList',
'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList',
'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary',
'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition',
'Get-OCIDatacatalogJobDefinitionsList',
'Get-OCIDatacatalogJobExecution',
'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog',
'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics',
'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList',
'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList',
'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList',
'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList',
'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList',
'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship',
'Get-OCIDatacatalogTermRelationshipsList',
'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType',
'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest',
'Get-OCIDatacatalogWorkRequestErrorsList',
'Get-OCIDatacatalogWorkRequestLogsList',
'Get-OCIDatacatalogWorkRequestsList',
'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset',
'Import-OCIDatacatalogGlossary', 'Import-OCIDatacatalogLineage',
'Invoke-OCIDatacatalogAssociateCustomProperty',
'Invoke-OCIDatacatalogAsynchronousExportDataAsset',
'Invoke-OCIDatacatalogAsynchronousExportGlossary',
'Invoke-OCIDatacatalogDisassociateCustomProperty',
'Invoke-OCIDatacatalogExpandTreeForGlossary',
'Invoke-OCIDatacatalogFetchEntityLineage',
'Invoke-OCIDatacatalogObjectStats',
'Invoke-OCIDatacatalogParseConnection',
'Invoke-OCIDatacatalogProcessRecommendation',
'Invoke-OCIDatacatalogRecommendations',
'Invoke-OCIDatacatalogSearchCriteria',
'Invoke-OCIDatacatalogSuggestMatches',
'Invoke-OCIDatacatalogSynchronousExportDataAsset',
'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers',
'Mount-OCIDatacatalogCatalogPrivateEndpoint',
'Move-OCIDatacatalogCatalogCompartment',
'Move-OCIDatacatalogCatalogPrivateEndpointCompartment',
'Move-OCIDatacatalogMetastoreCompartment',
'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag',
'New-OCIDatacatalogCatalog',
'New-OCIDatacatalogCatalogPrivateEndpoint',
'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty',
'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag',
'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag',
'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag',
'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob',
'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution',
'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace',
'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm',
'New-OCIDatacatalogTermRelationship',
'Remove-OCIDatacatalogAttribute',
'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog',
'Remove-OCIDatacatalogCatalogLock',
'Remove-OCIDatacatalogCatalogPrivateEndpoint',
'Remove-OCIDatacatalogCatalogPrivateEndpointLock',
'Remove-OCIDatacatalogConnection',
'Remove-OCIDatacatalogCustomProperty',
'Remove-OCIDatacatalogDataAsset',
'Remove-OCIDatacatalogDataAssetTag',
'Remove-OCIDatacatalogDataSelectorPatterns',
'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag',
'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag',
'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob',
'Remove-OCIDatacatalogJobDefinition',
'Remove-OCIDatacatalogMetastore',
'Remove-OCIDatacatalogMetastoreLock',
'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern',
'Remove-OCIDatacatalogTerm',
'Remove-OCIDatacatalogTermRelationship',
'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog',
'Update-OCIDatacatalogCatalogPrivateEndpoint',
'Update-OCIDatacatalogConnection',
'Update-OCIDatacatalogCustomProperty',
'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity',
'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary',
'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition',
'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace',
'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm',
'Update-OCIDatacatalogTermRelationship',
'Write-OCIDatacatalogCredentials'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Import Group Policies.ps1 | Import Group Policies.ps1 | ##############################################
##Import group policies from a folder to a Domain Controller
##Author: Adam Liquorish
##
##*Currently will only run on Server 2008 R2
##*Script is based on the Microsoft Visual Basic Script for importing group policies.
##*Server doesnt need to be defined as PDC emulator will be contacted by default
##############################################
######Define Parameters
param(
[Parameter(Mandatory=$true,
HelpMessage="Enter Path for input ie c:\\Temp\\output.html.")]
[ValidateNotNullOrEmpty()]
[string]$outputpath=$(Read-Host -prompt "Path for input"),
[Parameter(Mandatory=$true,
HelpMessage="Enter Domain")]
[ValidateNotNullOrEmpty()]
[string]$computername=$(Read-Host -prompt "Domain Name")
)
######Import Modules
import-module grouppolicy
######End Import Modules
######Define Variables
#Commented out due to introduction of parameters
#zeroize variables
$start=get-date
$prog=1
$i=$null
$a=$null
$b=$null
$c=$null
$max=$null
##Function to take gpo name from each xml
#Start Function
function GPOName ($b)
{
([xml](get-content $b)).GPO.Name
}
#End function
$a=get-childitem -recurse $path
$b=$a|where-object {$_.Name -eq "gpreport.xml"}
$c=foreach ($test in $b){GPOName($test.fullname)}
$c|
Foreach-object {
#Counter for Progress Bar
$max=$b.length
$i++
#Import GPO
Import-GPO -BackupGpoName $_ -TargetName $_ -path $path -CreateIfNeeded -Dom $domain
#Write Progress
Write-Progress -activity "Adding GPO's" -status "Added $i of $max" -PercentComplete (($i/$b.length)*100) -CurrentOperation $_}
Write-Host "Completed....Total Number of GPO's imported:"$b.length
|
combined_dataset/train/non-malicious/finddupe_18.ps1 | finddupe_18.ps1 | # new version has more error handling, "-delete" and "-noprompt" options.
function Get-MD5([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]'))
{
$stream = $null;
$cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider];
$hashAlgorithm = new-object $cryptoServiceProvider
$stream = $file.OpenRead();
$hashByteArray = $hashAlgorithm.ComputeHash($stream);
$stream.Close();
## We have to be sure that we close the file stream if any exceptions are thrown.
trap
{
if ($stream -ne $null)
{
$stream.Close();
}
break;
}
foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }}
return [string]$result;
}
$starttime=[datetime]::now
write-host "Usage: finddupe.ps1 <directory/file #1> <directory/file #2> ... <directory/file #N> [-delete] [-noprompt]"
$matches = 0 # initialize number of matches for summary.
$filesdeleted = 0 # number of files deleted.
$bytesrec = 0 # Number of bytes recovered.
$del = $false # delete duplicates
$noprompt = $false # delete without prompting toggle
$args | ?{$_ -eq "-delete"} |%{$del=$true}
$args | ?{$_ -eq "-noprompt"} | %{$noprompt=$true}
$files=@(dir -ea 0 -recurse ($args | ?{$_ -ne "-delete" -and $_ -ne "-noprompt"} |?{if ((get-item -ea 0 $_) -eq $null){write-host "`aError: " -f red -nonewline; write-host "$_ not found.";exit} else {$_}})|?{$_.psiscontainer -ne $true} )
if ($files.count -lt 2) {"Need at least two files to compare.`a";exit}
for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files
{
if ($files[$i] -eq $null) {continue}
$filecheck = $files[$i]
$files[$i] = $null
for ($c=0;$c -ne $files.count; $c++)
{
if ($files[$c] -eq $null) {continue}
# write-host "Comparing $filecheck and $($files[$c]) `r" -nonewline
if ($filecheck.length -eq $files[$c].length)
{
#write-host "Comparing MD5 of $($filecheck.fullname) and $($files[$c].fullname) `r" -nonewline
if ($filecheck.md5 -eq $null)
{
$md5 = (get-md5 $filecheck.fullname)
$filecheck = $filecheck | %{add-member -inputobject $_ -name MD5 -membertype noteproperty -value $md5 -passthru}
}
if ($files[$c].md5 -eq $null)
{
$md5 = (get-md5 $files[$c].fullname)
$files[$c] = $files[$c] | %{add-member -inputobject $_ -name MD5 -membertype noteproperty -value $md5 -passthru}
}
if ($filecheck.md5 -eq $files[$c].md5)
{
write-host "Size and MD5 match: " -fore red -nonewline
write-host "`"$($filecheck.fullname)`"" -nonewline
write-host " and " -nonewline
write-host "`"$($files[$c].fullname)`""
$matches += 1
if ($del -eq $true)
{
if ($noprompt -eq $true)
{
del $files[$c].fullname
write-host "Deleted duplicate: " -f red -nonewline
write-host "$($files[$c].fullname)."
}
else
{
del $files[$c].fullname -confirm
}
if ((get-item -ea 0 $files[$c].fullname) -eq $null)
{
$filesdeleted += 1
$bytesrec += $files[$c].length
}
}
$files[$c] = $null
}
}
}
}
write-host ""
write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found.
write-host "Number of duplicates found: $matches."
Write-host "Number of duplicates deleted: $filesdeleted." # Display number of duplicate files deleted and bytes recovered.
write-host "$bytesrec bytes recovered."
write-host ""
write-host "Time to run: $(([datetime]::now)-$starttime|select hours, minutes, seconds, milliseconds)"
write-host ""
|
combined_dataset/train/non-malicious/WhoIs_1.ps1 | WhoIs_1.ps1 | param([String] $DomainName = '192.168.0.1')
$socket = New-Object System.Net.Sockets.Socket ([System.Net.Sockets.AddressFamily]::InterNetwork, [System.Net.Sockets.SocketType]::Stream, [System.Net.Sockets.ProtocolType]::Tcp)
$Socket.Connect('whois.arin.net', 43) | out-null
$bytes = [System.Text.Encoding]::ASCII.GetBytes($domainName + "`n")
$Socket.Send($bytes) | out-null
$bytes = [Array]::CreateInstance("byte", 2048)
$Socket.Receive($bytes) | out-null
$result = [System.Text.Encoding]::ASCII.GetString($bytes).Trim()
$Socket.Close()
$Data = New-Object Object
$Data | Add-Member NoteProperty Raw ($result)
$result -split "`n" | % {
if (![String]::IsNullOrEmpty($_)) {
$num = $_.IndexOf(":")
if ($num -gt 0) {
$itemName = $_.SubString(0,$num).Trim()
$itemValue = $_.SubString($num+1).Trim()
if (($Data | Get-Member $itemName)) {
$Data.($itemName) += "|" + $itemValue
}
else {
$Data | Add-Member NoteProperty ($itemName) ($itemValue)
}
}
}
}
$Data
|
combined_dataset/train/non-malicious/Enable_Configure SNMP.ps1 | Enable_Configure SNMP.ps1 | #Powershell Script To Install SNMP Services (SNMP Service, SNMP WMI Provider)
#Variables :)
$pmanagers = "ADD YOUR MANAGER(s)"
$commstring = "ADD YOUR COMM STRING"
#Import ServerManger Module
Import-Module ServerManager
#Check If SNMP Services Are Already Installed
$check = Get-WindowsFeature | Where-Object {$_.Name -eq "SNMP-Services"}
If ($check.Installed -ne "True") {
#Install/Enable SNMP Services
Add-WindowsFeature SNMP-Services | Out-Null
}
##Verify Windows Servcies Are Enabled
If ($check.Installed -eq "True"){
#Set SNMP Permitted Manager(s) ** WARNING : This will over write current settings **
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\PermittedManagers" /v 1 /t REG_SZ /d localhost /f | Out-Null
#Used as counter for incremting permitted managers
$i = 2
Foreach ($manager in $pmanagers){
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\PermittedManagers" /v $i /t REG_SZ /d $manager /f | Out-Null
$i++
}
#Set SNMP Community String(s)- *Read Only*
Foreach ( $string in $commstring){
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\ValidCommunities" /v $string /t REG_DWORD /d 4 /f | Out-Null
}
}
Else {Write-Host "Error: SNMP Services Not Installed"}
|
combined_dataset/train/non-malicious/2771.ps1 | 2771.ps1 |
if (Test-Path "$env:SystemRoot\sigcheck.exe") {
$rootpath = Get-Random -Minimum 1 -Maximum 6
switch ($rootpath) {
1 { $rootpath = "$env:temp\" }
2 { $rootpath = "$env:systemroot\" }
3 { $rootpath = "$env:allusersprofile\" }
4 { $rootpath = "$env:ProgramFiles\" }
5 { $rootpath = "$env:ProgramData\" }
6 { $rootpath = "$env:ProgramFiles(x86)\" }
}
Try {
Push-Location
Set-Location $rootpath
& $env:SystemRoot\sigcheck.exe /accepteula -a -e -c -h -q -s -r 2> $null | ConvertFrom-Csv | ForEach-Object {
$_
}
} Catch {
Write-Error ("Caught: {0}" -f $_)
} Finally {
Pop-Location
}
} else {
Write-Error "Sigcheck.exe not found in $env:SystemRoot."
} |
combined_dataset/train/non-malicious/sample_12_47.ps1 | sample_12_47.ps1 | # Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
function Find-Ast {
<#
.EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml
#>
[CmdletBinding(PositionalBinding=$false, DefaultParameterSetName='FilterScript')]
param(
[Parameter(Position=0, ParameterSetName='FilterScript')]
[ValidateNotNullOrEmpty()]
[scriptblock]
$FilterScript = { $true },
[Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName='FilterScript')]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.Ast]
$Ast,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$Before,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$Family,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Closest', 'F')]
[switch]
$First,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Furthest')]
[switch]
$Last,
[Parameter(ParameterSetName='FilterScript')]
[Alias('Parent')]
[switch]
$Ancestor,
[Parameter(ParameterSetName='FilterScript')]
[switch]
$IncludeStartingAst,
[Parameter(ParameterSetName='AtCursor')]
[switch]
$AtCursor
)
begin {
# InvokeWithContext method is PS4+, but it's significantly faster for large files.
if ($PSVersionTable.PSVersion.Major -ge 4) {
$variableType = [System.Management.Automation.PSVariable]
function InvokeWithContext {
param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder)
return $Filter.InvokeWithContext(
<# functionsToDefine: #> $null,
<# variablesToDefine: #> [Activator]::CreateInstance($variableType, @('_', $DollarUnder)),
<# args: #> $aAst)
}
} else {
$FilterScript = [scriptblock]::Create($FilterScript.ToString())
function InvokeWithContext {
param([scriptblock]$Filter, [System.Management.Automation.Language.Ast]$DollarUnder)
return $DollarUnder | & { process { $Filter.InvokeReturnAsIs($DollarUnder) } }
}
}
# Get all children or ancestors.
function GetAllFamily {
param($Start)
if ($Before.IsPresent) {
$parent = $Start
for ($parent; $parent = $parent.Parent) { $parent }
return
}
return $Start.FindAll({ $true }, $true)
}
# Get all asts regardless of structure, in either direction from the starting ast.
function GetAllAsts {
param($Start)
$predicate = [Func[System.Management.Automation.Language.Ast,bool]]{
$args[0] -ne $Ast
}
$topParent = Find-Ast -Ast $Start -Ancestor -Last -IncludeStartingAst
if (-not $topParent) { $topParent = $Start }
if ($Before.IsPresent) {
# Need to store so we can reverse the collection.
$result = [Linq.Enumerable]::TakeWhile(
$topParent.FindAll({ $true }, $true),
$predicate) -as [System.Management.Automation.Language.Ast[]]
[array]::Reverse($result)
return $result
}
return [Linq.Enumerable]::SkipWhile(
$topParent.FindAll({ $true }, $true),
$predicate)
}
}
process {
if ($Ancestor.IsPresent) {
$Family = $Before = $true
}
$context = $psEditor.GetEditorContext()
if (-not $Ast -and $context) {
$Ast = $context.CurrentFile.Ast
}
switch ($PSCmdlet.ParameterSetName) {
AtCursor {
$cursorLine = $context.CursorPosition.Line - 1
$cursorColumn = $context.CursorPosition.Column - 1
$cursorOffset = $Ast.Extent.Text |
Select-String "(.*\r?\n){$cursorLine}.{$cursorColumn}" |
ForEach-Object { $PSItem.Matches.Value.Length }
# yield
Find-Ast -Last {
$cursorOffset -ge $PSItem.Extent.StartOffset -and
$cursorOffset -le $PSItem.Extent.EndOffset
}
}
FilterScript {
if (-not $Ast) { return }
# Check if we're trying to get the top level ancestor when we're already there.
if ($Before.IsPresent -and
$Family.IsPresent -and
$Last.IsPresent -and -not
$Ast.Parent -and
$Ast -is [System.Management.Automation.Language.ScriptBlockAst])
{ return $Ast }
if ($Family.IsPresent) {
$asts = GetAllFamily $Ast
} else {
$asts = GetAllAsts $Ast
}
# Check the first ast to see if it's our starting ast, unless
$checkFirstAst = -not $IncludeStartingAst
foreach ($aAst in $asts) {
if ($checkFirstAst) {
if ($aAst -eq $Ast) {
$checkFirstAst = $false
continue
}
}
$shouldReturn = InvokeWithContext $FilterScript $aAst
if (-not $shouldReturn) { continue }
# Return first, last, both, or all depending on the combination of switches.
if (-not $Last.IsPresent) {
$aAst # yield
if ($First.IsPresent) { break }
} else {
$lastMatch = $aAst
if ($First.IsPresent) {
$aAst # yield
$First = $false
}
}
}
# yield
if ($Last.IsPresent) { return $lastMatch }
}
}
}
}
# SIG # Begin signature block
# MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAItklfWteKH2i/
# HFdzPlev2c8mkTjAIWWicaXP36bs9qCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIJKwga/iSAEmqs98xcuwgBqGXwTwWpA
# 2lBHh7HkgP8MMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# GkcbTkGKV/Ipop27rxMmubWOJs2yITJAX29md3pK4Fcof3a/4JfKSAq9Z2mJFxiE
# x1Dj+C8+RMfSa8PDhLzoPOtBJKe103GI8aP+loLPGxFtITAwTEzVK/nc9svTtWXZ
# u+WsQm3Ju9uC9qPIvjFV05tprcQv0OyFtk/EFAyW3GFjstvran+ocZPPk+U9e0Up
# QCB59UaxKMO1Pb2MC63pZNC30fkhbgXyHFO0WZte1mIGj59muxjPEmXe0y16af/r
# g/oxDTt7QmUB0fFIOe5l2xKqpMZMAMTyuCWLaUboQLMKRMhicQrmcS62VUsmpKZm
# zh+2vPELkZgl+sz9TOmuI6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG
# SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B
# CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCDqAyGnZFU0dlRqaPd2FrsvJlQAhzTM5rgtujWNnwplvgIGZfLh3QcAGBMyMDI0
# MDQwMzIxMzM0MC4wODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5
# NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH
# IDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0y
# NTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD
# VQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn
# +8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1
# QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r0
# 1TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XI
# jiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/M
# sXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoq
# BYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx
# 6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCe
# tluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK
# 9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW
# 7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQAB
# o4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQY
# MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
# BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
# /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G
# CSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPh
# wGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopkl
# beGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5Q
# cLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w11
# 9b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUG
# MCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gH
# VSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KO
# EZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHO
# iOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRse
# dSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivd
# tnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6V
# NzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL
# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV
# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X
# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb
# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO
# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw
# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW
# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w
# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK
# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2
# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH
# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF
# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW
# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH
# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF
# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw
# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7
# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO
# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL
# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L
# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5
# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE
# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB
# ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9
# EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMA0GCSqGSIb3DQEBCwUAAgUA6be7PjAiGA8yMDI0MDQwMzExMjU1MFoYDzIw
# MjQwNDA0MTEyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt7s+AgEAMAcC
# AQACAgCFMAcCAQACAhPwMAoCBQDpuQy+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG
# CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL
# BQADggEBAGOEGg2aN3xyURELmw+L+GX8p2GLWI15sn26L5zZ1RCMYvrrEPzbIkBT
# j1NL0yFvaXLZb68bd179ylRdRB49JdGqFq0JlXlDpduzp+W9aX4OsZcimqvnX/aV
# v8vpwR0bkwQiF36Wlw3TXbw2aZdv/KnRY/COKkaoKxQxC9rgkNw5MLAx+GJfJFYx
# lMwxRj+jQkox5WIar2zQ+etv9rPjBrUmC2eDaY7gc8q8+3N/aVk/bE/j6LWpX5d5
# zJSjmZLTCPvHFakF75DP7NBXDK6u3RQgxwqvcQBdP3SXpw0P72aW5NEI3EAbdjiL
# caVi+qcCb/mHcVEsE/IQWfbRiTzLslgxggQNMIIECQIBATCBkzB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgB
# ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3
# DQEJBDEiBCCb3JkOnDAaTO14wBhT/kwpJnD7AFx8fJeZBBILwx5CQjCB+gYLKoZI
# hvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWUL
# ejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAHs4CukgtCRUoAAAQAAAewwIgQgKz3kSreOLui1ENgzHV9zHDupRYY2KLepgApY
# ryRPCEkwDQYJKoZIhvcNAQELBQAEggIAa6fg6XJpnTHFX3Vg1OC++zMAb7XnIFH8
# cLw8QW/jGz9Eq7xPdqR3MvExGLdAucV8/cuW3ys6e32exgG3ZrE7oP2VNtzOsf8/
# /YEofUkhBqiDovTlMsXiCreregaHp/izMdDjM5ta0TKScdJjm1lS/uZgkMH+dz26
# J5TmgrzY+NjB3UsB3SzIyuxswkuCHlKaB+3+zTQ8hD31a1s27uC7BxVVumdijEDi
# phdMzlfXupDg5JrAgcud+rW1KuW/0QYmNUH8pucBX2b2AQ1eu+Tn+MPdN5EnpbXZ
# swJtA3T2xHW1ixy+zqJf8hTT0SufSI6CGI5fcae34TW6jgagThvq5ZWl+Iowfv1K
# 87XgeNmCrKGJiM1r1n5gXL27nbkP6IDJR/RhwyaNJT5AFJxOykc084AIxkMSj1rg
# pahVndRsVQW2rB2GXfTPmYC/Gy/2vTxMwaXlBr8oJBVX/6oR5uU711uOGganpQZ3
# vfwEgGKhdQiu1fdd62it7sESr4HinKc52PxPdnRkojuD4Xsye4Ew2z6tyf+UCgO5
# 7K7SWkc0tABwR5MUgh6tNgd1HKjSanYpmS2/5T1YhxtNx4kw+DGw+43zLG9NLf1t
# EBE/E3GiP2kOh1E6VsIZyj1c4oRtifESJ2E2aWBKGTkvz4kHq+wQNJaiOssgfmBe
# ctplN4quwwA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Out-Balloon_3.ps1 | Out-Balloon_3.ps1 | <#
.Synopsis
Makes a baloon tip in the notification area
.Description
With just a few arguments, it is easy to make some text appear in a little balloon.
You can specify an icon file (*.ico) with the -icon argument, if you don't then
the first icon of the host is used.
out-balloon accepts pipeline input, strings only please.
It blocks for the duration of the balloon display, 3 seconds by default. Simple
fixes for this are welcome.
timeout should be an integer value.
INSTALLATION:
um, save this text in a file named out-balloon.ps1 in your path
.Parameter BuiltInIcon
Must be one of none, Info, warning, error.
.Parameter TimeoutSeconds
Number of Seconds to display the Tool tip for
.Example
"job done." | out-balloon
.Example
out-balloon "hey, your job is done." -icon "C:\\Program Files\\Microsoft Office\\Office12\\MYSL.ICO"
.Example
out-balloon "hey, your job is done." -title "Printer Server" -BuiltInIcon info
#>
param(
[Parameter(ValueFromPipeline=$true,Position=0,Mandatory=$true)]
[Alias('output')]
[string]$text,
[string]$iconFile,
[string]$title,
[string]$BuiltInIcon,
[int32]$TimeoutSeconds = 3
)
begin
{
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Drawing")
if( $BuiltInIcon )
{
if( $title -eq $null )
{
write-error "You must supply a title to dislay the BuiltInIcon!"
}
}
if( $iconFile -and $ToolTipIcon)
{
write-error "Cannot supply -IconFile and ToolTipIcon parameters together."
}
$not = new-object System.Windows.Forms.NotifyIcon
if ($icon -eq $null)
{
if ($win32extraciconex -eq $null)
{
$script:ExtractIconEx = Add-Type ¢memberDefinition @"
[DllImport("Shell32", CharSet=CharSet.Auto)]
private static extern int ExtractIconEx (string lpszFile, int nIconIndex,
IntPtr[] phIconLarge,IntPtr[] phIconSmall,int nIcons);
[DllImport("user32.dll", EntryPoint="DestroyIcon", SetLastError=true)]
private static extern int DestroyIcon(IntPtr hIcon);
public static System.Drawing.Icon ExtractIconFromExe(string file, bool large)
{
int readIconCount = 0;
IntPtr[] hDummy = new IntPtr[1] {IntPtr.Zero};
IntPtr[] hIconEx = new IntPtr[1] {IntPtr.Zero};
try
{
if(large)
readIconCount = ExtractIconEx(file,0, hIconEx, hDummy, 1);
else
readIconCount = ExtractIconEx(file,0, hDummy, hIconEx, 1);
if(readIconCount > 0 && hIconEx[0] != IntPtr.Zero)
{
System.Drawing.Icon extractedIcon = (System.Drawing.Icon)System.Drawing.Icon.FromHandle(hIconEx[0]).Clone();
return extractedIcon;
}
else // NO ICONS READ
return null;
}
catch(Exception ex)
{
throw new ApplicationException("Failed extracting icon", ex);
}
finally
{
foreach(IntPtr ptr in hIconEx)
if(ptr != IntPtr.Zero)
DestroyIcon(ptr);
foreach(IntPtr ptr in hDummy)
if(ptr != IntPtr.Zero)
DestroyIcon(ptr);
}
}
"@ -name ōWin32ExtractIconExö -namespace win32api ¢passThru -ReferencedAssemblies "System.Drawing"
}
$not.Icon = $extractIconEx::ExtractIconFromExe((get-process -Id $pid).mainmodule.filename, $true)
}
else
{
$not.Icon = new-object System.Drawing.Icon($iconFile)
}
$not.visible = $true
}
process
{
$not.BalloonTipText = $text
$not.BalloonTipTitle = $title
if( $BuiltInIcon) { $not.BalloonTipIcon = $BuiltInIcon }
$not.ShowBalloonTip($timeout)
sleep $TimeoutSeconds
}
end
{
$not.dispose()
}
|
combined_dataset/train/non-malicious/2211.ps1 | 2211.ps1 |
param(
[parameter(Mandatory=$true)]
$SiteServer,
[parameter(Mandatory=$true)]
$SiteCode,
[parameter(Mandatory=$true)]
$ApplicationName
)
if (Get-WmiObject -Namespace "root\sms\site_$($SiteCode)" -Class "SMS_Application" -ComputerName $SiteServer -ErrorAction SilentlyContinue | Where-Object { $_.LocalizedDisplayName -like "$($ApplicationName)"}) {
$Deployment = (Get-WmiObject -Namespace "root\sms\site_$($SiteCode)" -Class "SMS_ApplicationAssignment" -ComputerName $SiteServer | Where-Object { $_.ApplicationName -like "$($ApplicationName)"}).__PATH
$i = 0
if (($Deployment -eq $null) -or ($Deployment -eq "")) {
Write-Warning "No deployments was found for application $($ApplicationName)"
}
else {
$Deployment | ForEach-Object {
$i++
Write-Output ""
Write-Output "Deleting deployment $($i) of $($Deployment.Count): $($_)`n"
Remove-WmiObject -InputObject $_ | Out-Null
Write-Output "Successfully deleted $($i) deployments for $($ApplicationName)`n"
}
}
}
else {
Write-Warning "Application '$($ApplicationName)' was not found"
} |
combined_dataset/train/non-malicious/sample_63_19.ps1 | sample_63_19.ps1 | $global:VerbosePreference = 'Continue'
Function Write-Custom-Output
{
Param([string]$message)
$date = Get-Date
$newMessage = '[{0}] {1}' -f $date, $message
Write-Output $newMessage
}
trap [Exception]
{
Write-Custom-Output "WARN: Terminating error encountered on line $($_.InvocationInfo.ScriptLineNumber), char $($_.InvocationInfo.OffsetInLine): $_"
Write-Custom-Output "WARN: Execution will attempt to continue (As ErrorAction cannot be set for terminating errors)"
continue
}
Function GetTimestamp
{
return get-date -uformat %Y%m%d-%k%M%S
}
Function StartHFSTranscript ([string] $LogName)
{
$transcriptPath = "$($env:temp)\$LogName-$($timestamp).log"
Start-Transcript -Path $transcriptPath
}
Function StopHFSTranscript
{
Stop-Transcript
}
Function DeleteFirewallExceptions
{
Write-Custom-Output "Deleting firewall exceptions"
Start-ProcessAndPipeOutput "$env:SystemRoot\system32\netsh.exe" 'advfirewall firewall delete rule name="Storage Sync Agent - WorkFolders (Port 80)"'
Start-ProcessAndPipeOutput "$env:SystemRoot\system32\netsh.exe" 'advfirewall firewall delete rule name="Storage Sync Agent - WorkFolders (Port 443)"'
}
Function Start-ProcessAndPipeOutput ([string] $commandPath, [string] $commandArguments)
{
Write-Custom-Output ">>>>Executing commmand '$commandPath' with arguments '$commandArguments'"
$pinfo = New-Object System.Diagnostics.ProcessStartInfo
$pinfo.FileName = $commandPath
$pinfo.RedirectStandardError = $true
$pinfo.RedirectStandardOutput = $true
$pinfo.UseShellExecute = $false
$pinfo.Arguments = $commandArguments
$p = New-Object System.Diagnostics.Process
$p.StartInfo = $pinfo
$p.Start() | Out-Null
$p.WaitForExit()
Write-Custom-Output ">>>>Command completed with exit code '$($p.ExitCode)'"
Write-Custom-Output ">>>>Output stream: "
Write-Custom-Output "$($p.StandardOutput.ReadToEnd())"
Write-Custom-Output ">>>>Error stream: "
Write-Custom-Output "$($p.StandardError.ReadToEnd())"
}
Function Load-Module
{
Param([string]$name)
if(-not(Get-Module -name $name))
{
if(Get-Module -ListAvailable |
Where-Object { $_.name -eq $name })
{
Import-Module -Name $name
$true
} #end if module available then import
else
{
$false
} #module not available
} # end if not module
else
{
$true
} #module already loaded
} #end function
Function WaitForAppPoolToBeInDesiredState([string] $AppPoolName, [string] $DesiredState, [int] $WaitTimeInSecs = 100)
{
if(Load-Module -Name "WebAdministration")
{
Write-Custom-Output "Waiting until IIS app pool is in the state '$DesiredState'."
$timeElapsed = 0
$checkInterval = 5
while ((Get-WebAppPoolState -Name $AppPoolName).Value -ne $DesiredState)
{
# The IIS Module has a 90s shutdown timer, so if it'is still running after 100s, then IIS did not successfully kill the process.
if ($timeElapsed -ge $WaitTimeInSecs)
{
$error = "Waited for $WaitTimeInSecs seconds, and app pool hasn't reached the desired state '$DesiredState'."
throw $error
}
Write-Custom-Output "Waiting for AppPool to reach $DesiredState (waited for $timeElapsed seconds, timeout in $WaitTimeInSecs)"
Start-Sleep -Seconds $checkInterval
$timeElapsed = $timeElapsed + $checkInterval
}
Write-Custom-Output "IIS app pool is in the state '$DesiredState' (Took $timeElapsed seconds to reach state)."
}
else
{
$message = "WebAdministration could not be loaded, skipped {0}" -f $MyInvocation.MyCommand
Write-Custom-Output $message
}
}
Function InstallFeature([string] $featureName)
{
Write-Custom-Output "Checking Windows Feature $featureName installation"
try
{
#install feature if not already installed
if((ServerManager\Get-WindowsFeature -Name $featureName).Installed -ne $true)
{
if(([Environment]::OSVersion.Version) -gt (new-object 'Version' 6,1,7601,65536))
{
Write-Custom-Output "Command to install feature: Install-WindowsFeature -Name $featureName"
ServerManager\Install-WindowsFeature -Name $featureName;
}
else #Machine is Windows 7 run Add-WindowsFeature
{
Write-Custom-Output "Command to install feature: Add-WindowsFeature -Name $featureName"
ServerManager\Add-WindowsFeature -Name $featureName;
}
}
else
{
Write-Custom-Output "Windows Feature $featureName is already installed."
}
Write-Custom-Output "Completed Windows Feature $featureName installation"
}
catch
{
throw "InstallFeature action not completed for $featureName"
}
}
Function InstallHFSRequiredWindowsFeatures()
{
Write-Custom-Output "Initiating HFS Required Windows Feature installation action"
#Install IIS
InstallFeature("Web-Server");
# Skip the feature on Server Core
if(Test-Path "$env:windir\explorer.exe")
{
InstallFeature("Web-Mgmt-Tools");
}
#Install Windows Authentication module
InstallFeature("Web-Windows-Auth");
#Install Windows Authentication module
InstallFeature("Web-Digest-Auth");
Write-Custom-Output "Completed HFS Required Windows Feature installation action"
}
#Checks the state of the service
# If service is in the stopped state, attempt to start it and finish the function
# If the service is not in stopped state:
# Stop the service
# Check the process and process id to confirm service is stopped. If not stopped, kill the service using taskkill
# If service is stopped, attmempt to start it. If service is unable to stop, start call would not be successful
Function RestartService([string] $serviceName)
{
$processId=0
Write-Custom-Output "Checking if service '$serviceName' exists"
#Get the service name
$serviceObj = Get-Service $serviceName -ErrorAction Ignore
$processFound = $false
if ($serviceObj -eq $null)
{
Write-Custom-Output "WARN: Service '$serviceName' does not exist."
return
}
#check if the service is stopped
if($serviceObj.Status -ieq "Stopped")
{
#Attempt to start the service
Write-Custom-Output "Service $serviceName is not currently running. Attempting to restart it"
Start-Service -Name $serviceName -ErrorAction SilentlyContinue
}
else #service is running
{
#Get the process Id
try
{
#throws incase the process not found
$processId = (Get-Process -Name $serviceName).Id
if($processId -ne $null)
{
$processFound=$true
}
}
catch
{
#process really not running
Write-Custom-Output "Get-Process failed with detail: $Error"
}
if($processFound -eq $true)
{
Write-Custom-Output "Found the service $serviceName with processId $processId."
Write-Custom-Output "Attempting to stop the service $serviceName with processId $processId."
#Stop the service and check the ProcessId
$sb = { param($ServiceName) Stop-Service -Name $ServiceName -Force }
$job = Start-Job -ScriptBlock $sb -ArgumentList $ServiceName -ErrorAction Continue
#Delay for time
Start-Sleep -Seconds 30
Write-Custom-Output "Checking if the service $serviceName was stoppped successfully in grace time period."
#Get the process for service
#Process will be only found if the service was unable to stop with Stop-Service call earlier
$newProcessObj = Get-Process -Name $serviceName -ErrorAction SilentlyContinue
#Process found
if($newProcessObj -ne $null)
{
#Get the process id
$newProcessId = $newProcessObj.Id
if($newProcessId -eq $processId) #id is same as earlier process id, service didn't stop
{
Write-Custom-Output "$serviceName has not yet stopped after initial wait period. Continuing to poll the service status before timeout."
$processStopped = $false
#additional logic for service stop status query
$serviceStopRetryCount = 1;
$serviceStopMaxRetries = 15;
#poll the service state for 2:30 min (15 X 10 sec)
#poll is added as service state may not be completely stoppped
#after initial wait of 30 sec
while($serviceStopRetryCount -le $serviceStopMaxRetries)
{
Write-Custom-Output "Polling $serviceName state in retry count $serviceStopRetryCount of $serviceStopMaxRetries"
#10 sec delay before polling the service
Start-Sleep -Seconds 10;
#Get the process Id detail
$fileSyncSvcProcessObj = Get-Process -Name $serviceName -ErrorAction SilentlyContinue
#Check if the process not found
if(($fileSyncSvcProcessObj -eq $null) )
{
Write-Custom-Output "Confirmed $serviceName state as stopped after $serviceStopRetryCount of $serviceStopMaxRetries."
$processStopped=$true;
#exit loop
break;
}
#check if the process did spin up and new Id found
if(($fileSyncSvcProcessObj.Id -ne $processId))
{
Write-Custom-Output "Confirmed $serviceName state as stopped after $serviceStopRetryCount of $serviceStopMaxRetries. Old processId: $processId, New processId: $fileSyncSvcProcessObj.Id"
$processStopped=$true;
#exit loop
break;
}
#increment the retry count
$serviceStopRetryCount++
}
Write-Custom-Output "Process stop check flag value is $processStopped."
$retryCount = 0;
$maxRetries=3;
#retry to stop the process if needed
while (($processStopped -eq $false) -and ($retryCount -le $maxRetries))
{
#Stop/Kill the process using taskkill
$retryCount++
Write-Custom-Output "Ending the process $serviceName with attempt $retryCount of $maxRetries"
taskkill /F /IM "$serviceName.exe"
#Delay
Start-Sleep -Seconds 5
#Check if process still exists
$processObj = Get-Process -Name $serviceName -ErrorAction SilentlyContinue
if($processObj -eq $null) #ProcessId not found as process closed earlier
{
Write-Custom-Output "Process $serviceName not yet found after service killed successfully"
$processStopped = $true
}
else
{
if($processObj.Id -ne $processId)
{
$newProcessObjId = $processObj.Id
Write-Custom-Output "Service $serviceName restarted and got a new processId as $newProcessObjId"
$processStopped = $true
}
}
}
#Exit if the service cannot be stopped
if ($processStopped -ieq $false)
{
Write-Custom-Output "Service $serviceName with processId $ProcessId could not be killed after $maxRetries"
}
}
else #new process id was found
{
Write-Custom-Output "$serviceName service restarted. New process id is $newProcessId"
}
}
else
{
Write-Custom-Output "No running process found for $serviceName. Attempting to start a new instance of $serviceName process."
#attempt to run the service
Start-Service -Name $serviceName -ErrorAction SilentlyContinue
}
}
}
$retryCount = 0;
$maxRetries = 3;
$serviceStarted = $false
while (($serviceStarted -eq $false) -and ($retryCount -le $maxRetries))
{
#Check the service existence and state
$serviceObj = Get-Service -Name $serviceName -ErrorAction SilentlyContinue
if (($serviceObj -ne $null) -and ($serviceObj).Status -ieq 'Running')
{
$serviceStarted = $true
}
if($serviceStarted -ne $true)
{
$retryCount++;
Write-Custom-Output "Trying service $serviceName start command as $retryCount out of $maxRetries times."
#Start the service
Start-Service -Name $serviceName -ErrorAction SilentlyContinue
#Delay
Start-Sleep -Seconds 5
}
}
#After retries check if service started
if ($serviceStarted)
{
$processId = (Get-Process -Name $serviceName).Id
Write-Custom-Output "Service $serviceName has started successfully and the processId is $processId."
}
else
{
throw "Service $serviceName couldn't start after $maxRetries retries."
}
}
Function RegisterAfsSysprepProvider
{
$installPath = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\Agent").InstallDir
$dllPath = Join-Path -Path $installPath -ChildPath "AfsSysprepProvider.dll"
$val = $dllPath + ",AgentSysprep_Generalize"
$RegKeyPath = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\SysPrepExternal\Generalize"
if (!(Test-Path $RegKeyPath))
{
Write-Custom-Output "Path $RegKeyPath doesn't exist, creating a new path of it";
New-Item -Path $RegKeyPath -Force
}
# 51f1f017-4af5-41cc-a691-5b935c07e74f is GUID for AfsSysprepProvider.
# Every external provider needs a GUID when register to sysprep
New-ItemProperty -Path $RegKeyPath -Name "51f1f017-4af5-41cc-a691-5b935c07e74f" -Value $val -PropertyType String -Force
Write-Custom-Output "Successfully registered AfsSysprepProvider";
}
Function UnregisterAfsSysprepProvider
{
try
{
# 51f1f017-4af5-41cc-a691-5b935c07e74f is GUID for AfsSysprepProvider.
Remove-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\SysPrepExternal\Generalize" -Name "51f1f017-4af5-41cc-a691-5b935c07e74f" -Force
Write-Custom-Output "Successfully unregistered AfsSysprepProvider";
}
catch
{
Write-Custom-Output "Failed to unregister AfsSysprepProvider. $_";
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCARZfhV8PXaHBmd
# Mj1pmjDy287lDeHdGpDfUv+fyiridaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICgdYSwQpHPgT1vTT/WsqaBj
# mrYrsqetCVfR2CTZ63/vMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAIiZ4inEg2+Z0xD9T/49ZFSI5Kgmz2XNxklZM7UKvYOHh3TiyB3sTQy8K
# HNcbrPrBMBTNpNFVy9aN0woHQ+XDTrN1kkPZPC4BFCuqxhUU7qfU5TUqIwIc4QH4
# uAKFuEOXbZBU+0fl0v6dRF5+oMuTR9UGnJGm/RKcLoN3dVfH/Q24haBGaTeqpZUn
# L2ECKfB3RT1Ya1QFXmWcQ/kQ10msSTYPii+dQHuo+Mi5Y/iyuy5lDoyH/Z1nqY8J
# vImMUZf1reXbedunetNgrjAlKszqZoWyccmsk4+gmaBNVV3szjpswvqplJB5lW9p
# 6u7IPoD7uTf83kqHj3t5iMJ7dTe0N6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD08Inos/VrKBPf8/020ebwCC5LZ2WhQWKVrz3wfdpLQwIGZmsMdYnC
# GBMyMDI0MDYyMTIxMjIwNy45NjRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6iAWOjAiGA8yMDI0MDYyMTE1MDk0
# NloYDzIwMjQwNjIyMTUwOTQ2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqIBY6
# AgEAMAoCAQACAixBAgH/MAcCAQACAhQ1MAoCBQDqIWe6AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBACinjM3CiyJ/elvWOkvaRkpqbGTVCroACBPRUZQ2CnVE
# MK797yzNNXsCIKXYLeVJDEhyyiKM1FGpKLGGGHrIRv54s4NhPf6HV2T26S0d4Sg5
# nu45QX7vCiR0VKfDvhWnxR3ch2ugbUeA4RWZG5wmgsBScHWt28oozno95AxflPFs
# GsMXn6WjDaxiZY794ztQMtNOCvOxXTdrpM4eanMwDX81GiuMWanBbYtp8/keDkzP
# H74IkT0Ji8JfScNQdkxWiASDoiBlLCk3j1MRNGGMzRdnfXYs3ZExRpQvmgjNdAaA
# u8lcWktRZ09uJZfij3kPvAWdmtIqVsHRUOIv6Ay90mUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAsy6wvpc13UdNv9P/6u5nx34WRCXT1k7xuWamYNtGz
# xTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgx5/ykRmDWzWaYTgTiPqxHhAm
# 5GZwG4qRwJo/reIrjrAwDQYJKoZIhvcNAQELBQAEggIAL9cx/FBNKw8dF8p7zDAT
# LoPVx8WPDGuaqiqCwGWJfKQ9ES/kV0rJR5AT7ZfFfG215TGgzooJnnrgZJ+8d/YK
# FnGDFVorPRq6QRp16nnaDIS9TlZxgWDNyOM57YP48SQoJ6kXGidE3ZlD3BpFsFKe
# yI1IvPiWchgDdmCHwbv74TdYY5PWiknWOwQEi1TBfBkbjNEYA0xittnu04baLz5y
# 7vakXPZ8d2xVci1/YwFyTqcT/ecqk2u3ez8XlQVORtEWOKd5gdH/4BB+ENlyU7QQ
# bp6f49BF3183/gWl6/LjyTP2RMUfNK9UKYIk5SGrj+72P8MdS6MUYmLMOUltJumO
# Jq7ThMHL3Gt6OejVIlGsgF11qzzMGTcjYDKYfkXy8Ilw+Ibiwfw8KKCd0Rq94VK+
# Q7aPRMYpKRMVynH0bppHo+FuOyiU8Uvdm0GTyKy6zxHCUXOB5ISDP6dt2/GHSkZY
# rF8QW1SzewFr3oXWekcqFutTavd+Z7k4Tn1SZPSG82jEc8YQBilr/PPwVXEnFuEY
# yhxJDrmp/oVXgZiL9PTZuGEyZVAFQZi30vPFXMJkpl6FIVVBILRxR6AjQAG2thoK
# yxlnfsZceTu4cCp/c7kvZAiNUvULuapuKa0GATz8Hw1ITD9BoueveSKkYwaL8o6v
# 0Wbn1Mk7sMJXGHQLyvyhmeQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/test connectivity.ps1 | test connectivity.ps1 |
$ping = new-object System.Net.NetworkInformation.Ping
$isbad = $true;
do {
try {
$Reply = $ping.send('www.yahoo.com')
if ($Reply.status –ne “Success”) { $txt = "$(get-date) problem" ; write-Host $txt ; $txt | out-File -append c:\\downloads\\jetstreamlog.txt}
else {
if ($isbad) {$isbad = $false;$txt = "$(get-date) RECOVERED";write-Host $txt ; $txt | out-File -append c:\\downloads\\jetstreamlog.txt }
$txt = "$(get-date) good" ;write-Host $txt }
}
catch {
$isbad = $true;
$txt = "$(get-date) EXCEPTION" ; write-Host $txt ; $txt | out-File -append c:\\downloads\\jetstreamlog.txt
}
sleep 4
}
while ($true)
|
combined_dataset/train/non-malicious/sample_67_68.ps1 | sample_67_68.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Updates an existing CDN profile with the specified profile name under the specified subscription and resource group.
.Description
Updates an existing CDN profile with the specified profile name under the specified subscription and resource group.
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.ICdnIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.IProfile
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <ICdnIdentity>: Identity Parameter
[CustomDomainName <String>]: Name of the domain under the profile which is unique globally.
[EndpointName <String>]: Name of the endpoint under the profile which is unique globally.
[Id <String>]: Resource identity path
[OriginGroupName <String>]: Name of the origin group which is unique within the endpoint.
[OriginName <String>]: Name of the origin which is unique within the profile.
[PolicyName <String>]: The name of the CdnWebApplicationFirewallPolicy.
[ProfileName <String>]: Name of the CDN profile which is unique within the resource group.
[ResourceGroupName <String>]: Name of the Resource group within the Azure subscription.
[RouteName <String>]: Name of the routing rule.
[RuleName <String>]: Name of the delivery rule which is unique within the endpoint.
[RuleSetName <String>]: Name of the rule set under the profile which is unique globally.
[SecretName <String>]: Name of the Secret under the profile.
[SecurityPolicyName <String>]: Name of the security policy under the profile.
[SubscriptionId <String>]: Azure Subscription ID.
.Link
https://learn.microsoft.com/powershell/module/az.cdn/update-azcdnprofile
#>
function Update-AzCdnProfile {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.IProfile])]
[CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='UpdateExpanded', Mandatory)]
[Alias('ProfileName')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[System.String]
# Name of the CDN profile which is unique within the resource group.
${Name},
[Parameter(ParameterSetName='UpdateExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[System.String]
# Name of the Resource group within the Azure subscription.
${ResourceGroupName},
[Parameter(ParameterSetName='UpdateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# Azure Subscription ID.
${SubscriptionId},
[Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.ICdnIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Body')]
[System.Int32]
# Send and receive timeout on forwarding request to the origin.
# When timeout is reached, the request fails and returns.
${OriginResponseTimeoutSecond},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.IProfileUpdateParametersTags]))]
[System.Collections.Hashtable]
# Profile tags
${Tag},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$hasTag = $PSBoundParameters.Remove('Tag')
$hasOriginResponseTimeout = $PSBoundParameters.Remove('OriginResponseTimeoutSecond')
$hasAsJob = $PSBoundParameters.Remove('AsJob')
$hasNoWait = $PSBoundParameters.Remove('NoWait')
if ($PSCmdlet.ParameterSetName -eq 'UpdateExpanded') {
$cdnProfile = Get-AzCdnProfile @PSBoundParameters
} elseif ($PSCmdlet.ParameterSetName -eq 'UpdateViaIdentityExpanded') {
$cdnProfile = Get-AzCdnProfile @PSBoundParameters
} else {
throw "Not supported ParameterSetName."
}
if ($null -eq $cdnProfile) {
throw "Provided cdnProfile does not exist."
} else {
if ($hasTag) {
$PSBoundParameters.Add('Tag', ${Tag})
}
if ($hasOriginResponseTimeout) {
$PSBoundParameters.Add('OriginResponseTimeoutSecond', ${OriginResponseTimeoutSecond})
}
if ($hasAsJob) {
$PSBoundParameters.Add('AsJob', ${AsJob})
}
if ($hasNoWait) {
$PSBoundParameters.Add('NoWait', ${NoWait})
}
if (-Not (ISFrontDoorCdnProfile($cdnProfile.SkuName))){
Az.Cdn.internal\Update-AzCdnProfile @PSBoundParameters
} else {
throw "Provided cdnProfile does not exist."
}
}
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB/KGTQbUZi7Q9j
# y0kllAYm+v3c4zMsELPbNu8BqY+rzqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL6JYLbYroSJiL5dutKlw2DY
# Bkq1wSVU0fhTqGRl/todMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAxzacAQK+4jomu+EHHp3zUvtI2g9CdF5INVwmx8ZQOaXBPLL0dD9lYcix
# SXCyRZnik1gCf9iQBImjL+jRRK1ZB5Jw8lYgS3Y+hPlOdSS+QApTFbkIaww0O2Vt
# JDNbvCVg6z4m8f7r0rwIWX+43XB7lZ9D/6CZjbeVsrpZkE8pj7kmhsezUx6ZGRbG
# XMxWiCw2dBOHYusS0bHLIheOIuw4lilq9k3x8P259C3KjYVmeVFcMcK7Y2dTM+De
# PNaVm+FrMtf8DKRXIMrKh9aMyB09E1Oz55KSL/gQGaQadSxaZGgnqGndf1CxiBac
# mhyxVxBGo6ysWZWQM7xyvdBn7vDFFaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBA/Pbb3uAQ8B3rUQZou6CM82JFS2lHiVfZAZFlqnOouAIGZpWQ2IPw
# GBMyMDI0MDczMTA3MDA0MS41NzZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6lPUkjAiGA8yMDI0MDczMDIxMDcz
# MFoYDzIwMjQwNzMxMjEwNzMwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqU9SS
# AgEAMAcCAQACAjvwMAcCAQACAhM4MAoCBQDqVSYSAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAIEa9M1GnJvLuOV2roh+Al8vBLcgZuK+VtXvNjx7vMk6AJJg
# KJRZumaU04QOm4/RT7Rq69E3EdzM8JP0q4tUPCfOlbDqJGDdkJf1u3E4D3CqDJvt
# vn3eprmFbAwNWgPh0wuSrDmMvSL4t67gWumpAUO6+KrkrAOCUDO10ZtD3+npCwWl
# CqpEABoM2+5LWZqe3J94yHOfveGI9GJaZydVekEi//NqG2tjal4ySdkYj0CQyqq2
# ULfPeBdnL6fVm3yczYy0sim7G4W8uJDcGSaas2BWUJXyyorYfOwkE0vWPJEPtOLh
# W9p3kn4pDWkLCnLpJ1fXhareB0AMWMFFrIHb1LkxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCB7UeQC8Dkf3kjk14CA615Zle5mRXzqoPujxX2DTXRFmjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o
# CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgHWGZZdHAqjP9fib3QaFtxKQlOzwu
# /q4eVC0EhgTlbeEwDQYJKoZIhvcNAQELBQAEggIAILAqla9V8ROMJL7IHRxYygh5
# Wf3bQOhHxb+nfljKAbU3RvKWm6MKVqe+Ap93SRsN0Omn2ichqcPFOLtKnVGLdw4r
# /bKuKSzCj/urgewUvvdC+T5ZJ041V1qgSCx72h+mwMdzGi3aB9FDnIXrbJZa2syk
# SLkkQBLQgaarSucCalO1ZrsTSSUqk9DQfcCMMdyeyY89BZ9iGhW7qUjk3p+TyB74
# Qq4lyOWp3RuKCvwRhokvs2vbN4ul5/28GHRZAX1bAWekRbsNi+y0IBkWDWHusbcd
# UftZt3OtYoOdFlXli84HbxWL7fyW3zFICm05H4yD876RDu8ig3F/Tkm9GTkBxbrY
# +Pxc5j9gBl0F+RvV6j9qYWC84bfCwOK9WfoxwKbT1gsD3M+PZY2ZczBRsKvbTs1Z
# iMCsKicjtVKXRYJttCzlDAKgCwDGS4IGR5DwiMEL+B5lKhupiB31vVulyIB0hjUg
# kyP3KIn9r2h9dzPkhp5ilrREQ8fs1SXiPWMaIERyWr05r7nNS482E1E1hzjosLaB
# QnJyB/PVzQ4Wagdrx3RFU+XfiqdreYkV7QpAsyYUfb5KxoWH9PMdxK/w3k8fRiJb
# aHIaAFV+FnOI7Kipyuf9u2VgbBIv6uaidMxc//zKFbta11BFn1sHC/n9rpp0w5Ur
# GhY+kDnVcVgjidqfm5U=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_16_45.ps1 | sample_16_45.ps1 | #
# Module manifest for module 'OCI.PSModules.Nosql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Nosql.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6350988d-a08e-4817-bfff-d79172f60809'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Nosql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Nosql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCINosqlIndex', 'Get-OCINosqlIndexesList', 'Get-OCINosqlRow',
'Get-OCINosqlTable', 'Get-OCINosqlTablesList',
'Get-OCINosqlTableUsageList', 'Get-OCINosqlWorkRequest',
'Get-OCINosqlWorkRequestErrorsList',
'Get-OCINosqlWorkRequestLogsList', 'Get-OCINosqlWorkRequestsList',
'Invoke-OCINosqlPrepareStatement', 'Invoke-OCINosqlQuery',
'Invoke-OCINosqlSummarizeStatement',
'Move-OCINosqlTableCompartment', 'New-OCINosqlIndex',
'New-OCINosqlReplica', 'New-OCINosqlTable', 'Remove-OCINosqlIndex',
'Remove-OCINosqlReplica', 'Remove-OCINosqlRow',
'Remove-OCINosqlTable', 'Remove-OCINosqlWorkRequest',
'Update-OCINosqlRow', 'Update-OCINosqlTable'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Nosql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_15_30.ps1 | sample_15_30.ps1 | #
# Module manifest for module 'OCI.PSModules.Dashboardservice'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dashboardservice.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'cd6937ca-f4c2-4263-82d8-c6bec6fbadc4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dashboardservice Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dashboardservice.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDashboardserviceDashboard',
'Get-OCIDashboardserviceDashboardGroup',
'Get-OCIDashboardserviceDashboardGroupsList',
'Get-OCIDashboardserviceDashboardsList',
'Move-OCIDashboardserviceDashboardGroup',
'Move-OCIDashboardserviceDashboardGroupCompartment',
'New-OCIDashboardserviceDashboard',
'New-OCIDashboardserviceDashboardGroup',
'Remove-OCIDashboardserviceDashboard',
'Remove-OCIDashboardserviceDashboardGroup',
'Update-OCIDashboardserviceDashboard',
'Update-OCIDashboardserviceDashboardGroup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dashboardservice'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4291.ps1 | 4291.ps1 | function Invoke-SqliteQuery {
[CmdletBinding( DefaultParameterSetName='Src-Que' )]
[OutputType([System.Management.Automation.PSCustomObject],[System.Data.DataRow],[System.Data.DataTable],[System.Data.DataTableCollection],[System.Data.DataSet])]
param(
[Parameter( ParameterSetName='Src-Que',
Position=0,
Mandatory=$true,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false,
HelpMessage='SQLite Data Source required...' )]
[Parameter( ParameterSetName='Src-Fil',
Position=0,
Mandatory=$true,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false,
HelpMessage='SQLite Data Source required...' )]
[Alias('Path','File','FullName','Database')]
[validatescript({
$Parent = Split-Path $_ -Parent
if(
$_ -match ":MEMORY:|^WHAT$" -or
( $Parent -and (Test-Path $Parent))
){
$True
}
else {
Throw "Invalid datasource '$_'.`nThis must match :MEMORY:, or '$Parent' must exist"
}
})]
[string[]]
$DataSource,
[Parameter( ParameterSetName='Src-Que',
Position=1,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName='Con-Que',
Position=1,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[string]
$Query,
[Parameter( ParameterSetName='Src-Fil',
Position=1,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName='Con-Fil',
Position=1,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[ValidateScript({ Test-Path $_ })]
[string]
$InputFile,
[Parameter( Position=2,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Int32]
$QueryTimeout=600,
[Parameter( Position=3,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[ValidateSet("DataSet", "DataTable", "DataRow","PSObject","SingleValue")]
[string]
$As="PSObject",
[Parameter( Position=4,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[System.Collections.IDictionary]
$SqlParameters,
[Parameter( Position=5,
Mandatory=$false )]
[switch]
$AppendDataSource,
[Parameter( Position=6,
Mandatory=$false )]
[validatescript({Test-Path $_ })]
[string]$AssemblyPath = $SQLiteAssembly,
[Parameter( ParameterSetName = 'Con-Que',
Position=7,
Mandatory=$true,
ValueFromPipeline=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName = 'Con-Fil',
Position=7,
Mandatory=$true,
ValueFromPipeline=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Alias( 'Connection', 'Conn' )]
[System.Data.SQLite.SQLiteConnection]
$SQLiteConnection
)
Begin
{
Try
{
[void][System.Data.SQLite.SQLiteConnection]
}
Catch
{
if( -not ($Library = Add-Type -path $SQLiteAssembly -PassThru -ErrorAction stop) )
{
Throw "This module requires the ADO.NET driver for SQLite:`n`thttp://system.data.sqlite.org/index.html/doc/trunk/www/downloads.wiki"
}
}
if ($InputFile)
{
$filePath = $(Resolve-Path $InputFile).path
$Query = [System.IO.File]::ReadAllText("$filePath")
}
Write-Verbose "Running Invoke-SQLiteQuery with ParameterSet '$($PSCmdlet.ParameterSetName)'. Performing query '$Query'"
If($As -eq "PSObject")
{
$cSharp = @'
using System;
using System.Data;
using System.Management.Automation;
public class DBNullScrubber
{
public static PSObject DataRowToPSObject(DataRow row)
{
PSObject psObject = new PSObject();
if (row != null && (row.RowState & DataRowState.Detached) != DataRowState.Detached)
{
foreach (DataColumn column in row.Table.Columns)
{
Object value = null;
if (!row.IsNull(column))
{
value = row[column];
}
psObject.Properties.Add(new PSNoteProperty(column.ColumnName, value));
}
}
return psObject;
}
}
'@
Try
{
Add-Type -TypeDefinition $cSharp -ReferencedAssemblies 'System.Data','System.Xml' -ErrorAction stop
}
Catch
{
If(-not $_.ToString() -like "*The type name 'DBNullScrubber' already exists*")
{
Write-Warning "Could not load DBNullScrubber. Defaulting to DataRow output: $_"
$As = "Datarow"
}
}
}
if($PSBoundParameters.Keys -contains "SQLiteConnection")
{
if($SQLiteConnection.State -notlike "Open")
{
Try
{
$SQLiteConnection.Open()
}
Catch
{
Throw $_
}
}
if($SQLiteConnection.state -notlike "Open")
{
Throw "SQLiteConnection is not open:`n$($SQLiteConnection | Out-String)"
}
$DataSource = @("WHAT")
}
}
Process
{
foreach($DB in $DataSource)
{
if($PSBoundParameters.Keys -contains "SQLiteConnection")
{
$Conn = $SQLiteConnection
}
else
{
if(Test-Path $DB)
{
Write-Verbose "Querying existing Data Source '$DB'"
}
else
{
Write-Verbose "Creating andn querying Data Source '$DB'"
}
$ConnectionString = "Data Source={0}" -f $DB
$conn = New-Object System.Data.SQLite.SQLiteConnection -ArgumentList $ConnectionString
$conn.ParseViaFramework = $true
Write-Debug "ConnectionString $ConnectionString"
Try
{
$conn.Open()
}
Catch
{
Write-Error $_
continue
}
}
$cmd = $Conn.CreateCommand()
$cmd.CommandText = $Query
$cmd.CommandTimeout = $QueryTimeout
if ($SqlParameters -ne $null)
{
$SqlParameters.GetEnumerator() |
ForEach-Object {
If ($_.Value -ne $null)
{
if($_.Value -is [datetime]) { $_.Value = $_.Value.ToString("yyyy-MM-dd HH:mm:ss") }
$cmd.Parameters.AddWithValue("@$($_.Key)", $_.Value)
}
Else
{
$cmd.Parameters.AddWithValue("@$($_.Key)", [DBNull]::Value)
}
} > $null
}
$ds = New-Object system.Data.DataSet
$da = New-Object System.Data.SQLite.SQLiteDataAdapter($cmd)
Try
{
[void]$da.fill($ds)
if($PSBoundParameters.Keys -notcontains "SQLiteConnection")
{
$conn.Close()
}
$cmd.Dispose()
}
Catch
{
$Err = $_
if($PSBoundParameters.Keys -notcontains "SQLiteConnection")
{
$conn.Close()
}
switch ($ErrorActionPreference.tostring())
{
{'SilentlyContinue','Ignore' -contains $_} {}
'Stop' { Throw $Err }
'Continue' { Write-Error $Err}
Default { Write-Error $Err}
}
}
if($AppendDataSource)
{
$Column = New-Object Data.DataColumn
$Column.ColumnName = "Datasource"
$ds.Tables[0].Columns.Add($Column)
Try
{
$Conn.ConnectionString -match "Data Source=(?<DataSource>.*);"
$Datasrc = $Matches.DataSource.split(";")[0]
}
Catch
{
$Datasrc = $DB
}
Foreach($row in $ds.Tables[0])
{
$row.Datasource = $Datasrc
}
}
switch ($As)
{
'DataSet'
{
$ds
}
'DataTable'
{
$ds.Tables
}
'DataRow'
{
$ds.Tables[0]
}
'PSObject'
{
foreach ($row in $ds.Tables[0].Rows)
{
[DBNullScrubber]::DataRowToPSObject($row)
}
}
'SingleValue'
{
$ds.Tables[0] | Select-Object -ExpandProperty $ds.Tables[0].Columns[0].ColumnName
}
}
}
}
} |
combined_dataset/train/non-malicious/4452.ps1 | 4452.ps1 |
function Update-PSResource {
[OutputType([void])]
[cmdletbinding(SupportsShouldProcess = $true)]
Param
(
[Parameter(ValueFromPipeline = $true,
ValueFromPipelineByPropertyName = $true,
Position = 0)]
[ValidateNotNullOrEmpty()]
[String[]]
$Name,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNull()]
[string]
$RequiredVersion,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNull()]
[string]
$MaximumVersion,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateSet("PatchVersion", "MinorVersion", "MajorVersion")]
[string]
$UpdateTo,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[PSCredential]
$Credential,
[Parameter()]
[ValidateSet("CurrentUser", "AllUsers")]
[string]
$Scope,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[ValidateNotNullOrEmpty()]
[Uri]
$Proxy,
[Parameter(ValueFromPipelineByPropertyName = $true)]
[PSCredential]
$ProxyCredential,
[Parameter()]
[Switch]
$Force,
[Parameter()]
[Switch]
$Prerelease,
[Parameter()]
[switch]
$AcceptLicense,
[Parameter()]
[switch]
$PassThru
)
begin { }
process {
foreach ($n in $Name) {
if ($pscmdlet.ShouldProcess($n)) {
if (Get-InstalledResource $n) {
write-verbose -message "Successfully updated $n"
}
}
}
}
end { }
}
|
combined_dataset/train/non-malicious/sample_26_21.ps1 | sample_26_21.ps1 | # region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Security.private.dll')
# Load the internal module
$internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.Security.internal.psm1'
if(Test-Path $internalModulePath) {
$null = Import-Module -Name $internalModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export script cmdlets
Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias)
# endregion
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCh5lKJpQWwhX8Z
# RSQLiaQJKLdUpXjzggHjmVw+OhQKmKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAS3QGFSZ3QLukKmBMRC6y9K
# 8y2IXdZBcCu+rEafEv0YMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADMD0QJ/E4WGVqwGSuhIjQzqvrqH70uFnPegDTqCw+De/G7o3JsQCMdzr
# bJfTm0X4LNhYLRkDuqmIKLIwQiB7UToyOyIenhg1k/e5eTgnpsxsy+Fx35Xmc7hY
# zFmedISqcDNM7yDHlhA5RtNg7XIu91AD7JSDzkCavkM+s5wt1M2xgsDePyG2rN6w
# sZPi+PXwlICNWfSB1X0hfXOo5D5TbBhcbOs8WOS3V0cYwrVfOKzdG0GkxAewroTN
# cuVXPizlPKGF5bj6vqp+2iuWMg58CoM/rpwqZ2gfpFhUxrToK3wdElZt5Jszj5tl
# KSiRYcWEgRH4qQe6y8HfZskPFbPhK6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBPOJxX1YgXZZoPnDveqWrosd5MIZ/LCUkYE0AyOrbxIAIGZhf1OmqY
# GBMyMDI0MDQyMzEzMTUxMS45ODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp
# W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy
# C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2
# AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf
# ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq
# 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu
# 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg
# DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf
# DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI
# c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ
# 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD
# EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt
# DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq
# vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0
# Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I
# SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf
# 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39
# nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk
# V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot
# 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q
# RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow
# aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV
# QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM
# JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGceDAiGA8yMDI0MDQyMzAyMzMy
# OFoYDzIwMjQwNDI0MDIzMzI4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp0Zx4
# AgEAMAcCAQACAgtkMAcCAQACAhQRMAoCBQDp0u34AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAIkng/aMnNajdNmPrhPLwH98pK0d3IWxBQ5Ja3S9AdWO1PAR
# AAqsCdAMOkvHQ84gcqh6XaUwFgWHptNea3muMUXnQD1TMXoJG2aWg/iUYtZhRXW3
# Z1YfFo/2p160TXl93ULfmwpvhqkGw0Oli7gRRufMtVgLlvbqSOYhQW83BsGQWba3
# MIE4NnRDNbkc5FHwTO9+/kGshPt5Jl/eG/S1t6bGtKwEP1fgV9NBHrg2GRb8guG1
# 5cYUho2MYLaT7qXm+pjqENQDonVG6EplL+7YIUE8D23wp7psZN0BkF7F7/QNjbYN
# 9m3nj3HAR6KOF6rKORWJr81v8CoNC+4Mq32suZIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDvJkB6NIvykl32OlZr9PY+DREqi0+HrIqeHpBbEGZrcjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ
# T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgMGiqUmpZ2qQCJrjpEHhxsgFojmFn
# xbP6wgUZ9VaSzsgwDQYJKoZIhvcNAQELBQAEggIAwmCTi8SGLvsJGLtd5FwgoilH
# dWLW8omXZTMlelY8OMW8ICytejI4M4KUxePMFbAm22VV4tapAZi3tLWxfLxHXQZZ
# XKW2AvESQAxPjUzAebAdJXMKQxsxaSGzJsBG/SRmtX4Ip7LThomlc63I2G4diUFO
# NZdyM0XkCEtFfNJtqQ4Zcy+5LzKCnUL32dQ1GGgQDtDl2OgAwLh18/dI2QuB746M
# tfygOD9vfuMH+7zAc1q3xLFQx1Ck7HhmYSIv4nuF5cPNJ3q904uzZ9X03kHc/fx9
# 0bl5B8Ko2yiIwwQFgOOg/IYrAGbUYVr1tXTuQKLQ1YxnCZlU84I2MEFzfZGO0Mmz
# Ij2BjbDUg/EaiWxacz3snQEOCTMCUA3cw38xso3f17G26KgOP1lg23kiX87ptgln
# CzZy9K3DvMa21NcgpRz1qFxxK7UoidT25DE28IZAiGIJZgxsmbDBjvYPyArtZpXC
# 1MD4K3gDLIAclB9f+QeeI3UG5ZEidccSv6SPSdLXngwHj6Tqkm7hkNBVfs3Ibrrg
# J0Nh5gHMyb3lFmoabyIuL5hywxHFbKPr7OxrfGOAlGBfNXZxetmtlOktsOECggnt
# TGQQ9ks59cpap71uGTt69068/m06ZWH52i5t5LAbAcIScZzU0KeUKkfiIpgUkqGF
# NCCuanBO1hLQ7p0cceQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_93.ps1 | sample_48_93.ps1 | ConvertFrom-StringData @'
FailoverClustersModuleRequired=Impossibile trovare il modulo di PowerShell richiesto (FailoverClusters). Utilizza lo strumento Ruoli e funzionalità per installare: Strumenti di amministrazione remota del server | Strumenti di amministrazione funzionalità | Strumenti per clustering di failover | Modulo cluster di failover per Windows PowerShell.
HyperVModuleRequired=Impossibile trovare il modulo di PowerShell richiesto (Hyper-V). Utilizza lo strumento Ruoli e funzionalità per installare: Strumenti di amministrazione remota del server | Strumenti di amministrazione ruoli | Strumenti di gestione Hyper-V | Modulo Hyper-V per Windows PowerShell.
CimCmdletsModuleRequired=Impossibile trovare il modulo di PowerShell richiesto (CimCmdlets).
HypervisorSchedulerTypeNotSupported=Impossibile impostare il tipo di utilità di pianificazione dell'hypervisor su una versione di Windows Server inferiore a Windows Server 2016.
InvalidLoadBalancingAlgorithmType=Il parametro di algoritmo di bilanciamento del carico è stato fornito quando Switch Embedded Teaming (SET) non è supportato.
DeviceIdNotFound=Impossibile trovare il dispositivo con ID {0} nella macchina virtuale {1} (vmId = {2})
PhysicalNetworkAdapterRequired=È necessario specificare un nome di scheda di rete fisica per un commutatore virtuale esterno.
StartVirtualMachineStartingMessage=Avvio della macchina virtuale {0} in corso...
StartVirtualMachineSuccessMessage=Avvio della macchina virtuale {0} completato.
StartVirtualMachineFailureMessage=Impossibile avviare la macchina virtuale {0}. Errore: {1}
StartVirtualMachineOperationMessage=Avvio di {0} macchine virtuali completato. Impossibile avviare {1} macchine virtuali.
ShutdownVirtualMachineStartingMessage=Arresto della macchina virtuale {0} in corso...
ShutdownVirtualMachineSuccessMessage=Arresto della macchina virtuale {0} completato.
ShutdownVirtualMachineFailureMessage=Impossibile arrestare la macchina virtuale {0}. Messaggio di errore: {1}
ShutdownVirtualMachineOperationMessage=Arresto di {0} macchine virtuali completato. Impossibile arrestare {1} macchine virtuali.
TurnoffVirtualMachineStartingMessage=Disattivazione della macchina virtuale {0} in corso...
TurnoffVirtualMachineSuccessMessage=Disattivazione della macchina virtuale {0} completata.
TurnoffVirtualMachineFailureMessage=Impossibile disabilitare la macchina virtuale {0}. Messaggio di errore: {1}
TurnoffVirtualMachineOperationMessage=Disattivazione di {0} macchine virtuali completata. Impossibile disabilitare {1} macchine virtuali.
DeleteSavedStateVirtualMachineStartingMessage=Rimozione dello stato salvato della macchina virtuale {0} in corso...
DeleteSavedStateVirtualMachineSuccessMessage=Rimozione dello stato salvato per la macchina virtuale {0} completata.
DeleteSavedStateVirtualMachineFailureMessage=Impossibile rimuovere lo stato salvato della macchina virtuale {0}. Messaggio di errore: {1}
DeleteSavedStateVirtualMachineOperationMessage=Eliminazione dello stato salvato per {0} macchine virtuali completata. Impossibile eliminare lo stato salvato per {1} macchine virtuali.
SaveVirtualMachineStartingMessage=Salvataggio della macchina virtuale {0} in corso...
SaveVirtualMachineSuccessMessage=Salvataggio della macchina virtuale {0} completato.
SaveVirtualMachineFailureMessage=Impossibile salvare la macchina virtuale {0}. Messaggio di errore: {1}
SaveVirtualMachineOperationMessage=Salvataggio di {0} macchine virtuali completato. Impossibile salvare {1} macchine virtuali.
ResetVirtualMachineStartingMessage=Reimpostazione della macchina virtuale {0} in corso...
ResetVirtualMachineSuccessMessage=Reimpostazione della macchina virtuale {0} completata.
ResetVirtualMachineFailureMessage=Impossibile reimpostare la macchina virtuale {0}. Messaggio di errore: {1}
ResetVirtualMachineOperationMessage=Reimpostazione di {0} macchine virtuali completata. Impossibile reimpostare {1} macchine virtuali.
ResumeVirtualMachineStartingMessage=Ripresa della macchina virtuale {0} in corso...
ResumeVirtualMachineSuccessMessage=Ripresa della macchina virtuale {0} completata.
ResumeVirtualMachineFailureMessage=Impossibile riprendere la macchina virtuale {0}. Messaggio di errore: {1}
ResumeVirtualMachineOperationMessage=Ripresa di {0} macchine virtuali completata. Impossibile riprendere {1} macchine virtuali.
SuspendVirtualMachineStartingMessage=Sospensione della macchina virtuale {0} in corso...
SuspendVirtualMachineSuccessMessage=Sospensione della macchina virtuale {0} completata.
SuspendVirtualMachineFailureMessage=Impossibile sospendere la macchina virtuale {0}. Messaggio di errore: {1}
SuspendVirtualMachineOperationMessage=Sospensione di {0} macchine virtuali completata. Impossibile sospendere {1} macchine virtuali.
VirtualMachineDiskDeleteDiskNotFound=Impossibile rimuovere il disco con ID {0} dalla macchina virtuale {1} perché non è stato possibile trovarlo.
VirtualMachineDvdDeleteDiskNotFound=Impossibile rimuovere il DVD/CD-ROM con ID {0} dalla macchina virtuale {1} perché non è stato possibile trovarlo.
VirtualMachineDiskEditDiskNotFound=Impossibile modificare il disco con ID {0} nella macchina virtuale {1} perché non è stato possibile trovarlo.
VirtualMachineDvdEditDiskNotFound=Impossibile modificare il DVD/CD-ROM con ID {0} nella macchina virtuale {1} perché non è stato possibile trovarlo.
VirtualMachineDiskPathNotFound=Impossibile modificare il disco con ID {0} nella macchina virtuale {1} perché l'impostazione del percorso è vuota.
VirtualMachineDvdPathNotFound=Impossibile modificare il DVD/CD-ROM con ID {0} nella macchina virtuale {1} perché l'impostazione del percorso è vuota.
VirtualMachineNetworkDeleteAdapterNotFound=Impossibile rimuovere la scheda di rete virtuale con ID {0} dalla macchina virtuale {1} perché non è stato possibile trovarla.
VirtualMachineNetworkEditAdapterNotFound=Impossibile modificare la scheda di rete virtuale con ID {0} nella macchina virtuale {1} perché non è stato possibile trovarla.
VirtualMachineNetworkEditAdapterVlanModeNotSupported=Impossibile modificare la scheda di rete virtuale con ID {0} nella macchina virtuale {1} perché la modalità VLAN {2} non è supportata.
VirtualMachineNetworkEditAdapterIsolationModeNotSupported=Impossibile modificare la scheda di rete virtuale con ID {0} nella macchina virtuale {1} perché la modalità di isolamento {2} non è supportata.
VirtualMachineSdnConfigurationFailed=La macchina virtuale {0} è stata creata, ma si è verificato un errore durante la configurazione della rete virtuale.
VirtualMachinesString=Macchine virtuali
VirtualMachinesSecuritySettingsNotSupported=Le impostazioni di sicurezza della macchina virtuale non sono supportate nelle versioni di Windows Server precedenti a Windows Server 2012 R2.
MoveVirtualMachineStorageParametersInvalid=I parametri che controllano la modalità di spostamento dello spazio di archiviazione della macchina virtuale non sono validi.
BritannicaNamespaceNotAvailable=Impossibile trovare lo spazio dei nomi CIM necessario per il data center software-defined (SDDC\Management).
MoveVirtualMachineInvalidParameters=I parametri specificati per spostare la macchina virtuale non sono validi.
MoveVirtualMachineVMIncompatible=Non è stato possibile spostare la macchina virtuale {0} nel nuovo server host perché sono state rilevate incompatibilità. Per ulteriori informazioni sulle incompatibilità, consultare i registri degli eventi (Applications and Services Logs\\Microsoft-Server ManagementExperience) in{1}.
ImportVirtualMachineVMIncompatible=Non è stato possibile importare la macchina virtuale {0} in questo server host perché sono state rilevate incompatibilità. Per ulteriori informazioni sulle incompatibilità, consultare i registri degli eventi (Applications and Services Logs\\Microsoft-ServerManagementExperience) in{1}.
NewVirtualMachineCreatedAddToClusterFailed=La {0} della macchina virtuale è stata creata nel server {1}. Non è stato aggiunto al cluster di failover. Per ulteriori informazioni, vedere i registri eventi (Registri applicazioni e servizi\\Microsoft-ServerManagementExperience) in {1}.
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD5IAw2LwPSb1k8
# MzAooga1neULUzOe1ekoshHlGVEKZqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAi6DgQjtHxdV/7XxuX13rpa
# YbVGyfMCOKWC/5QH1kOtMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAFvwDQLttouiDCjObD4SbNNXyvgAyacVGVWwZt9LRq/MtJMZE1Nw23CoQ
# g8tw45nK46Y92l9YSrJ5406Ym7dOXxmU21GtreLEcTjk7Fzk0jieTUUc7BzOV12K
# krEdAJA9UqIBZeeESndVxugtD4szuhaR/rcz1+N12+e2wVIiI7YIwLyOVXwBLyK0
# c10WfGJgZpS7l/U7OM5azkx7/hTPL6PETb/LtF26Q3rKvVcZZB2kYD7G6p7PjTFH
# VuzYAfol6BwEPxekAnANY/grUvmZhhoWvwveeitP4gGMYnoeHYj0Axt6E3v1zN2P
# CwQfV9hZKp3l43ZyCrCbtVJFl4ukoKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCb6447bc0JFhRJOoZ5hZsR+SJ8i57sTk0jAgjirJkdjwIGZdYJAS8Y
# GBMyMDI0MDMwNzIxMTkyNy43NDRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmUSxMwIhgPMjAyNDAzMDcyMjE3NTVaGA8yMDI0MDMwODIyMTc1NVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6ZRLEwIBADAHAgEAAgIy2TAHAgEAAgIUBTAKAgUA
# 6ZWckwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFaazxlLFAIxJfTxGh9U
# wtSl6JTFgkoetfKiDG5trZMIZ22qg/e9GV74LcWrEHEbxjwRC9NdaKWz7Ubxi/kG
# zNA3XHZZ4EUi5r+0sRxRpx72Ps1nnZCQPexqQTqDhkFxjYu7Ts5NDOxt2otAqniq
# 865/4ZwKeFuq1W1abmQozFLxMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgCSlxtZPxRsmdpjDHZB0+5RVOo/7cTrCDtTeQak90TU0wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEIC58HBtly9ONbLEJxzPigfjEEyjBV161D7Wwhfi7T2gU
# MA0GCSqGSIb3DQEBCwUABIICAE1rLYv7qCJSROib5dUSje7rcuwiA/sHwnXAXDqM
# qJNW7z58heJAxyYWSgPMfK1f3RWUB1Dq4j9GAdKLd/I+04jTNoa6C7G9cFOsNRbj
# sZot/qhXIQf2wJijCVKeYVASOMMeMjkeel9+NChJ2F+FCesaivMTWOqive0eQ7+f
# kZPL8ns+HPsMF6X2GHtH7kYr0omKswCRUxf+tYnkhVV8LBeQ6SDRbahZtB7C5nN8
# S0ERFWsaSlV+6x2D+v0zlGuSOukfDT+hm+iBouNRhwFtTlsET9C8Fdvo8wO4wtDA
# rMig/BqzTWDHYgijV3KbwUWP1qq+2ZMo8wX8cdUASjxeZjRbdJeQ0wOXIK7DbjnC
# I2YzIj13M/coF7z9T6APX9WpyZbAAhjhFmgo9hELga5NWA6DT+JEMcvgzK0A/x8u
# f39YiHaUwUddGg38xTUpJRUICfOCRlg/M9xg/8qe6SNwdJ+hjdQupoqlG3a3r2bp
# 82sy938hGXkrNYmtlmV6gxRXzEWY/ktsvHcBXkM0bsCAP4KhBOGSTwpBpQBZkgMq
# 0f+hn1VaaSnf6p9AOC8Cx2Xp90dYmfysMJAXrWS1EwUHFoyDbHAUrcNGXtYLMJv0
# sxYj6YvfNweQ2d+M8EwVBwMag1c5HT6SlwwXkvN0HQVcstV6P/nF0gBsfd14zEdn
# TrzK
# SIG # End signature block
|
combined_dataset/train/non-malicious/2148.ps1 | 2148.ps1 |
using Namespace System.Management.Automation.Language
Describe "The SafeGetValue method on AST returns safe values" -Tags "CI" {
It "A hashtable is returned from a HashtableAst" {
$HashtableAstType = [HashtableAst]
$HtAst = {
@{ one = 1 }
}.ast.Find({$args[0] -is $HashtableAstType}, $true)
$HtAst | Should -Not -BeNullOrEmpty
$HtAst.SafeGetValue() | Should -BeOfType "Hashtable"
}
It "An Array is returned from a LiteralArrayAst" {
$ArrayAstType = [ArrayLiteralAst]
$ArrayAst = {
@( 1,2,3,4)
}.ast.Find({$args[0] -is $ArrayAstType}, $true)
$ArrayAst | Should -Not -BeNullOrEmpty
,$ArrayAst.SafeGetValue() | Should -BeOfType "Object[]"
}
It "The proper error is returned when a variable is referenced" {
$ast = { $a }.Ast.Find({$args[0] -is "VariableExpressionAst"},$true)
{ $ast.SafeGetValue() } | Should -Throw -ErrorId "InvalidOperationException"
}
It "A ScriptBlock AST fails with the proper error" {
{ { 1 }.Ast.SafeGetValue() } | Should -Throw -ErrorId "InvalidOperationException"
}
}
|
combined_dataset/train/non-malicious/LNK file testing_1.ps1 | LNK file testing_1.ps1 | param(
$Path = (Split-Path $PSHOME -Qualifier)
)
if($lnks -eq $null) {
$lnks = ls $Path -Recurse -Filter "*.lnk"
}
$wsh = New-Object -ComObject WScript.Shell;
foreach($lnk in $lnks) {
$lnko = $wsh.CreateShortcut($lnk.fullname);
$rtn = New-Object psobject -Property @{
"FilePath" = $lnk.FullName;
"TargetPath" = $lnko.TargetPath;
};
Add-Member -InputObject $rtn -MemberType NoteProperty -Name TargetExists -Value ($lnko.TargetPath -ne "" -and (Test-Path $lnko.TargetPath))
Add-Member -InputObject $rtn -MemberType ScriptProperty -Name IsUNC -Value {return $this.TargetPath.StartsWith("\\\\"); }
$rtn;
}
|
combined_dataset/train/non-malicious/sample_4_5.ps1 | sample_4_5.ps1 | ConvertFrom-StringData @'
id_ssas_collectssasregkeys=Analysis Services Registy Keys
id_ssas_collectssasregkeysdesc=Collecting SQL Server Analysis Services registry keys
'@
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDo7nhYvk3OnQ11
# t50qOTyI/VGqNCD/7OqEBAUl3Hxr6qCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJhc
# K+PjmUkw1vU726BMr8HpJqMVK5cm7YLeM6JjROT+MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAR7dtQnjv2eP0qUHLQgtY8pDukq6eWCDsVd1/
# JHcb3QyBgF7b+5QFmy9Uws0SKx9FpEhsNF4qupNHIZBuI0jfKND3l3fCw1cRquwu
# jWA9n5QVcF2BHjNCX9iSKyqVxsGJN1r1T7psy/Tbf525gNVotJELz16iUtA4sDht
# iPVTInODNASjnHKnOxKTz1xE7G546AlLpMX8T/b7BoY/lKs2c9gSENsXhoA91YEP
# hBVsxD2OUexuaSfqnhwEqCOrZnA75CQNBKBy7bZMpUDp7LUrHo6e+OFd6zOGemZ/
# 0zCvDrhW3RueGsZ5jiugtxCcdSdqsRBqTQKxc0wkrqb9M54Ok6GCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBBC96pfGlR9tb3g3stW8XkzfOqkFsb4WlS
# m8yffrDeUAIGZxpym1wcGBMyMDI0MTAyODExNDA0My4yMTVaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAAB
# AAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22
# uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKR
# SOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7
# S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWX
# t4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAi
# nb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQ
# HrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0H
# dOv6KWa+sAmJG7PDvTZae77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDH
# EzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wC
# bwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgR
# o/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgM
# GJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1
# whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDP
# ag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbF
# Tr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO
# 1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhB
# Ntu57wPKXZ1EoNToBk8bA6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJV
# vfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedL
# Qf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe7
# 6iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd0
# 71bemnou8A3rUZrdgKIautsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla
# 7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQ
# CTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJ
# FeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAi
# GA8yMDI0MTAyODA0MTQxN1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyY4ZAgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlm
# EUSqsB1JFEW74Yh1oAnUZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apW
# F7OLJj+IzfERluG9wFcnKZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2J
# A5g0hP9oaR70WD/wOq0PR+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1v
# NThkBK0cQg8uhyBgCm7AsGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHS
# lmMTGuAFMVHbFFtVtBr3X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezg
# K6SC0JFSgAABAAAB7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC9l2gDpsf1JX7ksSGBn+9TQ1TY
# Z/T0+EgtXrbFkPk1BjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVq
# fTfIhx21QBBbKyo/xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5Tm
# SmMHedwiqAcbeNSpfnbye1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAL0ws
# FRknQ6/R4+0CM7JakmfvX9R3USHfU1NgRIjHuumO34L/atGv0POSP894vH1fWdbX
# UkpxqZUgn8PQjXo4kvofV92Ka3nboKr6E5pUvfYWFv2qvdPWgywDTsUKZS/dSLzp
# VjteC9mEpmzYK0eqJgZDrHlZ+u4c/hLpn/GLliMZj33sYePOz+toAt7PLMq+DVCw
# fucSCKDXWK154Fg6ZjhPfN7cfmlkZojkv+OT08paqQZ50sr5e+P5r66tzUZz22RR
# 5z69JjlDN53NFcvPkTjes0btWFmMGCA+T99E5Wnkji+Fq8MtGA/R06l73nch3aHr
# mP3gYsrFttJnxlyfY8Bciy9QrQB5s77M1BTBvFwCOcFTyxZ9ximOB3Q5FEiGDGLB
# n448FwPIE4nKEWFy7EBpzmvVF/KaeVfjxQR3RvVL7aa4KS2brCl564ToLlZzRa5H
# Sg89p/6T0OnwgIz790a+7aMB+NInjBjMAYOeacqMKotk4MI6dB6rMvQQOWr102F+
# yGNAW45m+0dwSS07if201p38SGvGKh4Sxjk5ac09EGeRZxQicXydhhPAdOOBagwj
# NUOt/QiVSWlo0a7UroblZBIKei4EfKW+aGTCPI01/SoDVoCB68szXyzeTXy+LRIO
# z6RpO4gREAqzMUGpaXG9eXwTBdQBZwPrxmjyJgo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2944.ps1 | 2944.ps1 | task default -depends test
task test {
Push-Location 'legacy_build_file'
$result = invoke-psake -Docs | Out-String -Width 120
Pop-Location
Assert ($result -match 'alegacydefaulttask') 'Default build file should a task called alegacydefaulttask'
}
|
combined_dataset/train/non-malicious/sample_62_31.ps1 | sample_62_31.ps1 | #
# Module manifest for module 'OCI.PSModules.Audit'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Audit.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '159ba3cf-8d7b-460e-bb56-36417d6f4316'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Audit Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Audit.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAuditConfiguration', 'Get-OCIAuditEventsList',
'Update-OCIAuditConfiguration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Audit'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/DefaultParameterValues_3.ps1 | DefaultParameterValues_3.ps1 | # DefaultParameters Module
# 1.4 - removed extra parameter set to get parameter binding working better
# - added default aliases (sdp/gdp/rmdp)
#requires -version 3.0
# 1.3 - fixed denable/disable, added get and remove, and improved import and set
# 1.2 - added help and commands to enable/disable the defaults
# 1.0 - initial release
function Export-DefaultParameter {
#.Synopsis
# Exports the current default parameter values
[CmdletBinding()]
param(
# The path to export default parameter values to (defaults to "DefaultParameterValues.clixml" in your profile directory)
[String]$Path = $(Join-Path (Split-Path $Profile.CurrentUserAllHosts -Parent) DefaultParameterValues.clixml)
)
Export-CliXml -InputObject $Global:PSDefaultParameterValues -Path $Path
}
function Import-DefaultParameter {
#.Synopsis
# Imports new default parameter values
[CmdletBinding()]
param(
# The path to import default parameter values from (defaults to "DefaultParameterValues.clixml" in your profile directory)
[String]$Path = $(Join-Path (Split-Path $Profile.CurrentUserAllHosts -Parent) DefaultParameterValues.clixml),
# If set, overwrite current values (otherwise, keep current values)
[Switch]$Force
)
$TempParameterValues = $Global:PSDefaultParameterValues
if(Test-Path $Path) {
[System.Management.Automation.DefaultParameterDictionary]$NewValues =
Import-CliXml -Path ${ProfileDir}\\DefaultParameterValues.clixml
$repeats = @()
foreach($key in $NewValues.Keys) {
# don't import the disabled state, that's just silly
if($key -eq "disabled") { continue }
if($Global:PSDefaultParameterValues.ContainsKey($key)) {
$command,$parameter = $key -split ":"
if($Force) {
$repeats += [PSCustomObject]@{Command=$Command;Parameter=$Parameter;NewDefault=$NewValues.$key;OldDefault=$Global:PSDefaultParameterValues.$Key}
$Global:PSDefaultParameterValues.$Key = $NewValues.$key
} else {
$repeats += [PSCustomObject]@{Command=$Command;Parameter=$Parameter;CurrentDefault=$Global:PSDefaultParameterValues.$Key;SkippedValue=$NewValues.$key}
}
} else {
$Global:PSDefaultParameterValues.$Key = $NewValues.$key
}
}
if($repeats.Count) {
$Width = &{
$Local:ErrorActionPreference = "SilentlyContinue"
$Width = $Host.UI.RawUI.BufferSize.Width - 2
if($Width) { $Width } else { 80 }
}
if($Force) {
Write-Warning ("Some defaults overwritten:`n{0}" -f ($repeats | Out-String -Width $Width))
} else {
Write-Warning ("Some defaults already defined, use -Force to overwrite:`n{0}" -f ($repeats | Out-String -Width $Width))
}
}
# Make sure that everything is enabled
$Global:PSDefaultParameterValues["Disabled"] = $false
} else {
Write-Warning "Default Parameter file not found: '$Path'"
}
}
function Set-DefaultParameter {
#.Synopsis
# Sets a default parameter value for a command
#.Description
# Safely sets the default parameter value for a command, making sure that you've correctly typed the command and parameter combination
[CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Low")]
param(
# The command that you want to change the default value of a parameter for
[parameter(Position=0,Mandatory=$true)]
$Command,
# The name of the parameter that you want to change the default value for
[parameter(Position=1,Mandatory=$true)]
[String]$Parameter,
# The new default parameter value
[parameter(Position=2,Mandatory=$true)]
$Value
)
Write-Verbose ($PSBoundParameters | Out-String)
if($parameter.StartsWith("-")) {
$parameter = $parameter.TrimStart("-")
}
## Resolve the parameter to be sure
$cmd = Get-Command $command | Select -First 1
while($cmd.CommandType -eq "Alias") {
$cmd = Get-Command $cmd.Definition | Select -First 1
}
$parameters = $cmd.Parameters.Values
$param = @($parameters | Where-Object { $_.Name -match $parameter -or $_.Aliases -match $parameter} | Select -Expand Name -Unique)
if(!$param) {
$param = @($parameters | Where-Object { $_.Name -match "${parameter}*"} | Select -First 1 -Expand Name)
if(!$param) {
$param = @($parameters | Where-Object { $_.Aliases -match "${parameter}*"} | Select -First 1 -Expand Name)
}
}
if($param.Count -eq 1) {
$Command = $Cmd.Name
Write-Verbose "Setting Parameter $parameter on ${Command} to default: $($param[0])"
$Key = "${Command}:$($param[0])"
if( $Global:PSDefaultParameterValues.ContainsKey($Key) ) {
$WI = "Overwrote the default parameter value for '$Key' with $Value"
$CF = "Overwrite the existing default parameter value for '$Key'? ($($Global:PSDefaultParameterValues.$Key))"
} else {
$WI = "Added a default parameter value for '$Key' = $Value"
$CF = "Add a default parameter value for '$Key'? ($($Global:PSDefaultParameterValues.$Key))"
}
if($PSCmdlet.ShouldProcess( $WI, $CI, "Setting Default Parameter Values" )) {
$Global:PSDefaultParameterValues.$Key = $Value
}
} else {
Write-Warning "Parameter $parameter not found on ${Command}"
}
}
function Get-DefaultParameter {
#.Synopsis
# Gets the default parameter value for a command, if it's been set
#.Description
# Gets the default parameter value for a command from $PSDefaultParameterValues
[CmdletBinding()]
param(
# The command that you want to change the default value of a parameter for (allows wildcards)
[parameter(Position=0,Mandatory=$false)]
[string]$Command = "*",
# The name of the parameter that you want to change the default value for (allows wildcards)
[parameter(Position=1,Mandatory=$true)]
[string]$Parameter = "*"
)
if($parameter.StartsWith("-")) {
$parameter = $parameter.TrimStart("-")
}
$repeats = @()
foreach($key in $Global:PSDefaultParameterValues.Keys) {
# Handle the disabled state:
if($key -eq "disabled" -and $Global:PSDefaultParameterValues["Disabled"]) {
Write-Warning "Default Parameter Values are DISABLED and will not be used:"
continue
}
if($key -like "${Command}:${Parameter}*") {
$Cmd,$Param = $key -split ":"
$repeats += [PSCustomObject]@{Command=$Cmd;Parameter=$Param;CurrentDefault=$Global:PSDefaultParameterValues.$Key}
} else {
Write-Verbose "'$key' is -not -like '${Command}:${Parameter}*'"
}
}
$repeats
}
function Remove-DefaultParameter {
#.Synopsis
# Removed the default parameter value for a command, if it's been set
#.Description
# Removes the default parameter value for a command from $PSDefaultParameterValues
[CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Low")]
param(
# The command that you want to change the default value of a parameter for (allows wildcards)
[parameter(Position=0,Mandatory=$false)]
[string]$Command = "*",
# The name of the parameter that you want to change the default value for (allows wildcards)
[parameter(Position=1,Mandatory=$true)]
[string]$Parameter
)
if($parameter.StartsWith("-")) {
$parameter = $parameter.TrimStart("-")
}
$keys
foreach($key in $Global:PSDefaultParameterValues.Keys | Where { $_ -like "${Command}:${Parameter}*" }) {
# Handle the disabled state:
if($key -ne "disabled") {
if($PSCmdlet.ShouldProcess( "Removed the default parameter value for '$Key'",
"Remove the default parameter value for '$Key'?",
"Removing Default Parameter Values" )) {
$Global:PSDefaultParameterValues.Remove($key)
}
}
}
}
function Disable-DefaultParameter {
#.Synopsis
# Turns OFF default parameters
#.Description
# By setting $PSDefaultParameterValues["Disabled"] to $true, we make sure that NONE of our default parameter values will be used
[CmdletBinding()]
param()
$Global:PSDefaultParameterValues["Disabled"]=$true
}
function Enable-DefaultParameter {
#.Synopsis
# Turns ON default parameters
#.Description
# By setting $PSDefaultParameterValues["Disabled"] to $false, we make sure that all of our default parameter values will be used
[CmdletBinding()]
param()
$Global:PSDefaultParameterValues["Disabled"]=$false
}
Set-Alias Add-DefaultParameter Set-DefaultParameter -ErrorAction SilentlyContinue
Set-Alias sdp Set-DefaultParameter -ErrorAction SilentlyContinue
Set-Alias gdp Get-DefaultParameter -ErrorAction SilentlyContinue
Set-Alias rmdp Remove-DefaultParameter -ErrorAction SilentlyContinue
Set-Alias ipdp Import-DefaultParameter -ErrorAction SilentlyContinue
Set-Alias exdp Export-DefaultParameter -ErrorAction SilentlyContinue
# Set-Alias ddp Disable-DefaultParameter -ErrorAction SilentlyContinue
# Set-Alias edp Disable-DefaultParameter -ErrorAction SilentlyContinue
Import-DefaultParameter
Export-ModuleMember -Alias * -Function Set-DefaultParameter, Get-DefaultParameter, Remove-DefaultParameter, `
Import-DefaultParameter, Export-DefaultParameter, `
Enable-DefaultParameter, Disable-DefaultParameter
|
combined_dataset/train/non-malicious/sample_60_14.ps1 | sample_60_14.ps1 | param(
[Parameter(Mandatory=$true)][int] $BuildId,
[Parameter(Mandatory=$true)][int] $ChannelId,
[Parameter(Mandatory=$true)][string] $MaestroApiAccessToken,
[Parameter(Mandatory=$false)][string] $MaestroApiEndPoint = 'https://maestro.dot.net',
[Parameter(Mandatory=$false)][string] $MaestroApiVersion = '2019-01-16'
)
try {
. $PSScriptRoot\post-build-utils.ps1
# Check that the channel we are going to promote the build to exist
$channelInfo = Get-MaestroChannel -ChannelId $ChannelId
if (!$channelInfo) {
Write-PipelineTelemetryCategory -Category 'PromoteBuild' -Message "Channel with BAR ID $ChannelId was not found in BAR!"
ExitWithExitCode 1
}
# Get info about which channel(s) the build has already been promoted to
$buildInfo = Get-MaestroBuild -BuildId $BuildId
if (!$buildInfo) {
Write-PipelineTelemetryError -Category 'PromoteBuild' -Message "Build with BAR ID $BuildId was not found in BAR!"
ExitWithExitCode 1
}
# Find whether the build is already assigned to the channel or not
if ($buildInfo.channels) {
foreach ($channel in $buildInfo.channels) {
if ($channel.Id -eq $ChannelId) {
Write-Host "The build with BAR ID $BuildId is already on channel $ChannelId!"
ExitWithExitCode 0
}
}
}
Write-Host "Promoting build '$BuildId' to channel '$ChannelId'."
Assign-BuildToChannel -BuildId $BuildId -ChannelId $ChannelId
Write-Host 'done.'
}
catch {
Write-Host $_
Write-PipelineTelemetryError -Category 'PromoteBuild' -Message "There was an error while trying to promote build '$BuildId' to channel '$ChannelId'"
ExitWithExitCode 1
}
|
combined_dataset/train/non-malicious/sample_31_15.ps1 | sample_31_15.ps1 | #!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\cssesc@3.0.0\node_modules\cssesc\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\cssesc@3.0.0\node_modules\cssesc\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\cssesc@3.0.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/cssesc@3.0.0/node_modules/cssesc/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/cssesc@3.0.0/node_modules/cssesc/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/cssesc@3.0.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$new_node_path$pathsep$env_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../../../../../cssesc@3.0.0/node_modules/cssesc/bin/cssesc" $args
} else {
& "$basedir/node$exe" "$basedir/../../../../../cssesc@3.0.0/node_modules/cssesc/bin/cssesc" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../../../../../cssesc@3.0.0/node_modules/cssesc/bin/cssesc" $args
} else {
& "node$exe" "$basedir/../../../../../cssesc@3.0.0/node_modules/cssesc/bin/cssesc" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/4bbeb588-aa6d-475c-861b-05a432703d58.ps1 | 4bbeb588-aa6d-475c-861b-05a432703d58.ps1 | function CreateVDS(
$dvsName, $datacenter, $vmHost, $physicalNic, $portGroupType = "earlyBinding", `
[array]$portGroupNameList = @(),[array]$uplinkList = @() ) {
# ------- Create vDS ------- #
$dvsCreateSpec = New-Object VMware.Vim.DVSCreateSpec
$dvsCreateSpec.configSpec = New-Object VMware.Vim.DVSConfigSpec
$dvsCreateSpec.configSpec.name = $dvsName
$dvsCreateSpec.configSpec.uplinkPortPolicy =
New-Object VMware.Vim.DVSNameArrayUplinkPortPolicy
if ($uplinkList.Count -eq 0) {
$dvsCreateSpec.configSpec.uplinkPortPolicy.uplinkPortName =
New-Object System.String[] (2)
$dvsCreateSpec.configSpec.uplinkPortPolicy.uplinkPortName[0] = "dvUplink1"
$dvsCreateSpec.configSpec.uplinkPortPolicy.uplinkPortName[1] = "dvUplink2"
} else {
$dvsCreateSpec.configSpec.uplinkPortPolicy.uplinkPortName =
New-Object System.String[] ($uplinkList.Count)
for ($i = 0; $i -lt $uplinkList.Count; $i++){
$dvsCreateSpec.configSpec.uplinkPortPolicy.uplinkPortName[$i] =
$uplinkList[$i]
}
}
$hostIdValue = ($vmHost.Id.Split('-', 2))[1]
$dvsCreateSpec.configSpec.host =
New-Object VMware.Vim.DistributedVirtualSwitchHostMemberConfigSpec[] (1)
$dvsCreateSpec.configSpec.host[0] =
New-Object VMware.Vim.DistributedVirtualSwitchHostMemberConfigSpec
$dvsCreateSpec.configSpec.host[0].operation = "add"
$dvsCreateSpec.configSpec.host[0].host =
New-Object VMware.Vim.ManagedObjectReference
$dvsCreateSpec.configSpec.host[0].host.type = "HostSystem"
$dvsCreateSpec.configSpec.host[0].host.value = $hostIdValue
$dvsCreateSpec.configSpec.host[0].backing =
New-Object VMware.Vim.DistributedVirtualSwitchHostMemberPnicBacking
$dvsCreateSpec.configSpec.host[0].backing =
New-Object VMware.Vim.DistributedVirtualSwitchHostMemberPnicBacking
$dvsCreateSpec.configSpec.host[0].backing.pnicSpec =
New-Object VMware.Vim.DistributedVirtualSwitchHostMemberPnicSpec[] (1)
$dvsCreateSpec.configSpec.host[0].backing.pnicSpec[0] =
New-Object VMware.Vim.DistributedVirtualSwitchHostMemberPnicSpec
$dvsCreateSpec.configSpec.host[0].backing.pnicSpec[0].pnicDevice =
$physicalNic.DeviceName
$networkFolderView = Get-View -Id (($datacenter | Get-View).NetworkFolder)
$dvsMoRef = $networkFolderView.CreateDVS($dvsCreateSpec)
# ------- Add vDPortGroup ------- #
if ($portGroupNameList.Count -eq 0){
$portGroupNameList += "dvPortGroup"
}
$dvProtGroupSpec =
New-Object VMware.Vim.DVPortgroupConfigSpec[] ($portGroupNameList.Length)
for ($i = 0; $i -lt $portGroupNameList.Length; $i++){
$dvProtGroupSpec[$i] = New-Object VMware.Vim.DVPortgroupConfigSpec
$dvProtGroupSpec[$i].name = $portGroupNameList[$i]
$dvProtGroupSpec[$i].numPorts = 128
$dvProtGroupSpec[$i].defaultPortConfig =
New-Object VMware.Vim.VMwareDVSPortSetting
$dvProtGroupSpec[$i].defaultPortConfig.vlan =
New-Object VMware.Vim.VmwareDistributedVirtualSwitchVlanIdSpec
$dvProtGroupSpec[$i].defaultPortConfig.vlan.inherited = $false
$dvProtGroupSpec[$i].defaultPortConfig.vlan.vlanId = 0
$dvProtGroupSpec[$i].type = $portGroupType
}
$dvsView = Get-View -Id $dvsMoRef.ToString()
$dvsView.AddDVPortgroup($dvProtGroupSpec)
return $dvsMoRef
}
|
combined_dataset/train/non-malicious/Join-Collections 2.0.ps1 | Join-Collections 2.0.ps1 | #requires -version 2.0
####################################################################################################
## Version History:
##
## Version 2.0 Added Join-Object and removed dependency on ConvertFrom-Hashtable
## Now works on DataTables!
## Version 1.1 Fixed column uniqueness bug http://poshcode.org/1460
## Version 1.0 First post http://poshcode.org/1459
#.Note
# This script includes a Join-Object function you could use outside
#.Synopsis
# Performs a inner join on two collections of objects based on a common key column.
#.Description
# Takes two sets of objects where there are multiple "rows" and where each set has a shared column where the values match, and generates new objects with all the values from each.
#.Parameter GroupOnColumn
# The name of the property to merge on. Items with the same value in this column will be combined.
#.Parameter FirstCollection
# The first set of data
#.Parameter FirstJoinColumn
# The name of the key id column in the first set
#.Parameter SecondCollection
# The second set of data
#.Parameter SecondJoinColumn
# The name of the matching key id column in the second set
# OPTIONAL. Defaults to the same as FirstJoinColum
#.Example
# Import-CSV data.csv | Pivot-Objects SamAccountName Attribute Value
#
# Imports csv data containing multiple rows per-record such that a pair of columns named "Attribute" and "Value" are actually different in each row, and contain a name and value pair for attributes you want to add to the output objects.
#
#.Example
# $FirstCollection = @"
# FirstName, LastName, MailingAddress, EmployeeID
# John, Doe, 123 First Ave, J8329029
# Susan Q., Public, 3025 South Street, K4367143
#"@.Split("`n") | ConvertFrom-Csv
#
# $SecondCollection = @"
# ID, Week, HrsWorked, PayRate, EmployeeID
# 12276, 12, 40, 55, J8329029
# 12277, 13, 40, 55, J8329029
# 12278, 14, 42, 55, J8329029
# 12279, 12, 35, 40, K4367143
# 12280, 13, 32, 40, K4367143
# 12281, 14, 48, 40, K4367143
#"@.Split("`n") | ConvertFrom-Csv
#
# Join-Collections $FirstCollection EmployeeID $SecondCollection | ft -auto
#
#.Notes
# Author: Joel Bennett
# function Join-Collections {
PARAM(
$FirstCollection
, [string]$FirstJoinColumn
, $SecondCollection
, [string]$SecondJoinColumn=$FirstJoinColumn
)
PROCESS {
$ErrorActionPreference = "Inquire"
foreach($first in $FirstCollection) {
$SecondCollection | Where{ $_."$SecondJoinColumn" -eq $first."$FirstJoinColumn" } | Join-Object $first
}
}
BEGIN {
function Join-Object {
Param(
[Parameter(Position=0)]
$First
,
[Parameter(ValueFromPipeline=$true)]
$Second
)
BEGIN {
[string[]] $p1 = $First | gm -type Properties | select -expand Name
}
Process {
$Output = $First | Select $p1
foreach($p in $Second | gm -type Properties | Where { $p1 -notcontains $_.Name } | select -expand Name) {
Add-Member -in $Output -type NoteProperty -name $p -value $Second."$p"
}
$Output
}
}
}
#}
|
combined_dataset/train/non-malicious/sample_61_16.ps1 | sample_61_16.ps1 | #
# Module manifest for module 'OCI.PSModules.Marketplace'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Marketplace.dll'
# Version number of this module.
ModuleVersion = '85.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b7f90e90-3cc1-4fca-9773-f27b90f7945b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Marketplace Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplace.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIMarketplaceListing',
'Get-OCIMarketplaceAcceptedAgreement',
'Get-OCIMarketplaceAcceptedAgreementsList',
'Get-OCIMarketplaceAgreement', 'Get-OCIMarketplaceAgreementsList',
'Get-OCIMarketplaceCategoriesList',
'Get-OCIMarketplaceLaunchEligibility', 'Get-OCIMarketplaceListing',
'Get-OCIMarketplaceListingsList', 'Get-OCIMarketplacePackage',
'Get-OCIMarketplacePackagesList', 'Get-OCIMarketplacePublication',
'Get-OCIMarketplacePublicationPackage',
'Get-OCIMarketplacePublicationPackagesList',
'Get-OCIMarketplacePublicationsList',
'Get-OCIMarketplacePublishersList', 'Get-OCIMarketplaceReportsList',
'Get-OCIMarketplaceReportTypesList', 'Get-OCIMarketplaceTaxesList',
'Get-OCIMarketplaceThirdPartyPaidListingEligibility',
'Get-OCIMarketplaceWorkRequest',
'Get-OCIMarketplaceWorkRequestErrorsList',
'Get-OCIMarketplaceWorkRequestLogsList',
'Get-OCIMarketplaceWorkRequestsList',
'Invoke-OCIMarketplaceSearchListings',
'Move-OCIMarketplacePublicationCompartment',
'New-OCIMarketplaceAcceptedAgreement',
'New-OCIMarketplacePublication',
'Remove-OCIMarketplaceAcceptedAgreement',
'Remove-OCIMarketplacePublication',
'Update-OCIMarketplaceAcceptedAgreement',
'Update-OCIMarketplacePublication'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplace'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3064.ps1 | 3064.ps1 |
function Should-BeNullOrEmpty([object[]] $ActualValue, [switch] $Negate, [string] $Because) {
if ($null -eq $ActualValue -or $ActualValue.Count -eq 0) {
$succeeded = $true
}
elseif ($ActualValue.Count -eq 1) {
$expandedValue = $ActualValue[0]
if ($expandedValue -is [hashtable]) {
$succeeded = $expandedValue.Count -eq 0
}
else {
$succeeded = [String]::IsNullOrEmpty($expandedValue)
}
}
else {
$succeeded = $false
}
if ($Negate) {
$succeeded = -not $succeeded
}
$failureMessage = ''
if (-not $succeeded) {
if ($Negate) {
$failureMessage = NotShouldBeNullOrEmptyFailureMessage -Because $Because
}
else {
$failureMessage = ShouldBeNullOrEmptyFailureMessage -ActualValue $ActualValue -Because $Because
}
}
return New-Object psobject -Property @{
Succeeded = $succeeded
FailureMessage = $failureMessage
}
}
function ShouldBeNullOrEmptyFailureMessage($ActualValue, $Because) {
return "Expected `$null or empty,$(Format-Because $Because) but got $(Format-Nicely $ActualValue)."
}
function NotShouldBeNullOrEmptyFailureMessage ($Because) {
return "Expected a value,$(Format-Because $Because) but got `$null or empty."
}
Add-AssertionOperator -Name BeNullOrEmpty `
-InternalName Should-BeNullOrEmpty `
-Test ${function:Should-BeNullOrEmpty} `
-SupportsArrayInput
|
combined_dataset/train/non-malicious/LoadModuleConfig.ps1 | LoadModuleConfig.ps1 | ################################################################################
## Script Name: LoadModuleConfig
## Created On: 01/21/2010
## Author: Thell Fowler
## File: LoadModuleConfig.ps1
## Usage: Called from the NestedModules value from a module manifest.
## Version: 1.0.0.0
## Purpose: Provides automated loading of local configuration data.
##
## Requirements: PowerShell Version 2
## Last Updated: 01/22/2010
## History:
## 1.0.0.0 01/21/2010 - Initial implementation.
##
##
################################################################################
<#
To make use of this script use new-modulemanifest to create a manifest named
the with the same name as the manifest you are loading data for but with an
extension of 'config.psd1'
Enter LoadModuleConfig.ps1 in the NestedModules field.
After creating the manifest open it in your editor and edit the PrivateData
field to include hashes for LocalUser and Settings. After the Settings key
add values as you see fit.
Here is an example, as used in the FuncGuard module.
# Private data to pass to the module specified in ModuleToProcess
PrivateData = @{
"LocalUser" = @{
"Settings"=@{
"ActiveConfiguration" = "PSUnit"
"Configurations"=@{
"PSUnit" =@{
"Name"="PSUnit";
"Path"=$(join-path -Path $Env:Temp -ChildPath "FuncGuard.PSUnit");
"Prefix"="PSUNIT"
}
}
}
}
}
After loading the module a global variable will be available with a name
convention of $($ModuleName)Settings and the values can be accessed using
normal hash retrieval.
$config = $FuncGuardSettings["Configurations"].$($FuncGuardSettings["ActiveConfiguration"])
$Path = $config.Path
#>
#requires -version 2.0
Set-StrictMode -Version 2
$Module = $ExecutionContext.SessionState.Module
if (! $Module) {
throw ( New-Object System.Management.Automation.SessionStateException `
"An active module was not found! LoadModuleConfig must be run from a module manifest's NestedModules field.")
}
$ModuleName = $Module.Name.Replace(".config",$null)
$AppData = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::LocalApplicationData)
$ModuleConfigPath = join-path -Path $AppData `
-ChildPath "WindowsPowerShell\\Modules\\$ModuleName\\$ModuleName.config.xml"
$configurations = $null
if ( Test-Path $ModuleConfigPath -PathType Leaf ) {
$configurations = Import-Clixml -Path $ModuleConfigPath
} else {
# Generate new default config file.
$configurations = $Module.PrivateData.LocalUser.Settings
Export-Clixml -InputObject $configurations -Path $ModuleConfigPath
}
if ($configurations) {
Add-Member -InputObject $configurations -Name ModuleName -MemberType NoteProperty `
-Value $ModuleName
Add-Member -InputObject $configurations -Name Export -MemberType ScriptMethod `
-Value {
$AppData = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::LocalApplicationData)
$ModuleConfigPath = join-path -Path $AppData `
-ChildPath "WindowsPowerShell\\Modules\\$ModuleName\\$($this.ModuleName).config.xml"
Export-Clixml -InputObject $this -Path $ModuleConfigPath
}
Set-Variable -Name "$($ModuleName)Settings" -Value $($configurations) -Scope Global `
-Description "$($ModuleName) module configuration settings."
}
|
combined_dataset/train/non-malicious/2376.ps1 | 2376.ps1 |
param(
[Parameter()]
[ValidateNotNullOrEmpty()]
[string[]]$Section
)
$sections = @(
'Active Setup Temp Folders',
'BranchCache',
'Content Indexer Cleaner',
'Device Driver Packages',
'Downloaded Program Files',
'GameNewsFiles',
'GameStatisticsFiles',
'GameUpdateFiles',
'Internet Cache Files',
'Memory Dump Files',
'Offline Pages Files',
'Old ChkDsk Files',
'Previous Installations',
'Recycle Bin',
'Service Pack Cleanup',
'Setup Log Files',
'System error memory dump files',
'System error minidump files',
'Temporary Files',
'Temporary Setup Files',
'Temporary Sync Files',
'Thumbnail Cache',
'Update Cleanup',
'Upgrade Discarded Files',
'User file versions',
'Windows Defender',
'Windows Error Reporting Archive Files',
'Windows Error Reporting Queue Files',
'Windows Error Reporting System Archive Files',
'Windows Error Reporting System Queue Files',
'Windows ESD installation files',
'Windows Upgrade Log Files'
)
if ($PSBoundParameters.ContainsKey('Section')) {
if ($Section -notin $sections) {
throw "The section [$($Section)] is not available. Available options are: [$($sections -join ',')]."
}
} else {
$Section = $sections
}
Write-Verbose -Message 'Clearing CleanMgr.exe automation settings.'
$getItemParams = @{
Path = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\*'
Name = 'StateFlags0001'
ErrorAction = 'SilentlyContinue'
}
Get-ItemProperty @getItemParams | Remove-ItemProperty -Name StateFlags0001 -ErrorAction SilentlyContinue
Write-Verbose -Message 'Adding enabled disk cleanup sections...'
foreach ($keyName in $Section) {
$newItemParams = @{
Path = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\$keyName"
Name = 'StateFlags0001'
Value = 1
PropertyType = 'DWord'
ErrorAction = 'SilentlyContinue'
}
$null = New-ItemProperty @newItemParams
}
Write-Verbose -Message 'Starting CleanMgr.exe...'
Start-Process -FilePath CleanMgr.exe -ArgumentList '/sagerun:1' -NoNewWindow -Wait
Write-Verbose -Message 'Waiting for CleanMgr and DismHost processes...'
Get-Process -Name cleanmgr, dismhost -ErrorAction SilentlyContinue | Wait-Process |
combined_dataset/train/non-malicious/Get # of Web Connections.ps1 | Get # of Web Connections.ps1 | function Get-WebServiceConnections()
{
$results = @{}
$perfmon = new-object System.Diagnostics.PerformanceCounter
$perfmon.CategoryName = "Web Service"
$perfmon.CounterName = "Current Connections"
$cat = new-object System.Diagnostics.PerformanceCounterCategory("Web Service")
$instances = $cat.GetInstanceNames()
foreach ($instance in $instances)
{
$perfmon.InstanceName = $instance
$results.Add($instance, $perfmon.NextValue())
}
write-output $results
}
|
combined_dataset/train/non-malicious/Enable_Configure SNMP_1.ps1 | Enable_Configure SNMP_1.ps1 | #Powershell Script To Install SNMP Services (SNMP Service, SNMP WMI Provider)
#Variables :)
$pmanagers = "ADD YOUR MANAGER(s)"
$commstring = "ADD YOUR COMM STRING"
#Import ServerManger Module
Import-Module ServerManager
#Check If SNMP Services Are Already Installed
$check = Get-WindowsFeature | Where-Object {$_.Name -eq "SNMP-Services"}
If ($check.Installed -ne "True") {
#Install/Enable SNMP Services
Add-WindowsFeature SNMP-Services | Out-Null
}
##Verify Windows Servcies Are Enabled
If ($check.Installed -eq "True"){
#Set SNMP Permitted Manager(s) ** WARNING : This will over write current settings **
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\PermittedManagers" /v 1 /f /t REG_SZ /d localhost | Out-Null
#Used as counter for incremting permitted managers
$i = 2
Foreach ($manager in $pmanagers){
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\PermittedManagers" /v $i /f /t REG_SZ /d $manager | Out-Null
$i++
}
#Set SNMP Community String(s)- *Read Only*
Foreach ( $string in $commstring){
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\ValidCommunities" /v $string /f /t REG_DWORD /d 4 | Out-Null
}
}
Else {Write-Host "Error: SNMP Services Not Installed"}
reg add "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\services\\SNMP\\Parameters\\ValidCommunities" /v $string /f /t REG_DWORD /d 4 | Out-Null
}
}
Else {Write-Host "Error: SNMP Services Not Installed"}
|
combined_dataset/train/non-malicious/262.ps1 | 262.ps1 | function ConvertTo-Base64
{
[CmdletBinding()]
param
(
[Parameter(Mandatory = $true,
ValueFromPipeline = $true)]
[ValidateScript({ Test-Path -Path $_ })]
[String]$Path
)
Write-Verbose -Message "[ConvertTo-Base64] Converting image to Base64 $Path"
[System.convert]::ToBase64String((Get-Content -Path $path -Encoding Byte))
}
|
combined_dataset/train/non-malicious/sample_57_70.ps1 | sample_57_70.ps1 | import{m as s}from"./index-C8Scyk8z.js";/*!-----------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Version: 0.44.0(3e047efd345ff102c8c61b5398fb30845aaac166)
* Released under the MIT license
* https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
*-----------------------------------------------------------------------------*/var c=Object.defineProperty,l=Object.getOwnPropertyDescriptor,d=Object.getOwnPropertyNames,p=Object.prototype.hasOwnProperty,i=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of d(e))!p.call(t,r)&&r!==o&&c(t,r,{get:()=>e[r],enumerable:!(n=l(e,r))||n.enumerable});return t},h=(t,e,o)=>(i(t,e,"default"),o&&i(o,e,"default")),a={};h(a,s);var m=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],b={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},y={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/};export{b as conf,y as language};
|
combined_dataset/train/non-malicious/Security group monitor_3.ps1 | Security group monitor_3.ps1 | #Get group membership for a list of security
#groups and export to an XML for comparison
#against baseline.
#
$script:WorkingDirectory = split-path $myinvocation.Mycommand.Definition -parent
Function Re-Baseline
{
#First, declare array and hashtable.
$securitygroups = @()
$table = @{}
#Import Security Group list from XML and add to "securitygroups" array.
$securitygroupsxml = [XML] (gc "$script:WorkingDirectory\\sg.xml")
$securitygroups += $securitygroupsxml.objs.S
#Get membership for each group
foreach($securitygroup in $securitygroups){
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$root = [ADSI] "LDAP://$($dom.Name)"
$searcher = New-Object System.DirectoryServices.DirectorySearcher $root
$searcher.filter = "(&(objectCategory=group)(objectClass=group)(sAMAccountName=$securitygroup))"
$group = $searcher.findone()
$table += @{"$securitygroup"= $group.properties.member}
}
#Export hashtable to XML. So nice.
$table | export-clixml $script:WorkingDirectory\\baseline.xml
}
#
#First, declare hashtable.
$comparetable = @{}
#Import Security Group list from XML and add to "securitygroups" array.
$securitygroupsxml = [XML] (gc "$script:WorkingDirectory\\sg.xml")
$securitygroups = $securitygroupsxml.objs.S
#Get membership for each group and create a compare table.
foreach($securitygroup in $securitygroups){
$dom = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$root = [ADSI] "LDAP://$($dom.Name)"
$searcher = New-Object System.DirectoryServices.DirectorySearcher $root
$searcher.filter = "(&(objectCategory=group)(objectClass=group)(sAMAccountName=$securitygroup))"
$group = $searcher.findone()
$comparetable += @{"$securitygroup"= $group.properties.member}
}
#Export hashtable to XML. So nice.
$comparetable | export-clixml "$script:WorkingDirectory\\compare.xml"
#Import baseline XML to hashtable.
$baselinetable = @{}
$baselinetable += import-clixml "$script:WorkingDirectory\\baseline.xml"
#Import baseline XML to hashtable.
$comparetable = @{}
$comparetable += import-clixml "$script:WorkingDirectory\\compare.xml"
#Compare respective Keys and Values for $comparetable against
#$baselinetable and get differences.
$passtoemailsubuser = @()
$passtoemailbody = @()
foreach($securitygroup in $securitygroups) {
If($comparetable."$securitygroup" -eq $NULL)
{
If($baselinetable."$securitygroup" -eq $NULL)
{
(get-date).tostring() + " - Security Group $securitygroup is empty in the compare and the baseline" >> $script:WorkingDirectory\\log.txt
}
Else
{
foreach($entry in $baselinetable."$securitygroup")
{$passtoemailbody += "`r" + $entry + " " + "`r`r" + "***WAS REMOVED FROM***: " + "`r`r" + $securitygroup + "`r`r"}
$passtoemailbody += "`r" + $securitygroup + " " + "`r`r" + "in AD contains no more objects" + "`r`r"
(get-date).tostring() + " - $securitygroup in AD contains no more objects" >> $script:WorkingDirectory\\log.txt
}
}
Else
{
$baseline = @($baselinetable."$securitygroup")
$compare = @($comparetable."$securitygroup")
$results = Compare-Object $baseline $compare
foreach($result in $results){
if (($result.equals.isinstance -eq $true) -and ($result.sideindicator -eq "=>")) {$passtoemailbody += "`r" + $result.inputobject + " " + "`r`r" + "***WAS ADDED TO***: " + "`r`r" + $securitygroup + "`r`r"
$user = $result.inputobject
$searcher.filter = "(&(objectCategory=person)(objectClass=user)(distinguishedname=$user))"
$user = $searcher.FindOne()
$passtoemailsubuser += $user.properties.samaccountname
$mod = $true
}
if (($result.equals.isinstance -eq $true) -and ($result.sideindicator -eq "<=")) {$passtoemailbody += "`r" + $result.inputobject + " " + "`r`r" + "***WAS REMOVED FROM***: " + "`r`r" + $securitygroup + "`r`r"
$user = $result.inputobject
$searcher.filter = "(&(objectCategory=person)(objectClass=user)(distinguishedname=$user))"
$user = $searcher.FindOne()
$passtoemailsubuser += $user.properties.samaccountname
$mod = $true
}}
}
}
if ($mod -eq $true) {
$from = New-Object System.Net.Mail.MailAddress "from@address.com"
$to = New-Object System.Net.Mail.MailAddress "to@address.com"
$message = new-object System.Net.Mail.MailMessage $from, $to
$message.Subject = "The following accounts were involved in a security group modification: $passtoemailsubuser"
$message.Body = "Note the following security group modification information: `r`r $passtoemailbody"
$server = "SMTPSERVERNAME"
$client = new-object system.net.mail.smtpclient $server
$client.port = 125
$client.Send($message)
foreach($entry in $passtoemailbody)
{(get-date).tostring() + " - " + $Entry >> $script:WorkingDirectory\\Log.txt}
(get-date).tostring() + " - Group Membership compare has been baselined" >> $script:WorkingDirectory\\log.txt
re-baseline
}
else {
$from = New-Object System.Net.Mail.MailAddress "from@address.com"
$to = New-Object System.Net.Mail.MailAddress "to@address.com"
$message = new-object System.Net.Mail.MailMessage $from, $to
$message.Subject = "No modifications to the audited security groups have been made."
$message.Body = "No modifications to the audited security groups have been made."
$server = "SMTPSERVERNAME"
$client = new-object system.net.mail.smtpclient $server
$client.port = 125
$client.Send($message)
"No Changes have been made"
}
|
combined_dataset/train/non-malicious/1329.ps1 | 1329.ps1 |
function Disable-CAclInheritance
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[Alias('PSPath')]
[string]
$Path,
[Switch]
$Preserve
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$acl = Get-Acl -Path $Path
if( -not $acl.AreAccessRulesProtected )
{
Write-Verbose -Message ("[{0}] Disabling access rule inheritance." -f $Path)
$acl.SetAccessRuleProtection( $true, $Preserve )
$acl | Set-Acl -Path $Path
}
}
Set-Alias -Name 'Unprotect-AclAccessRules' -Value 'Disable-CAclInheritance'
Set-Alias -Name 'Protect-Acl' -Value 'Disable-CAclInheritance'
|
combined_dataset/train/non-malicious/sample_48_88.ps1 | sample_48_88.ps1 |
@{
GUID = '3af1699d-cc54-4e54-81cf-28d2df5cce0a'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="© Microsoft Corporation. All rights reserved."
HelpInfoUri="https://aka.ms/winsvr-2022-pshelp"
NestedModules = @('SmbShare.cdxml',
'SmbSession.cdxml',
'SmbServerNetworkInterface.cdxml',
'SmbServerConfiguration.cdxml',
'SmbOpenFile.cdxml',
'SmbMultichannelConnection.cdxml',
'SmbMapping.cdxml',
'SmbGlobalMapping.cdxml',
'SmbClientNetworkInterface.cdxml',
'SmbClientConfiguration.cdxml',
'SmbConnection.cdxml',
'SmbMultichannelConstraint.cdxml',
'SmbBandwidthLimit.cdxml',
'SmbServerCertificateMapping.cdxml',
'SmbClientCertificateMapping.cdxml',
'SmbComponent.cdxml',
'SmbScriptModule.psm1')
FormatsToProcess = @('Smb.format.ps1xml')
TypesToProcess = @('Smb.types.ps1xml')
ModuleVersion = '2.0.0.0'
AliasesToExport = @('gsmbs',
'nsmbs',
'rsmbs',
'ssmbs',
'gsmba',
'grsmba',
'rksmba',
'blsmba',
'ulsmba',
'gsmbse',
'cssmbse',
'gsmbo',
'cssmbo',
'gsmbsc',
'rsmbsc',
'ssmbsc',
'rsmbcc',
'gsmbcc',
'ssmbcc',
'gsmbc',
'gsmbm',
'nsmbm',
'rsmbm',
'gsmbcn',
'gsmbsn',
'gsmbmc',
'udsmbmc',
'gsmbt',
'nsmbt',
'rsmbt',
'ssmbp',
'gsmbb',
'ssmbb',
'rsmbb',
'gsmbd',
'esmbd',
'dsmbd',
'gsmbgm',
'nsmbgm',
'rsmbgm',
'gsmbscm',
'rsmbscm',
'nsmbscm',
'ssmbscm',
'gsmbccm',
'nsmbccm',
'rsmbccm',
'ssmbccm',
'rsmbc',
'gsmbscp',
'grsmbclas',
'rksmbclas',
'blsmbclas',
'ulsmbclas',
'gsmbclas')
CmdletsToExport = @()
FunctionsToExport = @('Get-SmbShare',
'Remove-SmbShare',
'Set-SmbShare',
'Block-SmbShareAccess',
'Unblock-SmbShareAccess',
'Grant-SmbShareAccess',
'Revoke-SmbShareAccess',
'Get-SmbShareAccess',
'New-SmbShare',
'Get-SmbSession',
'Close-SmbSession',
'Get-SmbServerNetworkInterface',
'Get-SmbServerConfiguration',
'Reset-SmbServerConfiguration',
'Set-SmbServerConfiguration',
'Get-SmbOpenFile',
'Close-SmbOpenFile',
'Get-SmbMultichannelConnection',
'Update-SmbMultichannelConnection',
'Get-SmbMapping',
'Remove-SmbMapping',
'New-SmbMapping',
'Get-SmbClientNetworkInterface',
'Get-SmbClientConfiguration',
'Reset-SmbClientConfiguration',
'Set-SmbClientConfiguration',
'Get-SmbConnection',
'Get-SmbMultichannelConstraint',
'New-SmbMultichannelConstraint',
'Remove-SmbMultichannelConstraint',
'Set-SmbPathAcl',
'Get-SmbBandWidthLimit',
'Set-SmbBandwidthLimit',
'Remove-SmbBandwidthLimit',
'Get-SmbDelegation',
'Enable-SmbDelegation',
'Disable-SmbDelegation',
'Get-SmbGlobalMapping',
'Remove-SmbGlobalMapping',
'New-SmbGlobalMapping',
'Get-SmbServerCertificateMapping',
'New-SmbServerCertificateMapping',
'Remove-SmbServerCertificateMapping',
'Set-SmbServerCertificateMapping',
'Get-SmbClientCertificateMapping',
'New-SmbClientCertificateMapping',
'Remove-SmbClientCertificateMapping',
'Set-SmbClientCertificateMapping',
'Remove-SMBComponent',
'Get-SmbServerCertProps',
'Grant-SmbClientAccessToServer',
'Revoke-SmbClientAccessToServer',
'Block-SmbClientAccessToServer',
'Unblock-SmbClientAccessToServer',
'Get-SmbClientAccessToServer')
PowerShellVersion = '5.1'
CompatiblePSEditions = @('Desktop','Core')
}
|
combined_dataset/train/non-malicious/sample_50_30.ps1 | sample_50_30.ps1 | #
# Module manifest for module 'OCI.PSModules.Ons'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ons.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5db527a1-caef-435a-b9e8-81f76e294a8a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ons Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ons.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOnsConfirmSubscription', 'Get-OCIOnsSubscription',
'Get-OCIOnsSubscriptionsList', 'Get-OCIOnsTopic',
'Get-OCIOnsTopicsList', 'Get-OCIOnsUnsubscription',
'Invoke-OCIOnsPublishMessage',
'Invoke-OCIOnsResendSubscriptionConfirmation',
'Move-OCIOnsSubscriptionCompartment', 'Move-OCIOnsTopicCompartment',
'New-OCIOnsSubscription', 'New-OCIOnsTopic',
'Remove-OCIOnsSubscription', 'Remove-OCIOnsTopic',
'Update-OCIOnsSubscription', 'Update-OCIOnsTopic'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ons'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2655.ps1 | 2655.ps1 |
[CmdletBinding()]
Param (
[switch]$RelaunchToolkitAsUser = $false
)
[string]$appDeployToolkitExtName = 'PSAppDeployToolkitExt'
[string]$appDeployExtScriptFriendlyName = 'App Deploy Toolkit Extensions'
[version]$appDeployExtScriptVersion = [version]'1.5.0'
[string]$appDeployExtScriptDate = '11/02/2014'
[hashtable]$appDeployExtScriptParameters = $PSBoundParameters
If (-not $RelaunchToolkitAsUser) {
If (-not [string]::IsNullOrEmpty($scriptParentPath)) {
Write-Log -Message "Script [$($MyInvocation.MyCommand.Definition)] dot-source invoked by [$(((Get-Variable -Name MyInvocation).Value).ScriptName)]" -Source $appDeployToolkitExtName
}
Else {
Write-Log -Message "Script [$($MyInvocation.MyCommand.Definition)] invoked directly" -Source $appDeployToolkitExtName
}
}
|
combined_dataset/train/non-malicious/ErrorLogstoHTML.ps1 | ErrorLogstoHTML.ps1 | $a="<style>"
$a=$a+"BODY{background-color :#FFFFF}"
$a=$a+"TABLE{Border-width:thin;border-style: solid;border-color:Black;border-collapse: collapse;}"
$a=$a+"TH{border-width: 0px;padding: 0px;border-style: solid;border-color: black;background-color: ThreeDShadow}"
$a=$a+"TD{border-width: 1px;padding: 0px;border-style: solid;border-color: black;background-color: Transparent}"
$a=$a+"</style>"
$log = Get-EventLog -LogName "Security" -Newest 20
$log = $log | ConvertTo-Html -Property EventID,Category,EntryType,UserName,TimeGenerated,Message -head $a -body "<H2>Restricted Folder Audit Log</H2>"
$log | Out-File C:\\PowerShellLog.html -Force
|
combined_dataset/train/non-malicious/2743.ps1 | 2743.ps1 |
if (Get-Command Get-SmbSession -ErrorAction SilentlyContinue) {
Get-SmbSession
} |
combined_dataset/train/non-malicious/Find-GeoCode_1.ps1 | Find-GeoCode_1.ps1 | $mappoint = New-WebServiceProxy http://staging.mappoint.net/standard-30/mappoint.wsdl -Namespace MapPoint
$FindService = new-object MapPoint.FindServiceSoap
# You need an account, sign up here: https://mappoint-css.live.com/mwssignup
$FindService.Credentials = Get-Credential
function Find-ReverseGeoCode( [double]$Latitude, [double]$longitude, [switch]$force )
{
$Coords = new-object MapPoint.LatLong
$Coords.Latitude = $Latitude
$Coords.Longitude = $longitude
$Locations = $FindService.GetLocationInfo( $Coords, "MapPoint.NA", $null)
if($force) {
return $Locations
} elseif($Locations[0].Address) {
return $Locations[0].Address # .FormattedAddress + " - " + $Locations[0].Address.CountryRegion
} else {
return $Locations | ?{ $_.Entity.TypeName -eq "PopulatedPlace" } # | %{ $_.Entity.DisplayName }
}
}
function Find-GeoCode( $address, $country = "US" )
{
$spec = new-object MapPoint.FindAddressSpecification
$spec.DataSourceName = "MapPoint.NA"
$spec.InputAddress = $FindService.ParseAddress( $address, $country )
$Found = $FindService.FindAddress( $spec )
if($Found.NumberFound) {
$found.Results | Select -expand FoundLocation | Select -Expand LatLong
}
# if($Found.NumberFound -gt 1) {
# $found.Results| Select -expand FoundLocation | Select -Expand Address
# }
}
## This is how non-geography geeks think of them:
Set-Alias Find-Address Find-ReverseGeoCode
Set-Alias Find-Coordinates Find-GeoCode
|
combined_dataset/train/non-malicious/sample_53_16.ps1 | sample_53_16.ps1 | #
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
# culture = "en-US"
ConvertFrom-StringData -StringData @'
FailToUninstall = Failed to uninstall the module '{0}'.
FailToInstall = Failed to install the module '{0}'.
InDesiredState = Resource '{0}' is in the desired state.
NotInDesiredState = Resource '{0}' is not in the desired state.
ModuleFound = Module '{0}' is found on the node.
ModuleNotFound = Module '{0}' is not found on the node.
ModuleWithRightPropertyNotFound = Module '{0}' with the right version or other properties not found in the node.
ModuleNotFoundInRepository = Module '{0}' with the right version or other properties not found in the repository.
StartGetModule = Begin invoking Get-Module '{0}'.
StartFindModule = Begin invoking Find-Module '{0}'.
StartInstallModule = Begin invoking Install-Module '{0}' version '{1}' from '{2}' repository.
StartUnInstallModule = Begin invoking Remove-Item to remove the module '{0}' from the file system.
InstalledSuccess = Successfully installed the module '{0}'
UnInstalledSuccess = Successfully uninstalled the module '{0}'
VersionMismatch = The installed module '{0}' has the version: '{1}'
RepositoryMismatch = The installed module '{0}' is from the '{1}' repository.
FoundModulePath = Found the module path: '{0}'.
InstallationPolicyWarning = The module '{0}' was installed from the untrusted repository' {1}'. The InstallationPolicy is set to '{2}' to override the repository installation policy. If you trust the repository, set the repository installation policy to 'Trusted', that will also remove this warning.
InstallationPolicyFailed = The current installation policy do not allow installation from this repository. Your current installation policy is '{0}' and the repository installation policy is '{1}'. If you trust the repository, either change the repository installation policy, or set the parameter InstallationPolicy to 'Trusted' to override the repository installation policy.
GetTargetResourceMessage = Getting the current state of the module '{0}'.
TestTargetResourceMessage = Determining if the module '{0}' is in the desired state.
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3aU/LXFNAmh3o
# ImcuJKT1RWLilph3AMcVu5/5cons4KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIJ7hwKBHO+zVAJc9YmBaZck
# zR6zm6g8RBB+iNLMfN68MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAZ9UGQJeEV+p0yhDIOtxDTffva5bKq+eDEvHpNGrNQ3rC0qwYs9SCeMdd
# szCzljuCyWw4s5/U4AKMMnLMjxpds4kHyIAWIlCw+7pHTQ2bD0CsvnzyGyUIwtwC
# cuzOM2VncJy5YCDuP5qaD2TvYpxvs8wH5VsZ42Hyo/Gm26H7zAgHko9EEbl9TWGv
# 8MWi368FwUIAuk7DjUu3MuMImNvfdj8mBR1omFx5ri3WfBTmsJoLhrYwKqxeRPAg
# OrSz9KWzBotOKRJa0/uyO6BGpd2Bwz3D0xTtJQ/1uWfHq3uqrqjywAHoddjaVXUU
# NQoqtVnnrSxlvFLLuDNdMDwQiNGMYaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBbtJXdoQuKbeJCGviuNW349Bzz1JT9CEX32cEmD4oTBwIGZh+4fQB7
# GBMyMDI0MDQyMzAyMjQxMi44MjJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRdsUwIhgPMjAyNDA0MjMwNzUyMzdaGA8yMDI0MDQyNDA3NTIzN1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dF2xQIBADAHAgEAAgITDzAHAgEAAgISuDAKAgUA
# 6dLIRQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAK5J/A9nRWniftydz2dJ
# QF+JJPuqJCZW/azqUQHco9vxuH7zJS4/skdIIrzba0NjBonRr2sA83bxQXdO1nyB
# 7vSUkAigvnWwgG+0TyEcfiP7/bTs3Z1RwzHLxxobVdyC3SvFb/0iiqhUDMyBoIle
# WAEAP4hYqo2WVA1bLOI0Ts1oMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgQm2NOjaeMRDslE5Ruwnb4jaN5eg1vV1EtsNTC8B4Ci4wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIOmfa01vHkmG3ncCCxvXk5CL8HkHce7K6iQ2Cp0UZNYR
# MA0GCSqGSIb3DQEBCwUABIICABiKgzcLT53x77WVPt4yMzhVkO+PQqMatE/ulgk5
# 4aV3DaEnAKP7Zr4ZqkejvT/YweueGYpXC+pRjaulB20SungjSeWbB2sdiAqRXTdc
# 9YiQpq6o4scDqjFvIieKvQwEaOzEYHEaYlH0N4qJd+zTB+WseU5caFdGrnC/HsTv
# wrOPRDyuj/AByMxduICCD4+jd1L3CIBE6HJPEd7IqBNRGPeJTuXF1+rJnVC1l4A5
# KAw72b/YoSYe+Xqj1I6NAcqrdScFOHW3KIaL4wP4MH8qLm0+nyUcIhfZOwm06MYV
# QR6YGciwy45rmTiNCJNvAoKdw3IAOQqiXBsH6YcLeoMSPuV+pKRuINsaCAduvhTS
# p8ouTn31DWaJqGDIR7GCOpu36+uwdvxPf+0D8HufCkosP8QWtFi9Vky9dNdP8jh2
# U35a2jEnAk1xIjT8YUbthxQzFyXW8kpjRU2owyVnNNcFcEDJ9PjnFdkkasVOO1Vl
# KyEvMf+kr/d0wVCLxMnLAyqm5p0q4DlBMVHLNOcNQP8Tl8/5Bx5L3NHlyD3R6nPR
# m8IEHhUNxlUl/cYdy7A0Z2tbnfVUVeSb/MxQhxZ4rLU/L2sCE1HWP5cK9p9eCfnD
# v86IP470DE7Wmi+iVyr5M+A7BRroXM5y7FJlt94E0Hnm/u4CFFDGwJhOm1tjMcyS
# Hj95
# SIG # End signature block
|
combined_dataset/train/non-malicious/2565.ps1 | 2565.ps1 |
$names = Get-Content e:\dexma\temp\tempserver.txt
foreach($name in $names) {
$svc = Get-WmiObject Win32_Service -ComputerName $name -Filter "name='DexFileImpExp2'"
if ($svc.Started -eq $true) {
Stop-Service -InputObject (get-Service -ComputerName PAPP10 -Name DexFileImpExp2)
Write-Host "Stopped service on $name."
}
Start-Service -InputObject (get-Service -ComputerName PAPP10 -Name DexFileImpExp2)
Write-Host "Started service on $name."
}
|
combined_dataset/train/non-malicious/4356.ps1 | 4356.ps1 | function Validate-VersionParameters
{
[CmdletBinding()]
Param(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.PSCmdlet]
$CallerPSCmdlet,
[Parameter()]
[String[]]
$Name,
[Parameter()]
[string]
$MinimumVersion,
[Parameter()]
[string]
$RequiredVersion,
[Parameter()]
[string]
$MaximumVersion,
[Parameter()]
[Switch]
$AllVersions,
[Parameter()]
[Switch]
$AllowPrerelease,
[Parameter()]
[Switch]
$TestWildcardsInName
)
if ($MinimumVersion)
{
$minResult = ValidateAndGet-VersionPrereleaseStrings -Version $MinimumVersion -CallerPSCmdlet $PSCmdlet
if (-not $minResult)
{
return
}
$minimumVersionVer = $minResult["Version"]
$minimumVersionPrerelease = $minResult["Prerelease"]
}
if ($MaximumVersion)
{
$maxResult = ValidateAndGet-VersionPrereleaseStrings -Version $MaximumVersion -CallerPSCmdlet $PSCmdlet
if (-not $maxResult)
{
return
}
$maximumVersionVer = $maxResult["Version"]
$maximumVersionPrerelease = $maxResult["Prerelease"]
}
if ($RequiredVersion)
{
$reqResult = ValidateAndGet-VersionPrereleaseStrings -Version $RequiredVersion -CallerPSCmdlet $PSCmdlet
if (-not $reqResult)
{
return
}
}
if($TestWildcardsInName -and $Name -and (Test-WildcardPattern -Name "$Name"))
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.NameShouldNotContainWildcardCharacters -f "$($Name -join ',')") `
-ErrorId 'NameShouldNotContainWildcardCharacters' `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument `
-ExceptionObject $Name
}
elseif($AllVersions -and ($RequiredVersion -or $MinimumVersion -or $MaximumVersion))
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $LocalizedData.AllVersionsCannotBeUsedWithOtherVersionParameters `
-ErrorId 'AllVersionsCannotBeUsedWithOtherVersionParameters' `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument
}
elseif($RequiredVersion -and ($MinimumVersion -or $MaximumVersion))
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $LocalizedData.VersionRangeAndRequiredVersionCannotBeSpecifiedTogether `
-ErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument
}
elseif($MinimumVersion -and $MaximumVersion -and (Compare-PrereleaseVersions -FirstItemVersion $maximumVersionVer `
-FirstItemPrerelease $maximumVersionPrerelease `
-SecondItemVersion $minimumVersionVer `
-SecondItemPrerelease $minimumVersionPrerelease))
{
$Message = $LocalizedData.MinimumVersionIsGreaterThanMaximumVersion -f ($MinimumVersion, $MaximumVersion)
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $Message `
-ErrorId "MinimumVersionIsGreaterThanMaximumVersion" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument
}
elseif( (($MinimumVersion -match '-') -or ($MaximumVersion -match '-') -or ($RequiredVersion -match '-')) -and -not $AllowPrerelease)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $LocalizedData.AllowPrereleaseRequiredToUsePrereleaseStringInVersion `
-ErrorId "AllowPrereleaseRequiredToUsePrereleaseStringInVersion" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument
}
elseif($AllVersions -or $AllowPrerelease -or $RequiredVersion -or $MinimumVersion -or $MaximumVersion)
{
if(-not $Name -or $Name.Count -ne 1 -or (Test-WildcardPattern -Name $Name[0]))
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $LocalizedData.VersionParametersAreAllowedOnlyWithSingleName `
-ErrorId "VersionParametersAreAllowedOnlyWithSingleName" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument
}
}
return $true
} |
combined_dataset/train/non-malicious/sample_57_62.ps1 | sample_57_62.ps1 | <#
.Synopsis
Activate a Python virtual environment for the current PowerShell session.
.Description
Pushes the python executable for a virtual environment to the front of the
$Env:PATH environment variable and sets the prompt to signify that you are
in a Python virtual environment. Makes use of the command line switches as
well as the `pyvenv.cfg` file values present in the virtual environment.
.Parameter VenvDir
Path to the directory that contains the virtual environment to activate. The
default value for this is the parent of the directory that the Activate.ps1
script is located within.
.Parameter Prompt
The prompt prefix to display when this virtual environment is activated. By
default, this prompt is the name of the virtual environment folder (VenvDir)
surrounded by parentheses and followed by a single space (ie. '(.venv) ').
.Example
Activate.ps1
Activates the Python virtual environment that contains the Activate.ps1 script.
.Example
Activate.ps1 -Verbose
Activates the Python virtual environment that contains the Activate.ps1 script,
and shows extra information about the activation as it executes.
.Example
Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv
Activates the Python virtual environment located in the specified location.
.Example
Activate.ps1 -Prompt "MyPython"
Activates the Python virtual environment that contains the Activate.ps1 script,
and prefixes the current prompt with the specified string (surrounded in
parentheses) while the virtual environment is active.
.Notes
On Windows, it may be required to enable this Activate.ps1 script by setting the
execution policy for the user. You can do this by issuing the following PowerShell
command:
PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
For more information on Execution Policies:
https://go.microsoft.com/fwlink/?LinkID=135170
#>
Param(
[Parameter(Mandatory = $false)]
[String]
$VenvDir,
[Parameter(Mandatory = $false)]
[String]
$Prompt
)
<# Function declarations --------------------------------------------------- #>
<#
.Synopsis
Remove all shell session elements added by the Activate script, including the
addition of the virtual environment's Python executable from the beginning of
the PATH variable.
.Parameter NonDestructive
If present, do not remove this function from the global namespace for the
session.
#>
function global:deactivate ([switch]$NonDestructive) {
# Revert to original values
# The prior prompt:
if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) {
Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt
Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT
}
# The prior PYTHONHOME:
if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) {
Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME
Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME
}
# The prior PATH:
if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) {
Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH
Remove-Item -Path Env:_OLD_VIRTUAL_PATH
}
# Just remove the VIRTUAL_ENV altogether:
if (Test-Path -Path Env:VIRTUAL_ENV) {
Remove-Item -Path env:VIRTUAL_ENV
}
# Just remove VIRTUAL_ENV_PROMPT altogether.
if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) {
Remove-Item -Path env:VIRTUAL_ENV_PROMPT
}
# Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether:
if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) {
Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force
}
# Leave deactivate function in the global namespace if requested:
if (-not $NonDestructive) {
Remove-Item -Path function:deactivate
}
}
<#
.Description
Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the
given folder, and returns them in a map.
For each line in the pyvenv.cfg file, if that line can be parsed into exactly
two strings separated by `=` (with any amount of whitespace surrounding the =)
then it is considered a `key = value` line. The left hand string is the key,
the right hand is the value.
If the value starts with a `'` or a `"` then the first and last character is
stripped from the value before being captured.
.Parameter ConfigDir
Path to the directory that contains the `pyvenv.cfg` file.
#>
function Get-PyVenvConfig(
[String]
$ConfigDir
) {
Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg"
# Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue).
$pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue
# An empty map will be returned if no config file is found.
$pyvenvConfig = @{ }
if ($pyvenvConfigPath) {
Write-Verbose "File exists, parse `key = value` lines"
$pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath
$pyvenvConfigContent | ForEach-Object {
$keyval = $PSItem -split "\s*=\s*", 2
if ($keyval[0] -and $keyval[1]) {
$val = $keyval[1]
# Remove extraneous quotations around a string value.
if ("'""".Contains($val.Substring(0, 1))) {
$val = $val.Substring(1, $val.Length - 2)
}
$pyvenvConfig[$keyval[0]] = $val
Write-Verbose "Adding Key: '$($keyval[0])'='$val'"
}
}
}
return $pyvenvConfig
}
<# Begin Activate script --------------------------------------------------- #>
# Determine the containing directory of this script
$VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition
$VenvExecDir = Get-Item -Path $VenvExecPath
Write-Verbose "Activation script is located in path: '$VenvExecPath'"
Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)"
Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)"
# Set values required in priority: CmdLine, ConfigFile, Default
# First, get the location of the virtual environment, it might not be
# VenvExecDir if specified on the command line.
if ($VenvDir) {
Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values"
}
else {
Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir."
$VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/")
Write-Verbose "VenvDir=$VenvDir"
}
# Next, read the `pyvenv.cfg` file to determine any required value such
# as `prompt`.
$pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir
# Next, set the prompt from the command line, or the config file, or
# just use the name of the virtual environment folder.
if ($Prompt) {
Write-Verbose "Prompt specified as argument, using '$Prompt'"
}
else {
Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value"
if ($pyvenvCfg -and $pyvenvCfg['prompt']) {
Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'"
$Prompt = $pyvenvCfg['prompt'];
}
else {
Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)"
Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'"
$Prompt = Split-Path -Path $venvDir -Leaf
}
}
Write-Verbose "Prompt = '$Prompt'"
Write-Verbose "VenvDir='$VenvDir'"
# Deactivate any currently active virtual environment, but leave the
# deactivate function in place.
deactivate -nondestructive
# Now set the environment variable VIRTUAL_ENV, used by many tools to determine
# that there is an activated venv.
$env:VIRTUAL_ENV = $VenvDir
$env:VIRTUAL_ENV_PROMPT = $Prompt
if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) {
Write-Verbose "Setting prompt to '$Prompt'"
# Set the prompt to include the env name
# Make sure _OLD_VIRTUAL_PROMPT is global
function global:_OLD_VIRTUAL_PROMPT { "" }
Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT
New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt
function global:prompt {
Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) "
_OLD_VIRTUAL_PROMPT
}
}
# Clear PYTHONHOME
if (Test-Path -Path Env:PYTHONHOME) {
Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME
Remove-Item -Path Env:PYTHONHOME
}
# Add the venv to the PATH
Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH
$Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH"
# SIG # Begin signature block
# MIIvKgYJKoZIhvcNAQcCoIIvGzCCLxcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBALKwKRFIhr2RY
# IW/WJLd9pc8a9sj/IoThKU92fTfKsKCCE8MwggWQMIIDeKADAgECAhAFmxtXno4h
# MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z
# ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z
# G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ
# anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s
# Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL
# 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb
# BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3
# JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c
# AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx
# YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0
# viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL
# T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud
# EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf
# Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk
# aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS
# PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK
# 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB
# cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp
# 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg
# dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri
# RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7
# 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5
# nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3
# i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H
# EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G
# CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C
# 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce
# 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da
# E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T
# SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA
# FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh
# D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM
# 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z
# 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05
# huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY
# mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP
# /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T
# AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD
# VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG
# A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV
# HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU
# cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry
# sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL
# IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf
# Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh
# OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh
# dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV
# 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j
# wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH
# Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC
# XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l
# /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW
# eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw
# CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x
# IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ
# eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7
# uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx
# xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb
# D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA
# GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm
# SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA
# LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1
# HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc
# eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w
# tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B
# Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj
# ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E
# FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM
# MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp
# Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI
# QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex
# LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v
# d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF
# BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu
# aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI
# hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N
# s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA
# 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2
# de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O
# q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd
# I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50
# jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU
# 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq
# rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs
# M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa
# 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa
# vTCCGrkCAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT
# QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl
# AwQCAQUAoIHOMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC
# AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAqV3t0Ut29nKA9Aib3
# hB5YJarT1GGdhakqzlHz+gumODBiBgorBgEEAYI3AgEMMVQwUqBMgEoAQgB1AGkA
# bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAzAC4AMAByAGMAMQBfADIA
# MAAyADQAMAA3ADMAMQAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAFxu82YvE
# 47pbLsDEwG4qWNhP6nfRcp2qGGUIMjKB8wI8srCVc0VQ29FkU6mNZ8sR6VYKCvjr
# XHmilJyHd8uaoMvQNUPAtHiZDF6cguXN0ta1USxL+S8oinShAnfxWE3vTbvD0Nlb
# wPheRk8mRUJwDnH1Un9HChnvxRzqpcyqIphKWKimZ2U/NgVrIrljQCNZfzaMwT23
# XiCUW3LfZH5g8GlwqOjPGpwsvZ5WWTkAOmnKU8w8KSHRnNvxBAK8JrhfC53dQR25
# IH4oFl5sET0aM16g7w0KUCF0tmh98n4PlYewovzLWHwBxL+7xIZvzfWvjew9Yz2b
# v93UoeX7so/i0ttMyneYf8hOiRGjeQsCdnaWAL5raf+Zy9dfD0IsoLAwz+wA8tnd
# dbfdSmikEYnaJtW2iu/v7Y3PEazJvDay+ydgOkNiEypIWb5ajHWsxcwQNWssctSo
# u8+jpWPbLuWJciQ536h42+pIvGCU0hjNde/qp/N3ZY8iLnf8Tmj8VPD/jYUpceYr
# FS18GwtlgXf1vm6i6EkaDrke0bV/QBOzCftMZ6+DoamxIyJyWCvHySa8wCDML7iI
# ZJo9W40+oEZugj9614bmrtYIPcCWt134cgUjeTtvLiejCUfue1P3RfOtfJ+0K1Dv
# 0EAwDQf/xM8CLeUVYfA1U1f2hOitMHlHdG2hghdAMIIXPAYKKwYBBAGCNwMDATGC
# FywwghcoBgkqhkiG9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgG
# CyqGSIb3DQEJEAEEoGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEF
# AAQgOglg5NmloxH/nfFVDW3EoNbYH6ZJigJSmLk76M+M92QCEQDr0+1DZHwDFf3/
# tcPE3zPeGA8yMDI0MDczMTIxNTgwMVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85Sd
# CDmmv9s/X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UE
# ChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQg
# UlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoX
# DTM0MTAxMzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0
# LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJ
# KoZIhvcNAQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEO
# CdwvSKOXejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrH
# mjsvlmbjaedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvK
# Xd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+
# 3RChG4PBuOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV
# 5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0
# +9S769SgLDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzh
# Ua+0rRUGFOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/
# eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7
# UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlw
# Jw1Pt7U20clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQ
# ofM604qDy0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEE
# AjALBglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8w
# HQYDVR0OBBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuG
# SWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQw
# OTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQG
# CCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKG
# TGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJT
# QTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIB
# AIEa1t6gqbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEv
# GN1Ott5s1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcig
# LiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvE
# xnvPnPp44pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W
# 8oM3NG6wQSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MA
# cN7MmJ4ZiQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arA
# VeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6c
# Kmx5AdzaROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygW
# y2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9O
# TH0eaHDAdwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8
# WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQ
# BzY3tyRUfNhHrP0oZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAw
# MDAwWhcNMzcwMzIyMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln
# aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5
# NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A
# MIICCgKCAgEAxoY1BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYR
# oUQVQl+kiPNo+n3znIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CE
# iiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCH
# RgB720RBidx8ald68Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5K
# fc71ORJn7w6lY2zkpsUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDni
# pUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2
# nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp
# 88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1C
# vwWcZklSUPRR8zZJTYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+
# 0wOI/rOP015LdhJRk8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl2
# 7KtdRnXiYKNYCQEoAA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOC
# AV0wggFZMBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaa
# L3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1Ud
# DwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkw
# JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcw
# AoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJv
# b3RHNC5jcnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQu
# Y29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwB
# BAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+
# ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvX
# bYf6hCAlNDFnzbYSlm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tP
# iix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCy
# Xen/KFSJ8NWKcXZl2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpF
# yd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3
# fpNTrDsdCEkPlM05et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t
# 5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejx
# mF/7K9h+8kaddSweJywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxah
# ZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAA
# zV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vup
# L0QVSucTDh3bNzgaoSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghA
# GFowDQYJKoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lD
# ZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGln
# aUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEw
# OTIzNTk1OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ
# MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1
# c3RlZCBSb290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQ
# c2jeu+RdSjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW
# 61bGl20dq7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU
# 0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzr
# yc/NrDRAX7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17c
# jo+A2raRmECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypu
# kQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaP
# ZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUl
# ibaaRBkrfsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESV
# GnZifvaAsPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2
# QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZF
# X50g/KEexcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1Ud
# EwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1Ud
# IwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5Bggr
# BgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNv
# bTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lD
# ZXJ0QXNzdXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8v
# Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEG
# A1UdIAQKMAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0
# Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+A
# ufih9/Jy3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51P
# pwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix
# 3P0c2PR3WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVV
# a88nq2x2zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6pe
# KOK5lDGCA3YwggNyAgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lD
# ZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYg
# U0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgB
# ZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcN
# AQkFMQ8XDTI0MDczMTIxNTgwMVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvAr
# MsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZIhvcNAQkEMSIEIN3jMi8U+HejkjxglLpO
# ms4FXFPVVSms/rQpAf2HexHHMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3t
# dCLM0dRAV2hBNm+CitpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAJzT
# DAzsPC1FwCikI+vLuYO+kS9csbOozqm+ujCSXftYi2w1w4dlGjihxRsAx6Vjilro
# 8Em6JAIF0tjTVS6lV4s/BFn0tJ8tV3ZzLH3TCPXqLI1A3oc+RM1ZpsO1fXVYEyZq
# 1dGeYn6GG99RAjlFXxNqfKBqYT4402LbgDaZLJjBfsyhRQsC4Y1Sqy+ceodrvh3P
# w//QE5yX/7A5sfdYdI9OkRTFEa/EI+jdLVuaUybiwE9k3kVxwvuAnvYt+m7cmBbn
# pNq2vpeeynhdN2yVHB36jQB8zFcQNXYjPI1+sYOQeirHwJGWrBTmUKZq+sGoHwm6
# 8EUQ4CzbRYSRGVDq3Vb3rq4L2OPKwEGdj9HxD72nWYETaY4SlNJOkzdlTi8zFjIm
# 7IME25FvDzKOCV1PpSsP4PhSllGF8gmLIiiRHTCjufj3WT6izYgWu8G4YBLez1em
# ncf5hE0qzif5wJr8s9igXUVxbFM2Lf19FmK2m+HzN07qtaPCuq5mYls31mUwe9js
# y5I0wsrN2sUZOC1VUuSno+L5GKws2FzwCQSJBZU8xG7S90l5POQJO4H49n36NoN5
# VOeT27C++I0d5ptflhPcn2IUmSk+zDJg0MzyRQNOghuWRy7C+ZXjEhrvdEB02igU
# +sKMa0aW37F9evZrAHL1J+9fa8ZddJU+FJcj7hcv
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_29_90.ps1 | sample_29_90.ps1 | #
# Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker'
#
# Generated by: Microsoft Corporation
#
# Generated on: 19/01/2022
#
@{
# Script module or binary module file associated with this manifest.
RootModule = ''
# Version number of this module.
ModuleVersion = '1.2100.2531.331'
# Supported PSEditions
# CompatiblePSEditions = ''
# ID used to uniquely identify this module
GUID = 'd4d76297-1fd8-4ff9-bc8a-690382525c43'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft AzStackHci Environment Checker'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @(
'AzStackHci.ArcIntegration.psm1'
'AzStackHci.ArcIntegration.Helpers.psm1'
)
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @('Invoke-AzStackHciArcIntegrationValidation')
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Microsoft','AzStackHci'
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBSXQDvAy/KA0qC
# Qguge+vc+dghon6jsOMzEzmVvrAsD6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA7hEJPN2P5rXSnVSObWH3Wg
# jlPOWv2v73PkHnbuZlkGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlJikgWvxgBPcOGZ6UbGBXjisyDw8ewHeXvDPN8XT5Hrtwm83ptujLCCI
# AzEhbNLCCnVMdMv6z9x8P8Yv2TMXbFKhllDXuFONl+AjUJJcDTL5U4vcIX0tHWsB
# 18cxyZhRT9kjnWVRei3Y5DhbeDan5bqM4AgZKQ+z1Ha2aZBxrg6AA8R8WfvCEY6x
# j1Qx6CNQ6aFccGFs9GSfpGGNBPHkRE9xRKlhXHkz6GYpgfljKd+PZRrNQ/QHwxJM
# jJXHbiB3xwvJ2xPcyaWd2rv78yfmxRScGMucITro+oHklJVXeAxAE5Z+z694qsVS
# yxrsG41W7AAxUb3iBeXqjEsBGtZ3+KGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC
# FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq
# hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAi8Mqqksmg8TNLFCauJ6yOhXpfgelCR6Eg8HGzI8IwVQIGZbqeuk8h
# GBIyMDI0MDIxMjE0MDUzMi41MlowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046
# MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WgghF7MIIHJzCCBQ+gAwIBAgITMwAAAdqO1claANERsQABAAAB2jANBgkq
# hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw
# MTIxOTA2NTlaFw0yNTAxMTAxOTA2NTlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4NDItNEJF
# Ni1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAk5AGCHa1UVHWPyNADg0N/xtx
# WtdI3TzQI0o9JCjtLnuwKc9TQUoXjvDYvqoe3CbgScKUXZyu5cWn+Xs+kxCDbkTt
# fzEOa/GvwEETqIBIA8J+tN5u68CxlZwliHLumuAK4F/s6J1emCxbXLynpWzuwPZq
# 6n/S695jF5eUq2w+MwKmUeSTRtr4eAuGjQnrwp2OLcMzYrn3AfL3Gu2xgr5f16ts
# MZnaaZffvrlpLlDv+6APExWDPKPzTImfpQueScP2LiRRDFWGpXV1z8MXpQF67N+6
# SQx53u2vNQRkxHKVruqG/BR5CWDMJCGlmPP7OxCCleU9zO8Z3SKqvuUALB9UaiDm
# mUjN0TG+3VMDwmZ5/zX1pMrAfUhUQjBgsDq69LyRF0DpHG8xxv/+6U2Mi4Zx7LKQ
# wBcTKdWssb1W8rit+sKwYvePfQuaJ26D6jCtwKNBqBiasaTWEHKReKWj1gHxDLLl
# DUqEa4frlXfMXLxrSTBsoFGzxVHge2g9jD3PUN1wl9kE7Z2HNffIAyKkIabpKa+a
# 9q9GxeHLzTmOICkPI36zT9vuizbPyJFYYmToz265Pbj3eAVX/0ksaDlgkkIlcj7L
# GQ785edkmy4a3T7NYt0dLhchcEbXug+7kqwV9FMdESWhHZ0jobBprEjIPJIdg628
# jJ2Vru7iV+d8KNj+opMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBShfI3JUT1mE5WL
# MRRXCE2Avw9fRTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV
# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAuYNV1O24jSMAS3jU
# 7Y4zwJTbftMYzKGsavsXMoIQVpfG2iqT8g5tCuKrVxodWHa/K5DbifPdN04G/uty
# z+qc+M7GdcUvJk95pYuw24BFWZRWLJVheNdgHkPDNpZmBJxjwYovvIaPJauHvxYl
# SCHusTX7lUPmHT/quz10FGoDMj1+FnPuymyO3y+fHnRYTFsFJIfut9psd6d2l6pt
# OZb9F9xpP4YUixP6DZ6PvBEoir9CGeygXyakU08dXWr9Yr+sX8KGi+SEkwO+Wq0R
# NaL3saiU5IpqZkL1tiBw8p/Pbx53blYnLXRW1D0/n4L/Z058NrPVGZ45vbspt6CF
# rRJ89yuJN85FW+o8NJref03t2FNjv7j0jx6+hp32F1nwJ8g49+3C3fFNfZGExkkJ
# WgWVpsdy99vzitoUzpzPkRiT7HVpUSJe2ArpHTGfXCMxcd/QBaVKOpGTO9KdErMW
# xnASXvhVqGUpWEj4KL1FP37oZzTFbMnvNAhQUTcmKLHn7sovwCsd8Fj1QUvPiydu
# gntCKncgANuRThkvSJDyPwjGtrtpJh9OhR5+Zy3d0zr19/gR6HYqH02wqKKmHnz0
# Cn/FLWMRKWt+Mv+D9luhpLl31rZ8Dn3ya5sO8sPnHk8/fvvTS+b9j48iGanZ9O+5
# Layd15kGbJOpxQ0dE2YKT6eNXecwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ
# AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
# V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9
# alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
# Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928
# jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t
# pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe
# HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o
# ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C
# vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug
# poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps
# xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
# AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
# FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT
# NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o
# dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD
# AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW
# y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t
# aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt
# MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y
# My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
# FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
# Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j
# VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
# +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR
# sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw
# ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b
# RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx
# aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX
# HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0
# W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0
# HVUzWLOhcGbyoYIC1zCCAkACAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
# ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4
# NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
# aWNloiMKAQEwBwYFKw4DAhoDFQBCoh8hiWMdRs2hjT/COFdGf+xIDaCBgzCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA
# 6XRE1jAiGA8yMDI0MDIxMjE1MTg0NloYDzIwMjQwMjEzMTUxODQ2WjB3MD0GCisG
# AQQBhFkKBAExLzAtMAoCBQDpdETWAgEAMAoCAQACAgFHAgH/MAcCAQACAhKSMAoC
# BQDpdZZWAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAQcwfx4PBDlQS9gg3
# /0qro+QwczUnhilSmzsbm830AISI07JHOjW7nW8g1FW1bflGRd38XBInHDLYWwG/
# 8PRaY9Xhmbg2haoOcH8OlvigFimCZeZdNwUds8pmV3Ijf9cwwnGdIuInrObNsK2a
# E8i6NQygUpClKufvA5+XJaOnlpoxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQABAAAB2jANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCA1GZLLb9j2D6hBA+sEeHtHHMXvTO2Y4qmFkvAJ72XP/DCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EICKlo2liwO+epN73kOPULT3TbQjmWOJutb+d0gI7
# GD3GMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHa
# jtXJWgDREbEAAQAAAdowIgQgOdGvSJPGjs3f1FiQlCM0qBJTMyWqjXTr8DRFjaXr
# dQkwDQYJKoZIhvcNAQELBQAEggIAQTSdMlZFwPKlNb9R7h0GFkoxp75FiIR7H+sP
# V0N6RXqUur5XkB1HfraRxI+FMLYQj5BoiO+3vcfqXr0o7NLpexn7SwNZn6NHw5Eh
# ACohsRqICOQT38Z3Uei4WR1YFWWdjVSzlF6iCpiioEDx2ZZMB3ouWXqeyY+Kr8St
# 839XdSvARZTVkNbD9aIalQ75sXNpWJQsGXYWuQLCjCH1RezlMefwCAsrdyfrIwXb
# DQUcGWRYA19KiVOp6HdwX6VJhU1JFVamxwWIWarGAYoZE6F/UPndRXpYPuJus0+s
# eBb63pViwVG0PALDj1iBBur0lRlHPzmnn67gqtOZoQXUpNMrQK3vC45no4+mRNhr
# lEsPcuBRRHN4j1VesMFNms3lm5eh2B23qQpIMSEzTRfEnSnDDudTo4JTp5Ett11t
# VQGKl+rPJltorega1beVwjqfu210tJE3Y/q441yaWcrKa5xO/jUQWAmLO9bMkmSS
# PbffD29GbtATRMsD42iMrhgemqnid1kbFZLhkcEU4Tx30kK6n7TA2W5w0HmxJhiA
# 59wkldrkHjSRJjXxJi9Ef5xGJyL9vjQ5bfIYr2dqpbgd/sQtij8sGXkBjccx2Mj9
# 8zRBKwmSRyFtrJM1O815yZZBA3PahZL0hS3ZEdizxj9G8qGR5LRzmZnpJIE2BF4W
# KFrUEfI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_20_13.ps1 | sample_20_13.ps1 | #
# Module manifest for module 'OCI.PSModules.Osubbillingschedule'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Osubbillingschedule.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd4547f1d-f4cf-431b-a0cb-3af8714cc42f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Osubbillingschedule Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osubbillingschedule.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOsubbillingscheduleBillingSchedulesList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osubbillingschedule'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_64_85.ps1 | sample_64_85.ps1 | #=======================================================================================================================================================================
# Copyright (c) Microsoft Corporation. All rights reserved.
#
# Description:
#
# ModifyProxySettings.ps1 - To be used by the installer - Modify proxy settings
#
#=======================================================================================================================================================================
<#
.SYNOPSIS
Modify proxy settings.
.DESCRIPTION
Modify proxy settings
.EXAMPLE
ModifyProxySettings.ps1 -Address <String> -Port <int> [-UserName <String>] [-Password <String>]
.PARAMETER Address
Address
.PARAMETER Port
Port
.PARAMETER UserName
UserName
.PARAMETER Password
Password
#>
param
(
# PARAMETERS
[Parameter(Mandatory=$true)]
[string] $Address,
[Parameter(Mandatory=$false)]
[int] $Port,
[Parameter(Mandatory=$false)]
[string] $UserName,
[Parameter(Mandatory=$false)]
[string] $Password
)
if ($UserName -and $UserName.Trim() -and $Password -and $Password.Trim()) {
$SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
$Creds = New-Object System.Management.Automation.PSCredential ($UserName, $SecurePassword)
if ($Port -and $Port -gt 0) {
Set-StorageSyncProxyConfiguration -Address $Address -Port $Port -ProxyCredential $Creds
}
else {
Set-StorageSyncProxyConfiguration -Address $Address -ProxyCredential $Creds
}
}
elseif ($Port -and $Port -gt 0) {
Set-StorageSyncProxyConfiguration -Address $Address -Port $Port
}
else {
Set-StorageSyncProxyConfiguration -Address $Address
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBa/kuTAExrOa4t
# BjuDXZQtU7Hzj8FT7PG0g4tSNNdy4qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICgW+t+bkthqNbmEn8nF/k84
# sCDQ+c9qvK5KDk1UQEllMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAmw1/2ybeMbZaUlIH6/SpcRVWjN/EK5F39oJ03IGsLix97ZXgdZw8hCvd
# zuxFJCc7CexYglrF+YSJdMY4ufnMDqKMwiy//f4Z253/NQFbcIO1cBc+tek5QnuG
# x28ugSiJA+38aSLUK1QpHv2U4PG8T0UY+l+ZKmeQ8ibvhuAQg7j5gCdFO1eZYNfH
# +xNGdquxzUbFX79bWXv09p6+T3sloF+ShPKf8KB1eOZZ969fxuaEzT3D00jZnNEg
# SNmG3UxmPK6sLinq9CsDGbspfeUmOYOds8FxRKDcTYehV6whW87X1ExlbB0FafZu
# f3ZZ/MAxftNh/WH4/qyN5yZkajGCCaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAQ5vdPBhBFR19BbN1WW1SZnnGllp3CRHCXfNdQSEfQcwIGZnLA63KC
# GBMyMDI0MDYyMTIxMjYxMy4zMTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOof4icwIhgPMjAyNDA2MjExOTI3MzVaGA8yMDI0MDYyMjE5MjczNVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6h/iJwIBADAHAgEAAgI5kzAHAgEAAgISKzAKAgUA
# 6iEzpwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGB+plxnnt7VJRUJHXTH
# QV7GNKem+73qrgMeRa162WuDD01ZstD9QcwleVjLV40dtpjyukTXOXyUxvXTqXVp
# lhKYbrLu+47a5hjATHMeys0/uwnmtKjvJPeVVMu5ajox8GudTvCyuaYpFY3rOE0q
# +Lmg+GdpccqdFYZ4NwsbFReBMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgTDjjS3ugpfaqPQzkAz29Ake5dnF7i2sK3Jg3s/M1UVowgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d
# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I
# npafKEQ9AAEAAAHeMCIEIIqEFnQI2p5ng4bpf5en+XZ8gWygZmW96NAm8ClmnMVt
# MA0GCSqGSIb3DQEBCwUABIICAIzpR3Z6xQo/Dl32maGZ0Ikp1NjPzhZl8ZiLOrAh
# pQteKSaCXamGavh3/hvlpIHxS1TORZHaQlZZqMxLu19XP7WDyI+kTVMhPB12oWap
# svyRRVnJqUuoECw5A8ccQMK9qlwcSviQGxSpeWP4Gm/ImsiqZeu96FpF9ihg7umd
# wmLW1B2t/1nnAB2hb2roxrjQZzVhKNnLN4U1Z6yjyvdao3ewuNBSFUYWzO4PkZrF
# TyKHFFqqwT/k51Q6VqWoXyioch7lvnx1jYduE1Bm2WHF0ZA/Fo8alnAXrRfIQaOC
# o5HEMCMc/c8c1tdQipILdHllRAcZVHIK9GmCI01NGJCzVHTC96e3u+4HJO020Y5j
# uOGqYxJmlc+Ksx0hxuvpcmea7mHldSKS4nv1mfp37U4n+Nr1dP8zv3W5hERItNTF
# DpqJWX5R1QhwE7N8vXoAU0GRwWnpWJ1XBfnoiDXMjEl3/0QircMssl8vcCnWtNa4
# tq4yqO1AuC4SziXVA73TgfYSPY3+x0u5zImbXicB4ZI5IxnUdbsh9RjablP1LRDG
# toA3J7dqXyxUZ9kH+5BS+BO40GE7FFGM46isgaMexRjV3MM2aXyDUC8Iv5XxQMmn
# BLfa8Bs7OHrgEawzAZmoP89/qwzycBeKU4VocgTUOZ1zZE7pOJDePkEaMxgbddDl
# lAUa
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get KB-articles of SP_1.ps1 | Get KB-articles of SP_1.ps1 | function Get-Sp1Articles()
{
$web = New-Object System.Net.WebClient
# Microsoft XLS-Datei über google herunterladen, damit kommt die XLS-Datei als in HTML konvertierte Datei
$html = $web.DownloadString(‘http://webcache.googleusercontent.com/search?q=cache:trZowCK8jvcJ:download.microsoft.com/download/8/B/3/8B37425B-AB6E-4C9C-9361-ECC15771BC5C/Hotfixes%2520and%2520Security%2520Updates%2520included%2520in%2520Windows%25207%2520and%2520Windows%2520Server%25202008%2520R2%2520Service%2520Pack%25201.xls’)
# zuerst den Google Header und das unnötige Blabla wegbekommen
$html = $html.Substring($html.IndexOf("KBTitle"))
# jetzt das nächste <tr> finden
$html = $html.Substring($html.IndexOf("<tr"))
# einzelne Zeile mit KB-Eintrag erkennen
$regex = ‘<tr([\\s\\S]*?)</tr>’
# HTML in Objektauflistung überführen
($html |Select-String -Pattern $regex -AllMatches).matches |foreach {
# durch überführen in ein XML-Objekt läßt sich die Zeile leichter verarbeiten
[xml]$tmp = $_
# neues Objekt erzeugen, dem die 4 wichtigen Eigenschaften zugeordnet werden, wenn eine KB-Nummer eingetragen ist
if ($tmp.tr.td[0].font.’#text’ -gt 0)
{
$obj = New-Object psobject
$obj |Add-Member -MemberType NoteProperty -Name KBArticle -Value $tmp.tr.td[0].font.’#text’
$obj |Add-Member -MemberType NoteProperty -Name Classification -Value $tmp.tr.td[1].font.’#text’
$obj |Add-Member -MemberType NoteProperty -Name KBTitle -Value $tmp.tr.td[2].font.’#text’
$obj |Add-Member -MemberType NoteProperty -Name Link -Value $tmp.tr.td[3].a.href
$obj
}
}
}
|
combined_dataset/train/non-malicious/Get-ObservedIPRange.ps1 | Get-ObservedIPRange.ps1 | function Get-ObservedIPRange {
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true,HelpMessage="Physical NIC from Get-VMHostNetworkAdapter")]
[VMware.VimAutomation.ViCore.Impl.V1.Host.Networking.Nic.PhysicalNicImpl]
$Nic
)
process {
$hostView = Get-VMHost -Id $Nic.VMHostId | Get-View -Property ConfigManager
$ns = Get-View $hostView.ConfigManager.NetworkSystem
$hints = $ns.QueryNetworkHint($Nic.Name)
foreach ($hint in $hints) {
foreach ($subnet in $hint.subnet) {
$observed = New-Object -TypeName PSObject
$observed | Add-Member -MemberType NoteProperty -Name Device -Value $Nic.Name
$observed | Add-Member -MemberType NoteProperty -Name VMHostId -Value $Nic.VMHostId
$observed | Add-Member -MemberType NoteProperty -Name IPSubnet -Value $subnet.IPSubnet
$observed | Add-Member -MemberType NoteProperty -Name VlanId -Value $subnet.VlanId
Write-Output $observed
}
}
}
}
# Example use:
# Get-VMHost esx01a.vmworld.com | Get-VMHostNetworkAdapter | Where { $_.Name -eq "vmnic1" } | Get-ObservedIPRange
# Example output:
#Device VMHostId IPSubnet VlanId
#------ -------- -------- ------
#vmnic1 HostSystem-host-102 10.91.245.128-10.91... 2907
#vmnic1 HostSystem-host-102 10.91.244.133-10.91... 2905
#vmnic1 HostSystem-host-102 10.91.243.253-10.91... 2903
#vmnic1 HostSystem-host-102 10.91.246.11-10.91.... 2908
#vmnic1 HostSystem-host-102 10.91.246.129-10.91... 2909
|
combined_dataset/train/non-malicious/sample_17_54.ps1 | sample_17_54.ps1 | #************************************************
# TS_ETLTraceCollector.ps1
# Version 1.2.2
# Date: 10-31-2010
# Author: Andre Teixeira - andret@microsoft.com
# Description: This script is a universal ETL Trace collector. Caller has to inform a Data Collector Set XML for the ETL and additional data.
# Script will collect ETL information after asking customer to reproduce the issue.
#************************************************
# invoked in DC_DirectAccessDiag.ps1
# Last Modified: 2023-02-23 by #we# - added trap in functions
PARAM( [string] $DataCollectorSetXMLName = "",
$OutputFileName,
[string] $ComponentName = "Component",
$FileDescription = "ETL trace file",
$SectionDescription = "ETL Traces",
[string] $ReproTitle = "",
[string] $ReproDescription = "",
[string] $StopTitle = "",
[string] $StopDescription = "",
[switch] $DoNotPromptUser,
[switch] $StartTrace,
[switch] $StopTrace,
$DataCollectorSetObject = $null,
[switch] $DisableRootCauseDetected,
[string] $DestinationFolder = ($PWD.Path + "\Perfmon")
)
Import-LocalizedData -BindingVariable EvtTraceStrings
Write-DiagProgress -Activity ($EvtTraceStrings.ID_ETLTraceEnable -replace "%Component%", $ComponentName) -Status ($EvtTraceStrings.ID_ETLTraceEnableDesc -replace "%Component%", $ComponentName)
if ($ReproTitle -eq ""){
$ReproTitle = $EvtTraceStrings.ID_ETLTraceReproTitle
}
if ($ReproDescription -eq ""){
$ReproDescription = $EvtTraceStrings.ID_ETLTraceReproDescription
}
if ($StopTitle -eq ""){
$StopTitle = $EvtTraceStrings.ID_ETLTraceStopTitle
}
if ($StopDescription -eq ""){
$StopDescription = $EvtTraceStrings.ID_ETLTraceStopDescription
}
Function StartDataCollectorSetFromXML{
param( [string] $PathToXML,
[string] $DestinationFolder)
if (Test-Path $PathToXML){
trap [Exception]{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Starting Data Collector Set $PathToXML")
if ($null -ne $_.Exception) {"[Exception]: $($_.Exception.Message)"}
continue
}
$Error.Clear()
"Obtaining DSC XML Content..." | WriteTo-StdOut -ShortFormat
[xml] $DataCollectorXML = Get-Content $PathToXML
$DataCollectorXML.DataCollectorSet.RootPath = $DestinationFolder
"Root Path: $DestinationFolder" | WriteTo-StdOut -ShortFormat
if ($OutputFileName -is [array]){
$X = 0
foreach ($TraceCollectorSet in $DataCollectorXML.DataCollectorSet.TraceDataCollector){
if ($TraceCollectorSet.FileName -ne "NtKernel"){
if ($X -lt $OutputFileName.Length){
$FileName = $OutputFileName[$X]
$TraceCollectorSet.FileName = $FileName
$CollectionName = $TraceCollectorSet.Name
$SectionName = $TraceCollectorSet.Name
"Setting Output to TraceDataCollector [$CollectionName] to [$FileName]" | WriteTo-StdOut -ShortFormat
}else{
"Error: OutputFileName contains less members than TraceCollectorSet sections." | WriteTo-StdOut -ShortFormat
}
$X++
}
}
}else{
foreach ($TraceCollectorSet in $DataCollectorXML.DataCollectorSet.TraceDataCollector){
if ($TraceCollectorSet.FileName -ne "NtKernel"){
$TraceCollectorSet.FileName = $OutputFileName
"Setting Output to [$OutputFileName]" | WriteTo-StdOut -ShortFormat
}
}
}
$Name = $DataCollectorXML.DataCollectorSet.Name
"DSC Name: $Name" | WriteTo-StdOut -ShortFormat
"Creating PLA Object and Setting Up DataCollector" | WriteTo-StdOut -ShortFormat
$DataCollectorSet = New-Object -ComObject PLA.DatacollectorSet
$DataCollectorSet.SetXml($DataCollectorXML.get_InnerXml()) | WriteTo-StdOut -ShortFormat
$DataCollectorSet.Commit($Name, $null , 0x0003) | WriteTo-StdOut -ShortFormat
$DataCollectorSet.Query($Name,$null) | WriteTo-StdOut -ShortFormat
"Starting DCS" | WriteTo-StdOut -ShortFormat
$DataCollectorSet.start($false) | WriteTo-StdOut -ShortFormat
If (($null -ne $DataCollectorSet) -and ($null -ne $DataCollectorSet.status)){
if ($DataCollectorSet.Status -eq 0){
"DCS was not started. Trying again in 5 seconds" | WriteTo-StdOut -ShortFormat
#Timming issue. Wait 5 seconds and try again
Start-Sleep -Seconds 5
if ($DataCollectorSet.Status -eq 0){
$DataCollectorSet.start($false)
}
if ($DataCollectorSet.Status -ne 1){
"DCS Current Status is " + $DataCollectorSet.Status | WriteTo-StdOut -ShortFormat
}else{
"DCS is now started" | WriteTo-StdOut -ShortFormat
}
}
return $DataCollectorSet
}else{
"An error has ocurred to create the following Data Collector Set:" | WriteTo-StdOut -ShortFormat
"Name: $Name" | WriteTo-StdOut -ShortFormat
"XML: $PathToXML" | WriteTo-StdOut -ShortFormat
}
}else{
$PathToXML + " does not exist. Exiting..." | WriteTo-StdOut -ShortFormat
}
}
Function StopDataCollectorSet ($DataCollectorSet){
trap [Exception]{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Stopping DataCollectorSet")
continue
}
"Stopping Data Collector Set. Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
if ($null -ne $DataCollectorSet.Status){
trap [Exception]{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Stopping DataCollectorSet")
continue
}
$retries = 0
do{
trap [Exception]{
continue
}
$retries++
Start-Sleep -Milliseconds 500
if ($DataCollectorSet.Status -ne 0){
$DataCollectorSet.Stop($false)
}
} while (($DataCollectorSet.Status -ne 0) -and ($retries -lt 900)) #Wait for up to 7.5 minutes for the report to finish
if ($retries -lt 900){
"Data Collector Set was stopped. Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}else{
"Current Status of Data Collector Set is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}
$OutputLocation = $DataCollectorSet.OutputLocation
"Deleting DataCollectorSet..." | writeto-stdout -ShortFormat
$DataCollectorSet.Delete()
return $OutputLocation
}
}
Function CleanDataCollectorSetTrace{
"Diagnostic package ends unexpectedly. Stopping DataCollectorSet [ToBeDetermined]" | WriteTo-StdOut -ShortFormat
trap [Exception]{
continue
}
$DataCollectorSet = New-Object -ComObject PLA.DatacollectorSet
$DCSName = "ToBeDetermined"
$DataCollectorSet.Query($DCSName,$null) | WriteTo-StdOut -ShortFormat
"Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
if ($null -ne $DataCollectorSet.Status){
trap [Exception]{
continue
}
$retries = 0
do{
trap [Exception]{
continue
}
$retries++
Start-Sleep -Milliseconds 500
if ($DataCollectorSet.Status -ne 0){
$DataCollectorSet.Stop($false)
}
} while (($DataCollectorSet.Status -ne 0) -and ($retries -lt 900)) #Wait for up to 7.5 minutes for the report to finish
if ($retries -lt 900){
"Data Collector Set was stopped. Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}else{
"Current Status of Data Collector Set is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}
$OutputLocation = $DataCollectorSet.OutputLocation
if(Test-Path -Path $OutputLocation){
"Delete DataCollectorSet output folder [$OutputLocation]" | writeto-stdout -ShortFormat
Remove-Item -Path $OutputLocation -Recurse -Force -Confirm:$false
}
"Deleting DataCollectorSet..." | writeto-stdout -ShortFormat
$DataCollectorSet.Delete()
}
}
## Main ##
if ($DataCollectorSetXMLName.Length -gt 0){
if (Test-Path -Path $DataCollectorSetXMLName){
$DataCollectorSetXMLName = [System.IO.Path]::GetFullPath($DataCollectorSetXMLName)
}
if ((Test-Path ($DestinationFolder)) -ne $true){
$null = mkdir $DestinationFolder
}
if (-not ($DoNotPromptUser.IsPresent)){
$Results = Get-DiagInput -Id "ETLTraceCollectorStopper" -Parameter @{"Title"=$ReproTitle; "Description"=$ReproDescription}
}
if (-not ($StopTrace.IsPresent)){
$TraceTimeStarted = Get-Date
$DataCollectorSet = StartDataCollectorSetFromXML -DestinationFolder $DestinationFolder -PathToXML $DataCollectorSetXMLName
if (($null -ne $DataCollectorSet) -and (-not ($DataCollectorSet -is [System.__ComObject]))){
#Probably an array
$ArrayDCS = $DataCollectorSet
foreach ($Member in $ArrayDCS){
if ($Member -is [System.__ComObject]){
$DataCollectorSet = $Member
}
}
}
}
}
if ($null -ne $DataCollectorSetObject){
$DataCollectorSet = $DataCollectorSetObject
}
if ($DataCollectorSet -is [System.__ComObject]){
$DataCollectorSetName = $DataCollectorSet.Name
if ((-not ($StopTrace.IsPresent)) -and ($null -ne $DataCollectorSet)){
"Starting Monitoring Session for DCS $DataCollectorSetName" | WriteTo-StdOut -ShortFormat
.\TS_MonitorDiagExecution.ps1 -SessionName "PLACollector_$($DataCollectorSetName)" -ScriptBlockToExecute (($Function:CleanDataCollectorSetTrace) -Replace ("ToBeDetermined", $DataCollectorSetName))
}
elseif ($null -ne $DataCollectorSet){
"[Warning] DataCollectorSet [$DataCollectorSetName] is null" | WriteTo-StdOut -ShortFormat
}
if (-not ($DoNotPromptUser.IsPresent)){
$Results = Get-DiagInput -Id "ETLTraceCollectorStopper" -Parameter @{"Title"=$StopTitle; "Description"=$StopDescription}
$TraceTimeDisplay = (GetAgeDescription(New-TimeSpan $TraceTimeStarted))
}
Write-DiagProgress -Activity ($EvtTraceStrings.ID_ETLTraceStopping -replace "%Component%", $ComponentName) -Status ($EvtTraceStrings.ID_ETLTraceStoppingDesc -replace "%Component%", $ComponentName)
if (($StopTrace.IsPresent) -or (($StopTrace.IsPresent -eq $false) -and ($StartTrace.IsPresent -eq $false))){
$OutputFolder = StopDataCollectorSet $DataCollectorSet
#end the TS_MonitorDiagExecution
.\TS_MonitorDiagExecution.ps1 -EndMonitoring -SessionName "PLACollector_$($DataCollectorSetName)"
Write-DiagProgress -Activity ($EvtTraceStrings.ID_ETLTraceCollecting -replace "%Component%", $ComponentName) -Status ($EvtTraceStrings.ID_ETLTraceCollectingDesc -replace "%Component%", $ComponentName)
if ($OutputFileName -is [array]){
$X = 0
ForEach ($OutputFile in $OutputFileName){
if ($FileDescription -is [Array]){
$FDescription = $FileDescription[$x]
}else{
$FDescription = $FileDescription
}
if ($sectionDescription -is [Array]){
$SDescription = $sectionDescription[$x]
}else{
$SDescription = $sectionDescription
}
CollectFiles -filesToCollect ([System.IO.Path]::Combine($OutputFolder, $OutputFile)) -fileDescription $FDescription -sectionDescription $SDescription
$X++
}
}else{
CollectFiles -filesToCollect ([System.IO.Path]::Combine($OutputFolder, $OutputFileName)) -fileDescription $FileDescription -sectionDescription $sectionDescription
}
if (-not ($DisableRootCauseDetected.IsPresent)){
if (Test-Path -Path ([System.IO.Path]::Combine($OutputFolder, $OutputFileName))){
$XMLFileName = "..\ETLCollected.XML"
$MSG_Summary = new-object PSObject
add-member -inputobject $MSG_Summary -membertype noteproperty -name "More Information" -value ("A $TraceTimeDisplay $ComponentName ETL trace was collected for and saved to <a href= `"`#" + $OutputFileName + "`">$OutputFileName</a>.")
($MSG_Summary | ConvertTo-Xml2).Save($XMLFileName)
Update-DiagRootCause -Id RC_ETLCollected -Detected $true -Parameter @{"XMLFileName"=$XMLFileName; "Verbosity"="Informational"; "SectionTitle"="Additional Information"; "Component"=$ComponentName}
}
}
}
}else{
"An error has occurred when setting Data Collector Set. Aborting" | WriteTo-StdOut -ShortFormat
if ($null -ne $DataCollectorSet){
"DataCollectorSet Type Information: " | WriteTo-StdOut -ShortFormat
$DataCollectorSet | Get-Member | Out-String | WriteTo-StdOut -ShortFormat
"DataCollectorSet: " | WriteTo-StdOut -ShortFormat
$DataCollectorSet | WriteTo-StdOut -ShortFormat
}else{
"DataCollectorSet is Null" | WriteTo-StdOut -ShortFormat
}
}
if ($null -ne $DataCollectorSet.Status){
return $DataCollectorSet
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB5/MSEqRhM/998
# vuki6uZlf1a/4CjlQ29+LoZYZ1kseaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFFw
# bGqBBLIpaNuz0A8iJcBkFHo78TWRzZRsge00CteKMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAEF1U2gmBDF7/FA1GCNxnkVw2zMDN+CERMMS6
# UjX5YfttDmsy8Ky/DpvqLfg7qJDwUg+leuNiGez8DH0/sWJguiKDWkgSO4HeXtjs
# OaIU3nfl7o7qoO7c0Xw+533d4R2SbZW+5wffrTOMnbHju+oulRwrfWEz6rjQ0bmi
# hzTjKE2mrssYmbXkcTW8JL/xikn8sDa+Bc3uhYEbPb7NwzAmc8t6W+u5gKaWB0JM
# 0Yibu0NNmqN/vcpxHVL+UG8RKfpelRVa40P+TqAN5QVFgwUl7ffcHhP608MW71d9
# a82lktnO7/DjDToJOlFLtExaK4f6q8QQ+BB1FGSMC9jxJey6+aGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDsjRZhAymuzSfFnqV0gd1i8lFp5oTQ/+md
# FUF0vG9ufwIGZutC6/SGGBMyMDI0MTAyODExNDA0MC41MjhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCo
# wns0IQsBAAEAAAH+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# vLwhFxWlqA43olsE4PCegZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62
# YHUieIQXw+0u4qlay4AN3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv0
# 7O18i2HjDyLuywYyKA9FmWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9
# BCGVRdHW9lmPMrrUlPWiYV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnT
# dcfP6T8Mir0HrwTTtV2h2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT
# 81ZC2aHN7exEDmmbiWssjGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX
# /uDVtY9pvL4j8aEWS49hKUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B
# 454eGJhL0fwUTRbgyCbpLgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQya
# hGZDL/vWAVjX5b8Jzhly9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xb
# eOETAOn7OT9D3UGt0q+KiWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOn
# F7Dgj8a60KQT9QgfJfwXnr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRvznuJ9SU2g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAiT4NUvO2lw+0dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8Lq
# xsH4GWCPTztc3tr8AgBvsYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPk
# MA3DAxVq4SSR8y+TRC2GcOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze
# +sbqSn8cekduMZdLyHJk3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtT
# lNkq3bx1iyWg7N7jGZABRWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIR
# VkWsMyEAdoP9dqfaZzwXGmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTR
# zZZEw82FupF3viXNR3DVOlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ
# 2e+sBUh62KVTlhEsQRHZRwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz
# 9SvCjIKSxCZFCNv/zpKIlsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObD
# fU4h/O/0vmbF3BMR+45rAZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7F
# RnHEAAr06sflqZ8eeV3FuDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQ
# LWVG9JuGxgLRXseggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0
# MTAyOTA5MDQwOFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEA
# AgIIsAIB/zAHAgEAAgISxjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAzScy1wBbpcAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG
# 0qSOBjk7VgyCvjFMirT11HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpe
# E+oE9viQRHMLsU/3b8huzWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSj
# n3XQ0nllmNeGCeUkdIsNTpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/a
# N3CjM0gf25XwDETanz7KLbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9
# FVUpwZNtKUwYSNiOSsA9S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQg1w0nAgfRI0dH+uN7ODs3BmrMhi8lNvwOklFgLalGEhEwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0W
# tkCstyh0eTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/tCowns0IQsBAAEAAAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH6
# 5KUaSnvoMA0GCSqGSIb3DQEBCwUABIICAI50mkWuBi6EKcYQFbJkF89wIA8Gb9Zw
# MsHAvHEMtiBGJEisNQNro6OjJl1PgMB9HsKptEB1IT6adPW8yVZfQcp1iK6yN8++
# GGJ867HwUdK4EAj/Q4QHpDcmh9U9HTvtTqnHaV2z1JYpFV/4jsIjpffZwQwyOHbk
# QiFS55Y8P2xI2GrSvPRN7IcXIkZv6VpgddzSfdXauM3zV4WiWlIYG4V6bkCdS9dK
# eUsoe5YIaYXFRhCJAL3Qri10RnEWO/6zQd5uI1jJ9n/ablya7hkB45N0DppNkunq
# xxZjMzMgi7TqO1K5k4Qt57V2p3MaCrL746qouAyntkDcNUhmQWlinN5w3Xy0RxE/
# zADTjwL9jP6xxrw6HUujL23Hk8GITX7riRRv+theT4elxk85nGFdYckoLtqGc44s
# JyHyzCsLfHKY5H/cxBUQ0WLOCaCHnzNGJSYbLX4jJNr+4tByxI1LR9G8/Yomefie
# DuProzbuMOXYIq8/7fgFaJtpwOdZwtG2AGgEcKEDeH5A3trSUd5iTFJbM57O9eUz
# 4KZe1YYQowx1ykkPl164y8YvorQRX9BAt/9SCdfUHkf2JX1OBhNslZ2WpjMw88ta
# txKM5lamoVEeWJ5FFGIBmFhUvcUvPrSvK+7oycmibqyG2j6fGe6miURlpVdljMa7
# 0EqUG05P8Gry
# SIG # End signature block
|
combined_dataset/train/non-malicious/4133.ps1 | 4133.ps1 |
[CmdletBinding()]
param
(
[Switch]$SCCM,
[switch]$TextFile,
[string]$TextFileLocation
)
function Find-RegistryKey {
[CmdletBinding()][OutputType([string])]
param
(
[ValidateNotNullOrEmpty()][string]$Value,
[ValidateNotNullOrEmpty()][string]$SID
)
$Version = Get-OfficeVersion
switch ($Version) {
"Office 14" { $Key = "HKEY_USERS\" + $SID + "\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles" }
"Office 16" { $Key = "HKEY_USERS\" + $SID + "\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles" }
}
If ((Test-Path REGISTRY::$Key) -eq $true) {
[string]$CachedMode = get-childitem REGISTRY::$Key -recurse -ErrorAction SilentlyContinue | where-object { $_.property -eq "00036601" }
If ($CachedMode -ne $null) {
[string]$CachedModeValue = (Get-ItemProperty REGISTRY::$CachedMode).'00036601'
switch ($Version) {
"Office 14" {
switch ($CachedModeValue) {
'128 25 0 0' { Return "Enabled" }
'0 16 0 0' { Return "Disabled" }
default { Return "Unknown" }
}
}
"Office 16" {
switch ($CachedModeValue) {
'132 25 0 0' { Return "Enabled" }
'4 16 0 0' { Return "Disabled" }
default { Return "Unknown" }
}
}
}
Return $CachedModeValue
} else {
Return $null
}
} else {
Return $null
}
}
function Get-HKEY_USERS_List {
[CmdletBinding()][OutputType([array])]
param ()
$HKEY_USERS = Get-ChildItem REGISTRY::HKEY_USERS | where-object { ($_.Name -like "*S-1-5-21*") -and ($_.Name -notlike "*_Classes") }
$Users = @()
foreach ($User in $HKEY_USERS) {
$PROFILESID = Get-ChildItem REGISTRY::"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList" | Where-Object { $_.name -like "*" + $USER.PSChildName + "*" }
$SID = $PROFILESID.PSChildName
$CachedMode = Find-RegistryKey -Value "00036601" -SID $SID
If ($CachedMode -ne $null) {
$ProfileName = ((Get-ItemProperty REGISTRY::$PROFILESID).ProfileImagePath).Split("\")[2]
$SystemInfo = New-Object -TypeName System.Management.Automation.PSObject
Add-Member -InputObject $SystemInfo -MemberType NoteProperty -Name Profile -Value $ProfileName
Add-Member -InputObject $SystemInfo -MemberType NoteProperty -Name Status -Value $CachedMode
$Users += $SystemInfo
}
}
Return $Users
}
function New-WMIClass {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$Class
)
$WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue
If ($WMITest -ne "") {
$Output = "Deleting " + $Class + " WMI class....."
Remove-WmiObject $Class
$WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue
If ($WMITest -eq $null) {
$Output += "Success"
} else {
$Output += "Failed"
Exit 1
}
Write-Output $Output
}
$Output = "Creating " + $Class + " WMI class....."
$newClass = New-Object System.Management.ManagementClass("root\cimv2", [String]::Empty, $null);
$newClass["__CLASS"] = $Class;
$newClass.Qualifiers.Add("Static", $true)
$newClass.Properties.Add("Profile", [System.Management.CimType]::String, $false)
$newClass.Properties["Profile"].Qualifiers.Add("key", $true)
$newClass.Properties["Profile"].Qualifiers.Add("read", $true)
$newClass.Properties.Add("Status", [System.Management.CimType]::String, $false)
$newClass.Properties["Status"].Qualifiers.Add("key", $true)
$newClass.Properties["Status"].Qualifiers.Add("read", $true)
$newClass.Put() | Out-Null
$WMITest = Get-WmiObject $Class -ErrorAction SilentlyContinue
If ($WMITest -eq $null) {
$Output += "Success"
} else {
$Output += "Failed"
Exit 1
}
Write-Output $Output
}
function New-WMIInstance {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$Username,
[ValidateNotNullOrEmpty()][string]$CachedModeStatus,
[ValidateNotNullOrEmpty()][string]$Class
)
$Output = "Writing Cached Exchange information instance to" + [char]32 + $Class + [char]32 + "class....."
$Return = Set-WmiInstance -Class $Class -Arguments @{ Profile = $Username; Status = $CachedModeStatus }
If ($Return -like "*" + $Username + "*") {
$Output += "Success"
} else {
$Output += "Failed"
}
Write-Output $Output
}
function Get-OfficeVersion {
[CmdletBinding()][OutputType([string])]
param ()
If ((Test-Path $env:ProgramFiles"\Microsoft Office") -eq $true) {
$File = get-childitem -path $env:ProgramFiles"\Microsoft Office" -filter ospp.vbs -recurse
}
If ((Test-Path ${env:ProgramFiles(x86)}"\Microsoft Office") -eq $true) {
$File = get-childitem -path ${env:ProgramFiles(x86)}"\Microsoft Office" -filter ospp.vbs -recurse
}
$Version = (cscript.exe $File.Fullname /dstatus | where-object { $_ -like "LICENSE NAME:*" }).split(":")[1].Trim().Split(",")[0]
Return $Version
}
function Initialize-HardwareInventory {
[CmdletBinding()]
param ()
$Output = "Initiate SCCM Hardware Inventory....."
$SMSCli = [wmiclass] "\\localhost\root\ccm:SMS_Client"
$ErrCode = ($SMSCli.TriggerSchedule("{00000000-0000-0000-0000-000000000001}")).ReturnValue
If ($ErrCode -eq $null) {
$Output += "Success"
} else {
$Output += "Failed"
}
Write-Output $Output
}
Clear-Host
$Users = Get-HKEY_USERS_List
If ($SCCM.IsPresent) {
New-WMIClass -Class "Cached_Exchange_Mode"
foreach ($User in $Users) {
New-WMIInstance -Username $User.Profile -CachedModeStatus $User.Status -Class "Cached_Exchange_Mode"
}
Initialize-HardwareInventory
}
If ($TextFile.IsPresent) {
If (($TextFileLocation -ne "") -and ($TextFileLocation -ne $null)) {
If ((Test-Path $TextFileLocation) -eq $true) {
If ($TextFileLocation.Length - 1 -ne '\') {
$File = $TextFileLocation + '\' + $env:COMPUTERNAME + ".log"
} else {
$File = $TextFileLocation + $env:COMPUTERNAME + ".log"
}
If ((Test-Path $File) -eq $true) {
Remove-Item $File -Force
}
$Users | Out-File $File -Encoding UTF8 -Force
} else {
Write-Host "Text file location does not exist"
}
} else {
Write-Host "No text file location was defined."
}
}
$Users
|
combined_dataset/train/non-malicious/2285.ps1 | 2285.ps1 | [CmdletBinding()]
param(
[parameter(Mandatory=$true)]
[string]$SiteServer,
[parameter(Mandatory=$true)]
[string]$MDTServer,
[parameter(Mandatory=$true)]
[string]$MDTDatabase
)
function Load-Window {
if ((Connect-CMSiteServer -CMSiteServer $SiteServer) -eq $true) {
Connect-MDTDatabase -MDTServer $MDTServer -MDTDatabase $MDTDatabase
if ($Global:MDTSQLConnection.State -like "Open") {
Get-MDTRoles
Get-CMCollections
$SyncHash.Window.ShowDialog() | Out-Null
}
else {
foreach ($Control in $SyncHash.Keys) {
$SyncHash.$Control.IsEnabled = $false
}
}
}
else {
foreach ($Control in $SyncHash.Keys) {
$SyncHash.$Control.IsEnabled = $false
}
}
}
function Error-Provider {
param(
[parameter(Mandatory=$true)]
$Control,
[parameter(Mandatory=$true)]
$Property,
[parameter(Mandatory=$true)]
[ValidateSet("Normal","Error")]
$Option
)
if ($Option -like "Error") {
$Control.$Property = "
}
if ($Option -like "Normal") {
$Control.$Property = "
}
}
function Clear-Form {
Set-ProgressBarValue -Value Minimum
Set-StatusBarText -Text ""
$ComboBoxMDTRole.SelectedIndex = 0
$ComboBoxCMCollection.SelectedIndex = 0
$TextBoxComputerName.Clear()
$TextBoxMACAddress.Clear()
$TextBoxPrimaryUser.Clear()
if ($TextBoxComputerName.Background -like "
$TextBoxComputerName.Background = "
}
if ($TextBoxMACAddress.Background -like "
$TextBoxMACAddress.Background = "
}
if ($TextBoxPrimaryUser.Background -like "
$TextBoxPrimaryUser.Background = "
}
}
function Load-ComboBox {
param(
[parameter(Mandatory=$true)]
[System.Windows.Controls.ComboBox]$ComboBox,
[parameter(Mandatory=$true)]
$Items,
[parameter(Mandatory=$false)]
[string]$SelectedIndex,
[parameter(Mandatory=$false)]
[switch]$Append
)
if (-not($PSBoundParameters["Append"])) {
$ComboBox.Items.Clear()
}
if ($Items -is [array]) {
foreach ($Item in $Items) {
$ComboBox.Items.Add($Item) | Out-Null
}
}
else {
$ComboBox.Items.Add($Items) | Out-Null
}
if ($PSBoundParameters["SelectedIndex"]) {
$ComboBox.SelectedIndex = $SelectedIndex
}
}
function Set-ToolTipText {
param(
[parameter(Mandatory=$true)]
$Control,
[parameter(Mandatory=$true)]
[ValidateSet("ToolTip")]
$Property,
[parameter(Mandatory=$true)]
$Text
)
$Control.$Property = "$($Text)"
}
function Set-Controls {
param(
[parameter(Mandatory=$true)]
[ValidateSet("True","False")]
[bool]$IsEnabled
)
foreach ($Control in $SyncHash.Keys) {
$SyncHash.$Control.IsEnabled = $IsEnabled
}
}
function Set-StatusBarText {
param(
[parameter(Mandatory=$true)]
$Text
)
$LabelStatusBar.Content = "$($Text)"
}
function Set-ProgressBarValue {
param(
[parameter(Mandatory=$true)]
[ValidateSet("Increase","Decrease","Maximum","Minimum")]
$Value
)
Begin {
$MaxValue = $StatusBarProgressBarItem.Content.Maximum
$MinValue = $StatusBarProgressBarItem.Content.Minimum
$CurrentValue = $StatusBarProgressBarItem.Content.Value
}
Process {
switch ($Value) {
"Increase" {
$CurrentValue++
if ($CurrentValue -ge $MaxValue) {
$StatusBarProgressBarItem.Content.Value = "$($MaxValue)"
}
else {
$StatusBarProgressBarItem.Content.Value = "$($CurrentValue)"
}
}
"Decrease" {
if ($CurrentValue -ne $MinValue) {
$CurrentValue--
$StatusBarProgressBarItem.Content.Value = "$($CurrentValue)"
}
}
"Maximum" {
$StatusBarProgressBarItem.Content.Value = "$($MaxValue)"
}
"Minimum" {
$StatusBarProgressBarItem.Content.Value = "$($MinValue)"
}
}
}
}
function Connect-CMSiteServer {
param(
[parameter(Mandatory=$true)]
[string]$CMSiteServer
)
$ConnectSMSProvider = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $CMSiteServer -ErrorAction SilentlyContinue
if (($ConnectSMSProvider | Measure-Object).Count -ge 1) {
foreach ($Provider in $ConnectSMSProvider) {
if ($Provider.ProviderForLocalSite -eq $true) {
return $true
}
}
}
else {
Write-Error -Message "Unable to connect to SMS Provider at '$($CMSiteServer)' - Namespace not found"
return $false
}
}
function Connect-MDTDatabase {
param(
[parameter(Mandatory=$true)]
[string]$MDTServer,
[parameter(Mandatory=$true)]
[string]$MDTDatabase,
[parameter(Mandatory=$false)]
[string]$MDTInstance = ""
)
if ($Instance.Length -ge 1) {
$MDTSQLConnectionString = "Server=$($MDTServer)\$($MDTInstance); Database='$($MDTDatabase)'; Integrated Security=True"
}
else {
$MDTSQLConnectionString = "Server=$($MDTServer); Database='$($MDTDatabase)'; Integrated Security=True"
}
try {
$Global:MDTSQLConnection = New-Object System.Data.SqlClient.SqlConnection
$Global:MDTSQLConnection.ConnectionString = $MDTSQLConnectionString
$Global:MDTSQLConnection.Open()
}
catch {
Write-Error -Message "Unable to connect to: '$($MDTServer)' - Possible cause: current user does not have sysadmin permission in the database"
}
}
function Close-MDTDatabase {
if ($Global:MDTSQLConnection.State -like "Open") {
$Global:MDTSQLConnection.Close()
}
}
function Get-MDTRoles {
if ($MDTSQLConnection.State -like "Open") {
$MDTRoleQuery = "SELECT Role FROM RoleIdentity"
$SQLDataAdapter = New-Object System.Data.SqlClient.SqlDataAdapter($MDTRoleQuery, $Global:MDTSQLConnection)
$SQLDataset = New-Object System.Data.DataSet
$Execute = $SQLDataAdapter.Fill($SQLDataset, "Roles")
$MDTRoles = $SQLDataset.Tables[0].Rows | Select-Object -ExpandProperty Role | Sort-Object
Load-ComboBox -ComboBox $ComboBoxMDTRole -Items $MDTRoles -SelectedIndex 0
}
}
function Get-CMSiteCode {
try {
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
return $SiteCodeObject.SiteCode
}
}
}
catch [Exception] {
Throw "Unable to determine SiteCode"
}
}
function Get-CMCollections {
$Collections = Get-WmiObject -Namespace "root\SMS\site_$(Get-CMSiteCode)" -Class SMS_Collection -ComputerName $SiteServer -ErrorAction SilentlyContinue | Select-Object -ExpandProperty Name
$SortedCollections = $Collections | Sort-Object
Load-ComboBox -ComboBox $ComboBoxCMCollection -Items $SortedCollections -SelectedIndex 0
}
function Get-CMPrimaryUser {
param(
[parameter(Mandatory=$true)]
[string]$SiteServer,
[parameter(Mandatory=$true)]
[string]$SiteCode,
[parameter(Mandatory=$true)]
[string]$UserName
)
$UserName = $UserName.Replace("\","\\")
$PrimaryUser = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_R_User -ComputerName $SiteServer -Filter "(UserName like '%$($UserName)%') OR (UniqueUserName like '$($UserName)%') OR (FullUserName like '%$($UserName)%')" -ErrorAction SilentlyContinue
if (($PrimaryUser | Measure-Object).Count -eq 1) {
$TextBoxPrimaryUser.Background = "
$TextBoxPrimaryUser.Text = $PrimaryUser.UniqueUserName
$ButtonPrimaryUserCheck.IsEnabled = $false
$Global:PrimaryUserValidated = $true
}
elseif (($PrimaryUser | Measure-Object).Count -gt 1) {
$TextBoxPrimaryUser.Background = "
$TextBoxPrimaryUser.Text = $PrimaryUser[0].UniqueUserName
$ButtonPrimaryUserCheck.IsEnabled = $false
$Global:PrimaryUserValidated = $true
}
else {
Error-Provider -Control $TextBoxPrimaryUser -Property "Background" -Option Error
Set-ToolTipText -Control $TextBoxPrimaryUser -Property "ToolTip" -Text "ERROR: Specified user name was not found"
$Global:PrimaryUserValidated = $false
}
}
function New-MDTComputer {
param(
[parameter(Mandatory=$true)]
[string]$MACAddress,
[parameter(Mandatory=$true)]
[string]$Description,
[parameter(Mandatory=$true)]
[string]$OSDComputerName
)
Set-StatusBarText -Text "Creating Computer Identity in the MDT database"
$MDTSQLIdentityCommand = "INSERT INTO ComputerIdentity (AssetTag, SerialNumber, MacAddress, UUID, Description) VALUES ('$($AssetTag)', '$($SerialNumber)', '$($MACAddress)', '$($UUID)', '$($Description)') SELECT @@IDENTITY"
$IdentityCommand = New-Object System.Data.SqlClient.SqlCommand($MDTSQLIdentityCommand, $Global:MDTSQLConnection)
$Identity = $IdentityCommand.ExecuteScalar()
Set-ProgressBarValue -Value Increase
Set-StatusBarText -Text "Associating Computer name with Computer Identity"
$MDTSQLSettingsCommand = "INSERT INTO Settings (Type, ID, OSDComputerName) VALUES ('C', '$($Identity)', '$($OSDComputerName)')"
$SettingsCommand = New-Object System.Data.SqlClient.SqlCommand($MDTSQLSettingsCommand, $Global:MDTSQLConnection)
$Execute = $SettingsCommand.ExecuteScalar()
Set-ProgressBarValue -Value Increase
Set-StatusBarText -Text "Associating Computer Indentity with specified Role"
$MDTSQLSettingsRolesCommand = "INSERT INTO Settings_Roles (Type, ID, Sequence, Role) VALUES ('C', '$($Identity)', '1', '$($ComboBoxMDTRole.SelectedItem)')"
$SettingsRolesCommand = New-Object System.Data.SqlClient.SqlCommand($MDTSQLSettingsRolesCommand, $Global:MDTSQLConnection)
$Update = $SettingsRolesCommand.ExecuteScalar()
Set-ProgressBarValue -Value Increase
}
function New-CMComputer {
param(
[parameter(Mandatory=$true)]
[string]$SiteServer,
[parameter(Mandatory=$true)]
[string]$SiteCode,
[parameter(Mandatory=$true)]
[string]$CollectionName,
[parameter(Mandatory=$true)]
[string]$ComputerName,
[parameter(Mandatory=$true)]
[string]$MACAddress
)
Set-ProgressBarValue -Value Increase
$CollectionQuery = Get-WmiObject -Namespace "Root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name='$($CollectionName)'"
$WMIClass = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_Site")
$NewEntry = $WMIClass.psbase.GetMethodParameters("ImportMachineEntry")
$NewEntry.MACAddress = $MACAddress
$NewEntry.NetbiosName = $ComputerName
$NewEntry.OverwriteExistingRecord = $True
$Resource = $WMIClass.psbase.InvokeMethod("ImportMachineEntry",$NewEntry,$null)
if ($Resource.ReturnValue -eq 0) {
Set-ProgressBarValue -Value Increase
Set-StatusBarText -Text "Imported machine entry to Configmgr"
$NewRule = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_CollectionRuleDirect").CreateInstance()
$NewRule.ResourceClassName = "SMS_R_SYSTEM"
$NewRule.ResourceID = $Resource.ResourceID
$NewRule.Rulename = $ResourceName
$AddMembership = $CollectionQuery.AddMemberShipRule($NewRule)
if ($AddMembership.ReturnValue -eq 0) {
Set-ProgressBarValue -Value Increase
Set-StatusBarText -Text "Added machine entry to collection"
}
else {
Set-ProgressBarValue -Value Maximum
Set-StatusBarText -Text "ERROR: Failed to add machine entry to collection"
}
}
else {
Set-ProgressBarValue -Value Maximum
Set-StatusBarText -Text "ERROR: Failed to import machine entry"
}
}
function Create-UDA {
param(
[parameter(Mandatory=$true)]
[string]$SiteServer,
[parameter(Mandatory=$true)]
[string]$SiteCode,
[parameter(Mandatory=$true)]
[string]$DeviceName,
[parameter(Mandatory=$true)]
[string]$UserName
)
$CMDeviceResourceID = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_R_System -ComputerName $SiteServer -Filter "Name like '$($DeviceName)'" | Select-Object -ExpandProperty ResourceID
$UserName = $UserName.Replace("\","\\")
$CMUserName = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_R_User -ComputerName $SiteServer -Filter "UniqueUserName like '%$($UserName)%'" | Select-Object -ExpandProperty Name
[int]$SourceId = 2
$WMIClass = [WmiClass]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_UserMachineRelationship"
$NewRelation = $WMIClass.psbase.GetMethodParameters("CreateRelationship")
$NewRelation.MachineResourceId = $CMDeviceResourceID
$NewRelation.SourceId = $SourceId
$NewRelation.TypeId = 1
$NewRelation.UserAccountName = $CMUserName
$Invoke = $WMIClass.psbase.InvokeMethod("CreateRelationship", $NewRelation, $null)
if ($Invoke.ReturnValue -eq 0) {
Set-ProgressBarValue -Value Increase
Set-StatusBarText -Text "Created UDA relationship"
}
else {
Set-ProgressBarValue -Value Maximum
Set-StatusBarText -Text "ERROR: Failed to create an UDA relationship"
}
}
function Update-CollectionMembership {
param(
[parameter(Mandatory=$true)]
[string]$SiteServer,
[parameter(Mandatory=$true)]
[string]$SiteCode,
[parameter(Mandatory=$true)]
[string]$CollectionName
)
$CollectionQuery = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($CollectionName)'" -ErrorAction SilentlyContinue
$Refresh = $CollectionQuery.RequestRefresh()
if ($Refresh.ReturnValue -eq 0) {
Set-StatusBarText -Text "Updated '$($CollectionName)' membership"
}
else {
Set-StatusBarText -Text "ERROR: Failed to update '$($CollectionName)'"
}
}
function Validate-Data {
if ($TextBoxPrimaryUser.Text.Length -ge 1) {
if (($TextBoxComputerName.Text.Length -le 15) -and ($TextBoxComputerName.Text.Length -ge 1) -and ($TextBoxMACAddress.Text -match ('^[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}$')) -and ($TextBoxPrimaryUser.Text.Length -ge 3) -and ($Global:PrimaryUserValidated -eq $true)) {
if ((Get-WmiObject -Namespace "root\SMS\site_$(Get-CMSiteCode)" -Class SMS_R_System -ComputerName $SiteServer -Filter "Name like '$($TextBoxComputerName.Text)'" -ErrorAction SilentlyContinue | Measure-Object).Count -eq 0) {
Set-StatusBarText -Text "Initiating"
Create-PrestagedComputer
}
else {
Error-Provider -Control $TextBoxComputerName -Property "Background" -Option Error
Set-StatusBarText -Text "ERROR: Computer name already exists"
}
}
else {
Set-StatusBarText -Text "ERROR: Incomplete form data submitted"
}
}
else {
if (($TextBoxComputerName.Text.Length -le 15) -and ($TextBoxMACAddress.Text -match ('^[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}$'))) {
Set-StatusBarText -Text "Initiating"
Create-PrestagedComputer
}
else {
Set-StatusBarText -Text "ERROR: Incomplete form data submitted"
}
}
}
function Create-PrestagedComputer {
Set-Controls -IsEnabled $false
New-CMComputer -SiteServer $SiteServer -SiteCode $(Get-CMSiteCode) -CollectionName $ComboBoxCMCollection.SelectedItem -ComputerName $TextBoxComputerName.Text -MACAddress $TextBoxMACAddress.Text
New-MDTComputer -MACAddress "$($TextBoxMACAddress.Text)" -Description "$($TextBoxComputerName.Text)" -OSDComputerName "$($TextBoxComputerName.Text)"
if ($Global:PrimaryUserValidated -eq $true) {
Create-UDA -SiteServer $SiteServer -SiteCode $(Get-CMSiteCode) -DeviceName $TextBoxComputerName.Text -UserName $TextBoxPrimaryUser.Text
}
Update-CollectionMembership -SiteServer $SiteServer -SiteCode $(Get-CMSiteCode) -CollectionName "All Systems"
Set-StatusBarText -Text "Prestage sequence completed"
Set-Controls -IsEnabled $true
}
$Global:PrimaryUserValidated = $null
[xml]$XAML = @"
<Window xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" Title="Prestage Computer 1.0.0" Height="453" Width="533" ResizeMode="NoResize">
<Grid>
<GroupBox x:Name="GroupBoxComputerName" Header="Computer Details (Required)" HorizontalAlignment="Left" Margin="10,10,0,0" VerticalAlignment="Top" Height="104" Width="498"/>
<GroupBox x:Name="GroupBoxMDTRole" Header="MDT Role (Required)" HorizontalAlignment="Left" Margin="10,193,0,0" VerticalAlignment="Top" Height="69" Width="498"/>
<GroupBox x:Name="GroupBoxCMCollection" Header="ConfigMgr Collection (Required)" HorizontalAlignment="Left" Margin="10,267,0,0" VerticalAlignment="Top" Height="69" Width="498"/>
<GroupBox x:Name="GroupBoxPrimaryUser" Header="Primary User (Optional)" HorizontalAlignment="Left" Margin="10,119,0,0" VerticalAlignment="Top" Height="69" Width="498"/>
<Button x:Name="ButtonCreate" Content="Create" HorizontalAlignment="Left" Margin="430,353,0,0" VerticalAlignment="Top" Width="75" RenderTransformOrigin="0.173,0.15" TabIndex="7"/>
<Button x:Name="ButtonPrimaryUserCheck" Content="Check" HorizontalAlignment="Left" Margin="340.333,147.33,0,0" VerticalAlignment="Top" Width="75" TabIndex="4"/>
<Button x:Name="ButtonClear" Content="Clear" HorizontalAlignment="Left" Margin="340,353,0,0" VerticalAlignment="Top" Width="75" TabIndex="8"/>
<TextBox x:Name="TextBoxComputerName" HorizontalAlignment="Left" Height="23" Margin="132.999,38.333,0,0" TextWrapping="Wrap" VerticalAlignment="Top" Width="190" ToolTip="Specify a computer name, maximum of 15 characters (Required)" TabIndex="1"/>
<TextBox x:Name="TextBoxMACAddress" HorizontalAlignment="Left" Height="23" Margin="132.999,69.333,0,0" TextWrapping="Wrap" VerticalAlignment="Top" Width="190" ToolTip="Specify a MAC address in the following format: 00:00:5C:E4:22:01 (Required)" TabIndex="2"/>
<TextBox x:Name="TextBoxPrimaryUser" HorizontalAlignment="Left" Height="23" Margin="133,146,0,0" TextWrapping="Wrap" VerticalAlignment="Top" Width="190" ToolTip="Specify a user name that will be associated with this computer (Optional)" TabIndex="3"/>
<Label x:Name="LabelComputerName" Content="Computer name:" HorizontalAlignment="Left" Margin="17.332,35.333,0,0" VerticalAlignment="Top" Width="101.333"/>
<Label x:Name="LabelMACAddress" Content="MAC Address:" HorizontalAlignment="Left" Margin="17.332,66.333,0,0" VerticalAlignment="Top"/>
<Label x:Name="LabelMDTRole" Content="Select role:" HorizontalAlignment="Left" Margin="20,219,0,0" VerticalAlignment="Top" Width="110" Height="28"/>
<Label x:Name="LabelCMCollection" Content="Select collection:" HorizontalAlignment="Left" Margin="20,293,0,0" VerticalAlignment="Top"/>
<Label x:Name="LabelPrimaryUser" Content="Primary User:" HorizontalAlignment="Left" Margin="18,144,0,0" VerticalAlignment="Top" Width="101"/>
<ComboBox x:Name="ComboBoxMDTRole" HorizontalAlignment="Left" Margin="135,221,0,0" VerticalAlignment="Top" Width="190" TabIndex="5"/>
<ComboBox x:Name="ComboBoxCMCollection" HorizontalAlignment="Left" Margin="135,294,0,0" VerticalAlignment="Top" Width="290" TabIndex="6"/>
<StatusBar x:Name="StatusBar" HorizontalAlignment="Left" Height="22" Margin="0,392,0,0" VerticalAlignment="Top" Width="529" BorderBrush="
<StatusBar.ItemsPanel>
<ItemsPanelTemplate>
<Grid>
<Grid.RowDefinitions>
<RowDefinition Height="*"/>
</Grid.RowDefinitions>
<Grid.ColumnDefinitions>
<ColumnDefinition Width="122"/>
<ColumnDefinition Width="Auto"/>
</Grid.ColumnDefinitions>
</Grid>
</ItemsPanelTemplate>
</StatusBar.ItemsPanel>
<StatusBarItem Margin="11,0,0,0">
<ProgressBar Name="ProgressBarItem" Value="0" Width="150" Height="12"/>
</StatusBarItem>
</StatusBar>
<Label x:Name="LabelStatusBar" Content="" HorizontalAlignment="Left" Margin="127,390,0,0" Width="300" Height="28" VerticalAlignment="Top" FontSize="11"/>
</Grid>
</Window>
"@
[void][System.Reflection.Assembly]::LoadWithPartialName("PresentationFramework")
$XAMLReader = New-Object -TypeName System.Xml.XmlNodeReader($XAML)
$SyncHash = [hashtable]::Synchronized(@{})
$SyncHash.Window = [Windows.Markup.XamlReader]::Load($XAMLReader)
$LabelComputerName = $SyncHash.LabelComputerName = $SyncHash.Window.FindName("LabelComputerName")
$LabelMACAddress = $SyncHash.LabelMACAddress = $SyncHash.Window.FindName("LabelMACAddress")
$LabelMDTRole = $SyncHash.LabelMDTRole = $SyncHash.Window.FindName("LabelMDTRole")
$LabelCMCollection = $SyncHash.LabelCMCollection = $SyncHash.Window.FindName("LabelCMCollection")
$LabelStatusBar = $SyncHash.LabelStatusBar = $SyncHash.Window.FindName("LabelStatusBar")
$TextBoxComputerName = $SyncHash.TextBoxComputerName = $SyncHash.Window.FindName("TextBoxComputerName")
$TextBoxMACAddress = $SyncHash.TextBoxMACAddress = $SyncHash.Window.FindName("TextBoxMACAddress")
$TextBoxPrimaryUser = $SyncHash.TextBoxPrimaryUser = $SyncHash.Window.FindName("TextBoxPrimaryUser")
$ButtonCreate = $SyncHash.ButtonCreate = $SyncHash.Window.FindName("ButtonCreate")
$ButtonClear = $SyncHash.ButtonClear = $SyncHash.Window.FindName("ButtonClear")
$ButtonPrimaryUserCheck = $SyncHash.ButtonPrimaryUserCheck = $SyncHash.Window.FindName("ButtonPrimaryUserCheck")
$ComboBoxMDTRole = $SyncHash.ComboBoxMDTRole = $SyncHash.Window.FindName("ComboBoxMDTRole")
$ComboBoxCMCollection = $SyncHash.ComboBoxCMCollection = $SyncHash.Window.FindName("ComboBoxCMCollection")
$StatusBar = $SyncHash.StatusBar = $SyncHash.Window.FindName("StatusBar")
$StatusBarProgressBarItem = $StatusBar.Items[0]
$StatusBarProgressBarItem.Content.Maximum = "6"
$StatusBarProgressBarItem.Content.Minimum = "0"
$ComboBoxMDTRole.MaxDropDownHeight = "245"
$ComboBoxCMCollection.MaxDropDownHeight = "245"
$ButtonCreateEvent = $ButtonCreate.Add_Click({
Validate-Data
})
$ButtonClearEvent = $ButtonClear.Add_Click({
Clear-Form
})
$ButtonPrimaryUserCheckEvent = $ButtonPrimaryUserCheck.Add_Click({
if ($TextBoxPrimaryUser.Text.Length -ge 1) {
Get-CMPrimaryUser -SiteServer $SiteServer -SiteCode $(Get-CMSiteCode) -UserName $TextBoxPrimaryUser.Text
}
})
$TextBoxComputerNameEvent = $TextBoxComputerName.Add_TextChanged({
if ($TextBoxComputerName.Text.Length -gt "15") {
Error-Provider -Control $TextBoxComputerName -Property "Background" -Option Error
Set-ToolTipText -Control $TextBoxComputerName -Property "ToolTip" -Text "ERROR: You can only enter a maximum of 15 characters"
}
else {
Error-Provider -Control $TextBoxComputerName -Property "Background" -Option Normal
Set-ToolTipText -Control $TextBoxComputerName -Property "ToolTip" -Text "Specify a computer name, maximum of 15 characters (Required)"
}
})
$TextBoxMACAddressEvent = $TextBoxMACAddress.Add_TextChanged({
if ($TextBoxMACAddress.Text -notmatch ('^[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}$')) {
Error-Provider -Control $TextBoxMACAddress -Property "Background" -Option Error
Set-ToolTipText -Control $TextBoxMACAddress -Property "ToolTip" -Text "ERROR: You need to enter a valid MAC Address in the correct format"
}
else {
Error-Provider -Control $TextBoxMACAddress -Property "Background" -Option Normal
Set-ToolTipText -Control $TextBoxMACAddress -Property "ToolTip" -Text "Specify a MAC address in the following format: 00:00:5C:E4:22:01 (Required)"
}
})
$TextBoxPrimaryUserEvent = $TextBoxPrimaryUser.Add_GotFocus({
if ($TextBoxPrimaryUser.Background.Color -like "
$TextBoxPrimaryUser.Background = "
Set-ToolTipText -Control $TextBoxPrimaryUser -Property "ToolTip" -Text "Specify a user name that will be associated with this computer (Optional)"
}
if ($ButtonPrimaryUserCheck.IsEnabled -eq $false) {
$ButtonPrimaryUserCheck.IsEnabled = $true
}
})
Load-Window |
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail.ps1 | Send-HTMLFormattedEmail.ps1 | #-------------------------------------------------
# Send-HTMLFormattedEmail
#-------------------------------------------------
# Usage: Used to display help information.
# **Parameters are not for interactive execution.**
#-------------------------------------------------
function Send-HTMLFormattedEmail{
param ( [string] $To,
[string] $ToDisName,
[string] $BCC,
[string] $From,
[string] $FromDisName,
[string] $Subject,
[string] $Content,
[string] $Relay,
[string] $XSLPath)
try {
# Load XSL Argument List
$XSLArg = New-Object System.Xml.Xsl.XsltArgumentList
$XSLArg.Clear()
$XSLArg.AddParam("To", $Null, $ToDisName)
$XSLArg.AddParam("Content", $Null, $Content)
# Load Documents
$BaseXMLDoc = New-Object System.Xml.XmlDocument
$BaseXMLDoc.LoadXml("<root/>")
$XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform
$XSLTrans.Load($XSLPath)
#Perform XSL Transform
$FinalXMLDoc = New-Object System.Xml.XmlDocument
$MemStream = New-Object System.IO.MemoryStream
$XMLWriter = [System.Xml.XmlWriter]::Create($MemStream)
$XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter)
$XMLWriter.Flush()
$MemStream.Position = 0
# Load the results
$FinalXMLDoc.Load($MemStream)
$Body = $FinalXMLDoc.Get_OuterXML()
# Create from, To, BCC and the message strucures
$MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName
$MessTo = New-Object System.Net.Mail.Mailaddress $To
$MessBCC = New-Object System.Net.Mail.Mailaddress $BCC
$Message = New-Object System.Net.Mail.MailMessage $MessFrom, $MessTo
# Populate message
$Message.Subject = $Subject
$Message.Body = $Body
$Message.IsBodyHTML = $True
# Add BCC
$Message.BCC.Add($MessBCC)
# Create SMTP Client
$Client = New-Object System.Net.Mail.SmtpClient $Relay
# Send The Message
$Client.Send($Message)
}
catch {
return $Error[0]
}
}
### XSLT Template Example
<?xml version="1.0"?>
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:output media-type="xml" omit-xml-declaration="yes" />
<xsl:param name="To"/>
<xsl:param name="Content"/>
<xsl:template match="/">
<html>
<head>
<title>My First Formatted Email</title>
</head>
<body>
<div width="400px">
<p>Dear <xsl:value-of select="$To" />,</p>
<p></p>
<p><xsl:value-of select="$Content" /></p>
<p></p>
<p><strong>Please do not respond to this email!</strong><br />
An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p>
<p></p>
<Address>
Many thanks from your:<br />
Really Cool IT Team<br />
</Address>
</div>
</body>
</html>
</xsl:template>
</xsl:stylesheet>
|
combined_dataset/train/non-malicious/sample_24_43.ps1 | sample_24_43.ps1 | #
# Module manifest for module 'OCI.PSModules.Vulnerabilityscanning'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vulnerabilityscanning.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '3a30f199-7c6d-48cf-8a14-f4fa8ff17785'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vulnerabilityscanning Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vulnerabilityscanning.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIVulnerabilityscanningHostAgentScanResultCsv',
'Export-OCIVulnerabilityscanningHostVulnerabilityCsv',
'Get-OCIVulnerabilityscanningContainerScanRecipe',
'Get-OCIVulnerabilityscanningContainerScanRecipesList',
'Get-OCIVulnerabilityscanningContainerScanResult',
'Get-OCIVulnerabilityscanningContainerScanResultsList',
'Get-OCIVulnerabilityscanningContainerScanTarget',
'Get-OCIVulnerabilityscanningContainerScanTargetsList',
'Get-OCIVulnerabilityscanningHostAgentScanResult',
'Get-OCIVulnerabilityscanningHostAgentScanResultsList',
'Get-OCIVulnerabilityscanningHostCisBenchmarkScanResult',
'Get-OCIVulnerabilityscanningHostCisBenchmarkScanResultsList',
'Get-OCIVulnerabilityscanningHostEndpointProtectionScanResult',
'Get-OCIVulnerabilityscanningHostEndpointProtectionScanResultsList',
'Get-OCIVulnerabilityscanningHostPortScanResult',
'Get-OCIVulnerabilityscanningHostPortScanResultsList',
'Get-OCIVulnerabilityscanningHostScanRecipe',
'Get-OCIVulnerabilityscanningHostScanRecipesList',
'Get-OCIVulnerabilityscanningHostScanTarget',
'Get-OCIVulnerabilityscanningHostScanTargetErrorsList',
'Get-OCIVulnerabilityscanningHostScanTargetsList',
'Get-OCIVulnerabilityscanningHostVulnerabilitiesList',
'Get-OCIVulnerabilityscanningHostVulnerability',
'Get-OCIVulnerabilityscanningHostVulnerabilityImpactedHostsList',
'Get-OCIVulnerabilityscanningVulnerabilitiesList',
'Get-OCIVulnerabilityscanningVulnerability',
'Get-OCIVulnerabilityscanningVulnerabilityImpactedContainersList',
'Get-OCIVulnerabilityscanningVulnerabilityImpactedHostsList',
'Get-OCIVulnerabilityscanningWorkRequest',
'Get-OCIVulnerabilityscanningWorkRequestErrorsList',
'Get-OCIVulnerabilityscanningWorkRequestLogsList',
'Get-OCIVulnerabilityscanningWorkRequestsList',
'Move-OCIVulnerabilityscanningContainerScanRecipeCompartment',
'Move-OCIVulnerabilityscanningContainerScanResultCompartment',
'Move-OCIVulnerabilityscanningContainerScanTargetCompartment',
'Move-OCIVulnerabilityscanningHostAgentScanResultCompartment',
'Move-OCIVulnerabilityscanningHostCisBenchmarkScanResultCompartment',
'Move-OCIVulnerabilityscanningHostEndpointProtectionScanResultCompartment',
'Move-OCIVulnerabilityscanningHostPortScanResultCompartment',
'Move-OCIVulnerabilityscanningHostScanRecipeCompartment',
'Move-OCIVulnerabilityscanningHostScanTargetCompartment',
'New-OCIVulnerabilityscanningContainerScanRecipe',
'New-OCIVulnerabilityscanningContainerScanTarget',
'New-OCIVulnerabilityscanningHostScanRecipe',
'New-OCIVulnerabilityscanningHostScanTarget',
'Remove-OCIVulnerabilityscanningContainerScanRecipe',
'Remove-OCIVulnerabilityscanningContainerScanResult',
'Remove-OCIVulnerabilityscanningContainerScanTarget',
'Remove-OCIVulnerabilityscanningHostAgentScanResult',
'Remove-OCIVulnerabilityscanningHostCisBenchmarkScanResult',
'Remove-OCIVulnerabilityscanningHostEndpointProtectionScanResult',
'Remove-OCIVulnerabilityscanningHostPortScanResult',
'Remove-OCIVulnerabilityscanningHostScanRecipe',
'Remove-OCIVulnerabilityscanningHostScanTarget',
'Update-OCIVulnerabilityscanningContainerScanRecipe',
'Update-OCIVulnerabilityscanningContainerScanTarget',
'Update-OCIVulnerabilityscanningHostScanRecipe',
'Update-OCIVulnerabilityscanningHostScanTarget'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vulnerabilityscanning'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_38_18.ps1 | sample_38_18.ps1 | #
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
#Helper functions for PackageManagement DSC Resouces
Import-LocalizedData -BindingVariable LocalizedData -filename PackageManagementDscUtilities.strings.psd1
Function ExtractArguments
{
<#
.SYNOPSIS
This is a helper function that extract the parameters from a given table.
.PARAMETER FunctionBoundParameters
Specifies the hashtable containing a set of parameters to be extracted
.PARAMETER ArgumentNames
Specifies A list of arguments you want to extract
#>
Param
(
[parameter(Mandatory = $true)]
[System.Collections.Hashtable]
$FunctionBoundParameters,
#A list of arguments you want to extract
[parameter(Mandatory = $true)]
[System.String[]]$ArgumentNames
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$returnValue=@{}
foreach ($arg in $ArgumentNames)
{
if($FunctionBoundParameters.ContainsKey($arg))
{
#Found an argument we are looking for, so we add it to return collection
$returnValue.Add($arg,$FunctionBoundParameters[$arg])
}
}
return $returnValue
}
function ThrowError
{
<#
.SYNOPSIS
This is a helper function that throws an error.
.PARAMETER ExceptionName
Specifies the type of errors, e.g. System.ArgumentException
.PARAMETER ExceptionMessage
Specifies the exception message
.PARAMETER ErrorId
Specifies an identifier of the error
.PARAMETER ErrorCategory
Specifies the error category, e.g., InvalidArgument defined in System.Management.Automation.
#>
param
(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ExceptionName,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ExceptionMessage,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ErrorId,
[parameter(Mandatory = $true)]
[ValidateNotNull()]
[System.Management.Automation.ErrorCategory]
$ErrorCategory
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$exception = New-Object -TypeName $ExceptionName -ArgumentList $ExceptionMessage;
$errorRecord = New-Object -TypeName System.Management.Automation.ErrorRecord -ArgumentList ($exception, $ErrorId, $ErrorCategory, $null)
throw $errorRecord
}
Function ValidateArgument
{
<#
.SYNOPSIS
This is a helper function that validates the arguments.
.PARAMETER Argument
Specifies the argument to be validated.
.PARAMETER Type
Specifies the type of argument.
#>
[CmdletBinding()]
param
(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[string]$Argument,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[String]$Type,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[String]$ProviderName
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
switch ($Type)
{
"SourceUri"
{
# Checks whether given URI represents specific scheme
# Most common schemes: file, http, https, ftp
$scheme =@('http', 'https', 'file', 'ftp')
$newUri = $Argument -as [System.URI]
$returnValue = ($newUri -and $newUri.AbsoluteURI -and ($scheme -icontains $newuri.Scheme))
if ($returnValue -eq $false)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.InValidUri -f $Argument)`
-ErrorId "InValidUri" `
-ErrorCategory InvalidArgument
}
#Check whether it's a valid uri. Wait for the response within 2mins.
<#$result = Invoke-WebRequest $newUri -TimeoutSec 120 -UseBasicParsing -ErrorAction SilentlyContinue
if ($null -eq (([xml]$result.Content).service ))
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.InValidUri -f $Argument)`
-ErrorId "InValidUri" `
-ErrorCategory InvalidArgument
}#>
}
"DestinationPath"
{
$returnValue = Test-Path -Path $Argument
if ($returnValue -eq $false)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.PathDoesNotExist -f $Argument)`
-ErrorId "PathDoesNotExist" `
-ErrorCategory InvalidArgument
}
}
"PackageSource"
{
#Argument can be either the package source Name or source Uri.
#Check if the source is a uri
$uri = $Argument -as [System.URI]
if($uri -and $uri.AbsoluteURI)
{
# Check if it's a valid Uri
ValidateArgument -Argument $Argument -Type "SourceUri" -ProviderName $ProviderName
}
else
{
#Check if it's a registered package source name
$source = PackageManagement\Get-PackageSource -Name $Argument -ProviderName $ProviderName -verbose -ErrorVariable ev
if ((-not $source) -or $ev)
{
#We do not need to throw error here as Get-PackageSource does already
Write-Verbose -Message ($LocalizedData.SourceNotFound -f $source)
}
}
}
default
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.UnexpectedArgument -f $Type)`
-ErrorId "UnexpectedArgument" `
-ErrorCategory InvalidArgument
}
}
}
Function ValidateVersionArgument
{
<#
.SYNOPSIS
This is a helper function that does the version validation.
.PARAMETER RequiredVersion
Provides the required version.
.PARAMETER MaximumVersion
Provides the maximum version.
.PARAMETER MinimumVersion
Provides the minimum version.
#>
[CmdletBinding()]
param
(
[string]$RequiredVersion,
[string]$MinimumVersion,
[string]$MaximumVersion
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$isValid = $false
#Case 1: No further check required if a user provides either none or one of these: minimumVersion, maximumVersion, and requiredVersion
if ($PSBoundParameters.Count -le 1)
{
return $true
}
#Case 2: #If no RequiredVersion is provided
if (-not $PSBoundParameters.ContainsKey('RequiredVersion'))
{
#If no RequiredVersion, both MinimumVersion and MaximumVersion are provided. Otherwise fall into the Case #1
$isValid = $PSBoundParameters['MinimumVersion'] -le $PSBoundParameters['MaximumVersion']
}
#Case 3: RequiredVersion is provided.
# In this case MinimumVersion and/or MaximumVersion also are provided. Otherwise fall in to Case #1.
# This is an invalid case. When RequiredVersion is provided, others are not allowed. so $isValid is false, which is already set in the init
if ($isValid -eq $false)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.VersionError)`
-ErrorId "VersionError" `
-ErrorCategory InvalidArgument
}
}
Function Get-InstallationPolicy
{
<#
.SYNOPSIS
This is a helper function that retrives the InstallationPolicy from the given repository.
.PARAMETER RepositoryName
Provides the repository Name.
#>
Param
(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]$RepositoryName
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$repositoryobj = PackageManagement\Get-PackageSource -Name $RepositoryName -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
if ($repositoryobj)
{
return $repositoryobj.IsTrusted
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+xe8u4YoS6UEO
# jtW70wceL89huvuluOvdcbeefpOXLqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAmdiucWytu7com6rTFeQB6c
# jTe5Tct5wjRGfoLIQj7QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAKoJP29OZAqpJXYHseo8li4dAoHWDrOcKQHxfYPs2Q7RUcg0XP2HJbFOX
# kZCW5D4W3KBuB58Yhs7fGUzQ8uJCpuR92+rYPKBSvBHuefoadthRQZE8EvdqDZAH
# VYG66OTBuKedC9xz8R8aPpeYjvDSmmBHwmnF9z7ZryghcimVBNVoLNIkqgWaHpKY
# lIIwBPN8NKVEpi5zaED7kjTL1606ggi/iOvucZ6S6zF+48fWBxtS4W7V+cwgXSqV
# TVDF2D/l9tQjC6+o0Q9g1JelzbFt1qWxueRL45U/Xoi84OjVFc5fCdhrc+1jQk1h
# 2jxGgUxmvSBwbJT4hkYM/CfcSH+wGaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDBbuzLfbrR9g00MvLhW3Cs7WuMHDbYi4uqB2lYsEBV4gIGZc5B3/1L
# GBMyMDI0MDIyMDE4MTg0MC43NjdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X9XxjAiGA8yMDI0MDIyMDE2NTQz
# MFoYDzIwMjQwMjIxMTY1NDMwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpf1fG
# AgEAMAoCAQACAhhSAgH/MAcCAQACAhNXMAoCBQDpgKlGAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBADkFtYKSKm2tzHpXFD996RrsrTUdk+NUljLlF66kyqSV
# 6mfKf0LB2MlaoRGW7eQ0cO7l494CreBV7LSCkx7PL19a3yY0z1E0rcrVWorBij6d
# IBm2KeL6ifRRGWcgs9qha/CsUvlLai9Mz177/hd9Ellz39ESC65qN3U+d3uJQeMc
# 8knaflZZKHq6bBcG/Tu/U/owFI2VQjVgj8Ws2vZEpx+XIeIPogbt/56d6YV7iV/S
# E75gMLfrGwSwW3iUhlYCvN4JcZWp/goOVLar11wYyWSlsaIHAcuIDtZ3a/gefgh3
# U9TnH7fk21/iZ9Vi750Qeu8W5WAbz5R6EEzG6xaQeyoxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB
# 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCB86MvySKC8LwGYJvVpksWuvPNh4+iESTy/EASRUQ2Z
# 5DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb
# HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgbRdm3FaKs10/o8c2mekMoaTc
# o0BQFeOGFPnOw9F4/dkwDQYJKoZIhvcNAQELBQAEggIAu0zfQgP8VIBTJCLzE4wL
# QAZrGuOYv8bSLHOlnevtRRBMNtIwGoy4UP/rPKvkxA1ISzLBwhW9MPQH0Wx2Ql0V
# iYO1op0RbNucAyClK0/7PlTpcfAcy4MRhLXpr9UOxH7DeiA0b+nfaWMRCB3Psstj
# jIC0Dwcikev1p5twHwsQVNg/asuWpz5FNZCRRvIQOLFqC5CltUrcCek4sMOwXABm
# 9b384MMRC9v2SvjmjE6TRIKepmPxSgSkSbMXxtTj9qm0EO5py9t0mwU3RiJAzGfo
# tfvcd96SDrr/aYLZVlUCp7u/zZZbQQ+dfFYUh0yE1qf/b2iaJo1zztTc/GcpHZly
# kdWdE7e/zGpnYeE+OBPJwXxPhtyzMFzJ6p7EjyqRDRDBzK15ywZ1i5V8jWXZ+qVJ
# +ld4yTwoKsBn+6epHqWog3CMnIY6MyIIwRQrGv0qAGLOYLJoEiMXSNCwCaBbnxJQ
# fPvSdHK+F0lrCrpu6zM97EY+XGNRVworEzDP2EqRZFj0A+Hi/bF8EkgO0nNaZ0Pz
# ctdIrzlFNXdelRDhj5XiKeG1Nrj1rGGAWW9cwuC7kkQ6cZ2CD9Rbk/sDxdhl0X5N
# r75nv8QPOdrXQUWudDDQfbA0asgHaPRUbGw9lQ9mTHsaOZSffh2mVvexke5Qr8NR
# k7r/hY7DN83Tahyp3m4Mw3o=
# SIG # End signature block
|
combined_dataset/train/non-malicious/usr mailbox in exch 07.ps1 | usr mailbox in exch 07.ps1 | #Generamos los usuarios por buzon y comprimimos el resultado
#Autor: Pedro Genil
#Fecha: 2012/11/21
#Version: 1.0
# Aþadimos modulo
If ((Get-PSSnapin | where {$_.Name -match "Exchange.Management"}) -eq $null)
{
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin
}
# Creamos el alias para el 7zip
if (-not (test-path "$env:ProgramFiles\\7-Zip\\7z.exe")) {throw "$env:ProgramFiles\\7-Zip\\7z.exe needed"}
set-alias sz "$env:ProgramFiles\\7-Zip\\7z.exe"
#Directorios
$filePath = 'F:\\Scripts\\users_Acount\\'
$fecha = get-date
$fecha= $fecha.toString("yyyyMMdd")
$filedate = $fecha
$info = Get-Mailbox -resultsize unlimited -ignoredefaultscope |select database,displayname,samaccountname,PrimarySmtpAddress,EmailAddresses -expandproperty EmailAddresses | out-file F:\\Scripts\\users_Acount\\$filedate.txt
$files = Get-ChildItem -Recurse -Path $filePath | Where-Object { $_.name -eq "$fecha.txt" }
#Cogemos el fichero , y creamos el zip
sz a "F:\\Scripts\\users_Acount\\$fecha.zip" "$filepath\\$files"
#Borramos el txt
remove-item "F:\\Scripts\\users_Acount\\$filedate.txt"
#foreach ($file in $files)
#{
# $name = $file.name
# $directory = $file.DirectoryName
# sz a "F:\\Scripts\\users_Acount\\$zipfile.zip" "$directory\\$name"
#}
|
combined_dataset/train/non-malicious/sample_12_99.ps1 | sample_12_99.ps1 | ConvertFrom-StringData @'
id_sql_collectsqlerrorlogs=SQL Server Errorlogs
id_sql_collectsqlerrorlogsdesc=Collecting SQL Server Errorlogs for instance
id_sql_collectsqlagentlogs=SQL Server Agent Logs
id_sql_collectsqlagentlogsdesc=Collecting SQL Server Agent logs for instance
id_sql_setup_collect_writer_logs=Collecting SQL SqlWriterLogger Logs
id_sql_writer_collect_2019_logs=Collecting SQL 2019 SqlWriterLogger Logs
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAzfdSS9/nO9jno
# FLwZdS18MyX4arwE6EzqhmB7sLCiVKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFVK
# rF1n0DMEFbgXz/OyllBQjq5QdUosjGDU2EOKl51fMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAfXZzn9Llr17Rh1RLptW5NBA0XwphULI2GJ/M
# W/DsOBRJA72IijO1YhfwMS1KyEXRoqnP0qwnmXzJmDcm5FgZLQuHQVhzoHYG9+IV
# lUEZ2fP6txY88ti+WCTMBVdgx98SHBggE0Ajdj3I8dcCMIhfLgzWTsdY7FQb/+Vl
# QCvhdRA7TYr2yCdhJ2Crj72+bDxZfe22IPJCVLgwtuaYVgMZFvi5vWUbgot4a3Sr
# aHpEmGSf+XT5qV2NjQlf9sRF4rBzLFpQa7kpqznYsZ0c+qLrvalg0sNwCSDkrMNf
# Zm/g7755PWFB+/NUXOCw6FPCYHdEXq0Tq1ZQz+c6yd2GHal5k6GCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC+UnnMoHJQoT/WAWbM8tkhDcB9KHg4cTW6
# 6VPEJyyomgIGZutwxmXEGBMyMDI0MTAyODExNDA0MS4yMTVaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF
# WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP
# AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF
# s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX
# ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL
# Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN
# gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m
# r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB
# BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp
# vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr
# OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI
# +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP
# Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri
# LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi
# mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV
# liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ
# dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L
# tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u
# EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US
# LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq
# 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu
# 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100
# DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0
# MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA
# AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b
# zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC
# K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga
# wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46
# vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW
# YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgYrGNeMwuE89grZiRAFISYY/wlWrHuPD/qNC5eZZgGW0wgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq
# Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC
# AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf
# HyoaMA0GCSqGSIb3DQEBCwUABIICADr6jsD61QK9zWjxEAZaPZY+O17Gx96x8j3v
# wf4Z6vxi2b/F3VwaOMdIlWG/U+iXdB62BLT2Ny0bwSaA4FVWTC8XCkr4bStE/bVe
# 9Xd8gtAvsns+c3H7TlBD+Krz+so/+zTuiIGZj2r/9rS+PZoAEgX5ypQEaPdLbF2J
# lMV4Gau9tAOyI2bk+fnpdR9YxTzQvzEXjsTolUmzaFcLcyhc0W82coobWfCQGykN
# 2fLG4wfpbJd+HVcxNfNrTxCnnIznk6RBuM0vlKlHvcnTpQGz05SkIvRXCQBq77Jc
# mCSDFDgkAZia6cpGPX+EqLmk8DdpA3Ud/bUo/Ox7fs8E9XQQ67ij16BKuMx1G0wB
# hFqDQQw0QQMOue69Q7i84iI5bJV3CfA5suqW98m0MiS71gWGP+DwQZ+v+BSl7Lh1
# QrkTP/9ZQ3XLByZtW8B7DitWknUU0/Tc7whED/zh9y016aCn/xWV1L0NmWhl3vxj
# NcI3eowi4G4tREF3GatffOXr00IaDSInAu4iDxOK8jr4wQSD/bkg3xtOEgTjOdhJ
# UwBueKjv5/GEaOFGX2DQquVW6XPSshpfJslJ8Zsse8cpcrmX/x2iPJJQdinWzOqT
# NQLyuYyHDc+mC5uAWRdpzLo4NvGnTynYbV1zEY2YnhHjYqqNYDgz0Q1mLpxv5Qk+
# Rfd9QdEc
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_5_12.ps1 | sample_5_12.ps1 | #************************************************
# TS_DetectWeakKeys.ps1
# Version 1.0.1
# Date: 8/6/2012
# Author: tspring
# Description: [Idea ID 5009] [Windows] Weak Key Block Detection
# Rule number: 5009
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=5009
# This rule looks at all certificates in the "My" stores and if they have RSA keys less than 1024 length the problem is detected.
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_DetectWeakKeysCertTitle `
-Status $ScriptStrings.ID_DetectWeakKeysCertDesc
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_DetectWeakKeys"
$PublicContent = "http://blogs.technet.com/b/pki/archive/2012/06/12/rsa-keys-under-1024-bits-are-blocked.aspx"
$InternalContent = ""
$Verbosity = "Error"
$Visibility = "4"
$SupportTopicsID = "18568"
$Title = $ScriptStrings.ID_DetectWeakKeys_ST
$IssueDetected = $false
$InformationCollected = new-object PSObject
$CheckStores = @("My", "CA", "Root")
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
[int]$sp = [int]$wmiOSVersion.ServicePackMajorVersion
#$OSVer = Get-CimInstance -Class Win32_OperatingSystem
#$bn = $OSVer.BuildNumber
#$sp = $OSVer.ServicePackMajorVersion
"Build number is $bn" | WriteTo-StdOut -ShortFormat
"SP level is $sp" | WriteTo-StdOut -ShortFormat
"Script is running." | WriteTo-StdOut -ShortFormat
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
$HotfixInstalled = $false
"Within AppliesToSystem function" | WriteTo-StdOut -ShortFormat
switch -exact ($bn){
"2600" {"In Windows XP switch." | WriteTo-StdOut -ShortFormat
if (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 5 131 2600 6239)
{$HotfixInstalled = $true}
}
"3790" { "In Windows Server 2003 switch." | WriteTo-StdOut -ShortFormat
$Proc = Get-CimInstance -class "Win32_Processor" -property "AddressWidth"
if ($Proc.AddressWidth -eq 32)
{if (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 5 131 3790 5014)
{$HotfixInstalled = $true}
}
if ($Proc.AddressWidth -eq 64)
{ if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 5 131 3790 5014) -and (CheckMinimalFileVersion "$System32Folder\WCrypt32.dll" 5 131 3790 5014))
{$HotfixInstalled = $true}
}
}
"6002" { "In Windows Server 2008 RTM switch." | WriteTo-StdOut -ShortFormat
if ($sp -eq 1)
{if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll.mui" 6 0 6002 18643) -and (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 6 0 6002 18643) -and (CheckMinimalFileVersion "$System32Folder\Cryptnet.dll" 6 0 6002 18643) -and (CheckMinimalFileVersion "$System32Folder\Cryptsvc.dll" 6 0 6002 18643))
{$HotfixInstalled = $true}
}
if($sp -eq 2)
{if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll.mui" 6 0 6002 22869) -and (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 6 0 6002 22869) -and (CheckMinimalFileVersion "$System32Folder\Cryptnet.dll" 6 0 6002 22869) -and (CheckMinimalFileVersion "$System32Folder\Cryptsvc.dll" 6 0 6002 22869))
{$HotfixInstalled = $true}
}
}
"7600" { "In Windows Server 2008 R2 switch." | WriteTo-StdOut -ShortFormat
if ($sp -eq 1)
{if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll.mui" 6 1 7600 17035) -and (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 6 1 7600 17035) -and (CheckMinimalFileVersion "$System32Folder\Cryptnet.dll" 6 1 7600 17035) -and (CheckMinimalFileVersion "$System32Folder\Cryptsvc.dll" 6 1 7600 17035))
{$HotfixInstalled = $true}
}
if($sp -eq 2)
{if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll.mui" 6 1 7600 21225) -and (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 6 1 7600 21225) -and (CheckMinimalFileVersion "$System32Folder\Cryptnet.dll" 6 1 7600 21225) -and (CheckMinimalFileVersion "$System32Folder\Cryptsvc.dll" 6 1 7600 21225))
{$HotfixInstalled = $true}
}
}
"7601" { "In Windows Server 2008 R2 switch." | WriteTo-StdOut -ShortFormat
if ($sp -eq 1)
{if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll.mui" 6 1 7601 17856) -and (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 6 1 7601 17856) -and (CheckMinimalFileVersion "$System32Folder\Cryptnet.dll" 6 1 7601 17856) -and (CheckMinimalFileVersion "$System32Folder\Cryptsvc.dll" 6 1 7601 17856))
{$HotfixInstalled = $true}
}
if($sp -eq 2)
{if ((CheckMinimalFileVersion "$System32Folder\Crypt32.dll.mui" 6 1 7601 22010) -and (CheckMinimalFileVersion "$System32Folder\Crypt32.dll" 6 1 7601 22010) -and (CheckMinimalFileVersion "$System32Folder\Cryptnet.dll" 6 1 7601 22010) -and (CheckMinimalFileVersion "$System32Folder\Cryptsvc.dll" 6 1 7601 22010))
{$HotfixInstalled = $true}
}
}
"9200" {
#Windows 8 and Server 2012 comes with this out of box.
$HotfixInstalled = $true
"In Windows 8 switch." | WriteTo-StdOut -ShortFormat
}
"9600" {
#Windows 8 and Server 2012 comes with this out of box.
$HotfixInstalled = $true
"In Windows 8.1 switch." | WriteTo-StdOut -ShortFormat
}
[default] {WriteTo-StdOut "[info]: Hotfix check default for switch." -shortformat }
}
if ($HotfixInstalled -eq $true)
{return $True}
else
{return $false}
}
if (AppliesToSystem)
{#Set date to exclude expired certificates from being detected as the problem.
$Now = Get-Date
$Certindex = 0
$DetectedCertList = @()
$GetReg = Get-ItemProperty -Path Registry::"HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\OID\EncodingType 0\CertDLLCreateCertificateChainEngine\Config"
$WeakSigFlagRegVal = $GetReg.EnableWeakSignatureFlags
$CheckStores = @("My", "CA", "Root")
get-childitem -path cert:\ -recurse | Where-Object {($_.PSParentPath -ne $null) -and ($_.PublicKey.Key.Keysize -le 1023) -and `
($_.PublicKey.Oid.Value -eq '1.2.840.113549.1.1.1') -and ($CheckStores -contains (Split-Path ($_.PSParentPath) -Leaf)) -and `
($_.IssuerName.Name -ne "CN=Root Agency") -and (-not($_.NotAfter -lt $Now)) -and (-not($_.NotBefore -gt $Now)) } | ForEach-Object {
$Store = (Split-Path ($_.PSParentPath) -Leaf)
$StorePath = (($_.PSParentPath).Split("\"))
$InformationCollected = new-object PSObject
$StoreWorkingContext = $Store
$StoreContext = Split-Path $_.PSParentPath.Split("::")[-1] -Leaf
add-member -inputobject $InformationCollected -membertype noteproperty -name "Security Fix Installed" -value "True"
if ($WeakSigFlagRegVal -eq 2)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Registry Setting" -value "Use of weak RSA Root certificates Allowed" }
elseif ($WeakSigFlagRegVal -eq 8)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Registry Setting" -value "Use of all weak key certificates Allowed"}
elseif ($WeakSigFlagRegVal -eq $null)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Registry Setting" -value "Use of weak key certificates Prohibited"}
if ($_.FriendlyName.length -gt 0)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Friendly Name" -value $_.FriendlyName}
else
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Friendly Name" -value "[None]"}
#Determine the context (User or Computer) of the certificate store.
$StoreWorkingContext = (($_.PSParentPath).Split("\"))
$StoreContext = ($StoreWorkingContext[1].Split(":"))
add-member -inputobject $InformationCollected -membertype noteproperty -name "Path" -value $StoreContext[2]
add-member -inputobject $InformationCollected -membertype noteproperty -name "Store" -value $StorePath[$StorePath.count-1]
add-member -inputobject $InformationCollected -membertype noteproperty -name "Has Private Key" -value $_.HasPrivateKey
add-member -inputobject $InformationCollected -membertype noteproperty -name "Serial Number" -value $_.SerialNumber
add-member -inputobject $InformationCollected -membertype noteproperty -name "Thumbprint" -value $_.Thumbprint
add-member -inputobject $InformationCollected -membertype noteproperty -name "Issuer" -value $_.IssuerName.Name
add-member -inputobject $InformationCollected -membertype noteproperty -name "Not Before" -value $_.NotBefore
add-member -inputobject $InformationCollected -membertype noteproperty -name "Not After" -value $_.NotAfter
add-member -inputobject $InformationCollected -membertype noteproperty -name "Subject Name" -value $_.SubjectName.Name
add-member -inputobject $InformationCollected -membertype noteproperty -name "Public Key Name" -value $_.PublicKey.Oid.FriendlyName
add-member -inputobject $InformationCollected -membertype noteproperty -name "Public Key OID" -value $_.PublicKey.Oid.Value
add-member -inputobject $InformationCollected -membertype noteproperty -name "Public Key Size" -value $_.PublicKey.Key.Keysize
if (($_.Extensions | Where-Object {$_.Oid.FriendlyName -match "subject alternative name"}) -ne $null)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Subject Alternative Name" -value ($_.Extensions | Where-Object {$_.Oid.FriendlyName -match "subject alternative name"}).Format(1)
}
else
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Subject Alternative Name" -value "[None]"}
if (($_.Extensions | Where-Object {$_.Oid.FriendlyName -like "Key Usage"}) -ne $null)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Key Usage" -value ($_.Extensions | Where-Object {$_.Oid.FriendlyName -like "Key Usage"}).Format(1)
}
else
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Key Usage" -value "[None]"}
if (($_.Extensions | Where-Object {$_.Oid.FriendlyName -like "Enhanced Key Usage"}) -ne $null)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Enhanced Key Usage" -value ($_.Extensions | Where-Object {$_.Oid.FriendlyName -like "Enhanced Key Usage"}).Format(1)
}
else
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Enhanced Key Usage" -value "[None]"}
if (($_.Extensions | Where-Object {$_.Oid.FriendlyName -match "Certificate Template Information"}) -ne $null)
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Certificate Template Information" -value ($_.Extensions | Where-Object {$_.Oid.FriendlyName -match "Certificate Template Information"}).Format(1)
}
else
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Certificate Template Information" -value "[None]"}
if (($InformationCollected."Public Key Size" -le "1023") -and ($InformationCollected."Public Key Size" -ne $null) -and ($InformationCollected."Public Key OID" -eq "1.2.840.113549.1.1.1"))
{add-member -inputobject $InformationCollected -membertype noteproperty -name "Problem Detected" -value $True
if ($InformationCollected."Problem Detected" -eq $True)
{$IssueDetected = $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title -MessageVersion 2
}
$InformationCollected
}
$InformationCollected = $null
}
}
# *********************
# Root Cause processing
# *********************
if ($IssueDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDdtGrgAQgM1xSJ
# FofLLG0423zIFfS8xVW2+6LjJQEioKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFMw
# 06Ze5NgxThfHnOUYX3ujUeyycO1mjiOoXOG9XsLdMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAI8ryIOdRls7WSyYOkobCz0Qs7mUP/f28LgHH
# fnSStqTdJ3owQvfEvwzcHcTELF9/vk1RnseFbRzcM5JHmCsZqi6IUqsKNxz/3vvY
# vaGlkOou4A1LEbiBF8IBHL2ZtNzZcSJEI26umxEBuIjsuRK7OXbsAyezWL89XtxO
# zc9qHc2/BQcjNh8Gm3AwXH+JV3nZdaVPnlCgZdJKxVBEyOoldmYGI+VluMF3Kbs0
# tCvRM55M0IyFjrpMFShMVoTyBZLxEE6OfK49oL8wFoWBK0EBYQ1TD/jK3A6dPUWA
# oQSe2LcN7wObmrsWzmp+unPqCdVWxwQxzVAwOy0PXCqhLMLEQqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC2FxGISKGv+vqNcmU8gtynNsw7NNN4qKKd
# 06k4felaXQIGZutTTeO/GBMyMDI0MTAyODExNDA0MC4zMTFaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7
# RNN3M8bTAAEAAAH6MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQzMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yhZVBM3PZcBfEpAf7fIIhygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpG
# yDGX+EbCbHhS5Td4J0Ylc83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJd
# enpQ6UciM4nMYZvdQjybA4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ4
# 5oQIp7Sx57RPQ/0O6qayJ2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVK
# rRV5YelRvWNTg1pH4EC2KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah
# 14t7Yk+xl5P4Tw3xfAGgHsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1
# NroJKwBCW11Pwi0z/ki90ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7L
# k0Z/pATRwAINqwdvzpdtX2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8p
# SwGewrffwgAbNKm82ZDFvqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbN
# h5tDv3GeJ3EKvC4vNSAxtGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG
# 3zcsYHaa4+w+YmMrhTEzD4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRjjHKbL5WV6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAuFbCorFrvodG+ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xW
# dL1kygaW5BOZ3xBlPY7Vpuf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJf
# UQRThDL4zxI2pYc1wnPp7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yat
# cm4kBqIH6db1+weM4q46NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJS
# KcJ3nMVyfNlnv6yvttYzLK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0V
# CM11rHM11ZmN0euJbbBCVfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6
# CqLKjtHSoeoAGPeeX24f5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRs
# tZajbYEeX/N7RvSbkn0djD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M
# 0TKOduihhKxAt/6Yyk17Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe
# 5N0e4HWFf8WW2ZL0+c83Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87Z
# ymXG3MO2wUjhL9HvSQzjoquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKw
# BvII6sg0Ny7aPDaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0
# MTAyOTEwMTQwMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEA
# AgIa4zAHAgEAAgITSTAKAgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBDp2k9IO7lePSuN2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypO
# a+QZHboICRCPw0/gWqlrvDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNL
# Ml1wOoWE3WfiBV23XWqiqgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKL
# Qri7U/CWGo0EhKQQh5XEqgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj
# 7KSuuVKsMWeLMNH4sRgs1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBc
# udKw24qBm3gFHJ2uSv/oCRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgnt7l4F1ASoc6KP+7HjioNV9wzdqjZ/nHD6Q37E6SPYUwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYoc
# bkOeVjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# +vs7RNN3M8bTAAEAAAH6MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hW
# GYq3MA0GCSqGSIb3DQEBCwUABIICAEV+Q7sHPMRxn5f10TpReXTw0aUkajOzTDFI
# PB1wmDlc9k9jGun+vmo4qoBeeNzltibzhcfS9D7sTWfoeapcVUX090xf4Q6AEATJ
# s6TCVvaGOLLLy0GPhqcosQOGE5D68qN74Yl8Q2HoJakYpTeDv5rlPZ1osE0dq66G
# bnSZhFO1Knnh70i09eIyxukIlt/8TrMPliC2HHk0Sz3LQeAZWodlc/+ow4ezv9V8
# qBAlRh1UabxY5I6UN9oPcXksIrWUiKQiFvNYZ9m7IwXHm3Lrht8dDjwSft5eu0J+
# G9zGzP54XPZLmEUDY1y+9mplStPoeCmcN/xKcyCgeucGCsWtTysbQJYRwDnlwl0I
# R+0xI/5zRDyOPMZic5/ZAOMs82+an+/V4i37yV33oFVFKdRSWxujTOrp2RhD1J16
# Ko97/aDlUi6suzJkQFR3E57nrjmSbl4GWVU/UAK7rzmS+SdPLQDsjeiKlpvxEEun
# 04ofWjOC8A+YxJjkMcVwloxgrP07osu8a95uMh5EksGs+8xojST0wKDo4TTLwhvN
# M/a+Q6s+7WQoKLo59OJiTZFXAFLppjOsQBdf6s3TttMMsW9sEkBisyxZzljLckIP
# Nvq8yoIyUTBIrFSEI1DPP9BmGHpOLuww4dkYqzVu0/EesEqlBa8ka/55pGN/3tb1
# oULViuac
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_9_84.ps1 | sample_9_84.ps1 | ConvertFrom-StringData @'
id_hpz12servicecheck=Checking the presence of HPZ12
id_hpz12servicecheckdesc=Checking if Net Driver HPZ12 or Pml Driver HPZ12 services are installed
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAAM6nPv4tk/OLK
# 2ejp5sJKnQJ26owufDmIkNM+GmvWt6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAX8
# rTtRv3Td7XqxGfWCwR0l9CDDmtugwUK3sqZK4S/NMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAG3XUnNLM+m5Jq/tUBAzN71M03EL/UyXBtYMc
# p7mxpqj38dSZgOqbNBZs5GBXi98JOqrTFuqgUEg3Pgx5AtRJVXAM3iimWvM8cd9/
# uwtR3OXqjYU6HqezLS7wbjfICwAecN6UdFP1pXhT5hyUNTQosM1Q2eAIFdN6Z7bv
# m8Qhi6xFOOa/Go3sg+T44cB2+/9yh+ijLQjejDS6QmYcyyO5UrhKik8Q3zKTyOpy
# 4n/k0oKvzzIoXkDPgeJPLqaHEXbAyqS3Gg4dEQf6nP7IXJqp385qJmz6aPcUbIRs
# ljhwt1XvHgHHVXfgkZV+KoYycXJulfI8p6sNtx0DSEl6BPwKTKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCfdCRxGOWUB2787MVNIOh/nk3lLY2jKM+u
# o8P7xrY0RQIGZus6esnEGBMyMDI0MTAyODExNDA0MS42NDhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9n
# jXWrpPGxAAEAAAH5MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# tD1MH3yAHWHNVslC+CBTj/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BO
# JUiYg7fDJ2AxGVGyovUtgGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONW
# y6lOyGZwZpxfV2EX4qAh6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2
# ps8Nc1xr41N8Qi3KVJLYX0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2
# KDJ2sQRFFF/egCxKgogdF3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN
# 8hiMc8Z47RRJuIWCOeyIJ1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57
# ITXsD9DPOob8tjtsefPcQJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5D
# HM4ovCmD3lifgYnzjOry4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby
# 44kGVK8MzY9s32Dy1THnJg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRV
# Ux2G/0Tr7Dk3fpCU8u+5olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1
# HvNIBpSNNuTBQk7FBvu+Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSJ7aO6nJXJI9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAZiAJgFbkf7jfhx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG
# 2CcdoXaq7VgpVkNf1uvIhrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0kt
# H+EkEuGXs9DBLyt71iutVkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2
# q5TjmrgEKyPe3TApAio8cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/ui
# zP1NuHSxF/V1ks/2tCEoriicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+U
# d9Va3Iw9Bs4ccrkgBjLtg3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y
# 6Si3AaNINt/pOMKU6l4AW0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qI
# VBZJ2XQpnhEuRbh+AgpmRn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhnc
# FetJ0ZK36wxAa3FiPgBebRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B
# 0s8RiFBMf/W7+O7EPZ+wMH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojz
# uCEahSAcq86yjwQeTPN9YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAK
# mIcdwhqgZvyp6UaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0
# MTAyOTA4MjgwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEA
# AgIIXjAHAgEAAgITcTAKAgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQAZdq+OU23EaUchwQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2Dewx
# IzsFz1t8ELbs/7V+b+lLZ25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh8
# 4y9kT8c5HUYL5kF2NJiqgHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e7
# 2AvfpKtUZO94WfnvRVAu4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpU
# qnrIVhOqTZE0I5GJiVJydAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGE
# u6OFzH+g6bBiUu/BsmlodM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgBPn+aCFDB0wF/umxZogHg9a+R9p+nQxGMRkQKsSZz3MwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5S
# bGLYEDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# +R9njXWrpPGxAAEAAAH5MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkH
# B7rdMA0GCSqGSIb3DQEBCwUABIICAG8NX0S8kLqCzn7OIrbZDjjhqz43wl5/HWDE
# w+f1muBDiaIzPa+zJ4BYS7hXQfkU5cmuZllXJOzZ/uHj2S5CZ0tRSOTZbQWBaMCo
# deJ+HdyhGGNkOTHX3pYKJTKR3kYDtQmVkbGHQMtHel7tpuLoxY20rEmWhiXcBlCR
# 00dYi0qx7Y8EadzIivlkplJoUCxQhwxQT8T8pN8i1ToLRTAwdEp4R0MYjSC4cJcB
# vBOweqV7iq7RQpw4TwKMEUnlrgQuRLE9CH+/V13rHhZGzvEFLwI8lGBTfGRQym36
# TR1gp2aDIeutyOw7clbVih8uxN8sMUUHcs8k6tP7egmkG4fJiwb33mbR8GeeBAzk
# E/x1+7IN+iLj2j6AD5sUQFIpl3li925M7INWejhuagbi0tG+UEFLM1Ehh/UQbNXM
# ZtQo1q53fv9w2gXxlCf3uZLCsJ+9Duf8qD8Ut4zgv5BgqffSAc8uEfIQ26cB3wxt
# wpZ4NNQK5/z44jHi4U4LjczqZZQkwBEXOMn6RjMKTxPrx7yfvs45gGDu/9nWUsht
# SHTa5nar+DB4a6mBYRmY1BQiW0IUYwO9WhYyQLL82GbaztUZ0t04qajHPeYzMSqZ
# y+//ZCal1H7XOf5OeUkjILOqCc2kB16ivTPJ2Odqz39DM3CinbFmMfzFUwVD4Ej3
# 5TCdzUUf
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_8_3.ps1 | sample_8_3.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudbridge'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll'
# Version number of this module.
ModuleVersion = '92.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '23fab747-5070-4685-94b0-d91859b2fd98'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudbridge Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent',
'Get-OCICloudbridgeAgentDependenciesList',
'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList',
'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset',
'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource',
'Get-OCICloudbridgeAssetSourceConnectionsList',
'Get-OCICloudbridgeAssetSourcesList',
'Get-OCICloudbridgeDiscoverySchedule',
'Get-OCICloudbridgeDiscoverySchedulesList',
'Get-OCICloudbridgeEnvironment',
'Get-OCICloudbridgeEnvironmentsList',
'Get-OCICloudbridgeHistoricalMetricsList',
'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory',
'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest',
'Get-OCICloudbridgeWorkRequestErrorsList',
'Get-OCICloudbridgeWorkRequestLogsList',
'Get-OCICloudbridgeWorkRequestsList',
'Import-OCICloudbridgeInventory',
'Invoke-OCICloudbridgeAnalyzeAssets',
'Invoke-OCICloudbridgeRefreshAssetSource',
'Invoke-OCICloudbridgeSubmitHistoricalMetrics',
'Move-OCICloudbridgeAgentCompartment',
'Move-OCICloudbridgeAgentDependencyCompartment',
'Move-OCICloudbridgeAssetCompartment',
'Move-OCICloudbridgeAssetSourceCompartment',
'Move-OCICloudbridgeAssetTags',
'Move-OCICloudbridgeDiscoveryScheduleCompartment',
'Move-OCICloudbridgeEnvironmentCompartment',
'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency',
'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource',
'New-OCICloudbridgeDiscoverySchedule',
'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory',
'Remove-OCICloudbridgeAgent',
'Remove-OCICloudbridgeAgentDependency',
'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource',
'Remove-OCICloudbridgeDiscoverySchedule',
'Remove-OCICloudbridgeEnvironment',
'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest',
'Update-OCICloudbridgeAgent',
'Update-OCICloudbridgeAgentDependency',
'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource',
'Update-OCICloudbridgeDiscoverySchedule',
'Update-OCICloudbridgeEnvironment',
'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_19_36.ps1 | sample_19_36.ps1 | #
# Module manifest for module 'OCI.PSModules.Mysql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Mysql.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ad8c5447-7619-4d20-8318-cfb7688ec98d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Mysql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mysql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlBackup',
'Get-OCIMysqlBackupsList', 'Get-OCIMysqlChannel',
'Get-OCIMysqlChannelsList', 'Get-OCIMysqlConfiguration',
'Get-OCIMysqlConfigurationsList', 'Get-OCIMysqlDbSystem',
'Get-OCIMysqlDbSystemsList', 'Get-OCIMysqlHeatWaveCluster',
'Get-OCIMysqlHeatWaveClusterMemoryEstimate', 'Get-OCIMysqlReplica',
'Get-OCIMysqlReplicasList', 'Get-OCIMysqlShapesList',
'Get-OCIMysqlVersionsList', 'Get-OCIMysqlWorkRequest',
'Get-OCIMysqlWorkRequestErrorsList',
'Get-OCIMysqlWorkRequestLogsList', 'Get-OCIMysqlWorkRequestsList',
'Invoke-OCIMysqlResumeChannel', 'Move-OCIMysqlBackupCompartment',
'New-OCIMysqlBackup', 'New-OCIMysqlChannel',
'New-OCIMysqlConfiguration', 'New-OCIMysqlDbSystem',
'New-OCIMysqlHeatWaveClusterMemoryEstimate', 'New-OCIMysqlReplica',
'Remove-OCIMysqlBackup', 'Remove-OCIMysqlChannel',
'Remove-OCIMysqlConfiguration', 'Remove-OCIMysqlDbSystem',
'Remove-OCIMysqlHeatWaveCluster', 'Remove-OCIMysqlReplica',
'Reset-OCIMysqlChannel', 'Restart-OCIMysqlDbSystem',
'Restart-OCIMysqlHeatWaveCluster', 'Start-OCIMysqlDbSystem',
'Start-OCIMysqlHeatWaveCluster', 'Stop-OCIMysqlDbSystem',
'Stop-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlBackup',
'Update-OCIMysqlChannel', 'Update-OCIMysqlConfiguration',
'Update-OCIMysqlDbSystem', 'Update-OCIMysqlHeatWaveCluster',
'Update-OCIMysqlReplica'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mysql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_11_35.ps1 | sample_11_35.ps1 | data _system_translations
{
ConvertFrom-StringData @'
# Fallback text
# Copy all the strings in the psd1 file here
msg_ad_forest = SMB Delegation cmdlets require the Active Directory forest to be in Windows Server 2012 forest functional level.
msg_ad_cmdlets = SMB Delegation cmdlets require the installation of the Active Directory module for Windows PowerShell.
'@
}
Import-LocalizedData -BindingVariable _system_translations -fileName SmbLocalization.psd1 -ErrorAction SilentlyContinue
function Set-SmbPathAcl
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$ShareName,
[Parameter()]
[string]
$ScopeName = $null
)
if( ($null -ne $ScopeName ) -and ( "" -ne $ScopeName) )
{
(Get-SmbShare -Name $ShareName -ScopeName $ScopeName ).PresetPathACL | Set-Acl
}
else
{
(Get-SmbShare -Name $ShareName ).PresetPathACL | Set-Acl
}
}
function CheckDelegationPrerequisites
{
if( $null -eq (Get-Command -Module ActiveDirectory) )
{
Write-Error $_system_translations.msg_ad_cmdlets
return $false
}
#
# Forest mode should be greater than or equal to Windows2012Forest
#
if( (Get-AdForest).ForestMode.ToInt32($null) -lt [Microsoft.ActiveDirectory.Management.AdForestMode]::Windows2012Forest.ToInt32($null) )
{
Write-Error $_system_translations.msg_ad_forest
return $false
}
return $true
}
function Get-SmbDelegation
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$SmbServer
)
$check = CheckDelegationPrerequisites
if( -not $check )
{
return
}
$result = @()
$fsAD = Get-ADComputer -filter {Name -Like $SmbServer} -Properties 'msds-allowedtoactonbehalfofotheridentity'
foreach ($AllowedAccount in $fsAD."msDS-AllowedToActOnBehalfOfOtherIdentity".Access)
{
$samAccountName = $AllowedAccount.IdentityReference.Value
$samAccountName = $samAccountName.Remove(0, ($samAccountName.IndexOf("\")+1))
$result += Get-ADComputer -Filter {SamAccountName -Like $samAccountName}
}
$result.Name
}
function Enable-SmbDelegation
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$SmbClient,
[Parameter(Mandatory=$true)]
[string]
$SmbServer
)
$check = CheckDelegationPrerequisites
if( -not $check )
{
return
}
$delegationPrinciples = @()
$fsAD = Get-ADComputer -Filter {Name -Like $SmbServer} -Properties msDS-AllowedToActOnBehalfOfOtherIdentity
foreach ($AllowedAccount in $fsAD."msDS-AllowedToActOnBehalfOfOtherIdentity".Access)
{
$samAccountName = $AllowedAccount.IdentityReference.Value
$samAccountName = $samAccountName.Remove(0, ($samAccountName.IndexOf("\")+1))
$delegationPrinciples += Get-ADComputer -Filter {SamAccountName -Like $samAccountName}
}
$delegationPrinciples += Get-ADComputer -Identity $SmbClient
$fsAD | Set-ADComputer -PrincipalsAllowedToDelegateToAccount $delegationPrinciples
}
function Disable-SmbDelegation
{
[CmdletBinding()]
param(
[Parameter()]
[string]
$SmbClient,
[Parameter(Mandatory=$true)]
[string]
$SmbServer,
[System.Management.Automation.SwitchParameter]
[bool]
$Force = $false
)
$check = CheckDelegationPrerequisites
if( -not $check )
{
return
}
$delegationPrinciples = @()
$fsAD = Get-ADComputer -Filter {Name -Like $SmbServer} -Properties msDS-AllowedToActOnBehalfOfOtherIdentity
if( ($null -ne $SmbClient) -and ("" -ne $SmbClient) )
{
foreach ($AllowedAccount in $fsAD."msDS-AllowedToActOnBehalfOfOtherIdentity".Access)
{
$samAccountName = $AllowedAccount.IdentityReference.Value
$samAccountName = $samAccountName.Remove(0, ($samAccountName.IndexOf("\")+1))
$adc = Get-ADComputer -Filter {SamAccountName -Like $samAccountName}
if( $adc.Name -ne $SmbClient )
{
$delegationPrinciples += $adc
}
}
}
$fsAD | Set-ADComputer -PrincipalsAllowedToDelegateToAccount $delegationPrinciples
}
function DumpAndTestCertificate([String]$Storename, [String]$Thumbprint) {
# All SMB Server certificates for QUIC should be from the machine store
$Certificate = (Get-Item -path Cert:\LocalMachine\$Storename\$Thumbprint)
if ($null -eq $Certificate)
{
Write-Error -Message "Unable to retrieve certificate '$Storename' '$Thumbprint'" -Category ObjectNotFound;
return;
}
# Certificate is self-signed if the issuer-name and subject-name match
$IsSelfSigned = -not (Compare-Object $Certificate.IssuerName $Certificate.SubjectName)
#$SubjectName = $Certificate.SubjectName.Name;
$SubjectOid = $Certificate.SubjectName.Oid;
$SubjectRawData = $Certificate.SubjectName.RawData;
$SignatureAlgorithm = $Certificate.SignatureAlgorithm.Value.ToString() + " " + $Certificate.SignatureAlgorithm.FriendlyName.ToString();
#$Certificate | Select-Object -Property *
$Certificate | Select-Object -Property @{Name = 'SMBServerCertificateMappingName'; Expression = { $MappingName } },
@{Name = 'SelfSigned'; Expression = { $IsSelfSigned.ToString() } },
SubjectName,
Subject,
@{Name = 'SubjectOid'; Expression = { $SubjectOid } },
@{Name = 'SubjectRawData'; Expression = { $SubjectRawData } },
FriendlyName,
@{Name = 'SignatureAlgorithm'; Expression = { $SignatureAlgorithm } },
Thumbprint,
NotBefore,
NotAfter,
SendAsTrustedIssuer,
PublicKey,
DnsNameList | Format-List
if ($IsSelfSigned)
{
$TestResult = $Certificate | Test-Certificate -AllowUntrustedRoot
}
else
{
$TestResult = $Certificate | Test-Certificate
}
if ($TestResult)
{
Write-Output "Test-Certificate result : PASS"
}
else
{
Write-Error "Test-Certificate result : FAIL"
}
}
function Get-SmbServerCertProps
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[System.Management.Automation.SwitchParameter]
[bool]
$Force = $false
)
$AllCertMappings = Get-SmbServerCertificateMapping -Name $Name;
foreach ($CertMapping in $AllCertMappings) {
Write-Output "---------------------------------------------------------------------------------------------------------------"
$MappingName = $($CertMapping).Name
Write-Output "Checking Mapping '$MappingName'....."
$StoreName = $($CertMapping).StoreName
DumpAndTestCertificate -Storename $StoreName -Thumbprint $CertMapping.Thumbprint
$RenewalChain = $($CertMapping).RenewalChain
Write-Output "`r`nRenewalChain: $RenewalChain"
if ($RenewalChain -ne "") {
Write-Output "`r`nTesting certificates in the RenewalChain.....`r`n"
$RenewalChain -split ":" | ForEach-Object {
$RenewedCert = $_
if ($null -eq $RenewedCert -or $RenewedCert -eq "") {
continue
}
Write-Output "`r`nRenewedCert: $RenewedCert"
Write-Output "-------------------------------------------------------"
DumpAndTestCertificate -Storename $StoreName -Thumbprint $RenewedCert
}
}
}
}
Set-Alias -Name ssmbp -Value Set-SmbPathAcl
Set-Alias -Name gsmbd -Value Get-SmbDelegation
Set-Alias -Name esmbd -Value Enable-SmbDelegation
Set-Alias -Name dsmbd -Value Disable-SmbDelegation
Set-Alias -Name gsmbscp -Value Get-SmbServerCertProps
Export-ModuleMember -Function Set-SmbPathAcl -Alias ssmbp
Export-ModuleMember -Function Get-SmbDelegation -Alias gsmbd
Export-ModuleMember -Function Enable-SmbDelegation -Alias esmbd
Export-ModuleMember -Function Disable-SmbDelegation -Alias dsmbd
Export-ModuleMember -Function Get-SmbServerCertProps -Alias gsmbscp |
combined_dataset/train/non-malicious/BinaryClock V_1.0.ps1 | BinaryClock V_1.0.ps1 | Function Start-BinaryClock {
<#
.SYNOPSIS
This is a binary clock that lists the time in hours, minutes and seconds
.DESCRIPTION
This is a binary clock that lists the time in hours, minutes and seconds.
Key Input Tips:
r: Toggles the resize mode of the clock so you can adjust the size.
d: Toggles the date to hide/show
o: Toggles whether the clock remains on top of windows or not.
+: Increases the opacity of the clock so it is less transparent.
-: Decreases the opacity of the clock so it appears more transparent.
Right-Click to close.
Use left mouse button to drag clock.
.PARAMETER OnColor
Define the color used for the active time (1).
.PARAMETER OffColor
Define the color used for the inactive time (0).
.PARAMETER RandomColor
Default parameter if manual colors are not used. Picks a random color for On and Off colors.
.NOTES
Name: BinaryClock.ps1
Author: Boe Prox
DateCreated: 07/05/2011
Version 2.0
.EXAMPLE
Start-BinaryClock
Description
-----------
Starts the binary clock using randomly generated colors
.EXAMPLE
Start-BinaryClock -OnColor Red -OffColor Gold -DateColor Black
Description
-----------
Starts the binary clock using using specified colors.
#>
[cmdletbinding(
DefaultParameterSetName = 'RandomColor'
)]
Param (
[parameter(Mandatory = 'True',ParameterSetName = 'SetColor')]
[String] $OnColor,
[parameter(Mandatory = 'True',ParameterSetName = 'SetColor')]
[String] $OffColor,
[parameter(ParameterSetName = 'RandomColor')]
[Switch]$RandomColor,
[parameter(Mandatory = 'True',ParameterSetName = 'SetColor')]
[String] $DateColor
)
If ($PSCmdlet.ParameterSetName -eq 'RandomColor') {
[switch]$RandomColor = $True
}
$Global:rs = [RunspaceFactory]::CreateRunspace()
$rs.ApartmentState = “STA”
$rs.ThreadOptions = “ReuseThread”
$rs.Open()
$psCmd = {Add-Type -AssemblyName PresentationCore,PresentationFramework,WindowsBase}.GetPowerShell()
$rs.SessionStateProxy.SetVariable('OnColor',$OnColor)
$rs.SessionStateProxy.SetVariable('OffColor',$OffColor)
$rs.SessionStateProxy.SetVariable('RandomColor',$RandomColor)
$rs.SessionStateProxy.SetVariable('DateColor',$DateColor)
$psCmd.Runspace = $rs
$psCmd.Invoke()
$psCmd.Commands.Clear()
$psCmd.AddScript({
#Load Required Assemblies
Add-Type –assemblyName PresentationFramework
Add-Type –assemblyName PresentationCore
Add-Type –assemblyName WindowsBase
##Colors
If ($RandomColor) {
#On Color
$OnColor = "#{0:X}" -f (Get-Random -min 1 -max 16777215)
Try {
[system.windows.media.brush]$OnColor | Out-Null
}
Catch {
$OnColor = "White"
}
#Off Color
$OffColor = "#{0:X}" -f (Get-Random -min 1 -max 16777215)
Try {
[system.windows.media.brush]$OffColor | Out-Null
}
Catch {
$OffColor = "Black"
}
#DateColor Color
$DateColor = "#{0:X}" -f (Get-Random -min 1 -max 16777215)
Try {
[system.windows.media.brush]$DateColor | Out-Null
}
Catch {
$DateColor = "Black"
}
}
[xml]$xaml = @"
<Window
xmlns='http://schemas.microsoft.com/winfx/2006/xaml/presentation'
xmlns:x='http://schemas.microsoft.com/winfx/2006/xaml'
x:Name='Window' WindowStyle = 'None' WindowStartupLocation = 'CenterScreen' Width = '170' Height = '101' ShowInTaskbar = 'True'
ResizeMode = 'NoResize' Title = 'Clock' AllowsTransparency = 'True' Background = 'Transparent' Opacity = '1' Topmost = 'True'>
<Grid x:Name = 'Grid' HorizontalAlignment="Stretch" ShowGridLines='false' Background = 'Transparent'>
<Grid.ColumnDefinitions>
<ColumnDefinition Width="*"/>
<ColumnDefinition Width="2"/>
<ColumnDefinition Width="*"/>
<ColumnDefinition Width="5"/>
<ColumnDefinition Width="*"/>
<ColumnDefinition Width="2"/>
<ColumnDefinition Width="*"/>
<ColumnDefinition Width="5"/>
<ColumnDefinition Width="*"/>
<ColumnDefinition Width="2"/>
<ColumnDefinition Width="*"/>
<ColumnDefinition Width="2"/>
<ColumnDefinition Width="*" x:Name = 'DayColumn'/>
<ColumnDefinition Width="*" x:Name = 'MonthColumn'/>
</Grid.ColumnDefinitions>
<Grid.RowDefinitions>
<RowDefinition Height = '*'/>
<RowDefinition Height = '2'/>
<RowDefinition Height = '*'/>
<RowDefinition Height = '2'/>
<RowDefinition Height = '*'/>
<RowDefinition Height = '2'/>
<RowDefinition Height = '*'/>
<RowDefinition Height = '2'/>
<RowDefinition x:Name = 'timerow' Height = '0'/>
</Grid.RowDefinitions>
<Ellipse Grid.Row = '0' Grid.Column = '0' Fill = 'Transparent'/>
<Ellipse Grid.Row = '2' Grid.Column = '0' Fill = 'Transparent' />
<Ellipse x:Name = 'HourA0' Grid.Row = '6' Grid.Column = '0' Fill = 'Transparent' />
<Ellipse x:Name = 'HourA1' Grid.Row = '4' Grid.Column = '0' Fill = 'Transparent' />
<Ellipse x:Name = 'HourB0' Grid.Row = '6' Grid.Column = '2' Fill = 'Transparent'/>
<Ellipse x:Name = 'HourB1' Grid.Row = '4' Grid.Column = '2' Fill = 'Transparent' />
<Ellipse x:Name = 'HourB2' Grid.Row = '2' Grid.Column = '2' Fill = 'Transparent' />
<Ellipse x:Name = 'HourB3' Grid.Row = '0' Grid.Column = '2' Fill = 'Transparent' />
<Ellipse Grid.Row = '0' Grid.Column = '4' Fill = 'Transparent'/>
<Ellipse x:Name = 'MinuteA0' Grid.Row = '6' Grid.Column = '4' Fill = 'Transparent' />
<Ellipse x:Name = 'MinuteA1' Grid.Row = '4' Grid.Column = '4' Fill = 'Transparent' />
<Ellipse x:Name = 'MinuteA2' Grid.Row = '2' Grid.Column = '4' Fill = 'Transparent' />
<Ellipse x:Name = 'MinuteB0' Grid.Row = '6' Grid.Column = '6' Fill = 'Transparent'/>
<Ellipse x:Name = 'MinuteB1' Grid.Row = '4' Grid.Column = '6' Fill = 'Transparent' />
<Ellipse x:Name = 'MinuteB2' Grid.Row = '2' Grid.Column = '6' Fill = 'Transparent' />
<Ellipse x:Name = 'MinuteB3' Grid.Row = '0' Grid.Column = '6' Fill = 'Transparent' />
<Ellipse Grid.Row = '0' Grid.Column = '8' Fill = 'Transparent'/>
<Ellipse x:Name = 'SecondA0' Grid.Row = '6' Grid.Column = '8' Fill = 'Transparent' />
<Ellipse x:Name = 'SecondA1' Grid.Row = '4' Grid.Column = '8' Fill = 'Transparent' />
<Ellipse x:Name = 'SecondA2' Grid.Row = '2' Grid.Column = '8' Fill = 'Transparent' />
<Ellipse x:Name = 'SecondB0' Grid.Row = '6' Grid.Column = '10' Fill = 'Transparent'/>
<Ellipse x:Name = 'SecondB1' Grid.Row = '4' Grid.Column = '10' Fill = 'Transparent' />
<Ellipse x:Name = 'SecondB2' Grid.Row = '2' Grid.Column = '10' Fill = 'Transparent' />
<Ellipse x:Name = 'SecondB3' Grid.Row = '0' Grid.Column = '10' Fill = 'Transparent' />
<Viewbox VerticalAlignment = 'Stretch' HorizontalAlignment = 'Stretch' Grid.Column = '12' Grid.RowSpan = '7'
StretchDirection = 'Both' Stretch = 'Fill'>
<TextBlock x:Name = 'DayLabel' VerticalAlignment = 'Stretch' HorizontalAlignment = 'Stretch'
FontWeight = 'Bold'>
<TextBlock.LayoutTransform>
<RotateTransform Angle="90" />
</TextBlock.LayoutTransform>
</TextBlock>
</Viewbox>
<Viewbox VerticalAlignment = 'Stretch' HorizontalAlignment = 'Stretch' Grid.Column = '13' Grid.RowSpan = '7'
StretchDirection = 'Both' Stretch = 'Fill'>
<TextBlock x:Name = 'MonthLabel' VerticalAlignment = 'Stretch' HorizontalAlignment = 'Stretch'
FontWeight = 'Bold'>
<TextBlock.LayoutTransform>
<RotateTransform Angle="90" />
</TextBlock.LayoutTransform>
</TextBlock>
</Viewbox>
</Grid>
</Window>
"@
$reader=(New-Object System.Xml.XmlNodeReader $xaml)
$Global:Window=[Windows.Markup.XamlReader]::Load( $reader )
$Global:DayLabel = $Global:window.FindName("DayLabel")
$Global:MonthLabel = $Global:window.FindName("MonthLabel")
$Global:DayColumn = $Global:window.FindName("DayColumn")
$Global:MonthColumn = $Global:window.FindName("MonthColumn")
$Global:TimeRow = $Global:window.FindName("TimeRow")
$Global:Grid = $Global:window.FindName("Grid")
##Events
#Key Events
$Global:Window.Add_KeyDown({
Switch ($_.Key) {
{'Add','OemPlus' -contains $_} {
If ($Window.Opacity -lt 1) {
$Window.Opacity = $Window.Opacity + .1
$Window.UpdateLayout()
}
}
{'Subtract','OemMinus' -contains $_} {
If ($Window.Opacity -gt .2) {
$Window.Opacity = $Window.Opacity - .1
$Window.UpdateLayout()
}
}
"r" {
If ($Window.ResizeMode -eq 'NoResize') {
$Window.ResizeMode = 'CanResizeWithGrip'
}
Else {
$Window.ResizeMode = 'NoResize'
}
}
"d" {
Switch ($MonthLabel.visibility) {
'Collapsed' {$MonthLabel.visibility = 'Visible';$DayLabel.Visibility = 'Visible'}
'Visible' {$MonthLabel.visibility = 'Collapsed ';$DayLabel.Visibility = 'Collapsed '}
}
}
"o" {
If ($Window.TopMost) {
$Window.TopMost = $False
}
Else {
$Window.TopMost = $True
}
}
}
})
$Window.Add_MouseRightButtonUp({
$This.close()
})
$Window.Add_MouseLeftButtonDown({
$This.DragMove()
})
$update = {
$DayLabel.Text = "$(((Get-Date).ToLongDateString() -split ',')[0] -split '')"
$DayLabel.Foreground = $DateColor
$MonthLabel.Text = Get-Date -u "%B %d %G"
$MonthLabel.Foreground = $DateColor
$hourA,$hourB = [string](Get-Date -f HH) -split "" | Where {$_}
$minuteA,$minuteB = [string](Get-Date -f mm) -split "" | Where {$_}
$secondA,$secondB = [string](Get-Date -f ss) -split "" | Where {$_}
$hourAdock = $grid.children | Where {$_.Name -like "hourA*"}
$minuteAdock = $grid.children | Where {$_.Name -like "minuteA*"}
$secondAdock = $grid.children | Where {$_.Name -like "secondA*"}
$hourBdock = $grid.children | Where {$_.Name -like "hourB*"}
$minuteBdock = $grid.children | Where {$_.Name -like "minuteB*"}
$secondBdock = $grid.children | Where {$_.Name -like "secondB*"}
#hourA
[array]$splittime = ([convert]::ToString($houra,2)) -split"" | Where {$_}
[array]::Reverse($splittime)
$i = 0
ForEach ($hdock in $hourAdock) {
Write-Verbose "i: $($i)"
Write-Verbose "split: $($splittime[$i])"
If ($splittime[$i] -eq "1") {
$hdock.Fill = $OnColor
}
Else {
$hdock.Fill = $OffColor
}
$i++
}
$i = 0
#hourB
[array]$splittime = ([convert]::ToString($hourb,2)) -split"" | Where {$_}
[array]::Reverse($splittime)
$i = 0
ForEach ($hdock in $hourBdock) {
Write-Verbose "i: $($i)"
Write-Verbose "split: $($splittime[$i])"
If ($splittime[$i] -eq "1") {
$hdock.Fill = $OnColor
}
Else {
$hdock.Fill = $OffColor
}
$i++
}
$i = 0
#minuteA
[array]$splittime = ([convert]::ToString($minutea,2)) -split"" | Where {$_}
[array]::Reverse($splittime)
$i = 0
ForEach ($hdock in $minuteAdock) {
Write-Verbose "i: $($i)"
Write-Verbose "split: $($splittime[$i])"
If ($splittime[$i] -eq "1") {
$hdock.Fill = $OnColor
}
Else {
$hdock.Fill = $OffColor
}
$i++
}
$i = 0
#minuteB
[array]$splittime = ([convert]::ToString($minuteb,2)) -split"" | Where {$_}
[array]::Reverse($splittime)
$i = 0
ForEach ($hdock in $minuteBdock) {
Write-Verbose "i: $($i)"
Write-Verbose "split: $($splittime[$i])"
If ($splittime[$i] -eq "1") {
$hdock.Fill = $OnColor
}
Else {
$hdock.Fill = $OffColor
}
$i++
}
$i = 0
#secondA
[array]$splittime = ([convert]::ToString($seconda,2)) -split"" | Where {$_}
[array]::Reverse($splittime)
$i = 0
ForEach ($hdock in $secondAdock) {
Write-Verbose "i: $($i)"
Write-Verbose "split: $($splittime[$i])"
If ($splittime[$i] -eq "1") {
$hdock.Fill = $OnColor
}
Else {
$hdock.Fill = $OffColor
}
$i++
}
$i = 0
#secondB
[array]$splittime = ([convert]::ToString($secondb,2)) -split"" | Where {$_}
[array]::Reverse($splittime)
$i = 0
ForEach ($hdock in $secondBdock) {
Write-Verbose "i: $($i)"
Write-Verbose "split: $($splittime[$i])"
If ($splittime[$i] -eq "1") {
$hdock.Fill = $OnColor
}
Else {
$hdock.Fill = $OffColor
}
$i++
}
$i = 0
}
$Global:Window.Add_KeyDown({
If ($_.Key -eq "F5") {
&$update
}
})
#Timer Event
$Window.Add_SourceInitialized({
#Create Timer object
Write-Verbose "Creating timer object"
$Global:timer = new-object System.Windows.Threading.DispatcherTimer
Write-Verbose "Adding interval to timer object"
$timer.Interval = [TimeSpan]"0:0:.10"
#Add event per tick
Write-Verbose "Adding Tick Event to timer object"
$timer.Add_Tick({
&$update
Write-Verbose "Updating Window"
})
#Start timer
Write-Verbose "Starting Timer"
$timer.Start()
If (-NOT $timer.IsEnabled) {
$Window.Close()
}
})
&$update
$window.Showdialog() | Out-Null
}).BeginInvoke() | out-null
}
|
combined_dataset/train/non-malicious/872.ps1 | 872.ps1 | function Start-PythonExample {
$ErrorActionPreference = "Stop"
Connect-AzAccount
$clusterName = Read-Host -Prompt "Enter the HDInsight cluster name"
$creds=Get-Credential -Message "Enter the login for the cluster" -UserName "admin"
$clusterInfo = Get-AzHDInsightCluster -ClusterName $clusterName
$storageInfo = $clusterInfo.DefaultStorageAccount.split('.')
$defaultStoreageType = $storageInfo[1]
$defaultStorageName = $storageInfo[0]
$activity="Python MapReduce"
Write-Progress -Activity $activity -Status "Uploading mapper and reducer..."
switch ($defaultStoreageType)
{
"blob" {
$resourceGroup = $clusterInfo.ResourceGroup
$storageContainer=$clusterInfo.DefaultStorageContainer
$storageAccountKey=(Get-AzStorageAccountKey `
-Name $defaultStorageName `
-ResourceGroupName $resourceGroup)[0].Value
$context = New-AzStorageContext `
-StorageAccountName $defaultStorageName `
-StorageAccountKey $storageAccountKey
Set-AzStorageBlobContent `
-File .\mapper.py `
-Blob "mapper.py" `
-Container $storageContainer `
-Context $context
Set-AzStorageBlobContent `
-File .\reducer.py `
-Blob "reducer.py" `
-Container $storageContainer `
-Context $context `
}
"azuredatalakestore" {
$clusterRoot=$clusterInfo.DefaultStorageRootPath
Import-AzDataLakeStoreItem -AccountName $defaultStorageName `
-Path .\mapper.py `
-Destination "$clusterRoot/mapper.py" `
-Force
Import-AzDataLakeStoreItem -AccountName $defaultStorageName `
-Path .\reducer.py `
-Destination "$clusterRoot/reducer.py" `
-Force
}
default {
Throw "Unknown storage type: $defaultStoreageType"
}
}
$jobDefinition = New-AzHDInsightStreamingMapReduceJobDefinition `
-Files "/mapper.py", "/reducer.py" `
-Mapper "mapper.py" `
-Reducer "reducer.py" `
-InputPath "/example/data/gutenberg/davinci.txt" `
-OutputPath "/example/wordcountout"
Write-Progress -Activity $activity -Status "Starting the MapReduce job..."
$job = Start-AzHDInsightJob `
-ClusterName $clusterName `
-JobDefinition $jobDefinition `
-HttpCredential $creds
Write-Progress -Activity $activity -Status "Waiting for the job to complete..."
Wait-AzHDInsightJob `
-JobId $job.JobId `
-ClusterName $clusterName `
-HttpCredential $creds
Write-Progress -Activity $activity -Status "Downloading job output..."
switch ($defaultStoreageType)
{
"blob" {
$resourceGroup = $clusterInfo.ResourceGroup
$storageContainer=$clusterInfo.DefaultStorageContainer
$storageAccountKey=(Get-AzStorageAccountKey `
-Name $defaultStorageName `
-ResourceGroupName $resourceGroup)[0].Value
$context = New-AzStorageContext `
-StorageAccountName $defaultStorageName `
-StorageAccountKey $storageAccountKey
Get-AzStorageBlobContent `
-Container $storageContainer `
-Blob "example/wordcountout/part-00000" `
-Context $context `
-Destination "./output.txt"
Get-Content "./output.txt"
}
"azuredatalakestore" {
$clusterRoot=$clusterInfo.DefaultStorageRootPath
$sourcePath=$clusterRoot + "example/wordcountout/part-00000"
Get-AzDataLakeStoreItemContent -Account $defaultStorageName -Path $sourcePath -Confirm
}
default {
Throw "Unknown storage type: $defaultStoreageType"
}
}
}
function fix-lineending($original_file) {
$text = [IO.File]::ReadAllText($original_file) -replace "`r`n", "`n"
[IO.File]::WriteAllText($original_file, $text)
}
|
combined_dataset/train/non-malicious/3632.ps1 | 3632.ps1 |
function Test-CreateSyncAgent
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
try
{
$saName = Get-SyncAgentName
$sa = New-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -SyncDatabaseServerName $server.ServerName `
-SyncDatabaseName $databaseName
Assert-NotNull $sa
Assert-AreEqual $saName $sa.SyncAgentName
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetAndListSyncAgents
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$saName = Get-SyncAgentName
$sa = New-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -SyncDatabaseServerName $server.ServerName `
-SyncDatabaseName $databaseName
try
{
$sa2 = Get-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -SyncAgentName $saName
Assert-NotNull $sa2
Assert-AreEqual $saName $sa2.SyncAgentName
$all = Get-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -SyncAgentName *
Assert-NotNull $all
Assert-AreEqual $all.Count 1
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RemoveSyncAgent
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$saName = Get-SyncAgentName
$sa = New-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -SyncDatabaseServerName $server.ServerName `
-SyncDatabaseName $databaseName
try
{
Remove-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName -Force
$all = Get-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName
Assert-AreEqual $all.Count 0
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-CreateSyncAgentKey
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$saName = Get-SyncAgentName
$sa = New-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -SyncDatabaseServerName $server.ServerName `
-SyncDatabaseName $databaseName
try
{
$key = New-AzSqlSyncAgentKey -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName
Assert-NotNull $key
Assert-NotNull $key.SyncAgentKey
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ListSyncAgentLinkedDatabase
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$saName = Get-SyncAgentName
$sa = New-AzSqlSyncAgent -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -SyncDatabaseServerName $server.ServerName `
-SyncDatabaseName $databaseName
try
{
$dbs = Get-AzSqlSyncAgentLinkedDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-SyncAgentName $saName
Assert-Null $dbs
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-CreateSyncGroup
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$credential = Get-ServerCredential
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
try
{
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
Assert-AreEqual $params.intervalInSeconds $sg.IntervalInSeconds
Assert-AreEqual $params.conflictResolutionPolicy $sg.ConflictResolutionPolicy
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-UpdateSyncGroup
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$credential = Get-ServerCredential
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
try
{
$newIntervalInSeconds = 200
$sg2 = Update-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName -IntervalInSeconds $newIntervalInSeconds
Assert-AreEqual $newIntervalInSeconds $sg2.IntervalInSeconds
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetAndListSyncGroups
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$credential = Get-ServerCredential
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
try
{
$sg1 = Get-AzSqlSyncGroup -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName -SyncGroupName $sgName
Assert-AreEqual $params.intervalInSeconds $sg1.IntervalInSeconds
Assert-AreEqual $params.conflictResolutionPolicy $sg1.ConflictResolutionPolicy
$all = Get-AzSqlSyncGroup -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName -SyncGroupName *
Assert-AreEqual $all.Count 1
Assert-AreEqual $params.intervalInSeconds $all[0].IntervalInSeconds
Assert-AreEqual $params.conflictResolutionPolicy $all[0].ConflictResolutionPolicy
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RefreshAndGetSyncGroupHubSchema
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$credential = Get-ServerCredential
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
try
{
Update-AzSqlSyncSchema -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName
$schema = Get-AzSqlSyncSchema -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName
Assert-NotNull $schema
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RemoveSyncGroup
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$credential = Get-ServerCredential
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
try
{
Remove-AzSqlSyncGroup -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName -SyncGroupName $sgName -Force
$all = Get-AzSqlSyncGroup -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName
Assert-AreEqual $all.Count 0
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-CreateSyncMember
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$serverDNS = Get-DNSNameBasedOnEnvironment
$serverName = $server.ServerName + $serverDNS
$credential = Get-ServerCredential
$databaseName1 = Get-DatabaseName
$db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName1
$databaseName2 = Get-DatabaseName
$db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName2
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
try
{
$smParams = Get-SqlSyncMemberTestEnvironmentParameters
$smName = Get-SyncMemberName
$sm1 = New-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName `
-SyncDirection $smParams.syncDirection -MemberDatabaseType $smParams.databaseType -MemberDatabaseName $databaseName2 `
-MemberServerName $serverName -MemberDatabaseCredential $credential
Assert-AreEqual $smParams.syncDirection $sm1.SyncDirection
Assert-AreEqual $smParams.databaseType $sm1.MemberDatabaseType
Assert-AreEqual $databaseName2 $sm1.MemberDatabaseName
Assert-AreEqual $serverName $sm1.MemberServerName
Assert-Null $sm1.MemberDatabasePassword
Assert-Null $sm1.SyncAgentId
Assert-Null $sm1.SqlServerDatabaseId
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetAndListSyncMembers
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$serverDNS = Get-DNSNameBasedOnEnvironment
$serverName = $server.ServerName + $serverDNS
$credential = Get-ServerCredential
$databaseName1 = Get-DatabaseName
$db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName1
$databaseName2 = Get-DatabaseName
$db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName2
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
$smParams = Get-SqlSyncMemberTestEnvironmentParameters
$smName = Get-SyncMemberName
$sm1 = New-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName `
-SyncDirection $smParams.syncDirection -MemberDatabaseType $smParams.databaseType -MemberDatabaseName $databaseName2 `
-MemberServerName $serverName -MemberDatabaseCredential $credential
try
{
$sm2 = Get-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sg.SyncGroupName -SyncMemberName $smName
Assert-AreEqual $smParams.syncDirection $sm1.SyncDirection
Assert-AreEqual $smParams.databaseType $sm1.MemberDatabaseType
Assert-AreEqual $databaseName2 $sm1.MemberDatabaseName
Assert-AreEqual $serverName $sm1.MemberServerName
Assert-Null $sm1.MemberDatabasePassword
Assert-Null $sm1.SyncAgentId
Assert-Null $sm1.SqlServerDatabaseId
$all = Get-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sg.SyncGroupName -SyncMemberName *
Assert-AreEqual 1 $all.Count
Assert-AreEqual $smParams.syncDirection $all[0].SyncDirection
Assert-AreEqual $smParams.databaseType $all[0].MemberDatabaseType
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-UpdateSyncMember
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$serverDNS = Get-DNSNameBasedOnEnvironment
$serverName = $server.ServerName + $serverDNS
$credential = Get-ServerCredential
$databaseName1 = Get-DatabaseName
$db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName1
$databaseName2 = Get-DatabaseName
$db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName2
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
$smParams = Get-SqlSyncMemberTestEnvironmentParameters
$smName = Get-SyncMemberName
$sm1 = New-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName `
-SyncDirection $smParams.syncDirection -MemberDatabaseType $smParams.databaseType -MemberDatabaseName $databaseName2 `
-MemberServerName $serverName -MemberDatabaseCredential $credential
try
{
$sm2 = Update-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName `
-MemberDatabaseCredential $credential
Assert-AreEqual $smParams.databaseType $sm2.MemberDatabaseType
Assert-AreEqual $databaseName2 $sm2.MemberDatabaseName
Assert-AreEqual $serverName $sm2.MemberServerName
Assert-Null $sm2.MemberDatabasePassword
Assert-Null $sm2.SyncAgentId
Assert-Null $sm2.SqlServerDatabaseId
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RefreshAndGetSyncMemberSchema
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$serverDNS = Get-DNSNameBasedOnEnvironment
$serverName = $server.ServerName + $serverDNS
$credential = Get-ServerCredential
$databaseName1 = Get-DatabaseName
$db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName1
$databaseName2 = Get-DatabaseName
$db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName2
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
$smParams = Get-SqlSyncMemberTestEnvironmentParameters
$smName = Get-SyncMemberName
$sm1 = New-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName `
-SyncDirection $smParams.syncDirection -MemberDatabaseType $smParams.databaseType -MemberDatabaseName $databaseName2 `
-MemberServerName $serverName -MemberDatabaseCredential $credential
try
{
Update-AzSqlSyncSchema -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName
$schema = Get-AzSqlSyncSchema -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName
Assert-NotNull $schema
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RemoveSyncMember
{
$rg = Create-ResourceGroupForTest
$server = Create-ServerForTest $rg "West US 2"
$serverDNS = Get-DNSNameBasedOnEnvironment
$serverName = $server.ServerName + $serverDNS
$credential = Get-ServerCredential
$databaseName1 = Get-DatabaseName
$db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName1
$databaseName2 = Get-DatabaseName
$db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName2
$syncDatabaseName = Get-DatabaseName
$syncdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $syncDatabaseName
$params = Get-SqlSyncGroupTestEnvironmentParameters
$sgName = Get-SyncGroupName
$sg = New-AzSqlSyncGroup -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -IntervalInSeconds $params.intervalInSeconds `
-ConflictResolutionPolicy $params.conflictResolutionPolicy -SyncDatabaseName $syncDatabaseName -SyncDatabaseServerName `
$server.ServerName -SyncDatabaseResourceGroupName $rg.ResourceGroupName -DatabaseCredential $credential
$smParams = Get-SqlSyncMemberTestEnvironmentParameters
$smName = Get-SyncMemberName
$sm1 = New-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName `
-SyncDirection $smParams.syncDirection -MemberDatabaseType $smParams.databaseType -MemberDatabaseName $databaseName2 `
-MemberServerName $serverName -MemberDatabaseCredential $credential
try
{
Remove-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName -SyncMemberName $smName -Force
$all = Get-AzSqlSyncMember -ServerName $server.ServerName -ResourceGroupName $rg.ResourceGroupName `
-DatabaseName $databaseName1 -SyncGroupName $sgName
Assert-AreEqual $all.Count 0
}
finally
{
Remove-ResourceGroupForTest $rg
}
} |
combined_dataset/train/non-malicious/sample_67_82.ps1 | sample_67_82.ps1 | # ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
[CmdletBinding(DefaultParametersetName="Unsecure")]
param (
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeName,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeType,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $FaultDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $AcceptEULA,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[string] $FabricRuntimePackagePath,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[switch] $X509Credential,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $ServerCertThumbprint,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreLocation,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreName,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $FindValueThumbprint,
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[switch] $WindowsCredential
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCExtractArguments = "/E /Y /L `"$ThisScriptPath`""
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorPath $DCExtractArguments && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$MicrosoftServiceFabricCabFileAbsolutePath = $null
if($FabricRuntimePackagePath)
{
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath
if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath))
{
Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath"
exit 1
}
}
else
{
$RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages"
if(!(Test-Path $RuntimeBinPath))
{
Write-Host "No directory exists for Runtime packages. Creating a new directory."
md $RuntimeBinPath | Out-Null
Write-Host "Done creating $RuntimeBinPath"
}
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
# Invoke in separate AppDomain
if($X509Credential)
{
$argList = @($DeployerBinPath, $ExistingClientConnectionEndpoint, $ServiceFabricPowershellModulePath, $NodeName, $NodeType, $NodeIpAddressOrFQDN, $UpgradeDomain, $FaultDomain, $MicrosoftServiceFabricCabFileAbsolutePath, $false, $true, $ServerCertThumbprint, $StoreLocation, $StoreName, $FindValueThumbprint)
}
else
{
if($WindowsCredential)
{
$argList = @($DeployerBinPath, $ExistingClientConnectionEndpoint, $ServiceFabricPowershellModulePath, $NodeName, $NodeType, $NodeIpAddressOrFQDN, $UpgradeDomain, $FaultDomain, $MicrosoftServiceFabricCabFileAbsolutePath, $true )
}
else
{
$argList = @($DeployerBinPath, $ExistingClientConnectionEndpoint, $ServiceFabricPowershellModulePath, $NodeName, $NodeType, $NodeIpAddressOrFQDN, $UpgradeDomain, $FaultDomain, $MicrosoftServiceFabricCabFileAbsolutePath )
}
}
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $DeployerBinPath,
[Parameter(Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(Mandatory=$true)]
[string] $ServiceFabricPowershellModulePath,
[Parameter(Mandatory=$true)]
[string] $NodeName,
[Parameter(Mandatory=$true)]
[string] $NodeType,
[Parameter(Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(Mandatory=$true)]
[string] $FaultDomain,
[Parameter(Mandatory=$false)]
[string] $MicrosoftServiceFabricCabFileAbsolutePath,
[Parameter(Mandatory=$false)]
[bool] $WindowsCredential,
[Parameter(Mandatory=$false)]
[bool] $X509Credential,
[Parameter(Mandatory=$false)]
[string] $ServerCertThumbprint,
[Parameter(Mandatory=$false)]
[string] $StoreLocation,
[Parameter(Mandatory=$false)]
[string] $StoreName,
[Parameter(Mandatory=$false)]
[string] $FindValueThumbprint
)
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
Try
{
# Connect to the existing cluster
if($X509Credential)
{
Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint
}
else
{
if($WindowsCredential)
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential
}
else
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint
}
}
if(!$MicrosoftServiceFabricCabFileAbsolutePath)
{
# Get runtime package details
$UpgradeStatus = Get-ServiceFabricClusterUpgrade
if($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted")
{
Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait till UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red
exit 1
}
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab"
$DeploymentPackageRoot = Split-Path -parent $DeployerBinPath
$RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages"
$MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename
if(!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion
$RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion }
if($RequiredPackage -eq $null)
{
Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red
exit 1
}
$Version = $UpgradeStatus.TargetCodeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath
}
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
#Add Node to an existing cluster
Try
{
Get-ServiceFabricNode | ft
Add-ServiceFabricNode -NodeName $NodeName -NodeType $NodeType -IpAddressOrFQDN $NodeIpAddressOrFQDN -UpgradeDomain $UpgradeDomain -FaultDomain $FaultDomain -FabricRuntimePackagePath $MicrosoftServiceFabricCabFileAbsolutePath -Verbose
Start-Sleep -s 30
Get-ServiceFabricNode |ft
}
Catch
{
Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $argList -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIIjhgYJKoZIhvcNAQcCoIIjdzCCI3MCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCClf47nbsrZ+LdI
# yHhWHaNpiAyzhdtfP9k2RS8/k/2QsqCCDYEwggX/MIID56ADAgECAhMzAAABUZ6N
# j0Bxow5BAAAAAAFRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMTkwNTAyMjEzNzQ2WhcNMjAwNTAyMjEzNzQ2WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCVWsaGaUcdNB7xVcNmdfZiVBhYFGcn8KMqxgNIvOZWNH9JYQLuhHhmJ5RWISy1
# oey3zTuxqLbkHAdmbeU8NFMo49Pv71MgIS9IG/EtqwOH7upan+lIq6NOcw5fO6Os
# +12R0Q28MzGn+3y7F2mKDnopVu0sEufy453gxz16M8bAw4+QXuv7+fR9WzRJ2CpU
# 62wQKYiFQMfew6Vh5fuPoXloN3k6+Qlz7zgcT4YRmxzx7jMVpP/uvK6sZcBxQ3Wg
# B/WkyXHgxaY19IAzLq2QiPiX2YryiR5EsYBq35BP7U15DlZtpSs2wIYTkkDBxhPJ
# IDJgowZu5GyhHdqrst3OjkSRAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUV4Iarkq57esagu6FUBb270Zijc8w
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDU0MTM1MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAWg+A
# rS4Anq7KrogslIQnoMHSXUPr/RqOIhJX+32ObuY3MFvdlRElbSsSJxrRy/OCCZdS
# se+f2AqQ+F/2aYwBDmUQbeMB8n0pYLZnOPifqe78RBH2fVZsvXxyfizbHubWWoUf
# NW/FJlZlLXwJmF3BoL8E2p09K3hagwz/otcKtQ1+Q4+DaOYXWleqJrJUsnHs9UiL
# crVF0leL/Q1V5bshob2OTlZq0qzSdrMDLWdhyrUOxnZ+ojZ7UdTY4VnCuogbZ9Zs
# 9syJbg7ZUS9SVgYkowRsWv5jV4lbqTD+tG4FzhOwcRQwdb6A8zp2Nnd+s7VdCuYF
# sGgI41ucD8oxVfcAMjF9YX5N2s4mltkqnUe3/htVrnxKKDAwSYliaux2L7gKw+bD
# 1kEZ/5ozLRnJ3jjDkomTrPctokY/KaZ1qub0NUnmOKH+3xUK/plWJK8BOQYuU7gK
# YH7Yy9WSKNlP7pKj6i417+3Na/frInjnBkKRCJ/eYTvBH+s5guezpfQWtU4bNo/j
# 8Qw2vpTQ9w7flhH78Rmwd319+YTmhv7TcxDbWlyteaj4RK2wk3pY1oSz2JPE5PNu
# Nmd9Gmf6oePZgy7Ii9JLLq8SnULV7b+IP0UXRY9q+GdRjM2AEX6msZvvPCIoG0aY
# HQu9wZsKEK2jqvWi8/xdeeeSI9FN6K1w4oVQM4Mwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIVWzCCFVcCAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAVGejY9AcaMOQQAAAAABUTAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgoOtZ6EjD
# qVszNjI8PRoZ8lE/5CJ9bzy6/HNZQXwd/gswQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQCI5G5GgMBKtSoD1iHwelFaLAgvqsxXnyqPO3/jdQM0
# S57pAe8T8W7Op8dTOBA/cxZhw8Larnl92PzWPPTY3Nuj0nUbwPosko+u0bHNhIIY
# 27xI0FKls5rlfiIEVV+oO7oaT52orkEJnKfkDLnGH2+2D+uMD2YifRIOxkfY7olE
# UgXCDWGD1h+S0IuJ+EqRVkzzYK0IZyeIwcSjNQv+58DgDM0g8lD+QOLz4HoG/qO1
# +04Sm75AHc6awH3eyjs6u69KJr9w41PTHjfNPND2SdnzK4/UfuVOLtMqDjrpR+Eb
# PUdJas9UdMhnnd/Xwttxr6YIiRLI8vJZODLnYGd/D2pIoYIS5TCCEuEGCisGAQQB
# gjcDAwExghLRMIISzQYJKoZIhvcNAQcCoIISvjCCEroCAQMxDzANBglghkgBZQME
# AgEFADCCAVEGCyqGSIb3DQEJEAEEoIIBQASCATwwggE4AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIL0fcV4SK3aIqLIe5sf9wBYCW3+WricH/Nq4vP/Y
# nxpXAgZeKeCgXZUYEzIwMjAwMjA0MDExMzEzLjIxM1owBIACAfSggdCkgc0wgcox
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
# Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJjAkBgNVBAsTHVRoYWxlcyBUU1Mg
# RVNOOkQyQ0QtRTMxMC00QUYxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFt
# cCBTZXJ2aWNloIIOPDCCBPEwggPZoAMCAQICEzMAAAEiG48AJiXMsecAAAAAASIw
# DQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN
# MTkxMTEzMjE0MDQzWhcNMjEwMjExMjE0MDQzWjCByjELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2Eg
# T3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDJDRC1FMzEwLTRB
# RjExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggEiMA0G
# CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDfFQNIYkE+wXLcD2Ufk2s4kUKUhTQ9
# 5+R/Q6DUhduOGdLJsSKhocU1Kl8L1zEqk/k1k+5oVCiBp5L9FO7ycSh779B+Q8Te
# iERLM+nbMdsAxUCbPjR0sQ63kJTFpDgB/4HOpeLULMPQ6iEl0jfEs2uqdt/gWIq4
# KyK0ZXoP/Oo6S7zhWz4Cjczk7gS0ilAfSt7xB5lEhQhLCtkp9rzO6CKqMLW5ujYV
# yhmFcfrdx74/Y6E2Gs9u1YOk8Ktn4Y4cW/2E2e+4BeMs9AS+0XWbk/NYY2xiPHjZ
# qlzoVZEKGldOJ09P+kIh/jntp3Tpqr2NTeDt9OjT1qUY1yzJddR0pcLJAgMBAAGj
# ggEbMIIBFzAdBgNVHQ4EFgQUjjY9VWprwC9x2Djj4TS9nRczt8gwHwYDVR0jBBgw
# FoAU1WM6XIoxkPNDe3xGG8UzaFqFbVUwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDov
# L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljVGltU3RhUENB
# XzIwMTAtMDctMDEuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0
# cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNUaW1TdGFQQ0FfMjAx
# MC0wNy0wMS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDCDAN
# BgkqhkiG9w0BAQsFAAOCAQEAi6RHbsMi/wa2g3J+VTuchJyiNZ0fZlqWuihOJOux
# N59QvCd66Hp2pBaRCF4jfx+wbrGEeOdJ5luTZIUD88hJof4Q7Q37ZX78snbMd/gh
# r177Z1bf7t3yRM2cQ3vH6j20jWtlacoWeG/CRsCX0VHy/5o+qJxb/SfVC5WB+aZB
# cF/j7cdzHls7CMcTpzDaon2+q5J0mB+bV/I7kGyLx4kIQOgvox1xeXywxtFOgVef
# BCKYHL59hLoQZsOUwr8k8kd/P8wWckaDTuWt/uRq41wzYw/nd3ACzfTHVF6DY9qQ
# FQVEGJ0RA4cEs6EIX94sN/zpVTnUG+0PPdXBcgBKUkjK2zCCBnEwggRZoAMCAQIC
# CmEJgSoAAAAAAAIwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp
# ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTEwMDcwMTIxMzY1NVoXDTI1MDcwMTIx
# NDY1NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggEiMA0GCSqGSIb3
# DQEBAQUAA4IBDwAwggEKAoIBAQCpHQ28dxGKOiDs/BOX9fp/aZRrdFQQ1aUKAIKF
# ++18aEssX8XD5WHCdrc+Zitb8BVTJwQxH0EbGpUdzgkTjnxhMFmxMEQP8WCIhFRD
# DNdNuDgIs0Ldk6zWczBXJoKjRQ3Q6vVHgc2/JGAyWGBG8lhHhjKEHnRhZ5FfgVSx
# z5NMksHEpl3RYRNuKMYa+YaAu99h/EbBJx0kZxJyGiGKr0tkiVBisV39dx898Fd1
# rL2KQk1AUdEPnAY+Z3/1ZsADlkR+79BL/W7lmsqxqPJ6Kgox8NpOBpG2iAg16Hgc
# sOmZzTznL0S6p/TcZL2kAcEgCZN4zfy8wMlEXV4WnAEFTyJNAgMBAAGjggHmMIIB
# 4jAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQU1WM6XIoxkPNDe3xGG8UzaFqF
# bVUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1Ud
# EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYD
# VR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwv
# cHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEB
# BE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9j
# ZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwgaAGA1UdIAEB/wSBlTCB
# kjCBjwYJKwYBBAGCNy4DMIGBMD0GCCsGAQUFBwIBFjFodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vUEtJL2RvY3MvQ1BTL2RlZmF1bHQuaHRtMEAGCCsGAQUFBwICMDQe
# MiAdAEwAZQBnAGEAbABfAFAAbwBsAGkAYwB5AF8AUwB0AGEAdABlAG0AZQBuAHQA
# LiAdMA0GCSqGSIb3DQEBCwUAA4ICAQAH5ohRDeLG4Jg/gXEDPZ2joSFvs+umzPUx
# vs8F4qn++ldtGTCzwsVmyWrf9efweL3HqJ4l4/m87WtUVwgrUYJEEvu5U4zM9GAS
# inbMQEBBm9xcF/9c+V4XNZgkVkt070IQyK+/f8Z/8jd9Wj8c8pl5SpFSAK84Dxf1
# L3mBZdmptWvkx872ynoAb0swRCQiPM/tA6WWj1kpvLb9BOFwnzJKJ/1Vry/+tuWO
# M7tiX5rbV0Dp8c6ZZpCM/2pif93FSguRJuI57BlKcWOdeyFtw5yjojz6f32WapB4
# pm3S4Zz5Hfw42JT0xqUKloakvZ4argRCg7i1gJsiOCC1JeVk7Pf0v35jWSUPei45
# V3aicaoGig+JFrphpxHLmtgOR5qAxdDNp9DvfYPw4TtxCd9ddJgiCGHasFAeb73x
# 4QDf5zEHpJM692VHeOj4qEir995yfmFrb3epgcunCaw5u+zGy9iCtHLNHfS4hQEe
# gPsbiSpUObJb2sgNVZl6h3M7COaYLeqN4DMuEin1wC9UJyH3yKxO2ii4sanblrKn
# QqLJzxlBTeCG+SqaoxFmMNO7dDJL32N79ZmKLxvHIa9Zta7cRDyXUHHXodLFVeNp
# 3lfB0d4wwP3M5k37Db9dT+mdHhk4L7zPWAUu7w2gUDXa7wknHNWzfjUeCLraNtvT
# X4/edIhJEqGCAs4wggI3AgEBMIH4oYHQpIHNMIHKMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMkNELUUzMTAtNEFG
# MTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcG
# BSsOAwIaAxUAUOwD/JcbpKVMXpF2Vh77MyVNm9mggYMwgYCkfjB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOHi33gwIhgPMjAy
# MDAyMDQwMjA1NDRaGA8yMDIwMDIwNTAyMDU0NFowdzA9BgorBgEEAYRZCgQBMS8w
# LTAKAgUA4eLfeAIBADAKAgEAAgIBeAIB/zAHAgEAAgIR3TAKAgUA4eQw+AIBADA2
# BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB
# AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGCL0MRYcY/K6DxtUAIv79iH0Xxfq/v7
# xh1DIY8IqkMrgWSxoz8rIN3XHFIiDlKPPz0POOg9+dF16bl8ZMyJ1oq3YAZKAsNY
# tUKLodK8l/t1w71EuLdyJd5eGyuuoCBo/NRHk8gHfuG6ThGZFjiQdfjliHgBy4In
# xO+9A+pHe+JuMYIDDTCCAwkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAEiG48AJiXMsecAAAAAASIwDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg7/LRPGhF
# gDoODMyJodAXOzC0jQZD1iTb7hLANWvCIQMwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCC78GCJXmIyzmqyWSlw5bflow9yQ3g4vvs34oNSwngxCTCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABIhuPACYlzLHnAAAA
# AAEiMCIEIHyuhThySIW+FOMdJBhdYT4Pzvt+uCJDeu1gq7S2lJFKMA0GCSqGSIb3
# DQEBCwUABIIBAGSTrv5PC0O3bwbzumJwzOvp6cFMMOG7vfnXSvzJ/ifmP51cQh3O
# V8zXDb2bxqiTUyPuRQamNeHuKzfk+W4uAuTFiInknBL8iz7omIo4EOG3Hjk0sCoc
# T8R3ye9Ml2rMS0cGm3K6iJbnAYiNp0MqxCy3tqQoOCm7Rh7hIU97PjKo1rsDmSa2
# vQbrqJl5k5fH2k0m7j8BrN/6CPHbsE4M8DZ/l8z69+1qkCkY8jSjpVBOuPhu9hTL
# LOpcbZUeFcN5W7VJ3O8qh3067naqDwq6oj4GRRro6vuYsIj6Wbwh8lQRz6iz4VLs
# UP3837cgXee1wD12TI0ybtnitLhCfFQZN0Y=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_32_57.ps1 | sample_32_57.ps1 | #
# Module manifest for module 'OCI.PSModules.Genericartifactscontent'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Genericartifactscontent.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ae94c03a-b1fd-4547-8536-fbadc98c3ab2'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Genericartifactscontent Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Genericartifactscontent.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIGenericartifactscontentGenericArtifactContent',
'Get-OCIGenericartifactscontentGenericArtifactContentByPath',
'Write-OCIGenericartifactscontentGenericArtifactContentByPath'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Genericartifactscontent'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_61_85.ps1 | sample_61_85.ps1 | #
# Copyright 2018-2024 HP Development Company, L.P.
# All Rights Reserved.
#
# NOTICE: All information contained herein is, and remains the property of HP Development Company, L.P.
#
# The intellectual and technical concepts contained herein are proprietary to HP Development Company, L.P
# and may be covered by U.S. and Foreign Patents, patents in process, and are protected by
# trade secret or copyright law. Dissemination of this information or reproduction of this material
# is strictly forbidden unless prior written permission is obtained from HP Development Company, L.P.
<#
.SYNOPSIS
Returns true if user is running with elevated privileges
.DESCRIPTION
This command returns true if the user is running with elevated administrator privileges, otherwise returns false.
.EXAMPLE
Test-IsElevatedAdmin
#>
function Test-IsElevatedAdmin
{
[CmdletBinding(HelpUri = "https://developers.hp.com/hp-client-management/doc/Test-IsElevatedAdmin")]
param()
$user = [Security.Principal.WindowsIdentity]::GetCurrent();
(New-Object Security.Principal.WindowsPrincipal $user).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)
}
<#
.SYNOPSIS
This is a private command for internal use only. Convert an XML to an indented string document
.DESCRIPTION
This is a private command for internal use only. This command takes an XML document and returns a prettified text version of the document, suitable for printing or writing to a file.
.PARAMETER xml
Specifies the XML object to format
.PARAMETER Indent
Specifies the number of spaces to indent. If not specified, default is 2.
.EXAMPLE
$xml | Format-XmlToText
.NOTES
- This is a private function for internal use only
#>
function Format-XmlToText {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline = $true,Mandatory = $true,Position = 0)]
[xml]$xml,
[Parameter(Mandatory = $false,Position = 1)]
[int]$Indent = 2
)
$StringWriter = New-Object System.IO.StringWriter
$XmlWriter = New-Object System.Xml.XmlTextWriter $StringWriter
$xmlWriter.Formatting = 'indented'
$xmlWriter.Indentation = $Indent
$xml.WriteContentTo($XmlWriter)
$XmlWriter.Flush()
$StringWriter.Flush()
$StringWriter.ToString()
}
Export-ModuleMember -Function 'Test-*'
Export-ModuleMember -Function 'Format-*'
# SIG # Begin signature block
# MIIoHgYJKoZIhvcNAQcCoIIoDzCCKAsCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCpbNsddJvRANo0
# ZcDDQZzna0ihlDcwkeE23k3m4DWzq6CCDYowggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggbSMIIEuqADAgECAhAJvPMqSNxAYhV5FFpsbzOhMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjE1MDAwMDAwWhcNMjUwMjE4
# MjM1OTU5WjBaMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTESMBAG
# A1UEBxMJUGFsbyBBbHRvMRAwDgYDVQQKEwdIUCBJbmMuMRAwDgYDVQQDEwdIUCBJ
# bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEApbF6fMFy6zhGVra3
# SZN418Cp2O8kjihQCU9tqPO9tkzbMyTsgveLJVnXPJNG9kQPMGUNp+wEHcoUzlRc
# YJMEL9fhfzpWPeSIIezGLPCdrkMmS3fdRUwFqEs7z/C6Ui2ZqMaKhKjBJTIWnipe
# rRfzGB7RoLepQcgqeF5s0DBy4oG83dqcRHo3IJRTBg39tHe3mD5uoGHn5n366abX
# vC+k53BVyD8w8XLppFVH5XuNlXMq/Ohf613i7DRb/+u92ZiAPVPXXnlxUE26cuDb
# OfJKN/bXPmvnWcNW3YHVp9ztPTQZhX4yWYXHrAI2Cv6HxUpO6NzhFoRoBTkcYNbA
# 91pf1Vagh/MNcA2BfQYT975/Vlvj9cfEZ/NwZthZuHa3rdrvCKhhjw7YU2QUeaTJ
# 0uaX4g6B9PFNqAASYLach3CDJiLmYEfus/utPh57mk0q27yL25fXo/PaMDXiDNIi
# 7Wuz7A+sPsbtdiY8zvEIRQ+XJXtKAlD4tqG9YzlTO6ZoQX/rAgMBAAGjggIDMIIB
# /zAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4EFgQURH4F
# u5yEAuElYWUbyGRYkNLLrA8wPgYDVR0gBDcwNTAzBgZngQwBBAEwKTAnBggrBgEF
# BQcCARYbaHR0cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMA4GA1UdDwEB/wQEAwIH
# gDATBgNVHSUEDDAKBggrBgEFBQcDAzCBtQYDVR0fBIGtMIGqMFOgUaBPhk1odHRw
# Oi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNybDBToFGgT4ZNaHR0cDovL2NybDQuZGln
# aWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hB
# Mzg0MjAyMUNBMS5jcmwwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUFBzABhhho
# dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6Ly9jYWNl
# cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNB
# NDA5NlNIQTM4NDIwMjFDQTEuY3J0MAkGA1UdEwQCMAAwDQYJKoZIhvcNAQELBQAD
# ggIBAFiCyuI6qmaQodDyMNpp0l7eIXFgJ4JI59o59PleFj4rcyd/+F4iI7u5if8G
# rV5Kn3s3tK9vfJO8SpqtEh7lL4e69z6v3ohcy4uy2hsjKQ/fFcDo9pQYDGmDVjCa
# D5qSVEIBlJHBe5NKEJAgUE0kaMjLzbi2+8DKJlNtvZ+hatuPl9fMnmU+VbQh7JhZ
# yJdz8Ay0tcQ9lC8HAX5Ah/pU+Vtv+c8gMSxjS1aWXoGCa1869IVi2O6qx7MuX12U
# 1eIpB9XxYr7HSebvg2G7Gz6nCh7u+4k7m3hJu9EStUIN2JII5260+E60uDWoHEhx
# tHbdueFQxJrTKnhplOSaaPFCVBDkWG83ZzN9N3z/45w1pBUNBiPJdRQJ58MhBYQe
# Zl90heMBL8QNQk2i0E5gHNT9pJiCR9+mvJkRxEVgUn+16ZpVnI6kzhThV9qBaWVF
# h83X4UWc/nwHKIuu+4x4fmkYc79A3MrsHflZIO8jOy0GC/xBnZTQ8s5b9Tb2UkHk
# w692Ypl7War3W7M37JCAPC/A7M4CwQYjdjG43zs5m36auYVaTvRLKtZVLzcj8oZX
# 4vqhlZ8+jCPXFiuDfoBXiTckTLpv/eHQ6q7Aoda+qARWPPE1U2v5r/lpKVqIx7B4
# PdFZAUf5MtG/Bj7LVXvXjW8ABIJv7L4cI2akn6Es0dmvd6PsMYIZ6jCCGeYCAQEw
# fTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xQTA/BgNV
# BAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJTQTQwOTYgU0hB
# Mzg0IDIwMjEgQ0ExAhAJvPMqSNxAYhV5FFpsbzOhMA0GCWCGSAFlAwQCAQUAoHww
# EAYKKwYBBAGCNwIBDDECMAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYK
# KwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJNfCVaJ
# +5oHGR4nVU6R0Y72lDK4Q4Ep/g6gbaDjlhdLMA0GCSqGSIb3DQEBAQUABIIBgBX3
# J29ytbRDI7MYo2zurUAtfhFiaIU/XL0rjDQM2lRHCCDDvAmAU/B+pG2Gx/5ftyPF
# gzB0hUCeRrZ7QBB8+v6u9NvCr5471+Zllnbhk2xr54NIfze8c0pN129+eB+0C/MI
# XPfZkUcY1U7BXQnEEYw2h7GnltkH/79lRRseyMSyDjvYBAm/qyc8OaosCwEaJfZe
# 9HIaYvLKA8wpqDWK9d8dhz3Vwnop1qa62tnx6XWUukd/53tkwTb37TLTWDsa5WHT
# 24TVHmTxbKVIP14rsBoL4p07dONiDIKLxvzbGUqE+0yux2wI57l5OK1I9sJCIxMw
# 8LIWUE4yoCRPpGZLmlv+lKrTJW0hD73VLOo85lyp9jc0uh88BtGCf/f/K0zQw9Fd
# AQj5gM2s38rz63of+tpAQFZpsdaocQujV2X/lVosBRfymAmH0RmAHpdprMTC1MgA
# tRL5/sAJ39H7BG080sAVyR64t842ZAQgveOZ/zy9+MiHtqY/N1XfKos66HiEfaGC
# F0Awghc8BgorBgEEAYI3AwMBMYIXLDCCFygGCSqGSIb3DQEHAqCCFxkwghcVAgED
# MQ8wDQYJYIZIAWUDBAIBBQAweAYLKoZIhvcNAQkQAQSgaQRnMGUCAQEGCWCGSAGG
# /WwHATAxMA0GCWCGSAFlAwQCAQUABCCM78NwX6rCAKjDgIF4LDrh425HAvbTinFE
# 7gcw8pxnkwIRAJDjRuihDAO8g8pa/nCcMPUYDzIwMjQwODI3MTY1NTUwWqCCEwkw
# ggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUAMGMx
# CzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMy
# RGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcg
# Q0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQGEwJV
# UzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0IFRp
# bWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAo1NF
# hx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrdECmK
# HmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLPywem
# MGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8bZlLj
# yNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK1ZXO
# 7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9MZll
# R1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapMZoOI
# aGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyqq1AV
# ybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8SdlalJPrX
# xGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+8LbH
# 1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rxKBMh
# SVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4GA1Ud
# DwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAWgBS6
# FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUxo97V
# 40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp
# Z2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNybDCB
# kAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2lj
# ZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29t
# L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy
# dDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN6l0i
# kuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3aEl3
# o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM2Jh2
# T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ+OVJ
# dwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgmagNF
# 3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doRS4wy
# w4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/Kwtw9
# Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHLFAx+
# rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquvczro
# SUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIjTvTs
# 0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mtkIBE
# r4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEB
# CwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV
# BAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQg
# Um9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNV
# BAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNl
# cnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3
# qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBMLJnOW
# bfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt
# 69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLydkf3
# YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECn
# wHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgmf6Aa
# RyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9abJTy
# UpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwYSH8U
# NM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80VgvCON
# WPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBAS
# A31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9Rp61
# 03a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIBADAd
# BgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7NfjgtJx
# XWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUF
# BwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGln
# aWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJo
# dHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNy
# bDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQEL
# BQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CK
# Daopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9qVbP
# FXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaH
# bJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6ZJxur
# JB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnEtp/N
# h4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fxZsNB
# zU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV77Qpf
# MzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT1Oby
# F5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkPCr2B
# 2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvmfxqk
# hQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCCBHWg
# AwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYDVQQG
# EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl
# cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwHhcN
# MjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEVMBMG
# A1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEw
# HwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZwuEp
# pz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4VpX6+
# n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAdYykt
# zuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3T6cw
# 2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjUN6Qu
# BX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNdaSaTC
# 5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtmmnTK
# 3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyVw4/3
# IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3AeEP
# lAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYiCd98
# THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmpsh3l
# GwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7NfjgtJx
# XWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8w
# DgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYYaHR0
# cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2FjZXJ0
# cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUGA1Ud
# HwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFz
# c3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3DQEB
# DAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+IcaaVQi
# 7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096wwepqL
# sl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcDx4eo
# 0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsgjTVg
# HAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37YOtnw
# toeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYDVQQG
# EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0
# IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAFRK/z
# lJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzENBgsq
# hkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwODI3MTY1NTUwWjArBgsqhkiG
# 9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG9w0B
# CQQxIgQgoHtGZskde2BlZfgxYp7arckrs0rQT6rxhBYfgLAO9NswNwYLKoZIhvcN
# AQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQMeCgw
# DQYJKoZIhvcNAQEBBQAEggIAccCC2uC3eL9oaBPv5gdMxM1fjEKMDDvLQVtjc6k4
# RRglfZ/y4FO1wnygD1GvEIa7sZRuwsrSEenWf6XkEppASnL/pvdrKDoRzxe5GRqe
# Pa1JXo5sFxKG2MAb64qTXDrz0yP/xLGVymeeu6eF9WmnRk4yPXCIm/d+Wu7Oc49S
# O/Df4R+PCNEEGQaGerexhQ+83zaiPOcYg557WJyqXb1i1tdFRA3PA57iKJK3Db4Y
# DmLnhlnD6/PJH8WuMep2jFTkHN7vkWWabVy+9toCFGd96+x1pvTUarCmD+7A5YpH
# 3Kc9lI9hw49pbfnoR6QjsXTXfChkE8LSKUsxucoADuDAPRY3pc0DPZOb9na5H2X1
# DGvfJmW2vr77558/8WFQI4UWU7fp5aXxzfIstlzuuz1fJbzzOSTpAVFYdtlJPHQP
# oW1bngixXPcICbATfdHfTQnfPTpfCkdjthqcRGkp8RuQ7OAaHeWeMmMXMAF6b/8+
# XUYntmkbhcINp8z0zfKM0CG2kei3dAgCTDoOeJBxjEooDRp5neq0f5Jzrm04PE8V
# LDWwZ/L+I0c04WdkqR6DDjtGtOhe97tFl0759S5wOKbQ7D0aUs2kM5xAXvJsXXJe
# mWTV9wuzR0vbpEd9MG03TvXj4cEpAoZmRH5HQs+F/Z4EKH66Sx52QmJaiE3fvHkn
# Mso=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_55_58.ps1 | sample_55_58.ps1 | #!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="E:\艺施胡\alova-devtools\node_modules\.pnpm\typescript@5.5.3\node_modules\typescript\bin\node_modules;E:\艺施胡\alova-devtools\node_modules\.pnpm\typescript@5.5.3\node_modules\typescript\node_modules;E:\艺施胡\alova-devtools\node_modules\.pnpm\typescript@5.5.3\node_modules;E:\艺施胡\alova-devtools\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/e/艺施胡/alova-devtools/node_modules/.pnpm/typescript@5.5.3/node_modules/typescript/bin/node_modules:/mnt/e/艺施胡/alova-devtools/node_modules/.pnpm/typescript@5.5.3/node_modules/typescript/node_modules:/mnt/e/艺施胡/alova-devtools/node_modules/.pnpm/typescript@5.5.3/node_modules:/mnt/e/艺施胡/alova-devtools/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$new_node_path$pathsep$env_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../typescript/bin/tsserver" $args
} else {
& "$basedir/node$exe" "$basedir/../typescript/bin/tsserver" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../typescript/bin/tsserver" $args
} else {
& "node$exe" "$basedir/../typescript/bin/tsserver" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/sample_0_90.ps1 | sample_0_90.ps1 | #************************************************
# DC_WinHTTP-Component.ps1
# Version 1.0
# Version 1.1: Moved $sectionDescription to the correct location.
# Date: 2009-2014
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects information about WinHTTP.
# Called from: Main Networking Diag, PKI Interactive Diag, WebClient Interactive Diag
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
Write-DiagProgress -Activity $ScriptVariable.ID_CTSWinHTTP -Status $ScriptVariable.ID_CTSWinHTTPDescription
$sectionDescription = "WinHTTP"
#os version
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
function RunNetSH ([string]$NetSHCommandToExecute="")
{
Write-DiagProgress -Activity $ScriptVariable.ID_CTSWinHTTP -Status "netsh $NetSHCommandToExecute"
$NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6
"`n`n`n" + "-" * ($NetSHCommandToExecuteLength) + "`r`n" + "netsh $NetSHCommandToExecute" + "`r`n" + "-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
}
#WV, WS2008+
if ($bn -gt 6000)
{
#----------Netsh
$OutputFile = $ComputerName + "_WinHTTP_netsh_proxy-settings.txt"
RunNetSH -NetSHCommandToExecute "winhttp show proxy"
CollectFiles -filesToCollect $OutputFile -fileDescription "WinHTTP proxy settings" -SectionDescription $sectionDescription
}
else #XP, WS2003
{
#----------ProxyCfg
$OutputFile = $ComputerName + "_WinHTTP_proxycfg.txt"
$CommandToExecute = "cmd.exe /c proxycfg.exe >> $OutputFile"
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
CollectFiles -filesToCollect $OutputFile -fileDescription "WinHTTP-proxy-settings_proxycfg" -SectionDescription $sectionDescription
}
#----------Registry
$OutputFile= $Computername + "_WinHTTP_reg_output.TXT"
$CurrentVersionKeys = "HKLM\System\CurrentControlSet\Services\WinHttpAutoProxySvc"
RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "WinHTTP registry output" -SectionDescription $sectionDescription
# Commented this out from the reg output for WinHTTP: "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections"
# Look at the InternetExplorer registry output file.
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvLbAQ2H2qUV38
# tyrfvWMWSoCueRzxL9AgQ1aRDjuYc6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEO8GJEXri0oGH6N7X+6Oo/j
# OrUvS1PwhDxCAJgqyniDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAd0Fd16Mcw8DA0EA5wZVgxPxrXvaltC8T9j1ToPLmTPu0iDiprQy1uzHg
# SHsvlVSbu699VIIwTKX7ofdmAGKuQQv8Oymx66zFaO4ns40kH9/mktD9voxb9Iwm
# yCEeJS7R7mAzTOHVST6cj3GTo/xzhyAeXlQeHak+jHcTJ8MDTvApMHDkz3uZ3Td2
# t036USB/jTx132y+qM6CCcY5AcAcAhNxKWQMAHLhTjoeqxSFFmUaX4MgGP7zscNi
# 0iXd+lxz7LXwWhZdScI0bV8CTFj1fvWICm8Xk/Y+hkpjbnOUD9CHUB9tMgWvN0/A
# si5XjJfFfnno7elydX8VjBiYPovOh6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBkd2DTrvBFl/HkOeCX1csonXwr+Qui5TDGOm3gj8pliwIGZus6esox
# GBMyMDI0MTAyODExNDA0Ni40MDVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT
# j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt
# gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh
# 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY
# X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd
# F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI
# J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc
# QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry
# 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn
# Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5
# olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+
# Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ
# I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf
# hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI
# hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut
# Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8
# cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo
# riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt
# g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A
# W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm
# Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe
# bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w
# MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9
# YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK
# AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch
# wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL
# Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq
# gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu
# 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy
# dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo
# dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgLn4NX4pcD37N
# keXLdlHORX0LtrWDA7bd0KDZoKCvp3MwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5
# MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB
# CwUABIICAFy7ohPs0eboBHbZWtSh6tr2np1RcU41fwKQuORzFPG/3L3vdwOOeri/
# GM/AHt0a7w71+hAJ6lQV27AuuaHKA6Z7weaQOc8a9U8/gqOiD2Lov0eVuUEXdcxD
# s/lIyTtENvQ2CeQAdgv0X+x4fkdUZmFRKIPWac6Q7MIV1av3DO3k6ZFS+AiVFiQJ
# mI5bzXYW3NRcnNeAhZ84uzUO6Kr6fvlV1d1uePtgfzBsGFD2B+QWfa89F+Dp70iz
# Ejwbo6WPpWxwjVsLMXqlsblcCp9IhxCA/qE4qLmiCl2rQfs2RosB24pgVUuzBBdB
# dyGMQzLMI6PMDyxqNf8rPGwfilMMfBuCR0t/VswRBnOm9iCElFECLwrFklmZJAV9
# TMAOy8g/pizT5Y2CKyHQRNzho88nnT3iXA9QxMTtmQnq3V3LicSSxWEAZJ8dobSd
# krNebbFUtmkVlIu7hpIVNvPPtxFtGMI58X4sTOWtoYhc4hOFBBuchmQD9kejuvmh
# KBD6fsJlB65AKE6XkowP5XnTxfDnuGXhK2jI3ymoBm9KJ2qdoFUJWytc0X9GpvIx
# hXc2+xGsWl9KV07MlRwEAfqIXP2cI4VLwFR+B3YgQ67j8mxzbezqPXsOJAWT4MKb
# p7/lHgDE3JI9fgU/fAgD67bc7ZPAb8tIvsYpTcqiNKnfCH3l3bZI
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_2_50.ps1 | sample_2_50.ps1 | #************************************************
# DC_KIR-RBC-RegEntries.ps1
# Version 1.0
# Date: 2020
# Author: + Walter Eder (waltere@microsoft.com)
# Description: Collects KIR (for 2019) and RBC (for 2016) Registry Entries
# Called from: TS_AutoAddCommands_*.ps1
#*******************************************************
function InsertRegHeader(
[string] $RegHeader="",
[string]$OutputFile)
{
if($RegHeader -ne "")
{
$RegHeader | Out-File -FilePath $OutputFile -Append -Encoding Default
"=" * ($RegHeader.Length) | Out-File -FilePath $OutputFile -Append -Encoding Default
}
}
Import-LocalizedData -BindingVariable KirRegistryStrings
Write-DiagProgress -Activity $KirRegistryStrings.ID_KIRRegentriesActivity -Status $KirRegistryStrings.ID_KIRRegentriesStatus
$OutputFile = $ComputerName + "_reg_KIR-RBC_MyKnobs.txt"
$fileDescription = "KIR (for 2019) and RBC (for 2016) Registry Entries"
InsertRegHeader -OutputFile $OutputFile -RegHeader "KIR (for 2019) Registry Entries"
RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Policies" -OutputFile $OutputFile -fileDescription $fileDescription -Recursive $true -AddFileToReport $false
Write-DiagProgress -Activity $KirRegistryStrings.ID_HivesRegentriesActivity -Status $KirRegistryStrings.ID_HivesRegentriesStatus
$OutputFile= $Computername + "_reg_System.HIV"
RegSave -RegistryKey "HKLM\SYSTEM" -OutputFile $OutputFile -fileDescription "Obtaining System Registry Hive"
$OutputFile= $Computername + "_reg_Software.HIV"
RegSave -RegistryKey "HKLM\Software" -OutputFile $OutputFile -fileDescription "Obtaining Software Registry Hive"
$OutputFile= $Computername + "_reg_Software_User.HIV"
RegSave -RegistryKey "HKCU\Software" -OutputFile $OutputFile -fileDescription "Obtaining Software_User Registry Hive"
Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABXOx0mJ2KgiQ1
# OlOqNCIJ99wsTSIA1UQCjacgGoEte6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMo0KTEPAWnT3sBsKPQToorj
# r1hUEDnvVM2k49Od8NYzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlRSEU+qhPifhOMlQ+4JzCVr/9JbgO5AhQeaMqT8WoZL48xPBgkh5OWyw
# 5nE2yRTvQ3GQvG8ukQSZJ3IXP2PQElwKBB1Z4YQetrgWPK6zILBpltdPZVoWDGmz
# B0wGdRYp3zfzGYeuqdcjgByuwkgz5u0Jh7vsMsjMCPmmQmcPsEuovYgoD4SZYvKO
# NqcauBXS3iAXI4H5T0u7H1FgTQW/9UUKZOSAFkfWhFSdJ7u7EPgTJJECk968zWDQ
# FDlH6iuFWmt+0v7mgsg+HV1g9ccRySpxHbE4c4lpTdGXnD81kqAkOda9/SVaRiDe
# bfK/Y8LmjyfqJ5EuIT/EASw/CsE/qaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCqRiMK2AWyzlh4oiCNzRZwJjlE7zZkXCrtbi2iFOgm/gIGZxp1kNxK
# GBMyMDI0MTAyODExNDA0My41MDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1
# NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP
# AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU
# 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt
# n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp
# un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q
# lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld
# HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBnrpeRQ8JnLJkGLNf9pgh20nOdC4PWmXRfB0x06LAvJTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo
# rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn
# cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAe6HI4RC6Dq+xciKWK9ef2gyI
# LQZ/+hawNafVQJ1MTWXMnlHDCgkvM136aOB9bxok8T3Fvr6KSAZbErnDDR+8GzyA
# E2LTNV5XL24yjJP1skFpYgiloF5Ld2hgTfp1LCyvdL0oQk9xStxzPth/TaHd/KZb
# nISwd5BDqFUHDvECMth7kOnQ1XlDlB0qLs0HI5EoqfUTqTGXwjJ7X1C6Igh0yWmx
# xmvriKdHoPZdtdZjBswFCwZUWqeRbwiYo/cCNBxb8jbEAfsCpWeQAMjvkp7BoNhl
# VjFYUX1KFggTRXTgWJPthh0U60rrtpZoLGmUu4d9Hmu067PteWEGpNoaQ4KzbrPo
# L9lsaZ2ALEGD+7Ree97BWOVkvg0/t85auqMowDC64MDEfblNTJc3BsLpn/Vc7Ox4
# b1YKlwWT/vTlwgdsZnX0/psvWDcxgfetpcKBOnXI51jePaJxsCTLhEgpuCOTVapl
# FGJ4N1ekTwz0V+YOsNALJm9OHMSsBOy3n3bWT0DAK1J/RWZGXnYn57JaDoP5/wjc
# oEmhCcGy6Xxp5os4P/oJYMMeuVYfHtS+35JNt9zjqnxbiBwrhNY6Ax1O2I0xsEwf
# 1llGq37bfQ7BMxn9nuHtJ/s3UI5LaIzJ4JamDN55ogSTySY2DE5Wn7s2x0K2Anqv
# LtNTu1jf/fq7O9/OiqU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/541.ps1 | 541.ps1 |
function Get-SPOGroup
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string]$name
)
$web = $clientContext.Web
if ($web -ne $null)
{
$groups = $web.SiteGroups
$clientContext.Load($groups)
$clientContext.ExecuteQuery()
$group = $groups | where {$_.Title -eq $name}
return $group
}
return $null
}
|
combined_dataset/train/non-malicious/133.ps1 | 133.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$MethodArguments = [Type[]]@("System.String", "System.String", "System.Uri", "Microsoft.IdentityModel.Clients.ActiveDirectory.PromptBehavior", "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier")
$NonAsync = $AuthContext.GetType().GetMethod("AcquireToken", $MethodArguments)
if ($NonAsync -ne $null){
$authResult = $authContext.AcquireToken($resourceAppIdURI, $clientId, [Uri]$redirectUri, [Microsoft.IdentityModel.Clients.ActiveDirectory.PromptBehavior]::Auto, $userId)
}
else {
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI, $clientId, [Uri]$redirectUri, $platformParameters, $userId).Result
}
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-ManagedAppPolicy(){
[cmdletbinding()]
param
(
$Name
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/managedAppPolicies"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("ManagedAppProtection") -or ($_.'@odata.type').contains("InformationProtectionPolicy") }
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-ManagedAppProtection(){
[cmdletbinding()]
param
(
$id,
$OS
)
$graphApiVersion = "Beta"
try {
if($id -eq "" -or $id -eq $null){
write-host "No Managed App Policy id specified, please provide a policy id..." -f Red
break
}
else {
if($OS -eq "" -or $OS -eq $null){
write-host "No OS parameter specified, please provide an OS. Supported value are Android,iOS,WIP_WE,WIP_MDM..." -f Red
Write-Host
break
}
elseif($OS -eq "Android"){
$Resource = "deviceAppManagement/androidManagedAppProtections('$id')/?`$expand=deploymentSummary,apps,assignments"
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
elseif($OS -eq "iOS"){
$Resource = "deviceAppManagement/iosManagedAppProtections('$id')/?`$expand=deploymentSummary,apps,assignments"
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
elseif($OS -eq "WIP_WE"){
$Resource = "deviceAppManagement/windowsInformationProtectionPolicies('$id')?`$expand=protectedAppLockerFiles,exemptAppLockerFiles,assignments"
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
elseif($OS -eq "WIP_MDM"){
$Resource = "deviceAppManagement/mdmWindowsInformationProtectionPolicies('$id')?`$expand=protectedAppLockerFiles,exemptAppLockerFiles,assignments"
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AADGroup(){
[cmdletbinding()]
param
(
$GroupName,
$id,
[switch]$Members
)
$graphApiVersion = "v1.0"
$Group_resource = "groups"
try {
if($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($GroupName -eq "" -or $GroupName -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
else {
if(!$Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
elseif($Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
$Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
if($Group){
$GID = $Group.id
$Group.displayName
write-host
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
write-host "Running query against Microsoft Graph for App Protection Policies" -f Yellow
$ManagedAppPolicies = Get-ManagedAppPolicy
write-host
foreach($ManagedAppPolicy in $ManagedAppPolicies){
write-host "Managed App Policy:"$ManagedAppPolicy.displayName -f Yellow
$ManagedAppPolicy
if($ManagedAppPolicy.'@odata.type' -eq "
$AndroidManagedAppProtection = Get-ManagedAppProtection -id $ManagedAppPolicy.id -OS "Android"
write-host "Managed App Policy - Assignments" -f Cyan
$AndroidAssignments = ($AndroidManagedAppProtection | select assignments).assignments
if($AndroidAssignments){
foreach($Group in $AndroidAssignments.target.groupId){
(Get-AADGroup -id $Group).displayName
}
Write-Host
}
else {
Write-Host "No assignments set for this policy..." -ForegroundColor Red
Write-Host
}
write-host "Managed App Policy - Mobile Apps" -f Cyan
if($ManagedAppPolicy.deployedAppCount -ge 1){
($AndroidManagedAppProtection | select apps).apps.mobileAppIdentifier
}
else {
Write-Host "No Managed Apps targeted..." -ForegroundColor Red
Write-Host
}
}
elseif($ManagedAppPolicy.'@odata.type' -eq "
$iOSManagedAppProtection = Get-ManagedAppProtection -id $ManagedAppPolicy.id -OS "iOS"
write-host "Managed App Policy - Assignments" -f Cyan
$iOSAssignments = ($iOSManagedAppProtection | select assignments).assignments
if($iOSAssignments){
foreach($Group in $iOSAssignments.target.groupId){
(Get-AADGroup -id $Group).displayName
}
Write-Host
}
else {
Write-Host "No assignments set for this policy..." -ForegroundColor Red
Write-Host
}
write-host "Managed App Policy - Mobile Apps" -f Cyan
if($ManagedAppPolicy.deployedAppCount -ge 1){
($iOSManagedAppProtection | select apps).apps.mobileAppIdentifier
}
else {
Write-Host "No Managed Apps targeted..." -ForegroundColor Red
Write-Host
}
}
elseif($ManagedAppPolicy.'@odata.type' -eq "
$Win10ManagedAppProtection = Get-ManagedAppProtection -id $ManagedAppPolicy.id -OS "WIP_WE"
write-host "Managed App Policy - Assignments" -f Cyan
$Win10Assignments = ($Win10ManagedAppProtection | select assignments).assignments
if($Win10Assignments){
foreach($Group in $Win10Assignments.target.groupId){
(Get-AADGroup -id $Group).displayName
}
Write-Host
}
else {
Write-Host "No assignments set for this policy..." -ForegroundColor Red
Write-Host
}
write-host "Protected Apps" -f Cyan
if($Win10ManagedAppProtection.protectedApps){
$Win10ManagedAppProtection.protectedApps.displayName
Write-Host
}
else {
Write-Host "No Protected Apps targeted..." -ForegroundColor Red
Write-Host
}
write-host "Protected AppLocker Files" -ForegroundColor Cyan
if($Win10ManagedAppProtection.protectedAppLockerFiles){
$Win10ManagedAppProtection.protectedAppLockerFiles.displayName
Write-Host
}
else {
Write-Host "No Protected Applocker Files targeted..." -ForegroundColor Red
Write-Host
}
}
elseif($ManagedAppPolicy.'@odata.type' -eq "
$Win10ManagedAppProtection = Get-ManagedAppProtection -id $ManagedAppPolicy.id -OS "WIP_MDM"
write-host "Managed App Policy - Assignments" -f Cyan
$Win10Assignments = ($Win10ManagedAppProtection | select assignments).assignments
if($Win10Assignments){
foreach($Group in $Win10Assignments.target.groupId){
(Get-AADGroup -id $Group).displayName
}
Write-Host
}
else {
Write-Host "No assignments set for this policy..." -ForegroundColor Red
Write-Host
}
write-host "Protected Apps" -f Cyan
if($Win10ManagedAppProtection.protectedApps){
$Win10ManagedAppProtection.protectedApps.displayName
Write-Host
}
else {
Write-Host "No Protected Apps targeted..." -ForegroundColor Red
Write-Host
}
write-host "Protected AppLocker Files" -ForegroundColor Cyan
if($Win10ManagedAppProtection.protectedAppLockerFiles){
$Win10ManagedAppProtection.protectedAppLockerFiles.displayName
Write-Host
}
else {
Write-Host "No Protected Applocker Files targeted..." -ForegroundColor Red
Write-Host
}
}
} |
combined_dataset/train/non-malicious/sample_53_67.ps1 | sample_53_67.ps1 | param( [string]$DataPath, `
[switch]$AcceptEula, `
[switch]$Trace, `
[switch]$Logs, `
[switch]$Activity, `
[switch]$Fwd, `
[switch]$FwdCli, `
[switch]$RemShell, `
[switch]$HTTPSYS, `
[switch]$WinHTTP, `
[switch]$CAPI, `
[switch]$Kerberos, `
[switch]$NTLM, `
[switch]$PKU2U, `
[switch]$Schannel, `
[switch]$EventLog, `
[switch]$WMI, `
[switch]$Network, `
[switch]$PerfMon, `
[switch]$Kernel
)
$version = "WinRM-Collect (20230601)"
$DiagVersion = "WinRM-Diag (20230515)"
# by Gianni Bragante - gbrag@microsoft.com
Function Write-Diag {
param( [string] $msg )
$msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg
Write-Host $msg
$msg | Out-File -FilePath $diagfile -Append
}
Function WinRMTraceCapture {
Invoke-CustomCommand ("logman create trace 'WinRM-Trace' -ow -o '" + $TracesDir + "\WinRM-Trace-$env:COMPUTERNAME.etl" + "' -p 'Microsoft-Windows-WinRM' 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets")
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{04C6E16D-B99F-4A3A-9B3E-B8325BBC781E}' 0xffffffffffffffff 0xff -ets" # Windows Remote Management Trace
if (-not $Activity -or $Fwd) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{699E309C-E782-4400-98C8-E21D162D7B7B}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Forwarding
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B977CF02-76F6-DF84-CC1A-6A4B232322B6}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-EventCollector
}
if (-not $Activity -or $RemShell) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F1CAB2C0-8BEB-4FA2-90E1-8F17E0ACDD5D}' 0xffffffffffffffff 0xff -ets" # RemoteShellClient
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{03992646-3DFE-4477-80E3-85936ACE7ABB}' 0xffffffffffffffff 0xff -ets" # RemoteShell
}
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{72B18662-744E-4A68-B816-8D562289A850}' 0xffffffffffffffff 0xff -ets" # Windows HTTP Services
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{DD5EF90A-6398-47A4-AD34-4DCECDEF795F}' 0xffffffffffffffff 0xff -ets" # HTTP Service Trace
if ($HTTPSYS) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F5344219-87A4-4399-B14A-E59CD118ABB8}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Http-SQM-Provider
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{08F93B14-1608-4A72-9CFA-457EECEDBBA7}' 0xffffffffffffffff 0xff -ets" # WebIo
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C42A2738-2333-40A5-A32F-6ACC36449DCC}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpLog
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7B6BC78C-898B-4170-BBF8-1A469EA43FC5}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpEvent
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{20F61733-57F1-4127-9F48-4AB7A9308AE2}' 0xffffffffffffffff 0xff -ets" # HttpSysGuid
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1945E15-4933-460F-8103-AA611DDB663A}' 0xffffffffffffffff 0xff -ets" # HttpSysProvider
}
if (-not $Activity -or $WinHTTP) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7D44233D-3055-4B9C-BA64-0D47CA40A232}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-WinHttp
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B3A7698A-0C45-44DA-B73D-E181C9B5C8E6}' 0xffffffffffffffff 0xff -ets" # WinHttp
}
if (-not $Activity -or $CAPI) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBCA4A8-B209-48DC-A8C7-B23D3E5216FB}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-CAPI2
}
if (-not $Activity -or $Kerberos) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6B510852-3583-4E2D-AFFE-A67F9F223438}' 0xffffffffffffffff 0xff -ets" # Kerberos Authentication
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{BBA3ADD2-C229-4CDB-AE2B-57EB6966B0C4}' 0xffffffffffffffff 0xff -ets" # Kerberos Client
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{98E6CFCB-EE0A-41E0-A57B-622D4E1B30B1}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Security-Kerberos
}
if (-not $Activity -or $CredSSP) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6165F3E2-AE38-45D4-9B23-6B4818758BD9}' 0xffffffffffffffff 0xff -ets" # TSPkg
}
if (-not $Activity -or $NTLM) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{AC43300D-5FCC-4800-8E99-1BD3F85F0320}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-NTLM
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C92CF544-91B3-4DC0-8E11-C580339A0BF8}' 0xffffffffffffffff 0xff -ets" # NTLM Security Protocol
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}' 0xffffffffffffffff 0xff -ets" # NTLM Authentication
}
if ($PKU2U) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{2A6FAF47-5449-4805-89A3-A504F3E221A6}' 0xffffffffffffffff 0xff -ets" # Pku2u Authentication
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1108F75-3252-4B66-9239-80FD47E06494}' 0xffffffffffffffff 0xff -ets" # IdentityCommonLib
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{D93FE84A-795E-4608-80EC-CE29A96C8658}' 0xffffffffffffffff 0xff -ets" # IdentityListenerControlGuid
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{82C7D3DF-434D-44FC-A7CC-453A8075144E}' 0xffffffffffffffff 0xff -ets" # IDStore
}
if (-not $Activity -or $Schannel) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1F678132-5938-4686-9FDC-C8FF68F15C85}' 0xffffffffffffffff 0xff -ets" # Schannel
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{37D2C3CD-C5D4-4587-8531-4696C44244C8}' 0xffffffffffffffff 0xff -ets" # SchannelWppGuid
}
if ($FwdCli) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{9D11915C-C654-4D73-A6D6-591570E011A0}' 0xffffffffffffffff 0xff -ets" # EvtFwdrWpp
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6FCDF39A-EF67-483D-A661-76D715C6B008}' 0xffffffffffffffff 0xff -ets" # ForwarderTrace
}
if ($FwdCli -or $EventLog) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{FC65DDD8-D6EF-4962-83D5-6E5CFE9CE148}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Eventlog
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B0CA1D82-539D-4FB0-944B-1620C6E86231}' 0xffffffffffffffff 0xff -ets" # EventlogTrace
}
if ($WMI) {
Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1418EF04-B0B4-4623-BF7E-D74AB47BBDAA}' 0xffffffffffffffff 0xff -ets" # WMI-Activity
}
if ($Network) {
Invoke-CustomCommand ("netsh trace start capture=yes scenario=netconnection maxsize=2048 report=disabled tracefile='" + $TracesDir + "NETCAP-" + $env:COMPUTERNAME + ".etl'")
}
if ($Kernel) {
Invoke-CustomCommand ("logman create trace 'NT Kernel Logger' -ow -o '" + $TracesDir + "\WinRM-Trace-kernel-$env:COMPUTERNAME.etl" + "' -p '{9E814AAD-3204-11D2-9A82-006008A86939}' 0x1 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 512 -ets")
}
if ($PerfMon) {
Invoke-CustomCommand ("Logman create counter 'WinRM-Trace-PerfMon' -f bincirc -max 2048 -c '\Process(*)\*' '\Processor(*)\*' '\PhysicalDisk(*)\*' '\Event Tracing for Windows Session(EventLog-*)\Events Lost' '\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec' '\HTTP Service Request Queues(*)\*' -si 00:00:01 -o '" + $TracesDir + "WinRM-trace-$env:COMPUTERNAME.blg'")
Invoke-CustomCommand ("logman start 'WinRM-Trace-PerfMon'")
}
Write-Log "Trace capture started"
read-host "Press ENTER to stop the capture"
Invoke-CustomCommand "logman stop 'WinRM-Trace' -ets"
if ($Network) {
Invoke-CustomCommand "netsh trace stop"
}
if ($Kernel) {
Invoke-CustomCommand "logman stop 'NT Kernel Logger' -ets"
}
if ($PerfMon) {
Invoke-CustomCommand ("logman stop 'WinRM-Trace-PerfMon'")
Invoke-CustomCommand ("logman delete 'WinRM-Trace-PerfMon'")
}
Invoke-CustomCommand "tasklist /svc" -DestinationFile ("Traces\tasklist-$env:COMPUTERNAME.txt")
}
Function GetPlugins{
# This function is a contribution from Ga�tan Rabier
param(
[string] $WinRMPluginPath = "WSMan:\localhost\plugin"
)
Write-Log ("Parsing plugins from path " + $WinRMPluginPath)
$WinRMPlugins = Get-ChildItem $WinRMPluginPath
foreach ($Plugin in $WinRMPlugins) {
$PluginName = $Plugin.Name
$PluginURIs = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources).Name
$PluginDLL = (Get-ChildItem $WinRMPluginPath\$PluginName\Filename).Value
$PluginName | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
(" DLL: " + $PluginDLL) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
foreach ($PluginURI in $PluginURIs) {
$Capability = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Capability).Value
$SecurityContainerName = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security).Name
$SecurityContainer = Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security\$SecurityContainerName
$SecuritySddl = ($SecurityContainer |Where-Object {$_.Name -eq 'Sddl'}).Value
$SecuritySddlConverted = (ConvertFrom-SddlString $SecuritySddl).DiscretionaryAcl
$ResourceURI = ($SecurityContainer | Where-Object {$_.Name -eq 'ParentResourceUri'}).Value
(" URI: " + $ResourceURI) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
(" Capabilities: " + $Capability) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
(" Security descriptor : " + $SecuritySddlConverted) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
" " | Out-File -FilePath ($resDir + "\Plugins.txt") -Append
Remove-Variable SecurityContainerName,SecurityContainer,ResourceURI,Capability,SecuritySddlConverted,SecuritySddl
}
}
}
Function EvtLogDetails {
param(
[string] $LogName
)
Write-Log ("Collecting the details for the " + $LogName + " log")
$cmd = "wevtutil gl " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log ("Collecting the details for the " + $LogName + " log")
$cmd = "wevtutil gli " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
"" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
if ($logname -ne "ForwardedEvents") {
$evt = (Get-WinEvent -Logname $LogName -MaxEvents 1 -Oldest)
"Oldest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
$evt = (Get-WinEvent -Logname $LogName -MaxEvents 1)
"Newest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
"" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append
}
}
Function GetStore($store) {
$certlist = Get-ChildItem ("Cert:\LocalMachine\" + $store)
foreach ($cert in $certlist) {
$EKU = ""
foreach ($item in $cert.EnhancedKeyUsageList) {
if ($item.FriendlyName) {
$EKU += $item.FriendlyName + " / "
} else {
$EKU += $item.ObjectId + " / "
}
}
$row = $tbcert.NewRow()
foreach ($ext in $cert.Extensions) {
if ($ext.oid.value -eq "2.5.29.14") {
$row.SubjectKeyIdentifier = $ext.SubjectKeyIdentifier.ToLower()
} elseif (($ext.oid.value -eq "2.5.29.35") -or ($ext.oid.value -eq "2.5.29.1")) {
$asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData)
$aki = $asn.Format($true).ToString().Replace(" ","")
$aki = (($aki -split '\n')[0]).Replace("KeyID=","").Trim()
$row.AuthorityKeyIdentifier = $aki
} elseif (($ext.oid.value -eq "1.3.6.1.4.1.311.21.7") -or ($ext.oid.value -eq "1.3.6.1.4.1.311.20.2")) {
$asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData)
$tmpl = $asn.Format($true).ToString().Replace(" ","")
$template = (($tmpl -split '\n')[0]).Replace("Template=","").Trim()
$row.Template = $template
}
}
if ($EKU) {$EKU = $eku.Substring(0, $eku.Length-3)}
$row.Store = $store
$row.Thumbprint = $cert.Thumbprint.ToLower()
$row.Subject = $cert.Subject
$row.Issuer = $cert.Issuer
$row.NotAfter = $cert.NotAfter
$row.EnhancedKeyUsage = $EKU
$row.SerialNumber = $cert.SerialNumber.ToLower()
$tbcert.Rows.Add($row)
}
}
Function ChkCert($cert, $store, $descr) {
$cert = $cert.ToLower()
if ($cert) {
if ("0123456789abcdef".Contains($cert[0])) {
$aCert = $tbCert.Select("Thumbprint = '" + $cert + "' and $store")
if ($aCert.Count -gt 0) {
Write-Diag ("[INFO] The $descr certificate was found, the subject is " + $aCert[0].Subject)
if (($aCert[0].NotAfter) -gt (Get-Date)) {
Write-Diag ("[INFO] The $descr certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
} else {
Write-Diag ("[ERROR] The $descr certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
}
} else {
Write-Diag "[ERROR] The certificate with thumbprint $cert was not found in $store"
}
} else {
Write-Diag "[ERROR] Invalid character in the $cert certificate thumbprint $cert"
}
} else {
Write-Diag "[ERROR] The thumbprint of $descr certificate is empty"
}
}
Function GetSubVal {
param( [string]$SubName, [string]$SubValue)
$SubProp = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions\" + $SubName) | Get-ItemProperty)
if ($SubProp.($SubValue)) {
return $SubProp.($SubValue)
} else {
$cm = $SubProp.ConfigurationMode
$subVal = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\ConfigurationModes\" + $cm) | Get-ItemProperty)
return $SubVal.($SubValue)
}
}
Function GetOwnerCim{
param( $prc )
$ret = Invoke-CimMethod -InputObject $prc -MethodName GetOwner
return ($ret.Domain + "\" + $ret.User)
}
Function GetOwnerWmi{
param( $prc )
$ret = $prc.GetOwner()
return ($ret.Domain + "\" + $ret.User)
}
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID)
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator
if (-not $myWindowsPrincipal.IsInRole($adminRole)) {
Write-Output "This script needs to be run as Administrator"
exit
}
$global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path
$resName = "WinRM-Results-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss)
if ($DataPath) {
if (-not (Test-Path $DataPath)) {
Write-Host "The folder $DataPath does not exist"
exit
}
$global:resDir = $DataPath + "\" + $resName
} else {
$global:resDir = $global:Root + "\" + $resName
} if ($DataPath) {
if (-not (Test-Path $DataPath)) {
Write-Host "The folder $DataPath does not exist"
exit
}
$global:resDir = $DataPath + "\" + $resName
} else {
$global:resDir = $global:Root + "\" + $resName
}
$diagfile = $global:resDir + "\WinRM-Diag.txt"
$global:outfile = $global:resDir + "\script-output.txt"
$global:errfile = $global:resDir + "\script-errors.txt"
Import-Module ($global:Root + "\Collect-Commons.psm1") -Force -DisableNameChecking
if (-not $Trace -and -not $Logs) {
Write-Host "WinRM-Collect: a data collection tools for WinRM troubleshooting"
Write-Host ""
Write-Host "Usage:"
Write-Host "WinRM-Collect -Logs"
Write-Host " Collects dumps, logs, registry keys, command outputs"
Write-Host ""
Write-Host "WinRM-Collect -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]"
Write-Host " Collects live trace"
Write-Host ""
Write-Host "WinRM-Collect -Logs -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]"
Write-Host " Collects live trace then -Logs data"
Write-Host ""
Write-Host "Parameters for -Trace :"
Write-Host " -Activity : Only trace WinRM basic log, less detailed and less noisy)"
Write-Host " -Fwd : Event Log Forwarding (enabled by default without -Activity)"
Write-Host " -RemShell : Remote Shell (enabled by default without -Activity)"
Write-Host " -HTTPSYS : HTTP.SYS tracing"
Write-Host " o If specified advanced HTTP.SYS tracing is enabled"
Write-Host " o If not specified basic HTTP.SYS tracing is enabled"
Write-Host " o With -Activity no HTTPS.SYS tracing, unless specified"
Write-Host " -WinHTTP : WinHTTP (enabled by default without -Activity)"
Write-Host " -CAPI : CAPI (enabled by default without -Activity)"
Write-Host " -Kerberos : Kerberos (enabled by default without -Activity)"
Write-Host " -CredSSP : CredSSP (enabled by default without -Activity)"
Write-Host " -NTLM : NTLM (enabled by default without -Activity)"
Write-Host " -Schannel : Schannel (enabled by default without -Activity)"
Write-Host " -WMI : WMI activity"
Write-Host ""
Write-Host " -FwdCli : Additional client side treacing for EventLog forwarding"
Write-Host " -EventLog : Event Log tracing (included in -FwdCli)"
Write-Host " -Network : Network capture"
Write-Host " -Kernel : Kernel Trace for process start and stop"
Write-Host " -PerfMon : Performance counters"
Write-Host ""
exit
}
$RdrOut = " >>""" + $global:outfile + """"
$RdrErr = " 2>>""" + $global:errfile + """"
$fqdn = [System.Net.Dns]::GetHostByName(($env:computerName)).HostName
$OSVer = ([environment]::OSVersion.Version.Major) + ([environment]::OSVersion.Version.Minor) /10
New-Item -itemtype directory -path $global:resDir | Out-Null
Write-Log $version
if ($AcceptEula) {
Write-Log "AcceptEula switch specified, silently continuing"
$eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 2
} else {
$eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 0
if($eulaAccepted -ne "Yes")
{
Write-Log "EULA declined, exiting"
exit
}
}
Write-Log "EULA accepted, continuing"
if ($Trace) {
$TracesDir = $global:resDir + "\Traces\"
New-Item -itemtype directory -path $TracesDir | Out-Null
WinRMTraceCapture
if (-not $Logs) {
exit
}
}
"Logman create counter FwdEvtPerf -o """ + $global:resDir + "\FwdEvtPerf.blg"" -f bin -v mmddhhmm -c ""\Process(*)\*"" ""\Processor(*)\*"" ""\PhysicalDisk(*)\*"" ""\Event Tracing for Windows Session(EventLog-*)\Events Lost"" ""\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec"" ""\HTTP Service Request Queues(*)\*"" -si 00:00:01" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"Logman start FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"timeout 60" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"Logman stop FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
"Logman delete FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii
$cmd = $global:resDir + "\WEF-Perf.bat"
Write-Log $cmd
Start-Process $cmd -WindowStyle Minimized
Write-Log "Retrieving WinRM configuration"
$config = Get-ChildItem WSMan:\localhost\ -Recurse -ErrorAction Continue 2>>$global:errfile
if (!$config) {
Write-Log ("Cannot connect to localhost, trying with FQDN " + $fqdn)
Connect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile
$config = Get-ChildItem WSMan:\$fqdn -Recurse -ErrorAction Continue 2>>$global:errfile
GetPlugins -WinRMPluginPath (WSMan:\$fqdn\Plugin)
Disconnect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile
} else {
GetPlugins
}
$config | out-string -Width 500 | out-file -FilePath ($global:resDir + "\WinRM-config.txt")
Write-Log "winrm get winrm/config"
$cmd = "winrm get winrm/config >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "winrm e winrm/config/listener"
$cmd = "winrm e winrm/config/listener >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "winrm enum winrm/config/service/certmapping"
$cmd = "winrm enum winrm/config/service/certmapping >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "Collecting dump of the svchost process hosting the WinRM service"
$pidWinRM = FindServicePid "WinRM"
if ($pidWinRM) {
CreateProcDump $pidWinRM $global:resDir "svchost-WinRM"
}
Write-Log "Collecing the dumps of wsmprovhost.exe processes"
$list = get-process -Name "wsmprovhost" -ErrorAction SilentlyContinue 2>>$global:errfile
if (($list | Measure-Object).count -gt 0) {
foreach ($proc in $list)
{
Write-Log ("Found wsmprovhost.exe with PID " + $proc.Id)
CreateProcDump $proc.id $global:resDir
}
} else {
Write-Log "No wsmprovhost.exe processes found"
}
if ($pidWinRM) {
Write-Log ("The PID of the WinRM service is: " + $pidWinRM)
$pidWEC = FindServicePid "WecSvc"
if ($pidWEC) {
Write-Log ("The PID of the WecSvc service is: " + $pidWEC)
if ($pidWinRM -ne $pidWEC) {
Write-Log "WinRM and WecSvc are not in the same process"
CreateProcDump $pidWEC $global:resDir "scvhost-WEC"
}
}
}
Write-Log "Collecting dump of the SME.exe process"
$proc = get-process "SME" -ErrorAction SilentlyContinue
if ($proc) {
Write-Log "Process SME.EXE found with PID $proc.id"
CreateProcDump $proc.id $global:resDir
}
FileVersion -Filepath ($env:windir + "\system32\wsmsvc.dll") -Log $true
FileVersion -Filepath ($env:windir + "\system32\pwrshplugin.dll") -Log $true
if (Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions) {
Write-Log "Retrieving subscriptions configuration"
$cmd = "wecutil es 2>>""" + $global:errfile + """"
Write-log $cmd
$subList = Invoke-Expression $cmd
if ($subList -gt "") {
foreach($sub in $subList) {
Write-Log "Subscription: " + $sub
("Subscription: " + $sub) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
"-----------------------" | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
$cmd = "wecutil gs """ + $sub + """ /f:xml" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
$cmd = "wecutil gr """ + $sub + """" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
" " | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append
}
}
}
Write-Log "Listing members of Event Log Readers group"
$cmd = "net localgroup ""Event Log Readers"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
if ($OSVer -le 6.3) {
Write-Log "Listing members of WinRMRemoteWMIUsers__ group"
$cmd = "net localgroup ""WinRMRemoteWMIUsers__"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
} else {
Write-Log "Listing members of Remote Management Users group"
$cmd = "net localgroup ""Remote Management Users"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
}
Write-Log "Listing members of Windows Admin Center CredSSP Administrators group"
$cmd = "net localgroup ""Windows Admin Center CredSSP Administrators"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
(" ") | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append
($group + " = " + $strSID) | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append
Write-Log "Getting the output of WHOAMI /all"
$cmd = "WHOAMI /all >>""" + $global:resDir + "\WHOAMI.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "Get-Culture output"
"Get-Culture" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-Culture | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Exporting registry key HKEY_USERS\S-1-5-20\Control Panel\International"
$cmd = "reg export ""HKEY_USERS\S-1-5-20\Control Panel\International"" """ + $global:resDir + "\InternationalNetworkService.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Get-WinSystemLocale output"
"Get-WinSystemLocale" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinSystemLocale | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinHomeLocation output"
"Get-WinHomeLocation" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinHomeLocation | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinUILanguageOverride output"
"Get-WinUILanguageOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinUILanguageOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinUserLanguageList output"
"Get-WinUserLanguageList" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinUserLanguageList | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinAcceptLanguageFromLanguageListOptOut output"
"Get-WinAcceptLanguageFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinAcceptLanguageFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinCultureFromLanguageListOptOut output"
"Get-Get-WinCultureFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinCultureFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinDefaultInputMethodOverride output"
"Get-WinDefaultInputMethodOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinDefaultInputMethodOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-WinLanguageBarOption output"
"Get-WinLanguageBarOption" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Get-WinLanguageBarOption | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append
Write-Log "Get-NetConnectionProfile output"
Get-NetConnectionProfile | Out-File -FilePath ($global:resDir + "\NetConnectionProfile.txt") -Append
Write-Log "Get-WSManCredSSP output"
Get-WSManCredSSP | Out-File -FilePath ($global:resDir + "\WSManCredSSP.txt") -Append
Write-Log "Exporting firewall rules"
$cmd = "netsh advfirewall firewall show rule name=all >""" + $global:resDir + "\FirewallRules.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Invoke-CustomCommand -Command "netstat -anob" -DestinationFile "netstat.txt"
Invoke-CustomCommand -Command "ipconfig /all" -DestinationFile "ipconfig.txt"
Invoke-CustomCommand -Command "auditpol /get /category:*" -DestinationFile "auditpol.txt"
Write-Log "Copying hosts and lmhosts"
if (Test-path -path C:\Windows\system32\drivers\etc\hosts) {
Copy-Item C:\Windows\system32\drivers\etc\hosts $global:resDir\hosts.txt -ErrorAction Continue 2>>$global:errfile
}
if (Test-Path -Path C:\Windows\system32\drivers\etc\lmhosts) {
Copy-Item C:\Windows\system32\drivers\etc\lmhosts $global:resDir\lmhosts.txt -ErrorAction Continue 2>>$global:errfile
}
$dir = $env:windir + "\system32\logfiles\HTTPERR"
if (Test-Path -path $dir) {
$last = Get-ChildItem -path ($dir) | Sort-Object CreationTime -Descending | Select-Object Name -First 1
Copy-Item ($dir + "\" + $last.name) $global:resDir\httperr.log -ErrorAction Continue 2>>$global:errfile
}
Write-Log "WinHTTP proxy configuration"
$cmd = "netsh winhttp show proxy >""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "NSLookup WPAD"
"------------------" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append
"NSLookup WPAD" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append
"" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append
$cmd = "nslookup wpad >>""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM """ + $global:resDir + "\WinRM.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN """+ $global:resDir + "\WSMAN.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
if (Test-Path HKLM:\Software\Policies\Microsoft\Windows\WinRM) {
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM"
$cmd = "reg export HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM """+ $global:resDir + "\WinRM-Policies.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
} else {
Write-Log "The registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM is not present"
}
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System """+ $global:resDir + "\System-Policies.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector """+ $global:resDir + "\EventCollector.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding """+ $global:resDir + "\EventForwarding.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog """+ $global:resDir + "\EventLog-Policies.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL """+ $global:resDir + "\SCHANNEL.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography """+ $global:resDir + "\Cryptography.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography """+ $global:resDir + "\Cryptography-Policy.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa"
$cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa """+ $global:resDir + "\LSA.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP"
$cmd = "reg export HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP """+ $global:resDir + "\HTTP.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
if (Test-Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials) {
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials"
$cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials """+ $global:resDir + "\AllowFreshCredentials.reg.txt"" /y" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
} else {
Write-Log "The registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials is not present"
}
Export-EventLog "System"
Export-EventLog "Application"
Export-EventLog "Microsoft-Windows-CAPI2/Operational"
Export-EventLog "Microsoft-Windows-WinRM/Operational"
Export-EventLog "Microsoft-Windows-EventCollector/Operational"
Export-EventLog "Microsoft-Windows-Forwarding/Operational"
Export-EventLog "Microsoft-Windows-PowerShell/Operational"
Export-EventLog "Windows PowerShell"
Export-EventLog "PowerShellCore/Operational"
Export-EventLog "Microsoft-Windows-GroupPolicy/Operational"
Export-EventLog "Microsoft-Windows-Kernel-EventTracing/Admin"
Export-EventLog "Microsoft-ServerManagementExperience"
Export-EventLog "Microsoft-Windows-ServerManager-ConfigureSMRemoting/Operational"
Export-EventLog "Microsoft-Windows-ServerManager-DeploymentProvider/Operational"
Export-EventLog "Microsoft-Windows-ServerManager-MgmtProvider/Operational"
Export-EventLog "Microsoft-Windows-ServerManager-MultiMachine/Operational"
Export-EventLog "Microsoft-Windows-FileServices-ServerManager-EventProvider/Operational"
EvtLogDetails "Application"
EvtLogDetails "System"
EvtLogDetails "Security"
EvtLogDetails "ForwardedEvents"
Write-Log "Autologgers configuration"
Get-AutologgerConfig -Name EventLog-ForwardedEvents -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
Get-AutologgerConfig -Name EventLog-System -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
Get-AutologgerConfig -Name EventLog-Security -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
Get-AutologgerConfig -Name EventLog-Application -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append
if ($OSVer -gt 6.1 ) {
Write-Log "Copying ServerManager configuration"
copy-item $env:APPDATA\Microsoft\Windows\ServerManager\ServerList.xml $global:resDir\ServerList.xml -ErrorAction Continue 2>>$global:errfile
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache"" """ + $global:resDir + "\ServerComponentCache.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
}
Write-Log "Get-Module output"
Get-Module -ListAvailable | Out-File -FilePath ($global:resDir + "\Get-Module.txt")
Write-Log "Exporting netsh http settings"
$cmd = "netsh http show sslcert >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "netsh http show urlacl >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "netsh http show servicestate >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "netsh http show iplisten >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
if (Test-Path HKLM:\SOFTWARE\Microsoft\InetStp) {
Write-Log "Exporting IIS configuration"
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list app >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list apppool >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list site >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list module >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list wp >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list vdir >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list config >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
} else {
Write-Log "IIS is not installed"
}
if (Test-Path -Path ($env:windir + "\System32\inetsrv\Config\ApplicationHost.config")) {
Write-Log "IIS ApplicationHost.config"
Copy-Item "C:\Windows\System32\inetsrv\Config\ApplicationHost.config" ($global:resDir + "\ApplicationHost.config")
}
$cmd = "setspn -L " + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching HTTP/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
"Searching WSMAN/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append
$cmd = "setspn -F -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
" " | Out-File ($global:resDir + "\SPN.txt") -Append
Write-Log "Collecting certificates details"
$cmd = "Certutil -verifystore -v MY > """ + $global:resDir + "\Certificates-My.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "Certutil -verifystore -v ROOT > """ + $global:resDir + "\Certificates-Root.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$cmd = "Certutil -verifystore -v CA > """ + $global:resDir + "\Certificates-Intermediate.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$tbCert = New-Object system.Data.DataTable
$col = New-Object system.Data.DataColumn Store,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Thumbprint,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Subject,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Issuer,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn NotAfter,([DateTime]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn IssuerThumbprint,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn EnhancedKeyUsage,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn SerialNumber,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn SubjectKeyIdentifier,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn AuthorityKeyIdentifier,([string]); $tbCert.Columns.Add($col)
$col = New-Object system.Data.DataColumn Template,([string]); $tbCert.Columns.Add($col)
GetStore "My"
GetStore "CA"
GetStore "Root"
Write-Log "Matching issuer thumbprints"
$aCert = $tbCert.Select("Store = 'My' or Store = 'CA'")
foreach ($cert in $aCert) {
$aIssuer = $tbCert.Select("SubjectKeyIdentifier = '" + ($cert.AuthorityKeyIdentifier).tostring() + "'")
if ($aIssuer.Count -gt 0) {
$cert.IssuerThumbprint = ($aIssuer[0].Thumbprint).ToString()
}
}
$tbcert | Export-Csv ($global:resDir + "\certificates.tsv") -noType -Delimiter "`t"
Write-Log "PowerShell version"
$PSVersionTable | Out-File -FilePath ($global:resDir + "\PSVersion.txt") -Append
Write-Log "Collecting details about running processes"
if (ListProcsAndSvcs) {
CollectSystemInfoWMI
ExecQuery -Namespace "root\cimv2" -Query "select * from Win32_Product" | Sort-Object Name | Format-Table -AutoSize -Property Name, Version, Vendor, InstallDate | Out-String -Width 400 | Out-File -FilePath ($global:resDir + "\products.txt")
Write-Log "Collecting the list of installed hotfixes"
Get-HotFix -ErrorAction SilentlyContinue 2>>$global:errfile | Sort-Object -Property InstalledOn -ErrorAction Ignore | Out-File $global:resDir\hotfixes.txt
Write-Log "Collecing GPResult output"
$cmd = "gpresult /h """ + $global:resDir + "\gpresult.html""" + $RdrErr
write-log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
$cmd = "gpresult /r >""" + $global:resDir + "\gpresult.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append
} else {
Write-Log "WMI is not working"
$proc = Get-Process | Where-Object {$_.Name -ne "Idle"}
$proc | Format-Table -AutoSize -property id, name, @{N="WorkingSet";E={"{0:N0}" -f ($_.workingset/1kb)};a="right"},
@{N="VM Size";E={"{0:N0}" -f ($_.VirtualMemorySize/1kb)};a="right"},
@{N="Proc time";E={($_.TotalProcessorTime.ToString().substring(0,8))}}, @{N="Threads";E={$_.threads.count}},
@{N="Handles";E={($_.HandleCount)}}, StartTime, Path |
Out-String -Width 300 | Out-File -FilePath ($global:resDir + "\processes.txt")
CollectSystemInfoNoWMI
}
Write-Diag ("[INFO] " + $DiagVersion)
# Diag start
function New-UrlAcl {
New-Object psobject -Property @{
Protocol = ''
Host = ''
Port = 0
Path = ''
Url = ''
Users = @()
}
}
function New-UrlAclUser {
New-Object psobject -Property @{
Name = ''
Listen = $false
Delegate = $false
SSDL = ''
}
}
function Get-UrlAcl { # Taken from https://www.powershellgallery.com/packages/HttpSys/1.0.1/Content/Get-UrlAcl.ps1 and modified to also run on PowerShell 4
[CmdletBinding()]
param(
[parameter(Position=0)]
[string]$Url,
[parameter()]
[int[]]$Port,
[string]$HostName,
[string]$Protocol
)
$cmd = "netsh http show urlacl"
if (-not [string]::IsNullOrWhiteSpace($Url)){
$cmd += " url=$Url"
}
$result = Invoke-Expression $cmd
$result = $result | Select-Object -Skip 4
$items = @()
$item = New-UrlAcl
$user = New-UrlAclUser
for ($i = 0; $i -lt $result.Length; $i++){
$line = $result[$i]
if ([string]::IsNullOrWhiteSpace($line)){
continue;
}
$splitIndex = $line.IndexOf(": ");
$key = $line.Substring(0,$splitIndex).Trim();
$value = $line.Substring($splitIndex + 2);
if ($key -eq "Reserved Url"){
$item = New-UrlAcl
$protocolSplitIndex = $value.IndexOf("://");
$item.Protocol = $value.Substring(0, $protocolSplitIndex)
$remainder = $value.Substring($protocolSplitIndex + 3)
$pathSplitIndex = $remainder.IndexOf("/")
$hostDetails = $remainder.Substring(0, $pathSplitIndex)
$hostParts = $hostDetails.Split(':')
$item.Host = $hostParts[0]
$item.Port = $hostParts[1]
$item.Path = $remainder.Substring($pathSplitIndex)
$item.Url = $value
$items += $item
}
if ($key -eq "User"){
$user = New-UrlAclUser
$user.Name = $value
$item.Users += $user
}
if ($key -eq "Listen"){
$user.Listen = if ($value -eq "Yes") { $true } else { $false }
}
if ($key -eq "Delegate"){
$user.Delegate = if ($value -eq "Yes") { $true } else { $false }
}
if ($key -eq "SDDL"){
$user.SSDL = $value
}
}
if (-not [string]::IsNullOrWhiteSpace($HostName)){
$items = $items | Where-Object { $_.Host -eq $HostName }
}
if (-not [string]::IsNullOrWhiteSpace($Protocol)){
$items = $items | Where-Object { $_.Protocol -eq $Protocol }
}
if ($null -ne $Port){
if ($Port -isnot [System.Array]){
$Port = @($Port)
}
if ($Port.Length -ge 0){
$items = $items | Where-Object { $Port -contains $_.Port }
}
}
return $items
}
Write-Diag "Retrieving URLACL information"
$urlACL = Get-UrlAcl
Write-Diag "[INFO] Checking HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\ClientAuthTrustMode"
$ClientAuthTrustMode = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel" | Select-Object -ExpandProperty "ClientAuthTrustMode" -ErrorAction SilentlyContinue)
if ($ClientAuthTrustMode -eq $null -or $ClientAuthTrustMode -eq 0) {
Write-Diag "[WARNING] 0 Machine Trust (default) - Requires that the client certificate is issued by a certificate in the Trusted Issuers list."
} elseif ($ClientAuthTrustMode -eq 1) {
Write-Diag "[WARNING] 1 Exclusive Root Trust - Requires that a client certificate chains to a root certificate contained in the caller-specified trusted issuer store. The certificate must also be issued by an issuer in the Trusted Issuers list"
} elseif ($ClientAuthTrustMode -eq 2) {
Write-Diag "[INFO] 2 Exclusive CA Trust - Requires that a client certificate chain to either an intermediate CA certificate or root certificate in the caller-specified trusted issuer store."
} else {
Write-Diag ("[ERROR] Invalid value " + $ClientAuthTrustMode)
}
$OSVer = [environment]::OSVersion.Version.Major + [environment]::OSVersion.Version.Minor * 0.1
$subDom = $false
$subWG = $false
$Subscriptions = Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions
foreach ($sub in $Subscriptions) {
Write-Diag ("[INFO] Found subscription " + $sub.PSChildname)
$SubProp = ($sub | Get-ItemProperty)
Write-Diag ("[INFO] SubscriptionType = " + $SubProp.SubscriptionType + ", ConfigurationMode = " + $SubProp.ConfigurationMode)
Write-Diag ("[INFO] MaxLatencyTime = " + (GetSubVal $sub.PSChildname "MaxLatencyTime") + ", HeartBeatInterval = " + (GetSubVal $sub.PSChildname "HeartBeatInterval"))
$logFile = (GetSubVal $sub.PSChildname "LogFile")
if ($logFile -ne "ForwardedEvents") {
Write-Diag ("[WARNING] LogFile = " + $logFile + ", this is a CUSTOM LOG")
} else {
Write-Diag ("[INFO] LogFile = " + $logFile)
}
if ($SubProp.AllowedSourceDomainComputers) {
Write-Diag "[INFO] AllowedSourceDomainComputers"
$ACL = (FindSep -FindIn $SubProp.AllowedSourceDomainComputers -Left ":P" -Right ")S:").replace(")(", ",").Split(",")
foreach ($ACE in $ACL) {
$SID = FindSep -FindIn $ACE -left ";;;"
$objSID = New-Object System.Security.Principal.SecurityIdentifier($SID)
$group = $objSID.Translate( [System.Security.Principal.NTAccount]).Value
Write-Diag "[INFO] $group ($SID)"
}
}
if ($SubProp.Locale) {
if ($SubProp.Locale -eq "en-US") {
Write-Diag "[INFO] The subscription's locale is set to en-US"
} else {
Write-Diag ("[WARNING] The subscription's locale is set to " + $SubProp.Locale)
}
} else {
Write-Diag "[INFO] The subscription's locale is not set, the default locale will be used."
}
if ($SubProp.AllowedSubjects) {
$subWG = $true
Write-Diag "[INFO] Listed non-domain computers:"
$list = $SubProp.AllowedSubjects -split ","
foreach ($item in $list) {
Write-Diag ("[INFO] " + $item)
}
} else {
Write-Diag "[INFO] No non-domain computers listed, that's ok if this is not a collector in workgroup environment"
}
if ($SubProp.AllowedIssuerCAs) {
$subWG = $true
Write-Diag "[INFO] Listed Issuer CAs:"
$list = $SubProp.AllowedIssuerCAs -split ","
foreach ($item in $list) {
Write-Diag ("[INFO] " + $item)
ChkCert -cert $item -store "(Store = 'CA' or Store = 'Root')" -descr "Issuer CA"
}
} else {
Write-Diag "[INFO] No Issuer CAs listed, that's ok if this is not a collector in workgroup environment"
}
$RegKey = (($sub.Name).replace("HKEY_LOCAL_MACHINE\","HKLM:\") + "\EventSources")
if (Test-Path -Path $RegKey) {
$sources = Get-ChildItem -Path $RegKey
if ($sources.Count -gt 4000) {
Write-Diag ("[WARNING] There are " + $sources.Count + " sources for this subscription")
} else {
Write-Diag ("[INFO] There are " + $sources.Count + " sources for this subscription")
}
} else {
Write-Diag ("[INFO] No sources found for the subscription " + $sub.Name)
}
}
if ($Subscriptions) {
$EventLost = (Get-Counter "\\$env:computername\Event Tracing for Windows Session(EventLog-ForwardedEvents)\Events Lost").CounterSamples[0].CookedValue
if ($EventLost -gt 100) {
Write-Diag ("[WARNING] " + $EventLost + " events lost for EventLog-ForwardedEvents")
} else {
Write-Diag ("[INFO] " + $EventLost + " events lost for EventLog-ForwardedEvents")
}
}
if ($OSVer -gt 6.1) {
Write-Diag "[INFO] Retrieving machine's IP addresses"
$iplist = Get-NetIPAddress
}
$pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpCompatibilityListener -ErrorAction SilentlyContinue
if ($pol) {
if ($pol.HttpCompatibilityListener -eq 1) {
Write-Diag ("[WARNING] HTTP Compatibility listener (port 80) is enabled")
}
}
$pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpsCompatibilityListener -ErrorAction SilentlyContinue
if ($pol) {
if ($pol.HttpsCompatibilityListener -eq 1) {
Write-Diag ("[WARNING] HTTPS Compatibility listener (port 443) is enabled")
}
}
Write-Diag "[INFO] Browsing listeners"
$HTTPListenerFound = $false
$listeners = Get-ChildItem WSMan:\localhost\Listener
foreach ($listener in $listeners) {
Write-Diag ("[INFO] Inspecting listener " + $listener.Name)
$prop = Get-ChildItem $listener.PSPath
if ($listener.keys[0] -eq "Transport=HTTP") {
$HTTPListenerFound = $true
}
foreach ($value in $prop) {
if ($value.Name -eq "CertificateThumbprint") {
if ($listener.keys[0].Contains("HTTPS")) {
$HTTPSListenerFound = $true
Write-Diag "[INFO] Found HTTPS listener"
$listenerThumbprint = $value.Value.ToLower()
Write-Diag "[INFO] Found listener certificate $listenerThumbprint"
if ($listenerThumbprint) {
ChkCert -cert $listenerThumbprint -descr "listener" -store "Store = 'My'"
}
}
}
if ($value.Name.Contains("ListeningOn")) {
$ip = ($value.value).ToString()
Write-Diag "[INFO] Listening on $ip"
if ($OSVer -gt 6.1) {
if (($iplist | Where-Object {$_.IPAddress -eq $ip } | measure-object).Count -eq 0 ) {
Write-Diag "[ERROR] IP address $ip not found"
}
}
}
}
}
if ($HTTPListenerFound) {
Write-Diag ("[INFO] HTTP listener found")
$HTTPURLACL = ($urlACL | Where-Object Port -eq 5985)
if ($HTTPURLACL) {
Write-Diag "[INFO] URLACL for port 5985 is present"
if ($HTTPURLACL.Protocol -ne "http") {
Write-Diag ("[ERROR] The protocol for port 5985 is not HTTP (" + $HTTPURLACL.Protocol + ")")
}
if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") {
Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5985")
} else {
Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5985")
}
if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") {
Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5985")
} else {
Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5985")
}
} else {
Write-Diag "[ERROR] HTTP Listener found but URLACL for port 5985 is missing"
}
} else {
Write-Diag ("[ERROR] The HTTP listener is missing")
}
if ($HTTPSListenerFound) {
Write-Diag ("[INFO] HTTP listener found")
$HTTPSURLACL = ($urlACL | Where-Object Port -eq 5986)
if ($HTTPSURLACL) {
Write-Diag "[INFO] URLACL for port 5986 is present"
if ($HTTPSURLACL.Protocol -ne "https") {
Write-Diag ("[ERROR] The protocol for port 5986 is not HTTPS (" + $HTTPSURLACL.Protocol + ")")
}
if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") {
Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5986")
} else {
Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5986")
}
if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") {
Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5986")
} else {
Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5986")
}
} else {
Write-Diag "[ERROR] HTTPS Listener found but URLACL for port 5986 is missing"
}
}
$svccert = Get-Item WSMan:\localhost\Service\CertificateThumbprint
if ($svccert.value ) {
Write-Diag ("[INFO] The Service Certificate thumbprint is " + $svccert.value)
ChkCert -cert $svccert.value -descr "Service" -store "Store = 'My'"
}
$remoteaccess = Get-Item WSMan:\localhost\Service\AllowRemoteAccess
if ($remoteaccess.Value -eq "true") {
Write-Diag "[INFO] AllowRemoteAccess = true"
} elseif ($remoteaccess.Value -eq "false") {
Write-Diag "[ERROR] AllowRemoteAccess = false, this machine will not accept remote WinRM connections"
} else {
Write-Diag "[ERROR] AllowRemoteAccess has an invalid value"
}
$ipfilter = Get-Item WSMan:\localhost\Service\IPv4Filter
if ($ipfilter.Value) {
if ($ipfilter.Value -eq "*") {
Write-Diag "[INFO] IPv4Filter = *"
} else {
Write-Diag ("[WARNING] IPv4Filter = " + $ipfilter.Value)
}
} else {
Write-Diag ("[WARNING] IPv4Filter is empty, WinRM will not listen on IPv4")
}
$ipfilter = Get-Item WSMan:\localhost\Service\IPv6Filter
if ($ipfilter.Value) {
if ($ipfilter.Value -eq "*") {
Write-Diag "[INFO] IPv6Filter = *"
} else {
Write-Diag ("[WARNING] IPv6Filter = " + $ipfilter.Value)
}
} else {
Write-Diag ("[WARNING] IPv6Filter is empty, WinRM will not listen on IPv6")
}
if (Test-Path -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager") {
$isForwarder = $True
$MaxFwd = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding').MaxForwardingRate
if ($MaxFwd) {
Write-Diag ("[ERROR] HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\MaxForwardingRate is set to " + $MaxFwd + ". This functionality is broken, see Bug 33554568. Remove the setting Configure Forwarder Resource Usage from the GPO to avoid performance issues")
}
$RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager')
Write-Diag "[INFO] Enumerating SubscriptionManager URLs at HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager"
$RegKey.PSObject.Properties | ForEach-Object {
If($_.Name -notlike '*PS*'){
Write-Diag ("[INFO] " + $_.Name + " " + $_.Value)
$IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right ",").ToLower()
if (-not $IssuerCA) {
$IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right "").ToLower()
}
if ($IssuerCA) {
if ("0123456789abcdef".Contains($IssuerCA[0])) {
Write-Diag ("[INFO] Found issuer CA certificate thumbprint " + $IssuerCA)
$aCert = $tbCert.Select("Thumbprint = '" + $IssuerCA + "' and (Store = 'CA' or Store = 'Root')")
if ($aCert.Count -eq 0) {
Write-Diag "[ERROR] The Issuer CA certificate was not found in CA or Root stores"
} else {
Write-Diag ("[INFO] Issuer CA certificate found in store " + $aCert[0].Store + ", subject = " + $aCert[0].Subject)
if (($aCert[0].NotAfter) -gt (Get-Date)) {
Write-Diag ("[INFO] The Issuer CA certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
} else {
Write-Diag ("[ERROR] The Issuer CA certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
}
}
$aCliCert = $tbCert.Select("IssuerThumbprint = '" + $IssuerCA + "' and Store = 'My'")
if ($aCliCert.Count -eq 0) {
Write-Diag "[ERROR] Cannot find any certificate issued by this Issuer CA"
} else {
if ($PSVersionTable.psversion.ToString() -ge "3.0") {
Write-Diag "[INFO] Listing available client certificates from this IssuerCA"
$num = 0
foreach ($cert in $aCliCert) {
if ($cert.EnhancedKeyUsage.Contains("Client Authentication")) {
Write-Diag ("[INFO] Found client certificate " + $cert.Thumbprint + " " + $cert.Subject)
if (($Cert.NotAfter) -gt (Get-Date)) {
Write-Diag ("[INFO] The client certificate will expire on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
} else {
Write-Diag ("[ERROR] The client certificate expired on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") )
}
$certobj = Get-Item ("CERT:\Localmachine\My\" + $cert.Thumbprint)
$keypath = [io.path]::combine("$env:ProgramData\microsoft\crypto\rsa\machinekeys", $certobj.privatekey.cspkeycontainerinfo.uniquekeycontainername)
if ([io.file]::exists($keypath)) {
$acl = ((get-acl -path $keypath).Access | Where-Object {$_.IdentityReference -eq "NT AUTHORITY\NETWORK SERVICE"})
if ($acl) {
$rights = $acl.FileSystemRights.ToString()
if ($rights.contains("Read") -or $rights.contains("FullControl") ) {
Write-Diag ("[INFO] The NETWORK SERVICE account has permissions on the private key of this certificate: " + $rights)
} else {
Write-Diag ("[ERROR] Incorrect permissions for the NETWORK SERVICE on the private key of this certificate: " + $rights)
}
} else {
Write-Diag "[ERROR] Missing permissions for the NETWORK SERVICE account on the private key of this certificate"
}
} else {
Write-Diag "[ERROR] Cannot find the private key"
}
$num++
}
}
if ($num -eq 0) {
Write-Diag "[ERROR] Cannot find any client certificate issued by this Issuer CA"
} elseif ($num -gt 1) {
Write-Diag "[WARNING] More than one client certificate issued by this Issuer CA, the first certificate will be used by WinRM"
}
}
}
} else {
Write-Diag "[ERROR] Invalid character for the IssuerCA certificate in the SubscriptionManager URL"
}
}
}
}
$RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding')
if ($regkey.MaxForwardingRate) {
Write-Diag "[ERROR] MaxForwardingRate is configured, this feature does not work. Please remove this setting and see bug 33554568"
}
} else {
$isForwarder = $false
Write-Diag "[INFO] No SubscriptionManager URL configured. It's ok if this machine is not supposed to forward events."
}
if ((Get-CimInstance -ClassName Win32_ComputerSystem).PartOfDomain) {
$search = New-Object DirectoryServices.DirectorySearcher([ADSI]"GC://$env:USERDNSDOMAIN") # The SPN is searched in the forest connecting to a Global catalog
$SPNReg = ""
$SPN = "HTTP/" + $env:COMPUTERNAME
Write-Diag ("[INFO] Searching for the SPN $SPN")
$search.filter = "(servicePrincipalName=$SPN)"
$results = $search.Findall()
if ($results.count -gt 0) {
foreach ($result in $results) {
Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory)
if ($result.properties.objectcategory[0].Contains("Computer")) {
if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) {
Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0])
$SPNReg = "OTHER"
}
} else {
Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account"
$SPNReg = "OTHER"
}
}
if ($results.count -gt 1) {
Write-Diag "[ERROR] The The SPN $SPN is duplicate"
}
} else {
Write-Diag "[INFO] The The SPN $SPN was not found. That's ok, the SPN HOST/$env:COMPUTERNAME will be used"
}
$SPN = "HTTP/" + $env:COMPUTERNAME + ":5985"
Write-Diag ("[INFO] Searching for the SPN $SPN")
$search.filter = "(servicePrincipalName=$SPN)"
$results = $search.Findall()
if ($results.count -gt 0) {
foreach ($result in $results) {
Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory)
if ($result.properties.objectcategory[0].Contains("Computer")) {
if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) {
Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0])
}
} else {
Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account"
}
}
if ($results.count -gt 1) {
Write-Diag "[ERROR] The The SPN $SPN is duplicate"
}
} else {
if ($SPNReg -eq "OTHER") {
Write-Diag "[WARNING] The The SPN $SPN was not found. It is required to accept WinRM connections since the HTTP/$env:COMPUTERNAME is reqistered to another name"
}
}
if ($OSVer -le 6.3) {
Write-Diag "[INFO] Checking the WinRMRemoteWMIUsers__ group"
$search = New-Object DirectoryServices.DirectorySearcher([ADSI]"") # This is a Domain local group, therefore we need to collect to a non-global catalog
$search.filter = "(samaccountname=WinRMRemoteWMIUsers__)"
$results = $search.Findall()
if ($results.count -gt 0) {
Write-Diag ("[INFO] Found " + $results.Properties.distinguishedname)
if ($results.Properties.grouptype -eq -2147483644) {
Write-Diag "[INFO] WinRMRemoteWMIUsers__ is a Domain local group"
} elseif ($results.Properties.grouptype -eq -2147483646) {
Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Global group"
} elseif ($results.Properties.grouptype -eq -2147483640) {
Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Universal group"
}
if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") {
Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is also present as machine local group"
}
} else {
Write-Diag "[WARNING] The WinRMRemoteWMIUsers__ was not found in the domain"
if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") {
Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group"
} else {
Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not even present as machine local group"
}
}
}
if ((Get-ChildItem WSMan:\localhost\Service\Auth\Kerberos).value -eq "true") {
Write-Diag "[INFO] Kerberos authentication is enabled for the service"
} else {
Write-Diag "[WARNING] Kerberos authentication is disabled for the service"
}
} else {
Write-Diag "[INFO] The machine is not joined to a domain"
if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") {
Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group"
} else {
Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not present as machine local group"
}
if ((Get-ChildItem WSMan:\localhost\Service\Auth\Certificate).value -eq "false") {
Write-Diag "[WARNING] Certificate authentication is disabled for the service"
} else {
Write-Diag "[INFO] Certificate authentication is enabled for the service"
}
}
$HHTPParam = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters"
if (($HHTPParam.MaxFieldLength -gt 0) -and ($HHTPParam.MaxRequestBytes -gt 0)) {
Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxFieldLength = " + $HHTPParam.MaxFieldLength)
Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxRequestBytes = " + $HHTPParam.MaxRequestBytes)
} else {
Write-Diag ("[WARNING] MaxFieldLength and/or MaxRequestBytes are not defined in HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters. This may cause the request to fail with error 400 in complex AD environemnts. See KB 820129")
}
$iplisten = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" | Select-Object -ExpandProperty "ListenOnlyList" -ErrorAction SilentlyContinue)
if ($iplisten) {
Write-Diag ("[WARNING] The IPLISTEN list is not empty, the listed addresses are " + $iplisten)
} else {
Write-Diag "[INFO] The IPLISTEN list is empty. That's ok: WinRM will listen on all IP addresses"
}
$binval = (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" -Name WinHttpSettings).WinHttPSettings
$proxylength = $binval[12]
if ($proxylength -gt 0) {
$proxy = -join ($binval[(12+3+1)..(12+3+1+$proxylength-1)] | % {([char]$_)})
Write-Diag ("[WARNING] A NETSH WINHTTP proxy is configured: " + $proxy)
$bypasslength = $binval[(12+3+1+$proxylength)]
if ($bypasslength -gt 0) {
$bypasslist = -join ($binval[(12+3+1+$proxylength+3+1)..(12+3+1+$proxylength+3+1+$bypasslength)] | % {([char]$_)})
Write-Diag ("[WARNING] Bypass list: " + $bypasslist)
} else {
Write-Diag "[WARNING] No bypass list is configured"
}
Write-Diag "[WARNING] WinRM does not work very well through proxies, make sure that the target machine is in the bypass list or remove the proxy"
} else {
Write-Diag "[INFO] No NETSH WINHTTP proxy is configured"
}
$th = (get-item WSMan:\localhost\Client\TrustedHosts).value
if ($th) {
Write-Diag ("[INFO] TrustedHosts contains: $th")
} else {
Write-Diag ("[INFO] TrustedHosts is not configured, it's ok it this machine is not supposed to connect to other machines using NTLM")
}
$psver = $PSVersionTable.PSVersion.Major.ToString() + $PSVersionTable.PSVersion.Minor.ToString()
if ($psver -eq "50") {
Write-Diag ("[WARNING] Windows Management Framework version " + $PSVersionTable.PSVersion.ToString() + " is no longer supported")
} else {
Write-Diag ("[INFO] Windows Management Framework version is " + $PSVersionTable.PSVersion.ToString() )
}
$clientcert = Get-ChildItem WSMan:\localhost\ClientCertificate
if ($clientcert.Count -gt 0) {
Write-Diag "[INFO] Client certificate mappings"
foreach ($certmap in $clientcert) {
Write-Diag ("[INFO] Certificate mapping " + $certmap.Name)
$prop = Get-ChildItem $certmap.PSPath
foreach ($value in $prop) {
Write-Diag ("[INFO] " + $value.Name + " " + $value.Value)
if ($value.Name -eq "Issuer") {
ChkCert -cert $value.Value -descr "mapping" -store "(Store = 'Root' or Store = 'CA')"
} elseif ($value.Name -eq "UserName") {
$usr = Get-CimInstance -ClassName Win32_UserAccount | Where-Object {$_.Name -eq $value.value}
if ($usr) {
if ($usr.Disabled) {
Write-Diag ("[ERROR] The local user account " + $value.value + " is disabled")
} else {
Write-Diag ("[INFO] The local user account " + $value.value + " is enabled")
}
} else {
Write-Diag ("[ERROR] The local user account " + $value.value + " does not exist")
}
} elseif ($value.Name -eq "Subject") {
if ($value.Value[0] -eq '"') {
Write-Diag "[ERROR] The subject does not have to be included in double quotes"
}
}
}
}
} else {
if ($subWG) {
Write-Diag "[ERROR] No client certificate mapping configured"
}
}
$aCert = $tbCert.Select("Store = 'Root' and Subject <> Issuer")
if ($aCert.Count -gt 0) {
Write-Diag "[ERROR] Found for non-Root certificates in the Root store"
foreach ($cert in $acert) {
Write-Diag ("[ERROR] Misplaced certificate " + $cert.Subject)
}
}
if ($isForwarder) {
$evtLogReaders = (Get-CimInstance -Query ("Associators of {Win32_Group.Domain='" + $env:COMPUTERNAME + "',Name='Event Log Readers'} where Role=GroupComponent") | Where {$_.Name -eq "NETWORK SERVICE"} | Measure-Object)
if ($evtLogReaders.Count -gt 0) {
Write-Diag "[INFO] The NETWORK SERVICE account is member of the Event Log Readers group"
} else {
Write-Diag "[WARNING] The NETWORK SERVICE account is NOT member of the Event Log Readers group, the events in the Security log cannot be forwarded"
}
}
$fwrules = (Get-NetFirewallPortFilter -Protocol TCP | Where { $_.localport -eq "5986" } | Get-NetFirewallRule)
if ($fwrules.count -eq 0) {
Write-Diag "[INFO] No firewall rule for port 5986"
} else {
Write-Diag "[INFO] Found firewall rule for port 5986"
}
$dir = $env:windir + "\system32\logfiles\HTTPERR"
if (Test-Path -path $dir) {
$httperrfiles = Get-ChildItem -path ($dir)
if ($httperrfiles.Count -gt 100) {
Write-Diag ("[WARNING] There are " + $httperrfiles.Count + " files in the folder " + $dir)
} else {
Write-Diag ("[INFO] There are " + $httperrfiles.Count + " files in the folder " + $dir)
}
$size = 0
foreach ($file in $httperrfiles) {
$size += $file.Length
}
$size = [System.Math]::Ceiling($size / 1024 / 1024) # Convert to MB
if ($size -gt 100) {
Write-Diag ("[WARNING] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space")
} else {
Write-Diag ("[INFO] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space")
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBdQdZ0sQcyhlnp
# vvn1S21gHDnw/ueJT0fNTnjQ7oTrAqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDgsat8ygU0by9RLfSDiOz9P
# ULyupwmhKNIdeckk6iZLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAX53CAlAjMGanyMtyk8RScBIZQYEn+nSuwPmgSv+Hz6gO1Ld/HYiufZMX
# kXEXASC0FgbWNRhZHFil0AqASfdFAXAjidjYwAziJtHG4GULLaAmLj3pr8jZDOjA
# OvzTAF9rIWMTO8gjuLy8u1jbqwkQ36AMvTw/AH6gvjil1gbqkZKVv/rfw5WNerGu
# CMvBH/JZb+Te43vMFAnu3N6YTdr0voHN3+xfWHdR+ufmXx3qzfecMLXIUKDnZ90x
# EFRZ34U2/V23PaEBCpAtkX2iFxqvPP5LxDdHK00NWnprqLeUBETpRaR2oXCUcCg9
# eeZr48J8hwaZZ/jeHHB//ZqoQme8UqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAQIezgFSqnnMHplAH9dkXreHFehYqG/975XDvzWnVbTgIGZjOq3l7c
# GBMyMDI0MDUxNDE4MjUyNS44MjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnt+kIwIhgPMjAyNDA1MTQyMjU3MDZaGA8yMDI0MDUxNTIyNTcwNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6e36QgIBADAHAgEAAgIDyjAHAgEAAgISETAKAgUA
# 6e9LwgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABAytxdUKg13fzNkuzgH
# UtlcFQAWkQDZxpKmXQe5gd3AXBJ2oHDq7X4YnuAawTLw8keBkwEU/cLgEaY7LTb1
# 8Z/PCtxhp1dPKtBeLyZjQWunDUeXQiW0YES854djjSkbGfCEHWVY1GRqfMb9FhyB
# hpmsADe5KtQP/ZCQ67lUlhbfMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg+kp6BHvHoKTvmpLtBwrLvlkJG2BjCgsWvngAVlPhIDIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEIHy/vpERuh3gAMMe00v4Gn6eoJV1RkvQVPKO5la+iKMm
# MA0GCSqGSIb3DQEBCwUABIICAAfyniAtzARljSAHOCiP+gdBO3Ui3w4Q+e9a9vg+
# wjqst6F9bn48eWf3s1rZh9E1LfcSD7dmtnsw6PFWeNwxiU0TrRtOQTOdLPJGOiaJ
# 5IBDdrlU9YLnri+4sCFTPx7IQNhJfvEVwQwGUI84HZ1MMbbupPenOw4iJImHMSPD
# zQqPQ17rXmbMQOwYZN/I8iZxvwbleHU4nsV4eWW3rslPvYLVqgZrt1x6cgYSwzSZ
# gsAvH6IQrasLSbZ3g58E16XKgIkuS0g80QSiUr3ZigfO0Au17nMcjlifv+lvkHJQ
# kXtNHe5BDNf/3LvkZ2SQmX3Krup9iEhjo5RDOZtDweMfK4C/PVIXaJnhlgsb5j3m
# jEYZn/UebO7J8s4hxHfC5uUdwEzk0psjs06nVtW0O813jMn/LU2dw/+VMH0VI81S
# Qx2BSgR1zF7nJDzwt+Up1BaTu8QaTY9iLR0bnLAGlA/8RNihFBO0joPOBzVt/PVu
# wze/I1xZkA1NOSsFuC3Is6Xc33dn+obTx4V9GqIPQej3L9pzUXcQUpt6VdRGe29P
# h8Cory+JaSjUnsZYo3iDHvwbRTXtYL4EeXPQ2ZLbfqknFphehXxfz1k4RtZ3lKN/
# 4qUh5tUZp3MATdfqPAsfI8w0ibSOJ3BVQ3r1n+bMqT+UyR56ozYyPnodl21xGGle
# jT3L
# SIG # End signature block
|
combined_dataset/train/non-malicious/8796ba7c-730c-45aa-ac56-3b561a1149d2.ps1 | 8796ba7c-730c-45aa-ac56-3b561a1149d2.ps1 | # Copyright (c) 2011 Code Owls LLC, All Rights Reserved.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy of this
# software and associated documentation files (the "Software"), to deal in the Software without
# restriction, including without limitation the rights to use, copy, modify, merge, publish,
# distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the
# Software is furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all copies or
# substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
# INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
# PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
# HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
# CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE
# OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
#
# http://www.opensource.org/licenses/mit-license.php
#
# PowerShell module for iSCSI management
#
# author:
# jim christopher <jimchristopher@gmail.com>
#
# notes:
#
#Target Mappings:
# <Target Lun> is the LUN value the target uses to expose the LUN.
# It must be in the form 0x0123456789abcdef
# <OS Bus> is the bus number the OS should use to surface the LUN
# <OS Target> is the target number the OS should use to surface the LUN
# <OS LUN> is the LUN number the OS should use to surface the LUN
#
#CHAP secrets, CHAP passwords and IPSEC preshared keys can be specified as
#a text string or as a sequence of hexadecimal values. The value specified on
#the command line is always considered a string unless the first two characters
#0x in which case it is considered a hexadecimal value.
#
#For example 0x12345678 specifies a 4 byte secret
#
#All numerical values are assumed decimal unless preceeded by 0x. If
#preceeded by 0x then value is assumed to be hex
#
#iscsicli can also be run in command line mode where iscsicli commands
#can be entered directly from the console. To enter command line
#mode, just run iscsicli without any parameters
###########################################################
## flags and enumerations
#Payload Id Type:
# ID_IPV4_ADDR is 1 - Id format is 1.2.3.4
# ID_FQDN is 2 - Id format is ComputerName
# ID_IPV6_ADDR is 5 - Id form is IPv6 Address
#
$payloadIPV4 = 1;
$payloadFQDN = 2;
$payloadIPV6 = 5;
#Security Flags:
# TunnelMode is 0x00000040
# TransportMode is 0x00000020
# PFS Enabled is 0x00000010
# Aggressive Mode is 0x00000008
# Main mode is 0x00000004
# IPSEC/IKE Enabled is 0x00000002
# Valid Flags is 0x00000001
#
$securityTunnelMode = 0x40;
$securityTransportMode = 0x20;
$securityPFSEnable = 0x10;
$securityAggressiveMode = 0x08;
$securityMainMode = 0x04;
$securityIPSECIKEEnabled = 0x02;
$securityValidFlags = 0x01;
#Login Flags:
# ISCSI_LOGIN_FLAG_REQUIRE_IPSEC 0x00000001
# IPsec is required for the operation
#
# ISCSI_LOGIN_FLAG_MULTIPATH_ENABLED 0x00000002
# Multipathing is enabled for the target on this initiator
#
$loginRequireIPSEC = 0x01;
$loginMultipathEnabled = 0x02;
#AuthType:
# ISCSI_NO_AUTH_TYPE = 0,
# No iSCSI in-band authentication is used
#
# ISCSI_CHAP_AUTH_TYPE = 1,
# One way CHAP (Target authenticates initiator is used)
#
# ISCSI_MUTUAL_CHAP_AUTH_TYPE = 2
# Mutual CHAP (Target and Initiator authenticate each other is used)
#
$authTypeNone = 0;
$authTypeChap = 1;
$authTypeMutualChap = 2;
#Target Flags:
# ISCSI_TARGET_FLAG_HIDE_STATIC_TARGET 0x00000002
# If this flag is set then the target will never be reported unless it
# is also discovered dynamically.
#
# ISCSI_TARGET_FLAG_MERGE_TARGET_INFORMATION 0x00000004
# If this flag is set then the target information passed will be
# merged with any target information already statically configured for
# the target
#
$targetHideStaticTarget = 0x02;
$targetMergeTargetInfo = 0x04;
###########################################################
## cmdlets
#iscsicli AddTarget <TargetName> <TargetAlias> <TargetPortalAddress>
# <TargetPortalSocket> <Target flags>
# <Persist> <Login Flags> <Header Digest> <Data Digest>
# <Max Connections> <DefaultTime2Wait>
# <DefaultTime2Retain> <Username> <Password> <AuthType>
# <Mapping Count> <Target Lun> <OS Bus> <Os Target>
# <OS Lun> ...
#
#iscsicli QAddTarget <TargetName> <TargetPortalAddress>
#
function Add-Target
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[Alias("Name")]
[string]
# the name of the target
$targetName,
[Parameter(Mandatory=$true)]
[Alias("Address")]
[string]
# the IP or DNS address of the target portal
$targetPortalAddress
)
process
{
& iscsicli qaddtarget $targetName, $targetPortalAddress;
}
}
#iscsicli RemoveTarget <TargetName>
#
#RemovePersistentTarget <Initiator Name> <TargetName>
# <Initiator Port Number>
# <Target Portal Address>
# <Target Portal Socket>
#
function Remove-Target
{
<#
This command will remove a target from the list of persisted targets.
Boot Configuration Known Issues (Windows Server 2003 Boot Initiator)
The Microsoft iSCSI Software Initiator boot version GUI does not allow you to view which adapter is set to boot. In order
to determine which adapter the system is set to boot with, you can use the following command:
From a command prompt type “iscsibcg /showibf” to find the MAC address of the boot adapter
Then run the command “ipconfig /all”
Compare the MAC address of the adapter to those listed with ipconfig /all
MPIO Failover in an iSCSI boot configuration using the Microsoft iSCSI Software Initiator
In Fail Over Only, no load balancing is performed. The primary path functions as the active path and all other paths are
standby paths. The active path is used for sending all I/O. If the active path fails, one of the standby paths becomes
the active path. When the formerly active path is reconnected, it becomes a standby path and a "failback" does not
occur. This behavior is due to Media Sensing is disabled by default in the boot version of the Microsoft iSCSI Software
Initiator and is by design. However, the registry key can be changed to enable fail back. For more information, please
see
For more information:
239924 How to disable the Media Sensing feature for TCP/IP in Windows
http://support.microsoft.com/default.aspx?scid=kb;EN-US;239924
#>
[CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact='high')]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Name")]
[string]
# the name of the target to remove
$targetName,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[Alias("Address")]
[string]
# the IP or DNS address of the target portal
$targetPortalAddress,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[Alias('Port')]
[int]
#the TCP port number of the target portal. Typically this is 3260, which is the well-known port number
defined for use by iSCSI.
$TargetPortalSocket = 3260,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[Alias( "InitiatorInstanceName" )]
[string]
#the name of the initiator via which the SendTargets operation is performed. If not specified then the
initiator used is selected by the iSCSI initiator service.
$InitiatorName,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[string]
#is the physical port number on the initiator via which the SendTargets operation is performed. If not
specified then the kernel mode initiator driver chooses the initiator port used.
$InitiatorPort = '*',
[Parameter()]
[switch]
# specify to remove a persistent connection
$persist,
[Parameter()]
[switch]
# specify to bypass standard PowerShell confirmation procedures
$force
)
process
{
Write-Verbose "remove-target ...";
Write-Verbose " TargetName: $targetName";
Write-Verbose " TargetPortalAddress: $targetPortalAddress";
Write-Verbose " TargetPortalSocket: $targetPortalSocket";
Write-Verbose " InitiatorInstanceName: $InitiatorName";
Write-Verbose " InitiatorPort: $initiatorPort";
Write-Verbose " Persist: $persist";
Write-Verbose " Force: $force";
if( -not ( $force -or $pscmdlet.ShouldProcess( $targetName, 'Remove iSCSI target' ) ) )
{
return;
}
if( $persist -and $InitiatorName )
{
$iscsi = "iscsicli removepersistenttarget $InitiatorName $targetName $InitiatorPort
$targetPortalAddress $TargetPortalSocket"
Write-Verbose $iscsi;
invoke-expression $iscsi
}
else
{
$iscsi = "iscsicli removetarget $targetName";
Write-Verbose $iscsi;
invoke-expression $iscsi
}
}
}
#iscsicli AddTargetPortal <TargetPortalAddress> <TargetPortalSocket>
# [HBA Name] [Port Number]
# <Security Flags>
# <Login Flags> <Header Digest> <Data Digest>
# <Max Connections> <DefaultTime2Wait>
# <DefaultTime2Retain> <Username> <Password> <AuthType>
#
#iscsicli QAddTargetPortal <TargetPortalAddress>
# [CHAP Username] [CHAP Password]
#
function Add-TargetPortal
{
<#
This command will add a target portal to the list of persisted target portals. The iSCSI initiator service will perform a
SendTargets operation to each target portal in the list whenever the service starts and whenever a full refresh of the
target list is requested.
#>
#[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[Alias("Address")]
[string]
# the IP or DNS address of the target portal.
$targetPortalAddress,
[Parameter()]
[string]
#Username is the string that should be used as the CHAP username when logging into the target. By
specifying * for this parameter, the iSCSI initiator service will use the initiator node name as the CHAP username.
$username,
[Parameter()]
[string]
#Password is the string that should be used as the target’s CHAP secret when logging into the target. The
initiator will use this secret to compute a hash value based on the challenge sent by the target.
$password
)
process
{
if( $username )
{
& iscsicli qaddtargetportal $targetPortalAddress $username $password;
}
else
{
& iscsicli qaddtargetportal $targetPortalAddress;
}
}
}
#iscsicli RemoveTargetPortal <TargetPortalAddress> <TargetPortalSocket> [HBA Name] [Port Number]
#
function Remove-TargetPortal
{
<#
This command will remove a target portal from the list of persisted target portals. The iSCSI initiator service will
perform a SendTargets operation to each target portal in the list whenever the service starts and whenever a full refresh
of the target list is requested. Note that the command does not purge the targets discovered via this target portal from
the list of targets maintained by the service.
#>
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true)]
[Alias('Name')]
[string]
# the IP or DNS address of the target portal.
$targetPortalAddress,
[Parameter()]
[Alias('Port')]
[int]
#the TCP port number of the target portal. Typically this is 3260, which is the well-known port number
defined for use by iSCSI.
$TargetPortalSocket = 3260,
[Parameter()]
[string]
#the name of the initiator via which the SendTargets operation is performed. If not specified then the
initiator used is selected by the iSCSI initiator service.
$InitiatorName = '',
[Parameter()]
[string]
#is the physical port number on the initiator via which the SendTargets operation is performed. If not
specified then the kernel mode initiator driver chooses the initiator port used.
$InitiatorPort = ''
)
process
{
& iscsicli removetargetportal $targetPortalAddress $TargetPortalSocket $InitiatorName $InitiatorPort
}
}
#iscsicli RefreshTargetPortal <TargetPortalAddress> <TargetPortalSocket> [HBA Name] [Port Number]
#
function Update-TargetPortal
{
<#
This command will perform a SendTargets operation to the target portal and include the discovered targets into the list of
targets maintained by the service. It does not add the target portal to the persistent list.
#>
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[Alias("Address")]
[string]
# the IP or DNS address of the target portal.
$targetPortalAddress,
[Parameter()]
[Alias("Port")]
[int]
#the TCP port number of the target portal. Typically this is 3260, which is the well-known port number
defined for use by iSCSI.
$TargetPortalSocket = 3260,
[Parameter()]
[string]
#the name of the initiator via which the SendTargets operation is performed. If not specified then the
initiator used is selected by the iSCSI initiator service.
$InitiatorName,
[Parameter()]
[int]
#is the physical port number on the initiator via which the SendTargets operation is performed. If not
specified then the kernel mode initiator driver chooses the initiator port used.
$InitiatorPort
)
process
{
& iscsicli refreshtargetportal $targetPortalAddress $TargetPortalSocket $InitiatorName $InitiatorPort
}
}
#iscsicli ListTargets [ForceUpdate]
#
#iscsicli ListPersistentTargets
#
function Get-Target
{
<#
This command will display the list of persistent targets configured for all initiators.
#>
[CmdletBinding(DefaultParameterSetName='Local')]
param(
[Parameter( ParameterSetName='Persistent' )]
[switch]
# specify to get persistent targets
$persistent,
[Parameter( ParameterSetName='Local' )]
[switch]
# specify to force refresh of target list during retrieval
$force
)
process
{
if( $persistent )
{
$data = & iscsicli ListPersistentTargets | Out-String;
$data | Write-Verbose;
$data -replace "[`r`n]+","=" -split "==" | where { $_ -match ':\\s+' } | foreach {
$_ | convertFrom-iSCSIOutput
# Write-Verbose "section $_";
# $a = @{};
# $_ -split '=' | Select-String '^\\s+[\\S\\s]+:\\s+' | foreach{
# Write-Verbose "item entry $_";
# $k,$v = $_ -split ':',2
# $a[$k.trim(' ')] = $v.trim(' ');
#
# #todo - massage to match remove-target inputs
# }
# new-object psobject -Property $a;
}
}
else
{
if( $force )
{
$data = & iscsicli ListTargets T
}
else
{
$data = & iscsicli ListTargets
}
$data | Select-String '^\\s+\\S+:\\S+$' | foreach{ $_ -replace '^\\s+','' -replace '\\s+$','' };
}
}
}
#iscsicli ListTargetPortals
#
function Get-TargetPortal
{
[CmdletBinding()]
param()
process
{
$data = & iscsicli ListTargetPortals | Out-String;
$data | Write-Verbose;
$data -replace "[`r`n]+","=" -split "==" | where { $_ -match ':\\s+' } | foreach {
$_ | convertFrom-iSCSIOutput
# Write-Debug "section $_";
# $a = @{};
# $_ -split '=' | Select-String '^\\s+[\\S\\s]+:\\s+' | foreach{
# Write-Debug "item entry $_";
# $k,$v = $_ -split ':',2
# $a[$k.trim(' ')] = $v.trim(' ');
# }
# new-object psobject -Property $a;
}
}
}
#iscsicli TargetInfo <TargetName> [Discovery Mechanism]
#
function Get-TargetInfo
{
<#
This command will return information about the target specified by TargetName. The iSCSI initiator service maintains a
separate set of information about every target organized by each mechanism by which it was discovered. This means that
each instance of a target can have different information such as target portal groups. Discovery Mechanism is an optional
parameter and if not specified then only the list of discovery mechanisms for the target are displayed. If Discovery
Mechanism is specified then information about the target instance discovered by that mechanism is displayed.
#>
[CmdletBinding()]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true)]
[string]
$targetName,
[Parameter()]
[string]
$discoveryMechanism
)
process
{
}
}
#iscsicli LoginTarget <TargetName> <ReportToPNP>
# <TargetPortalAddress> <TargetPortalSocket>
# <InitiatorInstance> <Port number> <Security Flags>
# <Login Flags> <Header Digest> <Data Digest>
# <Max Connections> <DefaultTime2Wait>
# <DefaultTime2Retain> <Username> <Password> <AuthType> <Key>
# <Mapping Count> <Target Lun> <OS Bus> <Os Target>
# <OS Lun> ...
#
#iscsicli PersistentLoginTarget <TargetName> <ReportToPNP>
# <TargetPortalAddress> <TargetPortalSocket>
# <InitiatorInstance> <Port number> <Security Flags>
# <Login Flags> <Header Digest> <Data Digest>
# <Max Connections> <DefaultTime2Wait>
# <DefaultTime2Retain> <Username> <Password> <AuthType> <Key>
# <Mapping Count> <Target Lun> <OS Bus> <Os Target>
# <OS Lun> ...
#
#iscsicli QLoginTarget <TargetName> [CHAP Username] [CHAP Password]
#
function Connect-Target
{
<#
This command will login to a target
#>
#iscsicli persistentlogintarget $t T * * * * * * * * * * * [* * *] * 0
[CmdletBinding( SupportsShouldProcess=$true )]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true)]
[Alias("Name")]
[string]
# the name of the target
$targetName,
[Parameter()]
[string]
# Username is the string that should be used as the CHAP username when logging into the target. By
specifying * for this parameter, the iSCSI initiator service will use the initiator node name as the CHAP username.
$username,
[Parameter()]
[string]
# Password is the string that should be used as the target’s CHAP secret when logging into the target. The
initiator will use this secret to compute a hash value based on the challenge sent by the target.
$password,
[Parameter()]
[switch]
# specify to persist the login information upon reboot
$persist
)
process
{
if( $username )
{
$data = & iscsicli qlogintarget $targetName $username $password
Write-Verbose "Raw iSCSIcli output: $data";
}
else
{
$data = & iscsicli qlogintarget $targetName
Write-Verbose "Raw iSCSIcli output: $data";
$username = '*';
$password = '*';
}
Write-Verbose "Raw iSCSIcli output: $data";
if( $data -match 'already.+logged' )
{
$s = get-session | where { $_.targetname -eq $targetName };
New-Object psobject -Property @{ SessionId=$s.SessionId; ConnectionId=$s.Connection.ConnectionID
};
}
else
{
# Session Id is 0xfffffa800f7900a8-0x4000013700000015
# Connection Id is 0xfffffa800f7900a8-0x23
( $data | Out-String ) -replace '0x','' -replace "[`r`n]+",'=' | convertFrom-iSCSIOutput -field '
is ';
}
if( $persist )
{
& iscsicli persistentlogintarget $targetName T * * * * * * * * * * * $username $password * * 0 |
Out-Null
}
}
}
#iscsicli LogoutTarget <SessionId>
#
function Disconnect-Session
{
<#
This command will attempt to logout of a target which was logged in via the session specified by SessionId. The iSCSI
initiator service will not logout of a session if any devices exposed by it are currently in use. If the command fails
then consult the system eventlog for additional information about the component that is using the device.
#>
[CmdletBinding( SupportsShouldProcess=$true, ConfirmImpact='high' )]
param(
[Parameter( Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true )]
[string]
$sessionId,
[Parameter()]
[switch]
# specify to bypass standard PowerShell confirmation processes
$force
)
process
{
if( -not( $force -or $pscmdlet.shouldProcess( $sessionId, "Disconnect Session" ) ) )
{
return;
}
$data = & iscsicli logouttarget $sessionId | Out-String;
if( $data -notmatch 'success' )
{
throw $data;
}
}
}
#iscsicli ListInitiators
#
function Get-Initiators
{
<#
This command will display the list of initiator instance names that are running and operating with the iSCSI initiator
service.
#>
[CmdletBinding()]
param()
process
{
& iscsicli listinitiators
}
}
#iscsicli SessionList <Show Session Info>
#
function Get-Session
{
<#
This command displays the list of active sessions for all initiators. Note that a session that has no connections is not
connected to the target and is in a retry state.
Microsoft iSCSI Initiator Version 6.1 Build 7601
Total of 2 sessions
Session Id : fffffa800f7900a8-400001370000000d
Initiator Node Name : iqn.1991-05.com.microsoft:archimedes
Target Node Name : (null)
Target Name : iqn.2008-08.com.starwindsoftware:127.0.0.1-target1
ISID : 40 00 01 37 00 00
TSID : 27 00
Number Connections : 1
Connections:
Connection Id : fffffa800f7900a8-1b
Initiator Portal : 0.0.0.0/58847
Target Portal : 192.168.1.108/3260
CID : 01 00
Devices:
Device Type : Disk
Device Number : 1
Storage Device Type : 7
Partition Number : 0
Friendly Name : ROCKET RAM DISK 1024 M SCSI Disk Device
Device Description : Disk drive
Reported Mappings : Port 1, Bus 0, Target Id 0, LUN 0
Location : Bus Number 0, Target Id 0, LUN 0
Initiator Name : ROOT\\ISCSIPRT\\0000_0
Target Name : iqn.2008-08.com.starwindsoftware:127.0.0.1-target1
Device Interface Name : \\\\?\\scsi#disk&ven_rocket&prod_ram_disk_1024_m#1&1c121344&0&000000#{53f56307-b6bf-11d0-9
4f2-00a0c91efb8b}
Legacy Device Name : \\\\.\\PhysicalDrive1
Device Instance : 0x82c
Volume Path Names :
E:\\
Session Id : fffffa800f7900a8-400001370000000f
Initiator Node Name : iqn.1991-05.com.microsoft:archimedes
Target Node Name : (null)
Target Name : iqn.2008-08.com.starwindsoftware:127.0.0.1-scratch
ISID : 40 00 01 37 00 00
TSID : 2b 00
Number Connections : 1
Connections:
Connection Id : fffffa800f7900a8-1d
Initiator Portal : 0.0.0.0/59359
Target Portal : 192.168.1.106/3260
CID : 01 00
Devices:
Device Type : Disk
Device Number : 2
Storage Device Type : 7
Partition Number : 0
Friendly Name : ROCKET RAM DISK 256 MB SCSI Disk Device
Device Description : Disk drive
Reported Mappings : Port 1, Bus 0, Target Id 1, LUN 0
Location : Bus Number 0, Target Id 1, LUN 0
Initiator Name : ROOT\\ISCSIPRT\\0000_0
Target Name : iqn.2008-08.com.starwindsoftware:127.0.0.1-scratch
Device Interface Name : \\\\?\\scsi#disk&ven_rocket&prod_ram_disk_256_mb#1&1c121344&0&000100#{53f56307-b6bf-11d0-9
4f2-00a0c91efb8b}
Legacy Device Name : \\\\.\\PhysicalDrive2
Device Instance : 0x8ac
#>
[CmdletBinding()]
param(
[Parameter( ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true )]
[string]
$sessionId = '.*'
)
process
{
Write-Verbose "Session ID filter: $sessionId";
$data = ( & iscsicli sessionlist ) | out-string;
$data = $data -replace "[`r`n]+",'='
Write-Verbose "raw sessionlist info : $data";
$sessions = $data -split "Session Id\\s+:\\s+";
$sessions = $sessions | where { $_ -match "Connections:" } | foreach {
$session, $data = ( "Session Id : " + $_ ) -split 'Connections:', 2;
$connection, $device = $data -split "Devices:", 2;
Write-Verbose "session $session";
Write-Verbose "connection $connection";
Write-Verbose "device $device";
$session, $connection, $device = $session, $connection, $device | convertFrom-iSCSIOutput;
$session | Add-Member -PassThru -MemberType NoteProperty -Name Connection -Value $connection |
Add-Member -MemberType NoteProperty -Name Device -Value $device;
$session;
}
if( -not $sessions )
{
Write-Verbose "no sessions found"
return;
}
$sessions | write-verbose;
$sessions | where { write-verbose "filtering $($_.SessionId) by $sessionId"; $_.SessionId -match
$sessionId }
}
}
function convertFrom-iSCSIOutput
{
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
[string]
$data,
[Parameter()]
[string]
$itemDelimiter = '=',
[Parameter()]
[string]
$fieldSeparator = ':'
)
process
{
Write-Debug "convertFrom-iSCSIOutput ..."
Write-Debug " Data: $data";
Write-Debug " Item Delimiter: $itemdelimiter";
Write-Debug " Field Separator: $fieldSeparator";
$a = @{};
$data -split $itemDelimiter | where { $_ -match "$fieldSeparator\\s*" } | foreach {
function add-ToA( $k, $v )
{
$k = $k -replace ' ','';
Write-Debug "item key $k; value $v";
$a[$k] = $v;
}
Write-Debug "item entry $_";
$k,$v = $_ -split "\\s*$fieldSeparator\\s*",2;
if( $k -match ' and ' )
{
$k1, $k2 = $k -split ' and ';
$v1, $v2 = $v -split '\\s+',2;
add-ToA $k1 $v1
add-ToA $k2 $v2
}
else
{
add-ToA $k $v
}
}
new-object psobject -Property $a;
}
}
###########################################################
## initialization
Export-ModuleMember -Function '*';
|
combined_dataset/train/non-malicious/2540.ps1 | 2540.ps1 |
[String] $folder = "E:\Dexma\SQLIOTesting\";
[int] $runTimeSec = 60;
[int] $fileSizeMb = 1000;
[String[]] $stripFct = @("random", "sequential");
[int[]] $threads = @(1, 4, 16);
[Char[]] $ioTypes = @("R", "W");
[int[]] $ioSizesKb = @(8, 64, 256, 512);
[bool] $createHtml = $true;
Add-Type @"
public struct IoResult {
public string stripeFactor;
public int threads;
public string ioType;
public int ioSizeKb;
public double ioPerSec;
public double mbPerSec;
public int minLatMs;
public int maxLatMs;
public int avgLatMs;
public int h00;
public int h01;
public int h02;
public int h03;
public int h04;
public int h05;
public int h06;
public int h07;
public int h08;
public int h09;
public int h10;
public int h11;
public int h12;
public int h13;
public int h14;
public int h15;
public int h16;
public int h17;
public int h18;
public int h19;
public int h20;
public int h21;
public int h22;
public int h23;
public int h24;
}
"@;
function getIoResult
{
param([String[]] $resultFile)
[IoResult] $ioResult = New-Object IoResult;
[String[]] $log = Get-Content $resultFile;
$culture = [Globalization.CultureInfo]::CreateSpecificCulture("en-US");
foreach($line in $log)
{
[int] $start = $line.IndexOf("IOs/sec:");
if ($start -ne -1)
{ $ioResult.ioPerSec = [Double]::Parse($line.SubString($start + 8), $culture); }
[int] $start = $line.IndexOf("MBs/sec:");
if ($start -ne -1)
{ $ioResult.mbPerSec = [Double]::Parse($line.SubString($start + 8), $culture); }
[int] $start = $line.IndexOf("Min_Latency(ms):");
if ($start -ne -1)
{ $ioResult.minLatMs = [int]::Parse($line.SubString($start + 16), $culture); }
[int] $start = $line.IndexOf("Max_Latency(ms):");
if ($start -ne -1)
{ $ioResult.maxLatMs = [int]::Parse($line.SubString($start + 16), $culture); }
[int] $start = $line.IndexOf("Avg_Latency(ms):");
if ($start -ne -1)
{ $ioResult.avgLatMs = [int]::Parse($line.SubString($start + 16), $culture); }
[int] $start = $line.IndexOf("%:");
if ($start -ne -1)
{
$ioResult.h00 = [int]::Parse($line.SubString( 2, 3), $culture);
$ioResult.h01 = [int]::Parse($line.SubString( 5, 3), $culture);
$ioResult.h02 = [int]::Parse($line.SubString( 8, 3), $culture);
$ioResult.h03 = [int]::Parse($line.SubString(11, 3), $culture);
$ioResult.h04 = [int]::Parse($line.SubString(14, 3), $culture);
$ioResult.h05 = [int]::Parse($line.SubString(17, 3), $culture);
$ioResult.h06 = [int]::Parse($line.SubString(20, 3), $culture);
$ioResult.h07 = [int]::Parse($line.SubString(23, 3), $culture);
$ioResult.h08 = [int]::Parse($line.SubString(26, 3), $culture);
$ioResult.h09 = [int]::Parse($line.SubString(29, 3), $culture);
$ioResult.h10 = [int]::Parse($line.SubString(32, 3), $culture);
$ioResult.h11 = [int]::Parse($line.SubString(35, 3), $culture);
$ioResult.h12 = [int]::Parse($line.SubString(38, 3), $culture);
$ioResult.h13 = [int]::Parse($line.SubString(41, 3), $culture);
$ioResult.h14 = [int]::Parse($line.SubString(44, 3), $culture);
$ioResult.h15 = [int]::Parse($line.SubString(47, 3), $culture);
$ioResult.h16 = [int]::Parse($line.SubString(50, 3), $culture);
$ioResult.h17 = [int]::Parse($line.SubString(53, 3), $culture);
$ioResult.h18 = [int]::Parse($line.SubString(56, 3), $culture);
$ioResult.h19 = [int]::Parse($line.SubString(59, 3), $culture);
$ioResult.h20 = [int]::Parse($line.SubString(62, 3), $culture);
$ioResult.h21 = [int]::Parse($line.SubString(65, 3), $culture);
$ioResult.h22 = [int]::Parse($line.SubString(68, 3), $culture);
$ioResult.h23 = [int]::Parse($line.SubString(71, 3), $culture);
$ioResult.h24 = [int]::Parse($line.SubString(74), $culture);
}
}
return $ioResult;
}
function getHtmlPageHeader
{
return `
"<!DOCTYPE HTML PUBLIC ""-//W3C//DTD HTML 4.0 Transitional//EN""><html><head>
<title>Storage I/O Performance Test</title>
<link rel=""stylesheet"" type=""text/css"" href=""StorageIoPerformanceTester.css""></link></head><body>
<table class=""docTable"">
<tr><td class=""docHeader"">Storage I/O Performance Test<br><br></td>
</tr><tr><td>Document Created: " + (Get-Date -Format yyyy-MM-dd) + "</td></tr></table><br>"
}
function getHtmlParagraph1
{
param([string] $text)
return "<br><br><p class=""styleHeader1"">$text</p>";
}
function getHtmlParagraph2
{
param([string] $text)
return "<br><br><p class=""styleHeader2"">$text</p>";
}
function getHtmlTableStart
{
param([string[]] $cols)
[string] $tbl = "<table class=""styleTable""><colgroup>";
[string] $tr = "<tr>";
foreach ($col in $cols)
{
$tbl += "<col></col>";
$tr += "<th class=""styleColHeader""><span>$col</span></th>";
}
return $tbl + "</colgroup>" + $tr + "</tr>";
}
function getHtmlTableAddRow
{
param([object[]] $cols)
[string] $tr = "<tr>";
foreach ($col in $cols)
{
if (@("int16", "int32", "double") -contains $col.GetType().Name)
{ $tr += "<th class=""styleColNum""><span>$col</span></th>"; }
else
{ $tr += "<th class=""styleCol""><span>$col</span></th>" };
}
return $tr + "</tr>";
}
function getHtmlTableEnd
{ return "</table>"; }
Clear-Host;
$check = Get-ChildItem -Path $folder"SqlIo.exe" -ErrorAction SilentlyContinue;
if (!$check)
{
Write-Host "The SqlIo.exe tool must exist in the test folder!" -BackgroundColor Red;
break;
}
[string] $batchFile = ($folder + "sqlio.bat");
[IoResult[]] $results = @();
Write-Host ((Get-Date -format HH:mm:ss) + ": Starting ...");
Set-Content -Value $folder"testfile.dat 2 0x0 "$fileSizeMb"" -Path $folder"param.txt";
foreach ($stripeFactor in $stripFct)
{
foreach ($thread in $threads)
{
foreach ($ioType in $ioTypes)
{
foreach ($ioSizeKb in $ioSizesKb)
{
Write-Host ((Get-Date -format HH:mm:ss) + ": Parameter = $stripeFactor $thread $ioType $ioSizeKb");
$batch = "call sqlio.exe " + `
"-k$ioType -s$runTimeSec -f$stripeFactor -b$ioSizeKb -t$thread " + `
"-o8 -LS -BN " + `
"-Fparam.txt > result.txt";
Set-Content -Value $batch -Path $batchFile;
Start-Process -Wait -FilePath $batchFile -workingdirectory $folder -WindowStyle Hidden;
[IoResult] $result = getIoResult -resultFile $folder"result.txt";
$result.stripeFactor = $stripeFactor;
$result.threads = $thread;
$result.ioType = $ioType;
$result.ioSizeKb = $ioSizeKb;
$results += $result;
Remove-Item $folder"result.txt" -ErrorAction SilentlyContinue;
Remove-Item $folder"sqlio.bat" -ErrorAction SilentlyContinue;
}
}
}
}
Clear-Host;
Write-Output "Measures:";
Write-Output $results | `
Format-Table -Property stripeFactor, threads, ioType, ioSizeKb, ioPerSec, mbPerSec, `
minlatMs, maxLatMs, avgLatMs -AutoSize;
Write-Output "Latency History:";
Write-Output $results | `
Format-Table -Property stripeFactor, threads, ioType, ioSizeKb, `
h00, h01, h02, h03, h04, h05, `
h06, h07, h08, h09, h10, h11, `
h12, h13, h14, h15, h16, h17, `
h18, h19, h20, h21, h23, h24 -AutoSize;
if ($createHtml)
{
[String] $header = [String]::Empty;
[String] $overview = [String]::Empty;
[string] $history = [String]::Empty;
[String] $html = [String]::Empty;
$header += getHtmlPageHeader;
$header += getHtmlParagraph1 -text "Test Parameter Settings:";
$header += getHtmlTableStart -cols @("Property", "Value");
$header += getHtmlTableAddRow -cols @("Computer", $Env:COMPUTERNAME);
$header += getHtmlTableAddRow -cols @("Test folder", $folder);
$header += getHtmlTableAddRow -cols @("Size of test file (MB)", $fileSizeMb);
$header += getHtmlTableAddRow -cols @("Duration per test case (sec)", $runTimeSec);
$header += getHtmlTableAddRow -cols @("Stripe factors", ($stripFct));
$header += getHtmlTableAddRow -cols @("Threads", ($threads));
$header += getHtmlTableAddRow -cols @("I/O types", ($ioTypes));
$header += getHtmlTableAddRow -cols @("I/O size (KB)", ($ioSizesKb));
$header += getHtmlTableEnd;
$overview += getHtmlParagraph1 -text "Measures Overview:";
$overview += getHtmlTableStart -cols @("Stripe Factor", "Threads", "IO Type", "IO Size", `
"IO per Sec", "MB per Sec", `
"Min Lat (ms)", "Max Lat (ms)", "Avg Lat (ms)");
$history += getHtmlParagraph1 -text "Latency History (ms):";
$history += getHtmlTableStart -cols @("Stripe Factor", "Threads", "IO Type", "IO Size", `
"0", "1", "2", "3", "4", "5", "6", "7", `
"8", "9", "10", "11", "12", "13", "14", "15", `
"16", "17", "18", "19", "20", "21", "22", "23", "24+");
foreach ($res in $results)
{
$overview += getHtmlTableAddRow -cols @($res.stripeFactor, $res.threads, $res.ioType, $res.ioSizeKb, `
$res.ioPerSec, $res.mbPerSec, `
$res.minLatMs, $res.maxLatMs, $res.avgLatMs);
$history += getHtmlTableAddRow -cols @($res.stripeFactor, $res.threads, $res.ioType, $res.ioSizeKb, `
$res.h00, $res.h01, $res.h02, $res.h03, $res.h04, $res.h05, `
$res.h06, $res.h07, $res.h08, $res.h09, $res.h10, $res.h11, `
$res.h12, $res.h13, $res.h14, $res.h15, $res.h16, $res.h17, `
$res.h18, $res.h19, $res.h20, $res.h21, $res.h22, $res.h23, `
$res.h24);
$overview += "`r`n";
$history += "`r`n";
}
$overview += getHtmlTableEnd;
$history += getHtmlTableEnd;
$html = $header + $overview + $history + "</body></html>";
Set-Content -Path $folder"StorageIoPerformanceTester.html" -Value $html;
Invoke-Item $folder"StorageIoPerformanceTester.html";
}
Remove-Item $folder"testfile.dat" -ErrorAction SilentlyContinue;
Remove-Item $folder"param.txt" -ErrorAction SilentlyContinue;
Write-Host ((Get-Date -format HH:mm:ss) + ": Finished"); |
combined_dataset/train/non-malicious/sample_62_21.ps1 | sample_62_21.ps1 | # diag_ads.psm1
# Created by tdimli
# March 2020
#
# Diagnostic functions for ADS area
# version
$ADS_version = "1.0.240326.0"
# Area and Area/Component arrays
$ADS = @("xray_ADS_Auth", "xray_ADS_gpo")
#Component/Diagnostic Function arrays
$xray_ADS_Auth = @("net_rpc_KB2506972")
$xray_ADS_gpo = @("ads_gpo_KB5034606", "ads_gpo_KB5026593")
# begin: diagnostic functions
#region gpo
#region ads_gpo_KB5034606
<#
Component: gpo
Checks for:
A misconfiguration of startup / shutdown PowerShell scripts.
#>
function ads_gpo_KB5034606 {
param(
[Parameter(Mandatory=$true,
Position=0)]
[Boolean]$offline
)
if($offline) {
LogWrite "Cannot run offline, skipping"
return $RETURNCODE_SKIPPED
}
$issueMsg = @"
The following Group Policy PowerShell script has not been defined as PowerShell.
{0}
Resolution:
Please configure the policy as a PowerShell script in the Group Policy Settings.
"@
$registryBase = "\Software\Microsoft\Windows\CurrentVersion\Group Policy\Scripts\"
$scopes = "Startup","Shutdown"
$MachineBase = "Registry::HKEY_LOCAL_MACHINE"
$UserBase = "Registry::HKEY_CURRENT_USER"
$KeyBases = $MachineBase, $UserBase
$invalidScripts = New-Object 'System.Collections.ArrayList'
foreach($scope in $scopes) {
foreach($keyBase in $KeyBases) {
$regPath = $keyBase + $registryBase + $scope
Get-ChildItem $regPath -ErrorAction Ignore | ForEach-Object {
$subPath = "Registry::$($_.Name)"
$gpoId = Get-ItemPropertyValue -Path $subPath -Name "GPOName" -ErrorAction Ignore
Get-ChildItem $subPath -ErrorAction Ignore | ForEach-Object {
$subsubKey = "Registry::$($_.Name)"
$scriptName = Get-ItemPropertyValue -Path $subsubKey -Name "Script" -ErrorAction Ignore
$isPowerShell = Get-ItemPropertyValue -Path $subsubKey -Name "IsPowerShell" -ErrorAction Ignore
if($scriptName.EndsWith(".ps1") -and -not $scriptName.StartsWith("powershell.exe") -and $isPowerShell -ne 1) {
# We have a match
$namespace = "root\Rsop\Computer"
if($keyBase -eq $UserBase) {
$namespace = "root\Rsop\User"
}
try {
$gpoName = (Get-WmiObject -Namespace $namespace -Query "SELECT Name FROM Rsop_GPO WHERE guidName = '$gpoId'").Name # ErrorAction omitted intentionally due to try/catch
}
catch {
$gpoName = "Unknown"
}
$invalidScripts.Add("$scope Script $scriptName from GPO $gpoName ($gpoId)") | Out-Null
}
}
}
}
}
if($invalidScripts.Count -ne 0) {
$scripts = $invalidScripts -Join "`n"
$issueMsg = [string]::Format($issueMsg, $scripts)
ReportIssue $issueMsg $ISSUETYPE_ERROR
break
}
return $RETURNCODE_SUCCESS
}
#endregion ads_gpo_KB5034606
#region ads_gpo_KB5026593
<#
Component: gpo
Checks for:
registry.pol file corruption
#>
function ads_gpo_KB5026593 {
param(
[Parameter(Mandatory=$true,
Position=0)]
[Boolean]$offline
)
if($offline) {
LogWrite "Cannot run offline, skipping"
return $RETURNCODE_SKIPPED
}
$issueMsgCorruption = @"
The following Local registry.pol file(s) appear corrupted:
{0}
This may cause corresponding policies to fail to apply.
Resolution:
Please restore from a recent backup or have the affected file recreated.
"@
$issueMsgInvalid = @"
The following Local registry.pol file(s) have invalid entries:
{0}
This may cause corresponding policies to fail to apply.
Resolution:
Please check the file(s) and ensure they don't have any invalid entries.
More Information:
https://learn.microsoft.com/en-us/previous-versions/windows/desktop/policy/registry-policy-file-format
"@
if($offline) {
LogWrite "Cannot run offline, skipping"
return $RETURNCODE_SKIPPED
}
# Look for the issue
try
{
$issueFound = $false
$corruptedFiles = ""
$invalidEntries = ""
$moreErrorsMsg = " ... (there may be more entries with errors)`n"
$maxErrors = 3
$polFiles = Get-ChildItem -Path $Env:windir\System32\GroupPolicy -Recurse -Filter "Registry.pol"
foreach ($polFile in $polFiles) {
# simple corruption check based on POL file signature (https://learn.microsoft.com/en-us/previous-versions/windows/desktop/policy/registry-policy-file-format)
if (-not $(Get-Content -Path $polFile.FullName) -match "PReg") {
$corruptedFiles += "$($polFile.FullName) (Length: $($polFile.Length) bytes, LastWriteTime: $($polFile.LastWriteTime))`n"
$issueFound = $true
}
}
if($issueFound)
{
$issueMsg = [string]::Format($issueMsgCorruption, $corruptedFiles)
ReportIssue $issueMsg $ISSUETYPE_ERROR
return $RETURNCODE_SUCCESS
}
# only look for lesser issues if a more serious error is not found
# check format matches [key;value;type;size;data]
foreach ($polFile in $polFiles) {
$fileHasIssue = $false
$errCount = $maxErrors
$lines = Get-Content -Path $polFile.FullName -Encoding Unicode
$lines = $lines -split '\[|\]' | Where-Object { $_ -match '\w' -and $_ -like '*;*' }
# check the format
foreach ($line in $lines) {
if ($errCount -le 0) {
$invalidEntries += $moreErrorsMsg
break
}
$parts = $line -split ';'
if ($parts.Length -ne 5) {
#invalid entry
if (-not $fileHasIssue) {
$invalidEntries += "`n$($polFile.FullName): Below entries are missing one or more of the 5 required fields [key;value;type;size;data]:`n"
$fileHasIssue = $true
$issueFound = $true
}
$invalidEntries += " [$line]`n"
$errCount--
}
}
}
if($issueFound)
{
$issueMsg = [string]::Format($issueMsgInvalid, $invalidEntries)
ReportIssue $issueMsg $ISSUETYPE_ERROR
return $RETURNCODE_SUCCESS
}
# check key and value are not empty
foreach ($polFile in $polFiles) {
$fileHasIssue = $false
$errCount = $maxErrors
$lines = Get-Content -Path $polFile.FullName -Encoding Unicode
$lines = $lines -split '\[|\]' | Where-Object { $_ -match '\w' -and $_ -like '*;*' }
# check the format
foreach ($line in $lines) {
if ($errCount -le 0) {
$invalidEntries += $moreErrorsMsg
break
}
$parts = $line -split ';'
foreach ($part in $parts) {
if ($part.Length -eq 0) {
#incorrect entry
if (-not $fileHasIssue) {
$invalidEntries += "`n$($polFile.FullName): Below entries have empty fields:`n"
$fileHasIssue = $true
$issueFound = $true
}
$invalidEntries += " [$line]`n"
$errCount--
break
}
}
}
}
if($issueFound)
{
$issueMsg = [string]::Format($issueMsgInvalid, $invalidEntries)
ReportIssue $issueMsg $ISSUETYPE_ERROR
return $RETURNCODE_SUCCESS
}
# check HKLM or HKCU is not specified (they are controlled by location of the file)
foreach ($polFile in $polFiles) {
$fileHasIssue = $false
$errCount = $maxErrors
$lines = Get-Content -Path $polFile.FullName -Encoding Unicode
$lines = $lines -split '\[|\]' | Where-Object { $_ -match '\w' -and $_ -like '*;*' }
# check the format
foreach ($line in $lines) {
if ($errCount -le 0) {
$invalidEntries += $moreErrorsMsg
break
}
$parts = $line -split ';'
$topLevel = $parts[0] -split '\\', 2
if ($topLevel[0] -in "HKLM", "HKEY_LOCAL_MACHINE", "HKCU", "HKEY_CURRENT_USER") {
#incorrect entry
if (-not $fileHasIssue) {
$invalidEntries += "`n$($polFile.FullName): Below entries include HKLM/HKCU which should not be included:`n"
$fileHasIssue = $true
$issueFound = $true
}
$invalidEntries += " [$line]`n"
$errCount--
}
}
}
if($issueFound)
{
$issueMsg = [string]::Format($issueMsgInvalid, $invalidEntries)
ReportIssue $issueMsg $ISSUETYPE_ERROR
return $RETURNCODE_SUCCESS
}
}
catch {
LogWrite "Failed - exiting! (Error: $_)"
return $RETURNCODE_FAILED
}
return $RETURNCODE_SUCCESS
}
#endregion ads_gpo_KB5026593
#endregion gpo
# end: diagnostic functions
Export-ModuleMember -Function * -Variable *
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBL7D9yRFPzuXGJ
# mnvc9iFdgas737K9FWVxVab1kAkj0qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMOUc4bdRr5bYC+4yJhLnVSE
# yN/ZltZlBZaD9E7uTumAMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASESDFZy8x8ztOYF8S9C9GqnKN2MB0Ti3ZcrgV/Ga9AJix3JRAIB/Azo+
# BuzMx8snO0dlfkXo0XhlaA+rh8/Fq4c5r3qPGbB6rU7vGR09UuG0MbORq7BvXoWJ
# mTf+IIf/wb/dn/06+HSB0qCdv4uf0awAx0xXhbMFjc5tVbhMr8mxwjhjVAHiS/3q
# ZtjBe051I3NGI3SJ/d2vJgtsBpuxDgzDTGpITM90Wgb9Qx48m1L3tkBD7pldER8W
# 47pJ4yi8PhWbjSBwU3kNe1YaL52NMkqMNVn1LZ4iCg0daUTGQhF/1QeTqn3rfp4v
# O7eHsNK67YDQaQfAwDIacyoerYgD06GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDcAKvnrj+gPJzfEkbiUZJkULa1G02REVosMhr5P6xbnwIGZkXwb9Ol
# GBMyMDI0MDYxMjE0NTg0OS4xMzZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hQFdDAiGA8yMDI0MDYxMjExMzEw
# MFoYDzIwMjQwNjEzMTEzMTAwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFAV0
# AgEAMAcCAQACAiRFMAcCAQACAhQoMAoCBQDqFVb0AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAE6VISplce5G6NIUG3teiNuajIKF5WqrxbEu8vjymi3++wDO
# pXgdmQuiLpbtFwnAmfHVd02SqihFKh1Ws7XswEYCe+sXvV9820IgU8zqrX63nLns
# 3D712IWY3q7lIwXNdZyYkNqvUHLwi8rlp2LGGBcKQnC8jMQqYj0tltP+zsBbCHl4
# DiyKqWUzqkATvDcvYiuzmuHzVOy8PuCmyWZwNZhC+E7riw7BtkwAhyNXd0j15TU8
# XQ8/jeksVLfzNtI7GTsCrjqZjJvRxc9bLItqLpvHLwFyya6hQmrT5Zu9LZqMO/Jb
# AkMmCUTPtUEHfLVPwZIVT9z+2G4vVZa4rirYgz4xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCffMxbkNY6KO6GC54RYLkf0ksoscgA7HWWpdVDaQ72UzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQg52fWEYq6fTuNkxG2HSNH5xdZmz9V
# SLto/y90KRIkLjgwDQYJKoZIhvcNAQELBQAEggIAp5YQZXqUzLftGsiO+cXWWeMM
# Fz0LaTBxZMTJmv6qRF0kLKgH7GhG6gDL2w4txuuuzBQBVQlvl9kmL0eH5IHtAbQx
# zf6jPkl3kC83t/krCl4dKRnLhozkKhlxYnZZyl0Sfo3xe0gIg4NvWotbe6OK8Mut
# DHGnF8D9PkZGRuTctfz9bkziKIsUQWEgsKVL5HXmZxuU6lL7ICmri3vp8nGaDlu0
# Uav7X08HFEGEkLo7unhNWzjrYoTu9JijtVL9mFH3Ac4xvuajBBKbNxlXC+HennkB
# 695X2Db/nNRltIcmSntJjHeRBG4Ezy6D+wqbn9SmlBVb3H8L3lyFAAEIa+bfy8Da
# z4yQgAxxrySQbfnxwKq11Gq5ceErzPVc1xMipfyvVY00SgJnQwoLw19LW8eJcDL3
# WTT/bkdI3ZpE61S7sVImpu3KyaLK0GC06jsLPDUDd4dfNaexuIvCvCuJnYmLfOFm
# 4Ec419fc8st3ZRN5k8q3gELKfWuTwhk6S2tOc+eo0SRxAdzxJiffktDTUjdOKr0K
# JNIwhaAeUeZLHraFjvOT8gz7qkjOL0rogwK5D4rMZyo/9CkUdZLS0M0UaSe08tHG
# cl6jk5yKyXuPyZHmDyy/C6xKxrdzVDdDJmAPvTRvJmpPgExCDdcBZcZohADFiESY
# e23KTxBVVZkUiP+exec=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_54_50.ps1 | sample_54_50.ps1 | #
# Module manifest for module 'OCI.PSModules.Adm'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Adm.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Adm Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAdmRemediationRecipe',
'Get-OCIAdmApplicationDependencyRecommendationsList',
'Get-OCIAdmApplicationDependencyVulnerabilitiesList',
'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList',
'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList',
'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList',
'Get-OCIAdmStage', 'Get-OCIAdmStagesList',
'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList',
'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList',
'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList',
'Invoke-OCIAdmDeactivateRemediationRecipe',
'Move-OCIAdmKnowledgeBaseCompartment',
'Move-OCIAdmRemediationRecipeCompartment',
'Move-OCIAdmRemediationRunCompartment',
'Move-OCIAdmVulnerabilityAuditCompartment',
'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe',
'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit',
'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe',
'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit',
'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest',
'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe',
'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_29_50.ps1 | sample_29_50.ps1 | let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl();
let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/docker.webCore.eventHandlers.js"];
let currentScriptElement = document.querySelector("script[src='Scripts/docker.webCore.plugin.js']");
if (currentScriptElement !== null) {
scripts.forEach(element => {
let newScriptElement = document.createElement("script");
newScriptElement.setAttribute("src", element);
newScriptElement.setAttribute("type", "text/javascript");
newScriptElement.async = false;
currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling);
currentScriptElement = newScriptElement;
});
}
// SIG // Begin signature block
// SIG // MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // X+ah+KdvfCBnE3Z3QtRiyytn7w3QlVsJD1vFr4g2au+g
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCDoMSRY8Wr3Xn4aGohXIO2uZtb3EMgJTzDF
// SIG // mXIg3CyFAzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAMZrvOsy
// SIG // YBAT2hwt/P3Ugi0wFywDKsRrw2iWollGzF9Z9e2j239E
// SIG // oM3vNqVZ91pk2KSIOrAZo9nqaiLf9x1njILbKi3iYaaU
// SIG // Jue9U69lVav6KMIEtgm7WzeSpKj+7fpSNUpY6nCDrHDE
// SIG // H6sKltSX999YOQkAB9CodnuGnTFPwkvOD93DGHM7xcLv
// SIG // kXMBBklBOcTAtyRLeNgAIqhRm7b5Q2pFImph2fXhMB/D
// SIG // hYVP2lNmURgT7vpN1hvB/sOgq2ChJfehu2Q5Iz2Rjhdf
// SIG // 5Swvj+5oKw7TbfPJdKWFmXbdkh61bzj+X1DAsF/EVZFk
// SIG // 2kxfTV1YlsqljQShhIPT0d/hwnKhgheUMIIXkAYKKwYB
// SIG // BAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIX
// SIG // aQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN
// SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQg3/wbauzXcTTGpFpQerX/
// SIG // kGHR+OYfsNu9s5gn9PiIazECBmX8a5++oRgTMjAyNDA0
// SIG // MTAxNzE5MDIuOTQ2WjAEgAIB9KCB0aSBzjCByzELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0
// SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo
// SIG // aWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYD
// SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
// SIG // oIIR6jCCByAwggUIoAMCAQICEzMAAAHviT9WoVjMqNoA
// SIG // AQAAAe8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTQ4WhcN
// SIG // MjUwMzA1MTg0NTQ4WjCByzELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl
// SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
// SIG // Ojk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG
// SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAowtY4p8M4B8ITmpG
// SIG // aste6BOASASrJuZF+A1JggViNJRVaRIiuZmdioefbKC+
// SIG // J7OdqYRTEGBhuZMqQoqbp4MD/TaG+FRlROmqDKOYWfTc
// SIG // rV0eWUYG/WfDUehJiyiAkYQ+LKIzzIP0ZxkU3HX+/02L
// SIG // 8jNdIy45i8ihHoDB37yMD5jPgD+4c0C3xMQ3agidruuB
// SIG // neV5Z6xTpLuVPYyzipNcu9HPk8LdOP0S6q7r9Xxj/C5m
// SIG // JrR76weE3AbAA10pnBY4dFYEJF+M1xcKpyBvK4GPsw6i
// SIG // WEDWT/DtWKOJEnJB0+N1wtKDONMntvvZf602IgxTN55W
// SIG // Xto4bTpBgjuhqok6edMSPSE6SV4tLxHpPAHo0+DyjBDt
// SIG // mz8VOt6et7mW43TeS/pYCHAjTAjSNEiKKUuIGlUeEsvy
// SIG // KA79bw1qXviNvPysvI1k3nndDtx8TyTGal+EAdyOg58G
// SIG // ax4ip+qBN/LYAUwggCrxKGDk4O69pRdCLm7f9/lT7yrU
// SIG // wlG2TxThvI2bfaugBaHZb0J7YqJWCGLakqy8lwECJVxo
// SIG // WeIDXL+Hb9WAIpZ21gPQrJ2IfjihBa/+MODOvZSPsmqG
// SIG // dy/7f1H16U//snO4UvxaJXJqxhSUwWJUuJxNXLim5cGf
// SIG // 1Dhtuki4QzjVlxmQyjCSjed6Di0kpOJXUdB5bG0+IXi5
// SIG // VpThJSUCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTtTFqi
// SIG // hcKwm7a8PT/AOt2wFUicyzAfBgNVHSMEGDAWgBSfpxVd
// SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ
// SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
// SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
// SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
// SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
// SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB
// SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G
// SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // GBmWt2gg7nW5PRFXZD/MXEBmbiACD0cfStQgO7kcwbfN
// SIG // HwtGlpLmGIUDLxxyUR1KG0jOFMN8ze3xxDfIYWgQ2/TU
// SIG // WhpxVnbR8ZifXjM+iaZ+ioiMovVOToO0Ak2TJde59sOH
// SIG // nXaub7ZOK0Vjlb6YgwRiQESol1gfbtosdFh9hDBRh6oy
// SIG // IY1lF4T4EeAujShTVx71r13nCdll6yZ770BlwHzSRhEy
// SIG // WRqUeNZ1Dd4o34gkoxQ8Wphj7MuYmLvdOB7/brkl2HeZ
// SIG // tCcX9ljSUl5DxpTYaztu6T8YE9ddZsgEetUt0toXOe9s
// SIG // zfcqCRDmxPfFcuShDN2V+d3C3nzfNRdQvaf3ACpBOrvV
// SIG // eq8spf6koMbtVKnjmQrRv4mh0ijKMTOzKuEjBbD0//In
// SIG // jncApWKXMNAo2XuSgcdsS2uAdZ3hYm/CfP4EqLIzHRd5
// SIG // x4sh8dWHnWQ7cUkoHoHibItH21IHc7FTCWL6lcOdlqkD
// SIG // btBkQu/Wbla3lFSnQiZlDARwaU6elRaKS9CX+Eq4IPs0
// SIG // Q/YsG3Pbma5/vPaHaSJ2852K5zyh4jtuqntXpDcJf3e6
// SIG // 6NiLT/5YIc9A6A+5BBnopCiVh3baO3lSaCYZK1HGp07l
// SIG // B9PIPjWMBukvj4wUgfzcjRemx2v8UfnHgGIXI8dIgYr/
// SIG // dDJ9CYhn5wNv4S4+Xr4U3AIwggdxMIIFWaADAgECAhMz
// SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA
// SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
// SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp
// SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx
// SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
// SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
// SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
// SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc
// SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus
// SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130
// SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI
// SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes
// SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp
// SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
// SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz
// SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO
// SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi
// SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5
// SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
// SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
// SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
// SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
// SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
// SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG
// SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw
// SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv
// SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH
// SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
// SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK
// SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
// SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
// SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
// SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
// SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
// SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l
// SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ
// SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz
// SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7
// SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY
// SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX
// SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
// SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz
// SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/
// SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1
// SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328
// SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
// SIG // ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4w
// SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
// SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV
// SIG // BAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1RTAtRDk0
// SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAS3CPNYMW3mtR
// SIG // MdphW18e3JPtIP+ggYMwgYCkfjB8MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnB
// SIG // R1owIhgPMjAyNDA0MTAxNzE0MDJaGA8yMDI0MDQxMTE3
// SIG // MTQwMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6cFH
// SIG // WgIBADAHAgEAAgIefzAHAgEAAgITxjAKAgUA6cKY2gIB
// SIG // ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMC
// SIG // oAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
// SIG // DQEBCwUAA4IBAQBebeAsUtZB4YT5tOWhMfT3RF/d/lCg
// SIG // opWEyA2I/1HHo6NF0Op6LMHxjfUkXxAngEG/RsgNQxUI
// SIG // Zkv3K1mMA64b6nEzqaD0NB64Rl+ArPz9JAgyiDxit90M
// SIG // 94KjHHwQ8E5027sNeqHg5S1wfBhn8KFQycINsI1fAY/8
// SIG // ToB0Hwaaa1BgLej1vweREqbFqvR9BqVUA1lPPYD6cYTm
// SIG // yssY1vKhrzfysjRNwqhJqGYFZc5c2M+lyALPnhSct3jo
// SIG // o2TBU9KSx5H5hLU3D+cYb9Bu1ak26+NxYcJKBntmS0PX
// SIG // X93gUQ17/EZircQy32fIhxinKSVu+EV4l9ToeRnSs0uD
// SIG // S2SjMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
// SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
// SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
// SIG // dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
// SIG // bXAgUENBIDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8w
// SIG // DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN
// SIG // BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgFojb
// SIG // AYNFECPNTS/1W4kVmkAgKAJ7PsrxCy4bpT/MFoMwgfoG
// SIG // CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDwYShFuBaN
// SIG // 8FM9PTUMdmtA23HbF/I6LzOS4sx5p8l/ozCBmDCBgKR+
// SIG // MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
// SIG // Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
// SIG // 74k/VqFYzKjaAAEAAAHvMCIEIDbD6RVrexcnqPj/dNwH
// SIG // l0Vp7m01FZQmrYD49j4Tyd9VMA0GCSqGSIb3DQEBCwUA
// SIG // BIICABBQvn2OoUzlC41EwIEAo3HVOSOXnvwSG5nzZmPH
// SIG // 5E4gBzMgbCX1xrQfx3bjhRc6D+N9iKiJ/s0lhcoEibDa
// SIG // 3xERy4BAaNrsvGf3+SXRbkmo5QoZPmrFHJeq3KCqqTwd
// SIG // 1vOrHsmAzu8V/+lIesI9rkst/GUUSXIjcWD4OAngwmUJ
// SIG // 27ggTJe2RGf/r57DDTXHVYh+shwQv2vSVMHqUQX7WEQ8
// SIG // 9PHWd9ypxI9dQunsWziNXGAp5M9ZxjY6mJNjPD5m2Lvn
// SIG // Q9cTOF7epeBy7zKcAd7I1yUVoRqdxGW0IDh6hm2bkH5f
// SIG // Xc/OdOnJidt1YaL26q27/buBO7NER3ah8r5byN6MImpv
// SIG // g8eN8qlxJEBpgTsbKQ0lFD6rC8Ol4DHXzsSovWJxFAZy
// SIG // XR+qiKBO8jMf0hgiurTCeaV1nBR1+vuhc5VvmokKJbXJ
// SIG // IODjqc9bqpl2okyoQ0+aly2NXnS438z9fGW09x4l0KrE
// SIG // twhnT61ec2b4qwpQb91kNPvUQtv5csi9XYPwTSdzCVa7
// SIG // LmKV/pEXeIcztW1Chc/AlXVjP2oX97zTeiDLbxHigj2V
// SIG // 6g7y/Qgd9kEOeP/PLXXJRVwD1771Oe7r7bWCZi3ikXtb
// SIG // Z6WlKAPBs4on404om4jZNSaFBpejTAsJoIZ9W6Ptl+sY
// SIG // VzrTaG+ufVWE8oa5oUOJpJ9xLT1u
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_55_85.ps1 | sample_55_85.ps1 | Import-LocalizedData -BindingVariable lswTxt -FileName AzStackHci.Software.Strings.psd1
function Test-OSVersion
{
<#
.SYNOPSIS
Test OS Version is correct
.DESCRIPTION
Get OS Version from local machine to use as minimum core count
Expecting data from PsSessions to include local machine indicating ECE.
#>
[CmdletBinding()]
param (
[Parameter()]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession
)
try
{
# Get All OS versions
$OsVersion = @()
$OsVersion = GetOSVersion -PsSession $PsSession
# Get OS Version from local machine to use as desired OS version
# Expecting data from PsSessions to include local machine indicating ECE.
$localOs = $OsVersion | Where-Object ComputerName -EQ $ENV:COMPUTERNAME
if ($localOs)
{
# Check local machine for minimum OS
$instanceResults = @()
$instanceResults += TestOsMinimumVersion -Version $localOs
# Check other nodes for consistency against local node
$localOsVersion = $localOs | Select-Object -ExpandProperty OSVersion
foreach ($version in ($OsVersion | Where-Object ComputerName -NE $ENV:COMPUTERNAME))
{
$detail = $lswTxt.OSVersion -f $version.OSVersion, $localOsVersion
if ($version.OSVersion -eq $localOsVersion)
{
$status = 'SUCCESS'
Log-Info ("Checking {0}. {1}" -f $version.ComputerName, $detail)
}
else
{
$status = 'FAILURE'
Log-Info ("Checking {0}. {1}" -f $version.ComputerName, $detail) -type Warning
}
$params = @{
Name = 'AzStackHci_Software_OperatingSystem_Version'
Title = 'Test Operating System Version'
DisplayName = 'Test Operating System Version'
Severity = 'WARNING'
Description = 'Checking Operating System Version matches existing cluster'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-install-os'
TargetResourceID = $version.ComputerName
TargetResourceName = $version.ComputerName
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $version.ComputerName
Resource = 'OS Version'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResults += New-AzStackHciResultObject @params
# Check for matching build
if (([system.version]$localOsVersion).Build -eq ([system.version]$version.OSVersion).Build)
{
$status = 'SUCCESS'
$detail = $lswTxt.OSBuild -f $version.ComputerName, ([system.version]$version.OSVersion).Build, ([system.version]$localOsVersion).Build
Log-Info $detail
}
else
{
$status = 'FAILURE'
$detail = $lswTxt.OSBuild -f $version.ComputerName, ([system.version]$version.OSVersion).Build, ([system.version]$localOsVersion).Build
Log-Info $detail -Type CRITICAL
}
$params = @{
Name = 'AzStackHci_Software_OperatingSystem_Build'
Title = 'Test Operating System Build'
DisplayName = 'Test Operating System Build'
Severity = 'CRITICAL'
Description = 'Checking Operating System Build matches existing cluster'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-install-os'
TargetResourceID = $version.ComputerName
TargetResourceName = $version.ComputerName
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $version.ComputerName
Resource = 'OS Build'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResults += New-AzStackHciResultObject @params
}
return $instanceResults
}
else
{
Log-Info $lswTxt.OSVersionSkip
}
}
catch
{
throw $_
}
}
function GetOSVersion
{
<#
.SYNOPSIS
Get OS Version from local or remote
#>
[CmdletBinding()]
param (
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession
)
$sb = {
$osVersion = (Get-CimInstance -ClassName Win32_OperatingSystem -Property Version).Version
$ntoskrnl = (Get-Item -Path (Join-Path -Path ([System.Environment]::SystemDirectory) -ChildPath 'ntoskrnl.exe')).VersionInfo.ProductVersion
return New-Object PSObject -Property @{
ComputerName = $ENV:COMPUTERNAME
OSVersion = [System.Version]("{0}.{1}" -f $osVersion,($ntoskrnl -Split '\.')[-1])
}
}
$osVersion = if ($PsSession)
{
Invoke-Command -Session $PsSession -ScriptBlock $sb
}
else
{
Invoke-Command -ScriptBlock $sb
}
return $osVersion
}
function TestOsMinimumVersion
{
<#
.SYNOPSIS
A short one-line action-based description, e.g. 'Tests if a function is valid'
#>
[CmdletBinding()]
param (
[Parameter()]
[psobject]
$Version,
[Parameter()]
[system.version]
$MinVersion = '10.0.19045'
)
try {
if ($version.OSVersion -ge $MinVersion)
{
$Status = 'SUCCESS'
$detail = $lswTxt.MinOSCheck -f $Version.OsVersion, $MinVersion
Log-Info $detail -Type Info
}
else
{
$Status = 'FAILURE'
$detail = $lswTxt.MinOSCheck -f $Version.OsVersion, $MinVersion
Log-Info $detail -Type Warning
}
$params = @{
Name = 'AzStackHci_Software_OperatingSystem_Version'
Title = 'Test Operating System Minimum Version'
DisplayName = 'Test Operating System Minimum Version'
Severity = 'CRITICAL'
Description = 'Checking Operating System Version meets minimum version'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-install-os'
TargetResourceID = $version.ComputerName
TargetResourceName = $version.ComputerName
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $version.ComputerName
Resource = 'OS Version'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResult = New-AzStackHciResultObject @params
return $instanceResult
}
catch {
throw $_
}
}
function GetNTPServer
{
<#
.SYNOPSIS
Get NTP server from local or remote
#>
[CmdletBinding()]
param (
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession
)
$sb = {
$ntpSource = & w32tm.exe /query /source
$ntpServer = ($ntpSource -split ',' | Select-Object -first 1).Trim()
$retry = 0
$maxRetry = 3
do {
$retry++
if ($retry -gt 1) { Start-Sleep -Seconds 5 }
$stripchart = & w32tm.exe /stripchart /computer:$ntpServer /dataonly /samples:1
} while ($stripchart -match 'error' -and $retry -le $maxRetry)
return New-Object PSObject -Property @{
ComputerName = $ENV:COMPUTERNAME
NtpServer = $ntpServer
Stripchart = $stripchart
Retries = "$retry/$maxRetry"
}
}
$ntpServer = if ($PsSession)
{
Invoke-Command -Session $PsSession -ScriptBlock $sb
}
else
{
Invoke-Command -ScriptBlock $sb
}
return $ntpServer
}
function Test-NtpServer
{
<#
.SYNOPSIS
Test NTP Server is consistent across nodes and all nodes are in sync.
#>
[CmdletBinding()]
param (
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession
)
try {
$ntpServerConfig = GetNTPServer -PsSession $PsSession
$ntpStr = $ntpServerConfig | ForEach-Object { '{0}:{1}' -f $_.ComputerName, $_.ntpServer }
$instanceResults = @()
$AdditionalData = @()
# localNtp should be read from local machine when running in ECE
$localNtp = $ntpServerConfig | Where-Object ComputerName -EQ $ENV:COMPUTERNAME | Select-Object -ExpandProperty ntpServer
# if it's not set to an external source return immediately with failure
if ($localNtp -eq 'Local CMOS Clock')
{
$detail = $lswTxt.NTPServerNotSet -f $ENV:COMPUTERNAME, $localNtp
Log-Info $detail -Type CRITICAL
$params = @{
Name = 'AzStackHci_Software_NTP_Server'
Title = 'Test NTP server'
DisplayName = 'Test NTP server'
Severity = 'CRITICAL'
Description = 'Checking NTP server is configured.'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings'
TargetResourceID = $ENV:COMPUTERNAME
TargetResourceName = $ENV:COMPUTERNAME
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = 'FAILURE'
AdditionalData = @{
Source = $ENV:COMPUTERNAME
Resource = 'NTP Server'
Detail = $detail
Status = 'FAILURE'
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResult = New-AzStackHciResultObject @params
return $instanceResult
}
# if we found more than one node check for consistency
if ($PsSession.Count -gt 1)
{
# if we found local ntp cfg, expect all nodes to be set to that.
# if not, expect all nodes to be consistent with each other anyway.
if ($localNtp)
{
Log-Info ("Checking all nodes are configured with NTP Server: {0}" -f $localNtp)
foreach ($nodeNtp in $ntpServerConfig)
{
$detail = $lswTxt.NTPServerCheck -f $nodeNtp.ComputerName, $nodeNtp.ntpServer, $localNtp
if ($nodeNtp.ntpServer -eq $localNtp)
{
$Status = 'SUCCESS'
Log-Info $detail -Type Info
}
else
{
$Status = 'FAILURE'
Log-Info $detail -Type Warning
}
$params = @{
Name = 'AzStackHci_Software_NTP_Server Consistent'
Title = 'Test NTP server'
DisplayName = "Test NTP server $($nodeNtp.ComputerName)"
Severity = 'WARNING'
Description = 'Checking NTP server is configured consistently.'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings'
TargetResourceID = $nodeNtp.ComputerName
TargetResourceName = $nodeNtp.ComputerName
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $nodeNtp.ComputerName
Resource = 'NTP Server'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResults += New-AzStackHciResultObject @params
}
}
else
{
if (($ntpServerConfig.ntpServer | Sort-Object | Get-Unique).Count -eq 1)
{
$Status = 'SUCCESS'
$detail = $lswTxt.NTPServerCheckPass -f ($ntpStr -join ', ')
Log-Info $detail -Type Info
}
else
{
$Status = 'FAILURE'
$detail = $lswTxt.NTPServerCheckFail -f $ntpServerConfig.ntpServer
Log-Info $detail -Type Warning
}
$AdditionalData += New-Object -TypeName PSObject -Property @{
Source = 'All Nodes'
Resource = 'NTP Server'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
}
$params = @{
Name = 'AzStackHci_Software_NTP_Server_Consistent'
Title = 'Test NTP server'
DisplayName = "Test NTP server $($nodeNtp.ComputerName)"
Severity = 'WARNING'
Description = 'Checking NTP server is configured consistently.'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings'
TargetResourceID = $nodeNtp.ComputerName
TargetResourceName = $nodeNtp.ComputerName
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = 'All Nodes'
Resource = 'NTP Server'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResults += New-AzStackHciResultObject @params
Clear-Variable -Name AdditionalData, instanceResult -ErrorAction SilentlyContinue
}
foreach ($ntpCfg in $ntpServerConfig)
{
$stripChart = $ntpCfg.Stripchart
if ($stripchart.Count -ge 4 -and (($stripchart[3] -like '*, +*') -or ($stripchart[3] -like '*, -*'))) {
$status = 'SUCCESS'
$detail = $lswTxt.NtpStripChartPass -f $ntpCfg.ComputerName, $ntpCfg.NtpServer, $stripchart[3]
Log-Info $detail
}
else {
$status = 'FAILURE'
$failureDetail = $stripchart | Select-String -Pattern 'error'
$detail = $lswTxt.NtpStripChartFail -f $ntpCfg.ComputerName, $ntpCfg.NtpServer, $failureDetail
Log-Info $detail -Type CRITICAL
$stripchart | ForEach-Object { Log-Info $_ -Type Warning }
}
$params = @{
Name = 'AzStackHci_Software_NTP_Server_Sync'
Title = 'Test NTP server'
DisplayName = "Test NTP server $($ntpCfg.ComputerName)"
Severity = 'CRITICAL'
Description = 'Checking NTP server is synchronisation'
Tags = @{}
Remediation = 'https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings'
TargetResourceID = "$($nodeNtp.ComputerName)/$($NodeNtp.NtpServer)"
TargetResourceName = "$($nodeNtp.ComputerName)/$($NodeNtp.NtpServer)"
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $ntpCfg.ComputerName
Resource = 'NTP Server Sync'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResults += New-AzStackHciResultObject @params
}
return $instanceResults
}
catch {
throw $_
}
}
function Test-LocalGroupEnumeration
{
<#
.SYNOPSIS
Test Local Group Enumeration
.DESCRIPTION
Test Local Group Enumeration because it is required during Azure Stack HCI deployment.
#>
[CmdletBinding()]
param (
[Parameter()]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession
)
try
{
$instanceResults = @()
$sb = {
try {
# Get-LocalGroupMember doesn't play nice with error stream, assigning to variable to get around this.
$errorDetail = $null
$localAdminGroup = Get-LocalGroupMember -SID S-1-5-32-544 -ErrorVariable errorDetail
}
catch {
$localAdminGroup = $null
if ([string]::IsNullOrEmpty($errorDetail))
{
$errorDetail = $_.Exception.Message
}
}
return New-Object PSObject -Property @{
ComputerName = $ENV:COMPUTERNAME
LocalAdminGroupTest = [bool]$localAdminGroup
errorDetail = $errorDetail
}
}
$localGroupTests = if ($PsSession)
{
Invoke-Command -Session $PsSession -ScriptBlock $sb -ErrorAction SilentlyContinue
}
else
{
Invoke-Command -ScriptBlock $sb -ErrorAction SilentlyContinue
}
$localGroupTests | ForEach-Object {
$localGroup = $_
if ($localGroup.LocalAdminGroupTest)
{
$status = 'SUCCESS'
$detail = $lswTxt.LocalGroupEnumerationSuccess -f $localGroup.ComputerName
Log-Info $detail
}
else
{
$status = 'FAILURE'
$detail = $lswTxt.LocalGroupEnumerationFailure -f $localGroup.ComputerName, $localGroup.errorDetail
Log-Info $detail -Type CRITICAL
}
$params = @{
Name = 'AzStackHci_Software_LocalGroupEnumeration'
Title = 'Test Local Group Enumeration'
DisplayName = "Test Local Group Enumeration on $($localGroup.ComputerName)"
Severity = 'CRITICAL'
Description = 'Checking Local Group Enumeration'
Tags = @{}
Remediation = 'https://docs.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-install-os'
TargetResourceID = "$($localGroup.ComputerName)/Administrators"
TargetResourceName = "$($localGroup.ComputerName)/Administrators"
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $localGroup.ComputerName
Resource = 'Local Group'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
HealthCheckSource = $ENV:EnvChkrId
}
$instanceResults += New-AzStackHciResultObject @params
}
return $instanceResults
}
catch {
throw $_
}
}
function Test-IsNotPartofDomain
{
<#
.SYNOPSIS
Test if the node is part of a domain
.DESCRIPTION
Test if the node is part of a domain
#>
[CmdletBinding()]
param (
[Parameter()]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession
)
try
{
$instanceResults = @()
$sb = {
$PartOfDomain = [bool](Get-WmiObject -Class Win32_ComputerSystem).PartOfDomain
return New-Object PSObject -Property @{
ComputerName = $ENV:COMPUTERNAME
PartOfDomain = $PartOfDomain
}
}
$domainTests = if ($PsSession)
{
Invoke-Command -Session $PsSession -ScriptBlock $sb
}
else
{
Invoke-Command -ScriptBlock $sb
}
foreach ($domainTest in $domainTests)
{
if ($domainTest.PartOfDomain)
{
$status = 'FAILURE'
$detail = $lswTxt.IsNotPartofDomainFailure -f $domainTest.ComputerName
Log-Info $detail -Type CRITICAL
}
else
{
$status = 'SUCCESS'
$detail = $lswTxt.IsNotPartofDomainSuccess -f $domainTest.ComputerName
Log-Info $detail
}
$params = @{
Name = 'AzStackHci_Software_IsNotPartofDomain'
Title = 'Test node is not part of a domain'
DisplayName = "Test node is not part of a domain on $($domainTest.ComputerName)"
Severity = 'CRITICAL'
Description = 'Checking if the node is not part of a domain'
Tags = @{}
Remediation = 'https://docs.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-install-os'
TargetResourceID = $domainTest.ComputerName
TargetResourceName = $domainTest.ComputerName
TargetResourceType = 'OperatingSystem'
Timestamp = [datetime]::UtcNow
Status = $status
AdditionalData = @{
Source = $domainTest.ComputerName
Resource = 'Domain'
Detail = $detail
Status = $status
TimeStamp = [datetime]::UtcNow
}
}
$instanceResults += New-AzStackHciResultObject @params
}
return $instanceResults
}
catch {
throw $_
}
}
Export-ModuleMember -Function Test-*
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDb/JPQVodcBRKU
# JwWG3SjWSMHqSsJ6aRIhdpGpRF/K36CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPUe30YTZp8onIlQSIcb0v2x
# SEXwJe0KGoR/opMQAfkyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAR7JpFW7Gy6R+gnCGn2brsQFoSGUPsepjPrfvkWQusqHZ3/cbETCAAZHS
# ihvsrkndKCpdsaz56xx4oDeqzKnhMDtalODU6rITaSAMCqTSPwr+d1K+SClTy91U
# svx5SUurSNQm49Fotgp7GOAHNFSzmAbtpu6fW+8vzTXYL8TQWkF7jDCnmCFR6OjY
# PotdmEv0gaIYKjdKSu5Ljh4+QmwJZvLdwigKqOjwcLhc5F/eUspl7JP8/l9Ht+tK
# Ha2EzvLNoWxJd9tPX3jVtUkcifx56TK+lT02kG+61arITtfs8QrsI2xbdFIeh7a3
# SeTCywe0PhZbotE78p4Va6G1xlnxtqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDL/2ol7l2HX0l8SIoEK+GjnVoqDAs/uvwjuAQO3eMiDwIGZjOt3K1f
# GBMyMDI0MDUxNjE4NDQyNC43NDVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwn2IwIhgPMjAyNDA1MTYyMzA2MTBaGA8yMDI0MDUxNzIzMDYxMFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCfYgIBADAHAgEAAgIYmzAHAgEAAgITVDAKAgUA
# 6fHw4gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAISJNra7Ggw4B/8Tn4yp
# x+hXDg8/G8srkcJl7vwzRVbuS6W9fR0YCSMS6fkjFayeozoQe5FrKcY1U7cZw3XC
# UhSsQGfYXh1matPvCIPXbjvnphAuKz0TdujD/q+eE6Gqa++ey0goT0AYhcfDRwvx
# gxxBejaOpgYnpl40jU7s7YN9MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgHAdPRpVoXtGLhWNFwmCmmxI/XOsmEvPomaRh2u8BYsYwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEILplb72oW4+73iQROSoFPO5HtCiiSLulx8XotCt2EMse
# MA0GCSqGSIb3DQEBCwUABIICAA+f+P3R/t0e2oy+kG4zNto7fg5CtpZvmHHosxtv
# rY2p9FRDatCqccd2BdjO3qKIL5jYGuZAkN1dzdQxB93F7VetZCSnbaQHzpRJF5ln
# uAWJrnta0QepG0CzjSmEtKfFp74vDBjeyBfKb6qefBYfZbpLGBzNkwp7IoA1eyD3
# KfrIuHVUe/pBajsxESPFjcLs+2OLOEQKbT/9PUxkFptPImgJE0e3+Ufoz0nyhjlz
# KtwAiVYZP6fxKNtVMK2OGFv6oT037CYNWxlWD3zKa8RQhgTCvzt1L3R5LLFgsUkO
# z3dLDi3fBh5XFFnWecUKHztyWgdeYXB3vpAU9JopAJtjoS5zVw9Wzgz2yMRbBX7a
# HiPVhbC9pTkupTmuM0bULVc5d5XbDE+BOBHJ/g2jyLoww+l1Dbn+v3b/fB7/T96O
# 1dbBN2tfPhjYH1JzjQJLYOpWrPDOK3RK4RrdB1djLjDNSfnN680EAoB9hVd2TDX5
# A3OQ/eki9hqD0FWXzFda0UZMtZ2v0TMaOagIwB623fq0i7R69xw2AtZY2v5kL+HH
# D7XdsiUXfezSfF0rpFRNjSeCtYs5UAbLDm2ToA4ZY+5ctZfknfqRYrpf2jO8xCUM
# lAUv+Rju4IW2Id2cecKgGko0d/kJrlP8kqnyZLSozfhbS8hwn+h4hDi62RtIOrrK
# pIsU
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_46_13.ps1 | sample_46_13.ps1 | # region Generated
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
# Load required Az.Accounts module
$accountsName = 'Az.Accounts'
$accountsModule = Get-Module -Name $accountsName
if(-not $accountsModule) {
$localAccountsPath = Join-Path $PSScriptRoot 'generated\modules'
if(Test-Path -Path $localAccountsPath) {
$localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1
if($localAccounts) {
$accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru
}
}
if(-not $accountsModule) {
$hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0
if($hasAdequateVersion) {
$accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru
}
}
}
if(-not $accountsModule) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop
} elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop
}
Write-Information "Loaded Module '$($accountsModule.Name)'"
# Load the private module dll
$null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.DataProtection.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Module]::Instance
# Ask for the shared functionality table
$VTable = Register-AzModule
# Tweaks the pipeline on module load
$instance.OnModuleLoad = $VTable.OnModuleLoad
# Following two delegates are added for telemetry
$instance.GetTelemetryId = $VTable.GetTelemetryId
$instance.Telemetry = $VTable.Telemetry
# Delegate to sanitize the output object
$instance.SanitizeOutput = $VTable.SanitizerHandler
# Delegate to get the telemetry info
$instance.GetTelemetryInfo = $VTable.GetTelemetryInfo
# Tweaks the pipeline per call
$instance.OnNewRequest = $VTable.OnNewRequest
# Gets shared parameter values
$instance.GetParameterValue = $VTable.GetParameterValue
# Allows shared module to listen to events from this module
$instance.EventListener = $VTable.EventListener
# Gets shared argument completers
$instance.ArgumentCompleter = $VTable.ArgumentCompleter
# The name of the currently selected Azure profile
$instance.ProfileName = $VTable.ProfileName
# Load the custom module
$customModulePath = Join-Path $PSScriptRoot './custom/Az.DataProtection.custom.psm1'
if(Test-Path $customModulePath) {
$null = Import-Module -Name $customModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = Join-Path $PSScriptRoot './exports'
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# Finalize initialization of this module
$instance.Init();
Write-Information "Loaded Module '$($instance.Name)'"
# endregion
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJeoutzs/KMfxW
# 5Kl10pGnJsVxHZuAlnYfF8cBAegVS6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMwOX1tht/gZSykMwXqNFDa2
# J/144uh7rtENM01pN0ouMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAGEsFZjZdRbmgLJssUt40d83bBMAoMd9t1bsjsFo48NbC3u7KAc/tuX1g
# LnzWirXsqoyfK066Xbgyx4FLrmwQLeG9/wjHRM1Xf30+jaxHlJvIVvzjbs64diZ9
# tGYFixrR5xUBKyb+LoQU4FVra4mFzrH6TrIqGjESs23zstktFsYR0hmWQ+lDUBMq
# 2fbINKeE50+KEhPug9I1HEq8uuSpjqggOfsGiEMPynBE+6/0lfN24nkgHE4mwmTf
# QSlA0RmTQ/xDW2tbwGv+CBTbxMTpSESz4meFVtcCwC/hRfo4V6csLWEmvR2Vzsh5
# uVdGyjEYK1VUSAKPwfevB1dh7y+4aKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAXLvyyWYH8DLvh3vNYajc4EFKErz5nSb2JrAH57PeuOQIGZiAsyD93
# GBMyMDI0MDQyMzEzMTUxNC4yNjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA
# 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031
# XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP
# CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa
# SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQggxhwTdGVpqVKiwtyFTiWuEkCi4Lwz/D4EENVsCYmGdUwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z
# MA0GCSqGSIb3DQEBCwUABIICAIRiZV1/v+UdjHO8mPqhZ8VZn/KOnSjRU4l7elMF
# egKsn2TAfGOevtHHxw/oL0AgVKEUXrdY40ImrjLS0mxJTn+a0hcOMUlXoCKvQvYy
# yMIf6ezL4WNvr4YwoOKLlRx9p0xTbFP8FTiViOLzimZsDYxKWXSRe3FMOJ/XYNwo
# xSEGcRAGejh4tB8LaEh9mgJYcC9dbUP76rvQxxD92qPmmpamT7NuB9mWnrhKTCVv
# AyEVPg1g8ncyuYZIwlE/bkNWlvZHZGrEJK6xoE2wWW/n76fvr45gJ8p+/Jq05WXD
# KsIOC9D0LVrUjiNZDC3KyHVbqgd2EvhEkhxX8yygUq59kC9qubm12AIRNgXO43kF
# TOBuwXilaFKcf3CdW3kWnDC+kuSPJIEt3ksWXItmB6DxnSVLSyPAA5QxAOed644g
# HVStvj6mz0nbC7Xz+FH2los9755wUGJkq3N9dDfsMVuYVaPlqGytUoJ+UWl2bRgn
# end5+Gu/1UF6g2iAImPqiaoJY9C8NjE8i5i+NwhZTJnsz40OL/vftMCoFUdj6nVR
# yyY8jUHNk7Z9igDEJ9pNiWlVbY5zMNCtrO30GKWVfiI0WMDPMgJoDeVFJb/mH16F
# kQXEqHMhpL10dJ0etjVQjlQpzlgmD4UIcwJC7GBcZACQ3amuLRvK6+kXmc25ci3w
# Eh0g
# SIG # End signature block
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.