full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_41_14.ps1
sample_41_14.ps1
. $PSScriptRoot\PathProcessingNonExistingPaths.ps1 . $PSScriptRoot\PathProcessingNoWildcards.ps1 . $PSScriptRoot\PathProcessingWildcards.ps1 # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBF2ChhFuZtu/sb # TrXm58cjIv4frtrC6jBOv8SAH6m/8KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB9CXSpIbuMufPrdf+IYmpZj # R+jgo4SXKH0BSPWT6PS2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhtl4cvvbdwRBWYf4V4S4oODK7J/d5GNG6JxAn6NuDV6IAsfYsohzvL20 # rxmk4g4cHMeFssCIrBhck2yocixwT7I8nIOxAZhdj6biJ7LoWS4k48NIEJi3V/9a # UXT85yf/FLNGrJ/O3r20HWhXUIJrpuIL8bYIF5iQFhbJy2UKglWfwrupMw8oUCT8 # lQU2FK8t3sdSz089ZceAEofphi+JSlZ5Rylbeh6bw3N+ImNl82i/UCaOIOcbWueT # nfQwGW2K64YoQUiFcIg/cjFn5g50YyqKGqe3oUXqsv/j6znF3K+DH7zrdXhE0q8J # 8D7e6Mxxzo1vyf7kLEkTbVhFNJXXCaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCArANwwB7ORveADmMgv5oFjXxgYD1n4MV83uxM7VyuTWwIGZjOoz5YX # GBMyMDI0MDUwNDAwMDA1OC4xNjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnfeI4wIhgPMjAyNDA1MDMyMjUxNThaGA8yMDI0MDUwNDIyNTE1OFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6d94jgIBADAHAgEAAgIN8jAHAgEAAgIR8DAKAgUA # 6eDKDgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFgod6cx/aGXLFFIKlcU # TXizhJ0gadQ7Db+YbYl/NcNArZEuXPmGdgGOi8hEsl9OhywpWKGsSHQ/ayY8xxfE # 21e6dST9KSA3zNYI5zA67h+K4mJoiWiJ/DvHYh+SwJd+eazIvOntmFjJdn3UIl5x # J0sQ6yUOSENngjDcGKZJjwulMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgvH4FLSrACqf8g/dXcu5YU70iZc9JFqnqwR55mJLBZvEwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIKtQUyh4GhfZrqQN7IiqTTf3Yfmj/nWOK79MEzRMOQ6N # MA0GCSqGSIb3DQEBCwUABIICAFO6CDzMemXGkEBJ2aiApAZUSi5zQaWGNMnYVwmw # 5HU2b3KfltcmT8YGB5Ayin8HYcIVjVeQL8AtaS+lzehimlONQ3pJKfSV6X65fzrw # WywOIsY51/kv1Xoal4r5MpoMdAMkq+vzxCF07FqP0AkS6mMoQOtifdmjQ3Y8KEK8 # qVmQIUMwHS377NF/5Nvqe/7/ghPrMgtKCikuxKZTBuebU/QkkRQ97c/1h+OAFBDS # PRiQnzP5311g0xJAAw3PgJmbihHOdrcUtW/H9ebVTjqfqjNquxclUDdxOJaycfOe # OA7lVnCMT3RPt6VkMZydaoJ6bFRsTJChunkvikD0e7bZYV6ToCPDa8AsBdor8Ugq # 6AaPaA23/gspfR9ZV7Q3qxiIJAqeBUeCb5dlws2V4xUueFkA+s+BmKzYjyR9mFjq # egi9bEy4SlMejb8nnau8VqfPmAK4Zf9dwgWUXDZGPT0vJcRXv/ZqJiZ25iXuO5uj # BPT7FuXXA2akSo/lNM9jB++1zto+zaT0LRBTW18mpieyJRtpb6kMI1bgPYLJbmcM # aeCu2mYVShSyM/GCw7Fzwf26YQUHRvjDvivlxbO0K1O6eMhv3l0ILcCeMpad1Jys # pnmopQdqyB6F/hOq0P8lIYW/i4Xpooz4l9qvwudSP8dCq0D3LX8HiI2XOAdfra6X # 5MDP # SIG # End signature block
combined_dataset/train/non-malicious/3051.ps1
3051.ps1
function Should-HaveParameter ( $ActualValue, [String] $ParameterName, $Type, [String]$DefaultValue, [Switch]$Mandatory, [Switch]$HasArgumentCompleter, [Switch]$Negate, [String]$Because ) { if ($null -eq $ActualValue -or $ActualValue -isnot [Management.Automation.CommandInfo]) { throw "Input value must be non-null CommandInfo object. You can get one by calling Get-Command." } if ($null -eq $ParameterName) { throw "The ParameterName can't be empty" } function Join-And ($Items, $Threshold = 2) { if ($null -eq $items -or $items.count -lt $Threshold) { $items -join ', ' } else { $c = $items.count ($items[0..($c - 2)] -join ', ') + ' and ' + $items[-1] } } function Add-SpaceToNonEmptyString ([string]$Value) { if ($Value) { " $Value" } } function Get-ParameterInfo { param( [Parameter( Mandatory = $true )] [Management.Automation.CommandInfo]$Command ) function Get-TokenGroup { param( [Parameter( Mandatory = $true )] [System.Management.Automation.PSToken[]]$tokens ) $i = $j = 0 do { $token = $tokens[$i] if ($token.Type -eq 'GroupStart') { $j++ } if ($token.Type -eq 'GroupEnd') { $j-- } if (-not $token.PSObject.Properties.Item('Depth')) { $token | Add-Member Depth -MemberType NoteProperty -Value $j } $token $i++ } until ($j -eq 0 -or $i -ge $tokens.Count) } $errors = $null $tokens = [System.Management.Automation.PSParser]::Tokenize($Command.Definition, [Ref]$errors) $start = $tokens.IndexOf(($tokens | Where-Object { $_.Content -eq 'param' } | Select-Object -First 1)) + 1 $paramBlock = Get-TokenGroup $tokens[$start..($tokens.Count - 1)] for ($i = 0; $i -lt $paramBlock.Count; $i++) { $token = $paramBlock[$i] if ($token.Depth -eq 1 -and $token.Type -eq 'Variable') { $paramInfo = New-Object PSObject -Property @{ Name = $token.Content } | Select-Object Name, Type, DefaultValue, DefaultValueType if ($paramBlock[$i + 1].Content -ne ',') { $value = $paramBlock[$i + 2] if ($value.Type -eq 'GroupStart') { $tokenGroup = Get-TokenGroup $paramBlock[($i + 2)..($paramBlock.Count - 1)] $paramInfo.DefaultValue = [String]::Join('', ($tokenGroup | ForEach-Object { $_.Content })) $paramInfo.DefaultValueType = 'Expression' } else { $paramInfo.DefaultValue = $value.Content $paramInfo.DefaultValueType = $value.Type } } if ($paramBlock[$i - 1].Type -eq 'Type') { $paramInfo.Type = $paramBlock[$i - 1].Content } $paramInfo } } } if ($Type -is [string]) { $parsedType = ($Type -replace '^\[(.*)\]$', '$1') -as [Type] if ($null -eq $parsedType) { throw [ArgumentException]"Could not find type [$ParsedType]. Make sure that the assembly that contains that type is loaded." } $Type = $parsedType } $buts = @() $filters = @() $null = $ActualValue.Parameters $hasKey = $ActualValue.Parameters.PSBase.ContainsKey($ParameterName) $filters += "to$(if ($Negate) {" not"}) have a parameter $ParameterName" if (-not $Negate -and -not $hasKey) { $buts += "the parameter is missing" } elseif ($Negate -and -not $hasKey) { return New-Object PSObject -Property @{ Succeeded = $true } } elseif ($Negate -and $hasKey -and -not ($Mandatory -or $Type -or $DefaultValue -or $HasArgumentCompleter)) { $buts += "the parameter exists" } else { $attributes = $ActualValue.Parameters[$ParameterName].Attributes if ($Mandatory) { $testMandatory = $attributes | Where-Object { $_ -is [System.Management.Automation.ParameterAttribute] -and $_.Mandatory } $filters += "which is$(if ($Negate) {" not"}) mandatory" if (-not $Negate -and -not $testMandatory) { $buts += "it wasn't mandatory" } elseif ($Negate -and $testMandatory) { $buts += "it was mandatory" } } if ($Type) { [type]$actualType = $ActualValue.Parameters[$ParameterName].ParameterType $testType = ($Type -eq $actualType) $filters += "$(if ($Negate) {"not "})of type [$($Type.FullName)]" if (-not $Negate -and -not $testType) { $buts += "it was of type [$($actualType.FullName)]" } elseif ($Negate -and $testType) { $buts += "it was of type [$($Type.FullName)]" } } if ($PSBoundParameters.Keys -contains "DefaultValue") { $parameterMetadata = Get-ParameterInfo $ActualValue | Where-Object { $_.Name -eq $ParameterName } $actualDefault = if ($parameterMetadata.DefaultValue) { $parameterMetadata.DefaultValue } else { "" } $testDefault = ($actualDefault -eq $DefaultValue) $filters += "the default value$(if ($Negate) {" not"}) to be $(Format-Nicely $DefaultValue)" if (-not $Negate -and -not $testDefault) { $buts += "the default value was $(Format-Nicely $actualDefault)" } elseif ($Negate -and $testDefault) { $buts += "the default value was $(Format-Nicely $DefaultValue)" } } if ($HasArgumentCompleter) { $testArgumentCompleter = $attributes | Where-Object {$_ -is [ArgumentCompleter]} $filters += "has ArgumentCompletion" if (-not $Negate -and -not $testArgumentCompleter) { $buts += "has no ArgumentCompletion" } elseif ($Negate -and $testArgumentCompleter) { $buts += "has ArgumentCompletion" } } } if ($buts.Count -ne 0) { $filter = Add-SpaceToNonEmptyString ( Join-And $filters -Threshold 3 ) $but = Join-And $buts $failureMessage = "Expected command $($ActualValue.Name)$filter,$(Format-Because $Because) but $but." return New-Object PSObject -Property @{ Succeeded = $false FailureMessage = $failureMessage } } else { return New-Object PSObject -Property @{ Succeeded = $true } } } Add-AssertionOperator -Name HaveParameter ` -InternalName Should-HaveParameter ` -Test ${function:Should-HaveParameter}
combined_dataset/train/non-malicious/Install-ISPackage.ps1
Install-ISPackage.ps1
####################### <# .SYNOPSIS Installs an SSIS package to a SQL Server store. .DESCRIPTION The Install-ISPackage script installs an Dtsx file to a SQL Server store using the command-line utility dtutil. Works for 2005 and higher .EXAMPLE ./install-ispackage.ps1 -DtsxFullName "C:\\Users\\Public\\bin\\SSIS\\sqlpsx1.dtsx" -ServerInstance "Z001\\SQL1" -PackageFullName "SQLPSX\\sqlpsx1" This command install the sqlpsx1.dtsx package to SQL Server instance Z001\\SQL1 under the SQLPSX folder as sqlpsx1. If SQLPSX folder does not exist it will be created. .NOTES Version History v1.0 - Chad Miller - 6/26/2012 - Initial release v1.1 - Chad Miller - 7/05/2012 - Updated to output object. Fixed lastexitcode check in test functions v1.2 - Chad Miller - 7/09/2012 - Added SqlVersion and Dtutil Path logic v1.3 - Chad Miller - 7/10/2012 - Fixed 2005 path logic v1.4 - Chad Miller - 9/25/2012 - Fixed 2012 path logic #> param( [Parameter(Position=0, Mandatory=$true)] [string] $DtsxFullName, [Parameter(Position=1, Mandatory=$true)] [string] $ServerInstance, [Parameter(Position=2, Mandatory=$true)] [string] $PackageFullName ) $ErrorActionPreference = "Stop" $Script:dtutil = $null $exitCode = @{ 0="The utility executed successfully." 1="The utility failed." 4="The utility cannot locate the requested package." 5="The utility cannot load the requested package." 6="The utility cannot resolve the command line because it contains either syntactic or semantic errors"} ####################### function Get-SqlVersion { param($ServerInstance) write-verbose "sqlcmd -S `"$ServerInstance`" -d `"master`" -Q `"SET NOCOUNT ON; SELECT SERVERPROPERTY('ProductVersion')`" -h -1 -W" $SqlVersion = sqlcmd -S "$ServerInstance" -d "master" -Q "SET NOCOUNT ON; SELECT SERVERPROPERTY('ProductVersion')" -h -1 -W if ($lastexitcode -ne 0) { throw $SqlVersion } else { $SqlVersion } } #Get-SqlVersion ####################### function Set-DtutilPath { param($SqlVersion) $paths = [Environment]::GetEnvironmentVariable("Path", "Machine") -split ";" if ($SqlVersion -like "9*") { $Script:dtutil = $paths | where { $_ -like "*Program Files\\Microsoft SQL Server\\90\\DTS\\Binn\\" } if ($Script:dtutil -eq $null) { throw "SQL Server 2005 Version of dtutil not found." } } elseif ($SqlVersion -like "10*") { $Script:dtutil = $paths | where { $_ -like "*Program Files\\Microsoft SQL Server\\100\\DTS\\Binn\\" } if ($Script:dtutil -eq $null) { throw "SQL Server 2008 or 2008R2 Version of dtutil not found." } } elseif ($SqlVersion -like "11*") { $Script:dtutil = $paths | where { $_ -like "*Program Files\\Microsoft SQL Server\\110\\DTS\\Binn\\" } if ($Script:dtutil -eq $null) { throw "SQL Server 2012 Version of dtutil not found." } } if ($Script:dtutil -eq $null) { throw "Unable to find path to dtutil.exe. Verify dtutil installed." } else { $Script:dtutil += 'dtutil.exe' } } #Set-DtutilPath ####################### function install-package { param($DtsxFullName, $ServerInstance, $PackageFullName) $result = & $Script:dtutil /File "$DtsxFullName" /DestServer "$ServerInstance" /Copy SQL`;"$PackageFullName" /Quiet $result = $result -join "`n" new-object psobject -property @{ ExitCode = $lastexitcode ExitDescription = "$($exitcode[$lastexitcode])" Command = "$Script:dtutil /File `"$DtsxFullName`" /DestServer `"$ServerInstance`" /Copy SQL;`"$PackageFullName`" /Quiet" Result = $result Success = ($lastexitcode -eq 0)} if ($lastexitcode -ne 0) { throw $exitcode[$lastexitcode] } } #install-package ####################### function test-path { param($ServerInstance, $FolderPath) write-verbose "$Script:dtutil /SourceServer `"$ServerInstance`" /FExists SQL`;`"$FolderPath`"" $result = & $Script:dtutil /SourceServer "$ServerInstance" /FExists SQL`;"$FolderPath" if ($lastexitcode -gt 1) { $result = $result -join "`n" throw "$result `n $($exitcode[$lastexitcode])" } if ($result -and $result[4] -eq "The specified folder exists.") { $true } else { $false } } #test-path ####################### function test-packagepath { param($ServerInstance, $PackageFullName) write-verbose "$Script:dtutil /SourceServer `"$ServerInstance`" /SQL `"$PackageFullName`" /EXISTS" $result = & $Script:dtutil /SourceServer "$ServerInstance" /SQL "$PackageFullName" /EXISTS if ($lastexitcode -gt 1) { $result = $result -join "`n" throw "$result `n $($exitcode[$lastexitcode])" } new-object psobject -property @{ ExitCode = $lastexitcode ExitDescription = "$($exitcode[$lastexitcode])" Command = "$Script:dtutil /SourceServer `"$ServerInstance`" /SQL `"$PackageFullName`" /EXISTS" Result = $result[4] Success = ($lastexitcode -eq 0 -and $result -and $result[4] -eq "The specified package exists.")} } #test-packagepath ####################### function new-folder { param($ServerInstance, $ParentFolderPath, $NewFolderName) $result = & $Script:dtutil /SourceServer "$ServerInstance" /FCreate SQL`;"$ParentFolderPath"`;"$NewFolderName" $result = $result -join "`n" new-object psobject -property @{ ExitCode = $lastexitcode ExitDescription = "$($exitcode[$lastexitcode])" Command = "$Script:dtutil /SourceServer `"$ServerInstance`" /FCreate SQL;`"$ParentFolderPath`";`"$NewFolderName`"" Result = $result Success = ($lastexitcode -eq 0)} if ($lastexitcode -ne 0) { throw $exitcode[$lastexitcode] } } #new-folder ####################### function Get-FolderList { param($PackageFullName) if ($PackageFullName -match '\\\\') { $folders = $PackageFullName -split "\\\\" 0..$($folders.Length -2) | foreach { new-object psobject -property @{ Parent=$(if($_-gt 0) { $($folders[0..$($_ -1)] -join "\\") } else { "\\" }) FullPath=$($folders[0..$_] -join "\\") Child=$folders[$_]}} } } #Get-FolderList ####################### ## MAIN ## ####################### try { #1. Get Sql Version $SqlVersion = Get-SqlVersion -ServerInstance $ServerInstance #2. Set Dtutil Path based on Sql Version Set-DtutilPath -SqlVersion $SqlVersion #3. Get SSIS Folder List, verify exists and create missing folders Get-FolderList -PackageFullName $PackageFullName | where { $(test-path -ServerInstance $ServerInstance -FolderPath $_.FullPath) -eq $false } | foreach { new-folder -ServerInstance $ServerInstance -ParentFolderPath $_.Parent -NewFolderName $_.Child } #4. Install SSIS Package install-package -DtsxFullName $DtsxFullName -ServerInstance $ServerInstance -PackageFullName $PackageFullName #5. Verify Package test-packagepath -ServerInstance $ServerInstance -PackageFullName $PackageFullName } catch { write-error "$_ `n $("Failed to install DtsxFullName {0} to ServerInstance {1} PackageFullName {2}" -f $DtsxFullName,$ServerInstance,$PackageFullName)" }
combined_dataset/train/non-malicious/New-Password 1.1.ps1
New-Password 1.1.ps1
#.Synopsis # Generate pseudo-random passwords based on templates # #.Parameter Template # The template for the password you want to generate. This defines which types of characters are generated for each character in the password. # IMPORTANT: the US English alphabet is hardcoded ... (we make no apologies, but thought you should know that) # # The valid template characters are: # * L - any uppercase letter (A-Z) # * l - any lowercase letter (a-z) # * C - uppercase consonant # * c - lowercase consonant # * V - uppercase vowel # * v - lowercase vowel # * H - uppercase HEX (0123456789ABCDEF) # * h - lowercase HEX (0123456789abcdef) # * . - punctuation # * d - numeric Digit character # * a - any alphabetic character: a-z, A-Z # * A - any alphanumeric character: a-z, A-Z, 0-9 # * * - any character: a-z, A-Z, 0-9 + punctuation # * An actual number modifies the presceding character to allow UP TO that many of that character class # * An escaped character: \\L will be inserted literally... # * Anything else will be inserted literally... # #.Example # New-Password "Cvcvcdd" # Jemad46 # # Description # ----------- # Generates a "pronounceable" 7 character password consisting of alternating consonants and vowels followed by a 2-digit number # #.Example # ("Cvcvcdd," * 8).Split(",") | New-Password # # Description # ----------- # Demonstrates that the function can take pipeline input. Passing multiple templates via the pipeline will generate multiple passwords. # In this case, we generate EIGHT "pronounceable" 7 character password consisting of alternating consonants and vowels followed by a 2-digit number # #.Example # 1..6 | ForEach { New-Password "Cv3c2v3cd4" } # Haavgaef922 # Celboey399 # Mavbaew1 # Voebhit896 # Qeeoddaw34 # Bowaf2 # # Description # ----------- # Generates 6 variable-length, mostly "pronounceable" password. The numbers indicate the maximum counts for each of the character types. # #.Example # New-Password "Cvvc.Cvvcdd" # Ziir-Diud55 # # Description # ----------- # Generates a password which starts with an upper-case consonant, followed by two lower-case vowels, followed by a punctuation mark, followed by an upper-case consonant, followed by two lower-case vowels, followed by two numbers. # #.Example # New-Password "********" # !u($OA:* # # Description # ----------- # Generates a totally random 8 character password # #.Example # New-Password "Get-Cvcvvc" # Get-Wodeaj # # Description # ----------- # Generates a password which looks like a strange PowerShell command, starting with "Get-" and ending with an uppercase consonant, a vowel, a consonant, two vowels, and a final consonant. # #.Notes # On PowerShell 2.0 if you define an alias "rand" to point to Microsoft.PowerShell.Utility\\Get-Random, this script will use the Get-Random cmdlet instead of it's built-in rand function. # Set-Alias rand Microsoft.PowerShell.Utility\\Get-Random -Option AllScope #.Inputs # [String] # A string template for a password #.Outputs # [String] # A password string # History: # v 1.1 - bugfix for the \\ escape character # + added a hex option (H for upper) and (h for lower) # + changed the '#' to 'd' for digits so you can write the patterns without quotes. # v 1.0 - first release # # function New-Password { #[CmdletBinding()] Param ( # [Parameter(ValueFromPipeline=$true,Position=0)] [string]$Template = "************" ) BEGIN { #if($Template.Length -lt 8) { THROW "Passwords less than 8 characters are not allowed." } ## You might consider avoiding the O which is easily confused with 0 except in the Consolas font ;) [char[]]$UpperAlpha = 'A','B','C','D','E','F','G','H','I','J','K','L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z' [char[]]$LowerAlpha = 'a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z' [char[]]$UpperConsonants = 'B','C','D','F','G','H','J','K','L','M','N','P','Q','R','S','T','V','W','X','Y','Z' [char[]]$LowerConsonants = 'b','c','d','f','g','h','j','k','l','m','n','p','q','r','s','t','v','w','x','y','z' [char[]]$LowerVowels = 'a','e','i','o','u' [char[]]$UpperVowels = 'A','E','I','O','U' [char[]]$Numeric = '1','2','3','4','5','6','7','8','9','0' [char[]]$UpperHex = '1','2','3','4','5','6','7','8','9','0','A','B','C','D','E','F' [char[]]$LowerHex = '1','2','3','4','5','6','7','8','9','0','a','b','c','d','e','f' # In case this is used in a DCPromo answer files, theres a few chars to avoid: Ampersand, Less than, double quote and back slash # And because they're easily confused for ' , let's also avoid the backtick ` ## '&','<','"','\\','``', [char[]]$Punctuation = '!','#','$','%','''','(',')','*','+',',','-','.','/',':',';','=','>','?','@','[',']','^','_' $script:RANDOM = new-object Random function rand { begin { $list = @() } process { $list += $_ } end { $list[$RANDOM.Next(0,$list.Count-1)] } } } PROCESS { if($_) { $Template = $_ } Write-Verbose "Template: $Template" $password = "" $randoms = @() for($c = 0; $c -lt $Template.Length; $c++) { switch -CaseSensitive ($Template[$c]) { 'l' { # Make this character a Lowercase Alpha $password += $LowerAlpha | rand break } 'L' { # Make this character a Uppercase Alpha $password += $UpperAlpha | rand break } 'l' { # Make this character a Lowercase Alpha $password += $LowerAlpha | rand break } 'C' { # Make this character a Uppercase consonant $password += $UpperConsonants | rand break } 'c' { # Make this character a Lowercase consonant $password += $LowerConsonants | rand break } 'V' { # Make this character a Uppercase vowel $password += $UpperVowels | rand break } 'v' { # Make this character a Lowercase vowel $password += $LowerVowels | rand break } 'H' { # Make this character a Uppercase vowel $password += $UpperHex | rand break } 'h' { # Make this character a Lowercase vowel $password += $LowerHex | rand break } '.' { # Make this character punctuation $password += $Punctuation | rand break } 'd' { # Make this character numeric $password += $Numeric | rand break } 'a' { # Make this character any alphabetic $password += $UpperAlpha + $LowerAlpha | rand break } 'A' { # Make this character any alphanumeric $password += $UpperAlpha + $LowerAlpha + $Numeric | rand break } '*' { # Make this character any character $password += $UpperAlpha + $LowerAlpha + $Numeric + $Punctuation | rand break } # For a number, decrement the number, and then go back one... { [bool](([string]$_) -as [int]) } { if($randoms -notcontains $c) { $randoms += $c [int]$count = $(0..([int][string]$_) | rand) } else { [int]$count = $(([int][string]$_) - 1) } if($c -gt 0 -and $count -gt 0) { $Template = $Template.Remove($c,1).Insert($c,$count) $c -= 2 Write-Verbose "ALTER Template: $Template Active: $($Template[$c]) ($c), Generating $count ($_) Password: $password" } break } '\\' { $password += $Template[(++$c)] break } default { $password += $Template[$c] break } } } return $Password } #}
combined_dataset/train/non-malicious/Send-SMSMessage.ps1
Send-SMSMessage.ps1
#requires -version 2 function Send-SMSMessage { <# .SYNOPSIS Send a Text Message (SMS) using Microsoft Outlook .DESCRIPTION Sends a Text Message (SMS) using the supplied parameters. .PARAMETER To Telephone number to send the text message to. .PARAMETER Message The message to send. .EXAMPLE Send-SMSMessage -To 555-12345 -Message "This is a test message" .NOTES Requires Windows PowerShell v2 and Microsoft Office Outlook 2010. Not tested in Outlook 2003 or 2007, but it should work with the Microsoft Outlook SMS Add-in installed (download from Microsoft). AUTHOR: Jan Egil Ring BLOG: http://blog.powershell.no LASTEDIT: 21.07.2010 #> [CmdletBinding()] param ( [parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] $To, [parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] $Message ) #Check if Outlook are running $OutlookState = Get-Process | Where-Object {$_.Name -eq "outlook"} #Check whether Outlook is installed if (-not (Test-Path "HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\App Paths\\OUTLOOK.EXE")) { Write-Warning "Outlook are not installed. The message was not sent." break } #Check wheter an Text Messaging (SMS) account are set up in Outlook $outlook = New-Object -ComObject outlook.application if (-not (($outlook.Session.Accounts | Where-Object {$_.AccountType -eq "5"} | Measure-Object).Count -gt 0)) { Write-Warning "Outlook are installed, but no accounts are configured for Text Messaging (SMS). The message was not sent." break } #Send message $NewMessage = $outlook.CreateItem("olMobileItemSMS") $NewMessage.To = $To $NewMessage.Body = $Message $NewMessage.Send($true) #Close outlook.exe if it was not running before executing this function if (-not $OutlookState) { $outlook.Quit() } }
combined_dataset/train/non-malicious/3147.ps1
3147.ps1
$From = "" $To = "" $MailServer = "" function SendMailMessage { param( [String]$Subject, [String]$Body ) Send-MailMessage -SmtpServer $MailServer -From $From -To $To -Subject $Subject -Body $Body }
combined_dataset/train/non-malicious/sample_53_54.ps1
sample_53_54.ps1
# # Module manifest for module 'OCI.PSModules.Networkloadbalancer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend', 'Get-OCINetworkloadbalancerBackendHealth', 'Get-OCINetworkloadbalancerBackendSet', 'Get-OCINetworkloadbalancerBackendSetHealth', 'Get-OCINetworkloadbalancerBackendSetsList', 'Get-OCINetworkloadbalancerBackendsList', 'Get-OCINetworkloadbalancerHealth', 'Get-OCINetworkloadbalancerHealthChecker', 'Get-OCINetworkloadbalancerHealthsList', 'Get-OCINetworkloadbalancerListener', 'Get-OCINetworkloadbalancerListenersList', 'Get-OCINetworkloadbalancersList', 'Get-OCINetworkloadbalancersPoliciesList', 'Get-OCINetworkloadbalancersProtocolsList', 'Get-OCINetworkloadbalancerWorkRequest', 'Get-OCINetworkloadbalancerWorkRequestErrorsList', 'Get-OCINetworkloadbalancerWorkRequestLogsList', 'Get-OCINetworkloadbalancerWorkRequestsList', 'Move-OCINetworkloadbalancerCompartment', 'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend', 'New-OCINetworkloadbalancerBackendSet', 'New-OCINetworkloadbalancerListener', 'Remove-OCINetworkloadbalancer', 'Remove-OCINetworkloadbalancerBackend', 'Remove-OCINetworkloadbalancerBackendSet', 'Remove-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancer', 'Update-OCINetworkloadbalancerBackend', 'Update-OCINetworkloadbalancerBackendSet', 'Update-OCINetworkloadbalancerHealthChecker', 'Update-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancerNetworkSecurityGroups' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Start-Verify_2.ps1
Start-Verify_2.ps1
# Author: Steven Murawski http://www.mindofroot.com # This script creates two functions (and a helper function). One starts logging all commands entered, # and the second removes the logging. # This script is similar to the Start-Transcript, but only logs the command line and not the output. # Modified to add the logging at the beginning of the Prompt function, otherwise it appeared to # impact some functions display options. I also added some verification to see that the log directory # exists and to create it if not. function New-ScriptBlock() { param ([string]$scriptblock) $executioncontext.InvokeCommand.NewScriptBlock($scriptblock.trim()) } function Start-Verify () { param ($logfile = 'c:\\scripts\\powershell\\logs\\verify.txt') #if the log folder does not exist, create one if (-not (test-path (split-path $logfile))) { mkdir (Split-Path $logfile) | Out-Null } $lastcmd = 'get-history | select -Last 1 | { $_.CommandLine.ToString() } | Out-File -Append {0};' -f $logfile Get-Content -Path function:\\prompt | ForEach-Object { $function:prompt = New-ScriptBlock ("$lastcmd`n" + $_.toString()) } | Out-Null } function Stop-Verify () { $lastcmd = '^get-history.*;' Get-Content -Path function:\\prompt | ForEach-Object { $function:prompt = New-ScriptBlock ($_.tostring() -replace "$lastcmd")} | Out-Null }
combined_dataset/train/non-malicious/sample_49_31.ps1
sample_49_31.ps1
# SharePoint references that need to remove when uninstall $ReferencesToRemoveWhenUninstall = @( @("System.IdentityModel.Tokens.Jwt"), @("Microsoft.IdentityModel.Tokens") ) # SharePoint references that need to be copy local $CopyLocalReferences = @( @("System.IdentityModel.Tokens.Jwt"), @("Microsoft.IdentityModel.Tokens") ) # Imports needed for VB project $VbImports = @( "Microsoft.SharePoint.Client", "System.IdentityModel.Tokens.Jwt", "Microsoft.IdentityModel.Tokens" ) Export-ModuleMember -Variable @( 'ReferencesToRemoveWhenUninstall', 'CopyLocalReferences', 'VbImports' ) # SIG # Begin signature block # MIImGwYJKoZIhvcNAQcCoIImDDCCJggCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDNzVriWAw1F0l4 # VWp4Fc3LD/jb/7CzsQOhCBZ7V+yYOqCCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghoKMIIaBgIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBQrGizReQK85WcRi1Xws3d # 1lNKEzwQY6+LHAwBK9tMtDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBAKuxt5LqQ9L4UxrCxovCCcKS5yjkj2SGBoScMjSITp7gKQfhr4NMB833 # iB/EzSb7vF6sBnqR5YZ7Z7mqj5Vv4SmOdnU3P83pyMwu+Nr8XuTC+Oj4wSVkWk+O # jl/RxAxtmpQZHZShCWCT4MOkffVWbisfj5YHvxGYpfKLCtyaExN5fEqxD/GSDFgm # CtkNfTFc3U4vIb6g6HY9LfthL0AKGLcleeB0EBGjlO8CEaH4QHa2sYYK0MQlzIBT # BXGtzPy+u69tmPdq2iKunva/vMKERV691RVqqPfghFLeC7mpDvzlEbl6oKivfzkP # aGTGIXZytOmTkN/iIQywDf3Pc1nR5jmhgheUMIIXkAYKKwYBBAGCNwMDATGCF4Aw # ghd8BgkqhkiG9w0BBwKgghdtMIIXaQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYL # KoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgwhrCzkeoz8lkgS4ejYDNwqp5hZd6NS6h4DuAqmKwzlUCBmXOHBn5 # xxgTMjAyNDAyMjcxMzQ5MTcuMzc0WjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt # ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # oIIR6jCCByAwggUIoAMCAQICEzMAAAHoULCAzytymU0AAQAAAegwDQYJKoZIhvcN # AQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0 # NTIyWhcNMjUwMzA1MTg0NTIyWjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u # czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYD # VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA4UF3RNFs1xu8M3gvUhnR+nlcHRpRemIKVO8HjhQZ # KVvcrhJiUgxNQAwcf9A07kQWqZUg/AkdUKskJsUQw/wnbw8nmRQHGepdvp5TLLJm # cgvEz7dRk1gFLdxl1FOoNBdLSKxTS4KHwozr5txtI+PNlbrSkuMGU+mzVZwVbAoa # 9gI5lWxgzf+kLPxKmpC+XMKRnpdbXu1Dtd3VMGj4zstFotamDZkfIu09Zbo9iXRX # X2YTD8qsqvzQ52bjjUm4/BTOcSgaGq9dq2oAvP9Ql2i9TjFwcBmkaCU2LZLIvZ47 # quMA5HAMIrQmeQbUNjaj2dJS4kAeztdAZvc6R1p/cdfx5nQJ+JKDFilA8B+bHf8w # 7uL4vPOxVsZueJJFjb5PBXkO2WdEOYKhiluIOq3r1diHQMQaG1naK6sL86i+9Fnb # IA1Pz+XNC/L2CLJFCWXnQhhzNoRyLDUcsPRBaEqJQzPsgnnZM+ve/O7PJyKeeYnC # 3w6CsOYWpORujFhene9bXDc1ffr/UUCjGulMH8qrq3nXebKl1gl7/voXpOANeVsm # yHOrn09IpWsymGbw76GrMIIz9Eni1u5r5nMNBRC8xdf7lmlxJSxzlyJYnihdov2M # 0OlOdCvXW4ZzGg3CUrBtIVy0U8vy0G7Dg9IcOxbitJ5s6LUsf+X6PYO3ws6BY5N7 # QxMCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBT6OVvKPfNJDH0VUG2uk9+B8HpS2jAf # BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ # hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQl # MjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBe # MFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Nl # cnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAM # BgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQE # AwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAln3CZtq8F7T4u+JJujygJJ4vfgVqLavk # LQxoHk+Rd66Oz7CFDSkZFMrbhqiPLYS9yXK29N8egzqaWCRAPqW+qNqj4xXXTtUy # 6r0l62JvjoAiy/u/txZkZn5EbvKx76a2m9DtfcA27pIDvCOTotUXoDCZfLeZP1LR # NFm98wJTh5woyxksz/w6N6bcIV6JJNNiLw+0mRAWz26Bm7cOCwh7E9qRWpKRjgYf # iElDFwX/N+QrlTX3XcMZshrzUs8hMhJOYdVYe7acD+8+6yfh7Ij+LHagY4+gL6Kb # n+K8VAH6xG1emo/LcBbO1lRzYiIKxzZ2v+eZMqwBvWLdfQj75FMMWCtLmbz5dlgt # /Z33NIzk44rwu7PyFKMxOLX8tyTZMkNXDbb2X7Yl94+Q7fniznrhg474Sb2DCBJK # ZFevFyzR+/mQX2Gvj5n0WGqBRRwiShKEUmdz2wyTwYhIWfcrsTHXaDDENfU5Mn7a # LehM9F4UpsI2Aat/Q7wRVoZcgxgYa1NxrXg1olXfWBkgdlp8bhTMuX2wCuqPD1s/ # EETIqbVxytxwwa9sFlhHK64HE7h2SCU6nqTaGJcfVURb4/7wl2gBXJpFtZ5O1RPq # MGl6+USY68g6vbm5Mg6tZnaxf4HmkQC13DWW3zVyJIV81wOmvAompnEFvw4JiyaY # lUDa4mWAhyAwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqG # SIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkg # MjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4X # YDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTz # xXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7 # uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlw # aQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedG # bsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXN # xF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03 # dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9 # ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 # UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReT # wDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZ # MBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8 # RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAE # VTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAww # CgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQD # AgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb # 186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG # CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZI # hvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9 # MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2Lpyp # glYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OO # PcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8 # DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA # 0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1Rt # nWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjc # ZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq7 # 7EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ # C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 # y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYID # TTCCAjUCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA # jCRuL4NI7jDlZ9gbigAlLz/NBbqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmHw4kwIhgPMjAyNDAyMjcwMjEy # MjVaGA8yMDI0MDIyODAyMTIyNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6YfD # iQIBADAHAgEAAgIzwzAHAgEAAgIT0zAKAgUA6YkVCQIBADA2BgorBgEEAYRZCgQC # MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG # SIb3DQEBCwUAA4IBAQBd/V+sdBma8DuSZ5hcIw8prNScF5hoaLnMNN5O6+udwPXj # DioLm0oxZ7hsSjsKix68QMyYgfveZY8HyBkHr0bsLU4zXRpcYZclgJILtORmvCYP # j8cXTS9Wbv+UmB808PhDuKOx3Tv7ODB5syi/NCcbrYbpeWu3yEdeq6jjFyYlFEEv # jvBfKZPhql0SwzNINaOJI3FnyLLmuqrQS7JaMg121JTninTe2FdMDbWYBWm8eXxS # 5MpX+cvmy4NFBVpkxX/lJOqKeuUM1Z/997xnGjxmBmb3AsXIWU44VcCtdkMoZc+s # EqSpvKZ49P2qYGE5lqHIb/AI8pRA3xkw98mY9ZPFMYIEDTCCBAkCAQEwgZMwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegw # DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv # BgkqhkiG9w0BCQQxIgQgceeHdDctgWGyUtspmRYFZr4taT46JUJpT6VgDCqbSlQw # gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAq0trE1QKEIIJB0efaTaooHtMX # yU9id1PFtUnPB/jrHTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwAhMzAAAB6FCwgM8rcplNAAEAAAHoMCIEIEWu2VuATGlU/IFgGekGS8BYjsA0 # wlijFmXKj0oY8SrrMA0GCSqGSIb3DQEBCwUABIICAJmhScO5lxG1yT7/CPs53uUV # BSBOBbShCRXJ3hUMf5ic6OV98zZOiFDurweQo9wUTDGTTATSmrnoFI67SbGfWHFQ # 4TpLR6KaHH4mgXsdgAshNLaQrn3++yTCXEaA+rPE5HkKZoRBIsT0w30xMhtbHgR5 # rlHENDC3g0MzgGr0AbUkhdX76Ry8edGdG1xQ8O1jm/irhAtT1KhE8N83CpCEB9Rn # bu+9zk5LuJhc1Y/oXxkJzxxjvkuNQFqFlPjbXj17lYy9TBaU1ydqIULkwLfRiuk5 # ofPv6haATe5Zx6k9cTZhFQfik/D7ouacytMFD4ckoH5Qo4nnw05+slfsclWUlPWC # ZlX3XWN68bAcyJ6/oL931omMbvUR9vFobq6jVKaSScSUMVuCFbOpUO7xBnROyK3s # CE8H2mJRzHi6aVRVxsmbOKW7q5rrFMN2nfpZYqYiddx0CrIkNFPNz/SP6Jqx7kBG # xmf4XUQp9ChUspW3nGG24Cov1VFp62WSQXKTfHpXr5bodVQJTWIMN/pFEI6sTmjl # t8QZBkmI65kCqFX6b07jX2p5MUbM+w8OInJD/d7UqM4o8lFm2BI9KfQGB44wiBXe # 6kUjLiHQOp/d/bm4bJly0tQndxkHFERPvSmP/m8i2iYJyYnqROPad1pETfMd1gQu # 8t4bdSavpHDUPvQlSTo8 # SIG # End signature block
combined_dataset/train/non-malicious/3449.ps1
3449.ps1
function Test-GetNonExistingDataFactoryGateway { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force New-AzDataFactory -Name $dfname -Location $rglocation -ResourceGroup $rgname -Force Assert-ThrowsContains { Get-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name "gwname" } "GatewayNotFound" } function Test-DataFactoryGateway { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $gwname = "foo" $description = "description" $actual = New-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname $expected = Get-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname Assert-AreEqual $actual.Name $expected.Name Assert-NotNull $actual.Key $key = New-AzDataFactoryGatewayKey -ResourceGroupName $rgname -DataFactoryName $dfname -GatewayName $gwname Assert-NotNull $key Assert-NotNull $key.Gatewaykey $result = Set-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname -Description $description Assert-AreEqual $result.Description $description Remove-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname -Force } finally { Clean-DataFactory $rgname $dfname } } function Test-DataFactoryGatewayAuthKey { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $gwname = "foo" $description = "description" $actual = New-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname $expected = Get-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname Assert-AreEqual $actual.Name $expected.Name Assert-NotNull $actual.Key $key = Get-AzDataFactoryGatewayAuthKey -ResourceGroupName $rgname -DataFactoryName $dfname -GatewayName $gwname Assert-NotNull $key Assert-NotNull $key.Key1 Assert-NotNull $key.Key2 $keyName = 'key2' $newKey = New-AzDataFactoryGatewayAuthKey -ResourceGroupName $rgname -DataFactoryName $dfname -GatewayName $gwname -KeyName $keyName Assert-NotNull $key.Key2 Assert-AreNotEqual $key.Key2 $newKey.Key2 Remove-AzDataFactoryGateway -ResourceGroupName $rgname -DataFactoryName $dfname -Name $gwname -Force } finally { Clean-DataFactory $rgname $dfname } } function Test-DataFactoryGatewayWithDataFactoryParameter { $dfname = Get-DataFactoryName $rgname = Get-ResourceGroupName $rglocation = Get-ProviderLocation ResourceManagement $dflocation = Get-ProviderLocation DataFactoryManagement New-AzResourceGroup -Name $rgname -Location $rglocation -Force try { $datafactory = New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force $gwname = "foo" $description = "description" $actual = New-AzDataFactoryGateway -DataFactory $datafactory -Name $gwname $expected = Get-AzDataFactoryGateway -DataFactory $datafactory -Name $gwname Assert-AreEqual $actual.Name $expected.Name $key = New-AzDataFactoryGatewayKey -DataFactory $datafactory -GatewayName $gwname Assert-NotNull $key Assert-NotNull $key.Gatewaykey $result = Set-AzDataFactoryGateway -DataFactory $datafactory -Name $gwname -Description $description Assert-AreEqual $result.Description $description Remove-AzDataFactoryGateway -DataFactory $datafactory -Name $gwname -Force } finally { Clean-DataFactory $rgname $dfname } }
combined_dataset/train/non-malicious/3280.ps1
3280.ps1
$platform = 'linux' Add-Type -Path "$ModulePath/lib/$platform/Microsoft.Azure.Amqp.dll" Add-Type -Path "$ModulePath/lib/$platform/Microsoft.Azure.ServiceBus.dll" $receiver = [Microsoft.Azure.ServiceBus.Core.MessageReceiver]::new( $connectionString, $QueueName, [Microsoft.Azure.ServiceBus.ReceiveMode]::PeekLock, [Microsoft.Azure.ServiceBus.RetryPolicy]::Default, 0 ) $receiver.OperationTimeout = $receiveTimeout while (-not $receiver.IsClosedOrClosing -and $ReceiverControl.ShouldRun) { $msg = $receiver.ReceiveAsync().GetAwaiter().GetResult() if ($msg) { $receiver.CompleteAsync($msg.SystemProperties.LockToken) > $null $payload = [System.Text.Encoding]::UTF8.GetString($msg.Body) if (-not [string]::IsNullOrEmpty($payload)) { $ReceiverMessages.Enqueue($payload) } } } $receiver.CloseAsync().GetAwaiter().GetResult()
combined_dataset/train/non-malicious/sample_48_87.ps1
sample_48_87.ps1
# # Module manifest for module 'OCI.PSModules.Databasetools' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasetools.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6caf205d-e415-4d7f-93f8-86cff5556f36' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasetools Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasetools.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasetoolsConnectionLock', 'Add-OCIDatabasetoolsPrivateEndpointLock', 'Confirm-OCIDatabasetoolsConnection', 'Get-OCIDatabasetoolsConnection', 'Get-OCIDatabasetoolsConnectionsList', 'Get-OCIDatabasetoolsEndpointService', 'Get-OCIDatabasetoolsEndpointServicesList', 'Get-OCIDatabasetoolsPrivateEndpoint', 'Get-OCIDatabasetoolsPrivateEndpointsList', 'Get-OCIDatabasetoolsWorkRequest', 'Get-OCIDatabasetoolsWorkRequestErrorsList', 'Get-OCIDatabasetoolsWorkRequestLogsList', 'Get-OCIDatabasetoolsWorkRequestsList', 'Move-OCIDatabasetoolsConnectionCompartment', 'Move-OCIDatabasetoolsPrivateEndpointCompartment', 'New-OCIDatabasetoolsConnection', 'New-OCIDatabasetoolsPrivateEndpoint', 'Remove-OCIDatabasetoolsConnection', 'Remove-OCIDatabasetoolsConnectionLock', 'Remove-OCIDatabasetoolsPrivateEndpoint', 'Remove-OCIDatabasetoolsPrivateEndpointLock', 'Update-OCIDatabasetoolsConnection', 'Update-OCIDatabasetoolsPrivateEndpoint' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasetools' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_37_94.ps1
sample_37_94.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> $MetaData = @{ "OperationType" = @("Deployment") "UIName" = 'Azure Stack HCI ARC Integration Check' "UIDescription" = 'Check ARC Integration inputs meet requirements' } function Test-AzStackHciArcIntegration { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $Parameters, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $OperationType, [parameter(Mandatory = $false)] [switch] $FailFast ) try { $ENV:EnvChkrOp = $OperationType if ($OperationType -eq 'Deployment') { $nodeNames = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $securityInfo = $cloudRole.PublicInfo.SecurityInfo $EnvironmentName = $cloudRole.PublicInfo.RegistrationCloudName $TenantId = $cloudRole.PublicInfo.RegistrationTenantId $ArcServerResourceGroupName = $cloudRole.PublicInfo.RegistrationArcServerResourceGroupName $RegistrationResourceGroupName = $cloudRole.PublicInfo.RegistrationResourceGroupName if([string]::IsNullOrEmpty($ArcServerResourceGroupName )) { $ArcServerResourceGroupName = $cloudRole.PublicInfo.RegistrationResourceGroupName } $PSSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters) $TestParams = @{ AzureEnvironment = $cloudRole.PublicInfo.RegistrationCloudName TenantID = $cloudRole.PublicInfo.RegistrationTenantId SubscriptionID = $cloudRole.PublicInfo.RegistrationSubscriptionId RegistrationResourceGroupName = $RegistrationResourceGroupName ArcResourceGroupName = $ArcServerResourceGroupName NodeNames = $nodeNames PassThru = $true OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" RegistrationResourceName = $cloudRole.PublicInfo.RegistrationResourceName PsSession = $PSSession } if(-Not [string]::IsNullOrEmpty($cloudRole.PublicInfo.RegistrationRegion)) { $TestParams += @{ Region = $cloudRole.PublicInfo.RegistrationRegion } } $cloudDeploymentNugetPath = Get-AsArtifactPath "Microsoft.AzureStack.Solution.Deploy.CloudDeployment" Import-Module "$cloudDeploymentNugetPath\content\Setup\Common\RegistrationHelpers.psm1" -Force $registrationParameterSet = $cloudRole.PublicInfo.RegistrationParameterSet if ($registrationParameterSet -eq "DefaultSet") { Trace-Execution "RegistrationParameterSet $registrationParameterSet, getting access tokens using user token cache" $registrationTokenCacheUser = $securityInfo.AADUsers.User | Where-Object Role -EQ 'RegistrationTokenCache' Trace-Execution "Registration token cache user is : $registrationTokenCacheUser" $registrationTokenCacheCred = $Parameters.GetCredential($registrationTokenCacheUser.Credential) $clientId = $cloudRole.PublicInfo.RegistrationClientId Trace-Execution "Using clientId $clientId to get access token" $armAccessToken = Get-AccessToken -AzureEnvironment $EnvironmentName -TenantId $TenantId -TokenCacheCred $registrationTokenCacheCred -ClientId $clientId $AccountId = $registrationTokenCacheCred.UserName $TestParams += @{ AccountId = $AccountId ArmAccessToken = $armAccessToken.AccessToken } } else { $registrationSPUser = $securityInfo.AADUsers.User | ? Role -EQ $Parameters.Configuration.Role.PrivateInfo.Accounts.RegistrationSPID $registrationSPCred = $Parameters.GetCredential($registrationSPUser.Credential) Trace-Execution "RegistrationSPCred AppId $($registrationSPCred.UserName)" Login-AzAccount -Environment $EnvironmentName -Credential $registrationSPCred -Tenant $TenantId -ServicePrincipal $armAccessToken = Get-AzAccessToken -Verbose $TestParams += @{ AccountId = $registrationSPCred.UserName ArmAccessToken = $armAccessToken.Token } } if (Get-Command Get-IdentifierForCloudDeployment -ErrorAction SilentlyContinue) { $deploymentType = Get-IdentifierForCloudDeployment } else { $deploymentType = $null } if ($null -ne $deploymentType -and $deploymentType -eq "CloudDeployment") { Trace-Execution "Since this is cloud based deployment we are trying to skip the test : Test-ExistingArcResources" $testsToExclude = @("Test-ExistingArcResources", "Test-ExistingHCIResource") $TestParams += @{ Exclude = $testsToExclude } } [array]$ArcIntegrationResult Trace-Execution "Installing Az.Accounts from validated receipe" $azAccountsVersion = GetAzStackHCIVersionFromCentralConfig('Az.Accounts') Set-PSRepository -Name 'PSGallery' -InstallationPolicy Trusted Install-Module Az.Accounts -RequiredVersion $azAccountsVersion Trace-Execution "Installed Az.Accounts from validated receipe" Trace-Execution "Installing Az.Resources from validated receipe" $azResourcesVersion = GetAzStackHCIVersionFromCentralConfig('Az.Resources') Install-Module Az.Resources -RequiredVersion $azResourcesVersion Set-PSRepository -Name 'PSGallery' -InstallationPolicy Untrusted Trace-Execution "Installed Az.Resources from validated receipe" Trace-Execution "Starting ArcIntegration validation, detail output can be found in $($env:LocalRootFolderPath)\MASLogs\AzStackHciEnvironmentChecker*" $ArcIntegrationResult = Invoke-AzStackHciArcIntegrationValidation @TestParams # Parse Result [EnvironmentValidator]::ParseResult($ArcIntegrationResult, 'ArcIntegration', $FailFast) } else { Trace-Execution "No interface found for $OperationType" } } catch { Trace-Execution "Validator failed. $_" Trace-Execution "$($_.ScriptStackTrace)" throw $_ } } function GetAzStackHCIVersionFromCentralConfig([string] $moduleName) { <# .SYNOPSIS This function is used to get Az powershell module version from validated receipe json file .EXAMPLE GetAzStackHCIVersionFromCentralConfig #> $mocArblifeCycleNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.MocArb.LifeCycle" $jsonString = Get-Content -Path "$mocArblifeCycleNugetPath\content\ValidatedRecipe.json" -Raw $validatedRecipeHash = ConvertFrom-Json -InputObject $jsonString Trace-Execution "Modules present in the validated receipe are $validatedRecipeHash" $azModuleversion = ($validatedRecipeHash | Where-Object { $_.ModuleName -eq $moduleName }).RequiredVersion Trace-Execution "Az powershell module for $moduleName with version obtained from validated receipe is $azModuleversion" return $azModuleversion } Export-ModuleMember -Function Test-AzStackHciArcIntegration -Variable MetaData # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEsJRh2oN6n7Kk # Bo4+Wb2JErM16h6Tlt5FJRj4EihddaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP9KETYJGtDrEXshbTBQ1zLl # 9ODVMDS9nVtOw0DUIno7MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAV01uTFZYfovsLPaYehMzB212nEUoBdtinqgDlvNrZW2rRXiKC3SZZ4MU # D9SsikKTMrazmN1IQCdxKWUYMYLbsf0kp3GTHvVukQSyVAhZkStjud0P3+/TRajV # 0zv1hrFVAv6+BYiO8eyXnRdcvJNY2iriwM7kAGFTxee+pU3KE//9Bo+4TUjdM7Ar # X/8O2q9kAYD/nSgBTwAI6s7/BoTMuLWCO1CTVbrzBNvxm9+RrpXctEA1B7+0fW77 # oFtavzKjvIzsK9fsFItsrHe7yeg1HLiTi9rDHX+sTYcOmglVU+fYF+oS8G6XtEOF # umw/h6YPcx55CnD9G5RyIg6OWgMyjKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDrP2HUaRoZRXpMdrYmPX6w01/WzJuxDrALCQKd04ZTHAIGZbqk0RZx # GBMyMDI0MDIxMjE0MDUzNC43NDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg7XICjSWHKmo1j//hBT4D4lagGqt7qO3DwIr2mOHbROgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAKPjs3LBnYvx4KItgraBSr/M25qiyuZZNTvSaT5K # iBIkMrbAscvR3Q1Ek0Z/P4bDIuatt2Wi3Or4kwCpAUI7Hf2E5wO5SZO73dkG8Bu/ # C6wmWIW4w2V91TNRrYmnQeTePXPy/7Ji2ODzNcoiXBeuiQ+G9eoTcFA/6dm3Q+7/ # NiU0hdVvRZarMnOR+bJNbpusI3N6rdRpkmoIGXYYF43Wgx87xpOj35MfNw3Cs7Oy # cV0rvis5YlTsoKndYvZbs0+vbD/NcTY/1PhaX1qh250dWr7fr2bPyHUbIGfQKucw # WchNoxYs7iSgKbDrccYk10wR3c9doKNQaZo9U7cQUsZhUscEsib51i6OB7XWls96 # 5FoduU4u0F0TxMuxcB9+NNv3CDjzgdVUh/ZMEU+udCEtxfRqTTu7adhj0eWZlUaw # Clz8PGnsd/tABDnLi2I+8JUvLXdINRScBoyj8b1rfG8qYesTa64u7yb+gHeNtSF8 # L0YIRGDeNt8fS1BYENsSyEXxn8+5aTdtA4PYa7VeaNZPnthEQVJiU9u8YbNpXJS3 # dGdOy56dniPF/HsAEJIjlfHdEdwHYoYWAqz2cycVCK6rZSxAEMsXaACV6GnnBja5 # cY59EK0rNrlE3zEEK38bsHO9hwtnMO2UdjQxxbh0uCRfNF2EyW7oGFJxUgK//+vu # UMSv # SIG # End signature block
combined_dataset/train/non-malicious/sample_27_17.ps1
sample_27_17.ps1
# # Module manifest for module 'OCI.PSModules.Emwarehouse' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Emwarehouse.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b5a40306-5a74-471c-a805-435bba4f4b4b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Emwarehouse Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Emwarehouse.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEmwarehouse', 'Get-OCIEmwarehouseEtlRunsList', 'Get-OCIEmwarehouseResourceUsage', 'Get-OCIEmwarehousesList', 'Get-OCIEmwarehouseWorkRequest', 'Get-OCIEmwarehouseWorkRequestErrorsList', 'Get-OCIEmwarehouseWorkRequestLogsList', 'Get-OCIEmwarehouseWorkRequestsList', 'Move-OCIEmwarehouseCompartment', 'New-OCIEmwarehouse', 'Remove-OCIEmwarehouse', 'Stop-OCIEmwarehouseWorkRequest', 'Update-OCIEmwarehouse' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Emwarehouse' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1307.ps1
1307.ps1
function Invoke-CPowerShell { [CmdletBinding(DefaultParameterSetName='ScriptBlock')] param( [Parameter(Mandatory=$true,ParameterSetName='ScriptBlock')] [ScriptBlock] $ScriptBlock, [Parameter(Mandatory=$true,ParameterSetName='Command')] [object] $Command, [Parameter(Mandatory=$true,ParameterSetName='FilePath')] [string] $FilePath, [Parameter(ParameterSetName='Command')] [Parameter(ParameterSetName='ScriptBlock')] [Parameter(ParameterSetName='FilePath')] [object[]] [Alias('Args')] $ArgumentList, [Parameter(ParameterSetName='Command')] [Switch] $Encode, [string] $OutputFormat, [Microsoft.PowerShell.ExecutionPolicy] $ExecutionPolicy, [Switch] $NonInteractive, [Switch] $x86, [string] [ValidateSet('v2.0','v4.0')] $Runtime, [Parameter(ParameterSetName='FilePath')] [Parameter(ParameterSetName='Command')] [pscredential] $Credential ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $powerShellv3Installed = Test-Path -Path HKLM:\SOFTWARE\Microsoft\PowerShell\3 $currentRuntime = 'v{0}.0' -f $PSVersionTable.CLRVersion.Major if( $powerShellv3Installed ) { $currentRuntime = 'v4.0' } if( $PSBoundParameters.ContainsKey('Runtime') ) { $runtimeInstalled = switch( $Runtime ) { 'v2.0' { Test-CDotNet -V2 } 'v4.0' { Test-CDotNet -V4 -Full } default { Write-Error ('Unknown runtime value ''{0}''.' -f $Runtime) } } if( -not $runtimeInstalled ) { Write-Error ('.NET {0} not found.' -f $Runtime) return } } if( -not $Runtime ) { $Runtime = $currentRuntime } if( $PSCmdlet.ParameterSetName -eq 'ScriptBlock' -and ` $Host.Name -eq 'Windows PowerShell ISE Host' -and ` $Runtime -eq 'v2.0' -and ` $powerShellv3Installed ) { Write-Error ('The PowerShell ISE v{0} can''t run script blocks under .NET {1}. Please run from the PowerShell console, or save your script block into a file and re-run Invoke-CPowerShell using the `FilePath` parameter.' -f ` $PSVersionTable.PSVersion,$Runtime) return } $comPlusAppConfigEnvVarName = 'COMPLUS_ApplicationMigrationRuntimeActivationConfigPath' $activationConfigDir = Join-Path $env:TEMP ([IO.Path]::GetRandomFileName()) $activationConfigPath = Join-Path $activationConfigDir powershell.exe.activation_config $originalCOMAppConfigEnvVar = [Environment]::GetEnvironmentVariable( $comPlusAppConfigEnvVarName ) if( -not $powerShellv3Installed -and $currentRuntime -ne $Runtime ) { $null = New-Item -Path $activationConfigDir -ItemType Directory @" <?xml version="1.0" encoding="utf-8" ?> <configuration> <startup useLegacyV2RuntimeActivationPolicy="true"> <supportedRuntime version="{0}" /> </startup> </configuration> "@ -f $Runtime | Out-File -FilePath $activationConfigPath -Encoding OEM Set-CEnvironmentVariable -Name $comPlusAppConfigEnvVarName -Value $activationConfigDir -ForProcess } $params = @{ } if( $x86 ) { $params.x86 = $true } try { $psPath = Get-CPowerShellPath @params if( $ArgumentList -eq $null ) { $ArgumentList = @() } $runningAScriptBlock = $PSCmdlet.ParameterSetName -eq 'ScriptBlock' if( $PSCmdlet.ParameterSetName -eq 'Command' -and $Command -is [scriptblock] ) { Write-Warning -Message ('Passing a script block to the Command parameter is OBSOLETE and will be removed in a future major version of Carbon. Use the `ScriptBlock` parameter instead.') $ScriptBlock = $Command $runningAScriptBlock = $true if( $Credential ) { Write-Error -Message ('It looks like you''re trying to run a script block as another user. `Start-Process` is used to start powershell.exe as that user. Start-Process requires all arguments to be strings. Converting a script block to a string automatically is unreliable. Please convert the script block to a command string or omit the Credential parameter.') return } } $powerShellArgs = Invoke-Command -ScriptBlock { if( $powerShellv3Installed -and $Runtime -eq 'v2.0' ) { '-Version' '2.0' } if( $NonInteractive -and -not $runningAScriptBlock ) { '-NonInteractive' } '-NoProfile' if( $OutputFormat ) { '-OutputFormat' $OutputFormat } if( $ExecutionPolicy -and $PSCmdlet.ParameterSetName -ne 'ScriptBlock' ) { '-ExecutionPolicy' $ExecutionPolicy } } if( $runningAScriptBlock ) { Write-Debug -Message ('& {0} {1} -Command {2} -Args {3}' -f $psPath,($powerShellArgs -join ' '),$ScriptBlock,($ArgumentList -join ' ')) & $psPath $powerShellArgs -Command $ScriptBlock -Args $ArgumentList Write-Debug -Message ('LASTEXITCODE: {0}' -f $LASTEXITCODE) } elseif( $PSCmdlet.ParameterSetName -eq 'FilePath' ) { if( $Credential ) { Start-PowerShellProcess -CommandLine ('{0} -File "{1}" {2}' -f ($powerShellArgs -join " "),$FilePath,($ArgumentList -join " ")) -Credential $Credential } else { Write-Debug ('{0} {1} -File {2} {3}' -f $psPath,($powerShellArgs -join " "),$FilePath,($ArgumentList -join ' ')) & $psPath $powerShellArgs -File $FilePath $ArgumentList Write-Debug ('LASTEXITCODE: {0}' -f $LASTEXITCODE) } } else { if( $ArgumentList ) { Write-Error -Message ('Can''t use ArgumentList parameter with Command parameter because powershell.exe''s -Command parameter doesn''t support it. Please embed the argument list in your command string, or convert your command to a script block and use the `ScriptBlock` parameter.') return } $argName = '-Command' if( $Encode ) { $Command = ConvertTo-CBase64 -Value $Command $argName = '-EncodedCommand' } if( $Credential ) { Start-PowerShellProcess -CommandLine ('{0} {1} {2}' -f ($powerShellArgs -join " "),$argName,$Command) -Credential $Credential } else { Write-Debug ('{0} {1} {2} {3}' -f $psPath,($powerShellArgs -join " "),$argName,$Command) & $psPath $powerShellArgs $argName $Command Write-Debug ('LASTEXITCODE: {0}' -f $LASTEXITCODE) } } } finally { if( Test-Path -Path $activationConfigDir -PathType Leaf ) { Remove-Item -Path $activationConfigDir -Recurse -Force } if( Test-Path -Path env:$comPlusAppConfigEnvVarName ) { if( $originalCOMAppConfigEnvVar ) { Set-CEnvironmentVariable -Name $comPlusAppConfigEnvVarName -Value $originalCOMAppConfigEnvVar -ForProcess } else { Remove-CEnvironmentVariable -Name $comPlusAppConfigEnvVarName -ForProcess } } } }
combined_dataset/train/non-malicious/PS2WCF_7.ps1
PS2WCF_7.ps1
<# .SYNOPSIS Functions to call WCF Services With PowerShell. .NOTES Version 1.2 11.02.2012 Requires Powershell v2 and .NET 3.5 Copyright (c) 2008 Christian Glessner Copyright (c) 2012 Justin Dearing Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Original version by Christian Glessner Blog: http://www.iLoveSharePoint.com Twitter: http://twitter.com/cglessner Codeplex: http://codeplex.com/iLoveSharePoint PowerShell v2.0 modification by Justin Dearing Blog: http://justaprogrammer.net Twitter: http://twitter.com/zippy1981 .LINK Blog describing original version: http://www.ilovesharepoint.com/2008/12/call-wcf-services-with-powershell.html Authoritative version of this fork: https://github.com/justaprogrammer/PowerShellWCF Posted to PoshCode.org http://poshcode.org/?lang=&q=PS2WCF #> # load WCF assemblies Add-Type -AssemblyName "System.ServiceModel" Add-Type -AssemblyName "System.Runtime.Serialization" <# .SYNOPSIS Get metadata of a service .DESCRIPTION Parses a wsdl or mex and generates a WsdlImporter object from it. .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc/mex' .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc' -HttpGet .EXAMPLE Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc?wsdl' -HttpGet #> function global:Get-WsdlImporter([CmdletBinding()][Parameter(Mandatory=$true, ValueFromPipeline=$true)][string]$WsdlUrl, [switch]$HttpGet) { if($HttpGet) { $local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::HttpGet } else { $local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::MetadataExchange } $mexClient = New-Object System.ServiceModel.Description.MetadataExchangeClient([Uri]$WsdlUrl, $mode); $mexClient.MaximumResolvedReferences = [System.Int32]::MaxValue $metadataSet = $mexClient.GetMetadata() $wsdlImporter = New-Object System.ServiceModel.Description.WsdlImporter($metadataSet) return $wsdlImporter } <# .SYNOPSIS Generate wcf proxy types .DESCRIPTION Examines a web services meta data (wsdl or mex) and generates the types for the client proxy, as well as request and response contracts. .EXAMPLE $proxyType = Get-WcfProxyType $wsdlImporter $endpoints = $wsdlImporter.ImportAllEndpoints(); $proxy = New-Object $proxyType($endpoints[0].Binding, $endpoints[0].Address); #> function global:Get-WcfProxyType( [CmdletBinding()] [Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter, [Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl, [string] $proxyPath ) { switch ($PsCmdlet.ParameterSetName) { "WsdlUrl" { $WsdlImporter = Get-WsdlImporter $WsdlUrl trap [Exception] { $WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet continue } break } "WsdlImporter" { break } } $generator = new-object System.ServiceModel.Description.ServiceContractGenerator foreach($contractDescription in $wsdlImporter.ImportAllContracts()) { [void]$generator.GenerateServiceContractType($contractDescription) } $parameters = New-Object System.CodeDom.Compiler.CompilerParameters if($proxyPath -eq $null) { $parameters.GenerateInMemory = $true } else { $parameters.OutputAssembly = $proxyPath } $providerOptions = New-Object "Collections.Generic.Dictionary[String,String]" [void]$providerOptions.Add("CompilerVersion","v3.5") $compiler = New-Object Microsoft.CSharp.CSharpCodeProvider($providerOptions) $result = $compiler.CompileAssemblyFromDom($parameters, $generator.TargetCompileUnit); if($result.Errors.Count -gt 0) { throw "Proxy generation failed" } return $result.CompiledAssembly.GetTypes() | Where-Object {$_.BaseType.IsGenericType -and $_.BaseType.GetGenericTypeDefinition().FullName -eq "System.ServiceModel.ClientBase``1" } } <# .SYNOPSIS Generate wcf proxy .DESCRIPTION Generate wcf proxy in a manner similar to a Get-WebServiceProxy .EXAMPLE $proxy = Get-WcfProxy 'http://localhost.fiddler:14232/EchoService.svc/mex' $proxy.Echo("Justin Dearing"); .EXAMPLE $proxy = Get-WcfProxy 'net.tcp://localhost:8732/EchoService/mex' 'net.tcp://localhost:8732/EchoService/' (New-Object System.ServiceModel.NetTcpBinding) $proxy.Echo("Justin Dearing"); #> function global:Get-WcfProxy( [CmdletBinding()] [Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $WsdlImporter, [Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $WsdlUrl, [Parameter(Position=1, Mandatory=$false)][string] $EndpointAddress = $null, [Parameter(Position=2, Mandatory=$false)][System.ServiceModel.Channels.Binding] $Binding = $null ) { if ($Binding -ne $null -and [string]::IsNullOrEmpty($EndpointAddress)) { throw New-Object ArgumentNullException '$EndPointAddress', 'You cannot set $Binding without setting $EndpointAddress.' } switch ($PsCmdlet.ParameterSetName) { "WsdlUrl" { $WsdlImporter = Get-WsdlImporter $WsdlUrl trap [Exception] { $WsdlImporter = Get-WsdlImporter $WsdlUrl -HttpGet continue } break } } $proxyType = Get-WcfProxyType $wsdlImporter; if ([string]::IsNullOrEmpty($EndpointAddress)) { $endpoints = $WsdlImporter.ImportAllEndpoints(); $Binding = $endpoints[0].Binding; $EndpointAddress = $endpoints[0].Address; } return New-Object $proxyType($Binding, $EndpointAddress); }
combined_dataset/train/non-malicious/sample_21_17.ps1
sample_21_17.ps1
/////////////////////////////////////////////////////////////////////////////// // Helper to set a designer prop /////////////////////////////////////////////////////////////////////////////// function setDesignerProp(tname, ttype, tvalue) { var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0); trait.value = tvalue; } /////////////////////////////////////////////////////////////////////////////// // Toggle button and gobal state /////////////////////////////////////////////////////////////////////////////// var ct = command.getTrait("state"); if (ct.value == 0) { ct.value = 2; setDesignerProp("showPivot", "bool", true); } else { ct.value = 0; setDesignerProp("showPivot", "bool", false); } // SIG // Begin signature block // SIG // MIInvAYJKoZIhvcNAQcCoIInrTCCJ6kCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // ZFSP4yc5tVMjuO4eo+b4ivxyD7xHSp6mX9gm4IpI7D2g // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmeMIIZmgIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCAsaO2uNjqq4Q+PuLNhV3dERZliZVdDaRZC // SIG // DOhuNFKwlzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAHdfX9ee // SIG // 8kW8bBJArIpLag64upcYavoH8unDFbBQ9sSRLv4F3cJL // SIG // QekGNRmri2VZ0TgJqzO+xPJu/QmJwBUcXGeI6tSnZeD/ // SIG // 4TE5i56U61QuJgC7lNXYFSmJMcPLH9Z6dRmFWCebAIeL // SIG // KMsAaB6uwkOiUA6RBTgcUVHR5Cguv7PTTW8tDviYdmXD // SIG // w1CDsj906No9iHUW46lO4KOpmAYH7xrfzjgCzLyh/04F // SIG // wPwHFbdAgqe3tm2Q7ZuAqqHjzBqs66Xlw8z4mqk4KG0X // SIG // TWSFb0+dnU+FzXBsPp6sEDfRKrit9DL5WMCO+dbxHFuO // SIG // zNh4zmMKdAtXVwG3RxFzxrBeqcihghcoMIIXJAYKKwYB // SIG // BAGCNwMDATGCFxQwghcQBgkqhkiG9w0BBwKgghcBMIIW // SIG // /QIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWAYLKoZIhvcN // SIG // AQkQAQSgggFHBIIBQzCCAT8CAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgTmOq8NFMlkFZcR4kfitr // SIG // 6nH+37/6Pp3oN2ekN1PBv2ACBmXV5UM+jBgSMjAyNDAy // SIG // MjkyMjMwMDcuMTZaMASAAgH0oIHYpIHVMIHSMQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQg // SIG // SXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNV // SIG // BAsTHVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlB // SIG // MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT // SIG // ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJ // SIG // WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 // SIG // IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkw // SIG // NjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh // SIG // bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U // SIG // aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMG // SIG // A1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj // SIG // ZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB // SIG // AJOQBgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57 // SIG // sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E // SIG // 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf // SIG // 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHk // SIG // k0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9erbDGZ // SIG // 2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxV // SIG // hqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlg // SIG // zCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog5plIzdEx // SIG // vt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb/ // SIG // /ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidu // SIG // g+owrcCjQagYmrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3 // SIG // zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMi // SIG // pCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk // SIG // 6M9uuT2493gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+ // SIG // zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDyS // SIG // HYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAd // SIG // BgNVHQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYD // SIG // VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD // SIG // VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv // SIG // ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGlt // SIG // ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsG // SIG // AQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3 // SIG // dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNy // SIG // b3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgx // SIG // KS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAK // SIG // BggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI // SIG // hvcNAQELBQADggIBALmDVdTtuI0jAEt41O2OM8CU237T // SIG // GMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz // SIG // 3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjX // SIG // YB5DwzaWZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/ // SIG // 6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHen // SIG // dpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNP // SIG // HV1q/WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYg // SIG // cPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg // SIG // ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ // SIG // 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EY // SIG // k+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKzFsZw // SIG // El74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7K // SIG // L8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7 // SIG // aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph589Ap/xS1j // SIG // ESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm // SIG // /Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIH // SIG // cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN // SIG // BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm // SIG // aWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgy // SIG // MjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T // SIG // dGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQAD // SIG // ggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT // SIG // /e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3 // SIG // lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3 // SIG // po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8 // SIG // OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc // SIG // nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks // SIG // UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWY // SIG // bWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLN // SIG // ueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1 // SIG // zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM // SIG // 9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8 // SIG // P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY // SIG // WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb // SIG // oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc // SIG // xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8Fdsa // SIG // N8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMB // SIG // AAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMG // SIG // CSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E // SIG // 7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIw // SIG // XAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/Bggr // SIG // BgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud // SIG // JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoA // SIG // UwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8E // SIG // BTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQ // SIG // W9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9j // SIG // cmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3Rz // SIG // L01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr // SIG // BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v // SIG // Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEB // SIG // CwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2 // SIG // Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP // SIG // +2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J // SIG // 6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1 // SIG // JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthIS // SIG // EV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC // SIG // gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM // SIG // vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJv // SIG // EKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ // SIG // ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo // SIG // 3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1 // SIG // V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g7 // SIG // 5LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP // SIG // Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 // SIG // dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw // SIG // Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9 // SIG // AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl // SIG // cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg // SIG // VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMc // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB // SIG // MAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2g // SIG // gYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK // SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG // SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD // SIG // VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx // SIG // MDANBgkqhkiG9w0BAQUFAAIFAOmK7k4wIhgPMjAyNDAy // SIG // MjkxOTUxNDJaGA8yMDI0MDMwMTE5NTE0MlowdDA6Bgor // SIG // BgEEAYRZCgQBMSwwKjAKAgUA6YruTgIBADAHAgEAAgIE // SIG // cjAHAgEAAgIR1zAKAgUA6Yw/zgIBADA2BgorBgEEAYRZ // SIG // CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6Eg // SIG // oQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHw4 // SIG // N0xrzfMlYYRYBU6siIgEP7FKouSj75GMbxmK/o9q9Yfq // SIG // 50dbekeSkOl6iqqLsEWAcu0AOpvfEH/bxvFenEvfMoZT // SIG // uONHSU8y2bCvLvEIdmE7XJ6TScLMmWtReSQl/xcl3rCp // SIG // 2nclGoHZwyxUBjyrQVgYlYPXmlNeP8NTItrzMYIEDTCC // SIG // BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD // SIG // BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B // SIG // CRABBDAvBgkqhkiG9w0BCQQxIgQgrEYsXdYQCpZ4WqXx // SIG // JPC9QNoBpBpBV9TU5o8mvoLkbAwwgfoGCyqGSIb3DQEJ // SIG // EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09 // SIG // 020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNV // SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD // SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg // SIG // Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7VyVoA0RGx // SIG // AAEAAAHaMCIEIKQKfyPi5YS8BylJA7n4vT2Nf/9dppsV // SIG // wVobX3q4qQe/MA0GCSqGSIb3DQEBCwUABIICAB2Y961F // SIG // qUHymLROxP/ArXe0lVbKZqZtuw53UhSSYeRkCBZ8PI/W // SIG // yZy64+EjdbYv+oaww+wA7phCRmYa4PYhbSq4yVjMGWAD // SIG // DfXbkLbxZH6tdyg/2SWAk/Rlh5qf6VvwjpgYT9VnVO04 // SIG // jb2EM2jS13eWfb+nikbjLWtZaInAIP2AFosisXufAI06 // SIG // pTy49ztUCYbchk55aPy6Lpe7bvRZTBWhaWAe5cXp1XUW // SIG // X0auLac+b//Xd5hQw8Xz5Et0WQuvlT13DWBYf31MgOeg // SIG // JTcr6WOSaoyLToBUx6dqhOxRmOb7rkx5N+kJUnw3Zxp2 // SIG // RmglOSil8CbDjBqzorV0/TzhzH0BzWu1a296yW4Yrk7R // SIG // bp7+WyJro9gW2F0KPpZwYExGXI1Al3PvwyQkQWoqq+am // SIG // GN5HXMXbJRfh+d8SSmitxoar2pXVboj9O51Umbb2nXpW // SIG // s9q6fS7D3T8PFtKVnjtN8a+rZ5xWmfde49qMsX1bmwDy // SIG // BGNSrBaKFqOHeuYJCubf8SPw4btmJMimA6iW+lRbCNT3 // SIG // sFIpN+LeqLNi+XY1Dfy2KFdcsUPtuGXeg/vZjlKqqFUi // SIG // QPXm8o1QFbFdeV7cOthv5y1YY1dfdtik/rtXkeAiBYYe // SIG // EWNTSoazUHkZZZ0kZDU+p4AghouMqKTnK9DD5CYuvoZi // SIG // 3MstzsOoRagsiYL0 // SIG // End signature block
combined_dataset/train/non-malicious/New-Choice_1.ps1
New-Choice_1.ps1
function New-Choice { <# .SYNOPSIS The New-Choice function is used to provide extended control to a script author who writing code that will prompt a user for information. .PARAMETER Choices An Array of Choices, ie Yes, No and Maybe .PARAMETER Caption Caption to present to end user .EXAMPLE PS C:\\> New-Choice -Choices 'Yes','No' -Caption "PowerShell makes choices easy" .NOTES Author: Andy Schneider Date: 5/6/2011 #> [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$True, ValueFromPipeline=$True)] $Choices, [Parameter(Position=1)] $Caption, [Parameter(Position=2)] $Message ) process { $resulthash += @{} for ($i = 0; $i -lt $choices.count; $i++) { $ChoiceDescriptions += @(New-Object System.Management.Automation.Host.ChoiceDescription ("&" + $choices[$i])) $resulthash.$i = $choices[$i] } $AllChoices = [System.Management.Automation.Host.ChoiceDescription[]]($ChoiceDescriptions) $result = $Host.UI.PromptForChoice($Caption,$Message, $AllChoices, 1) $resulthash.$result -replace "&", "" } } new-choice -Choices "yes","no","maybe"
combined_dataset/train/non-malicious/1888.ps1
1888.ps1
Describe "Object cmdlets" -Tags "CI" { Context "Group-Object" { It "AsHashtable returns a hashtable" { $result = Get-Process | Group-Object -Property ProcessName -AsHashTable $result["pwsh"].Count | Should -BeGreaterThan 0 } It "AsString returns a string" { $processes = Get-Process | Group-Object -Property ProcessName -AsHashTable -AsString $result = $processes.Keys | ForEach-Object {$_.GetType()} $result[0].Name | Should -Be "String" } } Context "Tee-Object" { It "with literal path" { $path = "TestDrive:\[TeeObjectLiteralPathShouldWorkForSpecialFilename].txt" Write-Output "Test" | Tee-Object -LiteralPath $path | Tee-Object -Variable TeeObjectLiteralPathShouldWorkForSpecialFilename $TeeObjectLiteralPathShouldWorkForSpecialFilename | Should -Be (Get-Content -LiteralPath $path) } } } Describe "Object cmdlets" -Tags "CI" { Context "Measure-Object" { BeforeAll { $firstValue = "9995788.71" $expectedFirstValue = $null $null = [System.Management.Automation.LanguagePrimitives]::TryConvertTo($firstValue, [double], [cultureinfo]::InvariantCulture, [ref] $expectedFirstValue) $firstObject = new-object psobject $firstObject | Add-Member -NotePropertyName Header -NotePropertyValue $firstValue $secondValue = "15847577.7" $expectedSecondValue = $null $null = [System.Management.Automation.LanguagePrimitives]::TryConvertTo($secondValue, [double], [cultureinfo]::InvariantCulture, [ref] $expectedSecondValue) $secondObject = new-object psobject $secondObject | Add-Member -NotePropertyName Header -NotePropertyValue $secondValue $testCases = @( @{ data = @("abc","ABC","Def"); min = "abc"; max = "Def"}, @{ data = @([datetime]::Today, [datetime]::Today.AddDays(-1)); min = ([datetime]::Today.AddDays(-1)).ToString() ; max = [datetime]::Today.ToString() } @{ data = @(1,2,3,"ABC"); min = 1; max = "ABC"}, @{ data = @(4,2,3,"ABC",1); min = 1; max = "ABC"}, @{ data = @(4,2,3,"ABC",1,"DEF"); min = 1; max = "DEF"}, @{ data = @("111 Test","19"); min = "111 Test"; max = "19"}, @{ data = @("19", "111 Test"); min = "111 Test"; max = "19"}, @{ data = @("111 Test",19); min = "111 Test"; max = 19}, @{ data = @(19, "111 Test"); min = "111 Test"; max = 19}, @{ data = @(100,2,3, "A", 1); min = 1; max = "A"}, @{ data = @(4,2,3, "ABC", 1, "DEF"); min = 1; max = "DEF"}, @{ data = @("abc",[Datetime]::Today,"def"); min = [Datetime]::Today.ToString(); max = "def"} ) } It "can compare string representation for minimum" { $minResult = $firstObject, $secondObject | Measure-Object Header -Minimum $minResult.Minimum.ToString() | Should -Be $expectedFirstValue.ToString() } It "can compare string representation for maximum" { $maxResult = $firstObject, $secondObject | Measure-Object Header -Maximum $maxResult.Maximum.ToString() | Should -Be $expectedSecondValue.ToString() } It 'correctly find minimum of (<data>)' -TestCases $testCases { param($data, $min, $max) $output = $data | Measure-Object -Minimum $output.Minimum.ToString() | Should -Be $min } It 'correctly find maximum of (<data>)' -TestCases $testCases { param($data, $min, $max) $output = $data | Measure-Object -Maximum $output.Maximum.ToString() | Should -Be $max } It 'returns a GenericMeasureInfoObject' { $gmi = 1,2,3 | measure-object -max -min $gmi | Should -BeOfType Microsoft.PowerShell.Commands.GenericMeasureInfo } It 'should return correct error for non-numeric input' { $gmi = "abc",[Datetime]::Now | Measure-Object -sum -max -ErrorVariable err -ErrorAction silentlycontinue $err | ForEach-Object { $_.FullyQualifiedErrorId | Should -Be 'NonNumericInputObject,Microsoft.PowerShell.Commands.MeasureObjectCommand' } } It 'should have the correct count' { $gmi = "abc",[Datetime]::Now | Measure-Object -sum -max -ErrorVariable err -ErrorAction silentlycontinue $gmi.Count | Should -Be 2 } } }
combined_dataset/train/non-malicious/sample_61_55.ps1
sample_61_55.ps1
# # Module manifest for module 'OCI.PSModules.Marketplacepublisher' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplacepublisher.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16f2e498-6e6b-4e22-8c36-b6c2677410c6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplacepublisher Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplacepublisher.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIMarketplacepublisherAndPublishArtifact', 'Enable-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherArtifact', 'Get-OCIMarketplacepublisherArtifactsList', 'Get-OCIMarketplacepublisherAttachment', 'Get-OCIMarketplacepublisherAttachmentContent', 'Get-OCIMarketplacepublisherAttachmentsList', 'Get-OCIMarketplacepublisherCategoriesList', 'Get-OCIMarketplacepublisherCategory', 'Get-OCIMarketplacepublisherListing', 'Get-OCIMarketplacepublisherListingRevision', 'Get-OCIMarketplacepublisherListingRevisionAttachment', 'Get-OCIMarketplacepublisherListingRevisionAttachmentsList', 'Get-OCIMarketplacepublisherListingRevisionNote', 'Get-OCIMarketplacepublisherListingRevisionNotesList', 'Get-OCIMarketplacepublisherListingRevisionPackage', 'Get-OCIMarketplacepublisherListingRevisionPackagesList', 'Get-OCIMarketplacepublisherListingRevisionsList', 'Get-OCIMarketplacepublisherListingsList', 'Get-OCIMarketplacepublisherMarket', 'Get-OCIMarketplacepublisherMarketsList', 'Get-OCIMarketplacepublisherOffer', 'Get-OCIMarketplacepublisherOfferInternalDetail', 'Get-OCIMarketplacepublisherOffersList', 'Get-OCIMarketplacepublisherProduct', 'Get-OCIMarketplacepublisherProductsList', 'Get-OCIMarketplacepublisherPublisher', 'Get-OCIMarketplacepublisherPublishersList', 'Get-OCIMarketplacepublisherTerm', 'Get-OCIMarketplacepublisherTermsList', 'Get-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherTermVersionsList', 'Get-OCIMarketplacepublisherWorkRequest', 'Get-OCIMarketplacepublisherWorkRequestErrorsList', 'Get-OCIMarketplacepublisherWorkRequestLogsList', 'Get-OCIMarketplacepublisherWorkRequestsList', 'Invoke-OCIMarketplacepublisherCascadingDeleteListing', 'Invoke-OCIMarketplacepublisherCascadingDeleteListingRevision', 'Invoke-OCIMarketplacepublisherCloneListingRevision', 'Invoke-OCIMarketplacepublisherMarkListingRevisionPackageAsDefault', 'Invoke-OCIMarketplacepublisherPublishListingRevision', 'Invoke-OCIMarketplacepublisherPublishListingRevisionAsPrivate', 'Invoke-OCIMarketplacepublisherPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherSubmitListingRevisionForReview', 'Invoke-OCIMarketplacepublisherUnPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherWithdrawListingRevision', 'Move-OCIMarketplacepublisherArtifactCompartment', 'Move-OCIMarketplacepublisherListingCompartment', 'Move-OCIMarketplacepublisherListingRevisionToNewStatus', 'Move-OCIMarketplacepublisherTermCompartment', 'New-OCIMarketplacepublisherArtifact', 'New-OCIMarketplacepublisherAttachment', 'New-OCIMarketplacepublisherListing', 'New-OCIMarketplacepublisherListingRevision', 'New-OCIMarketplacepublisherListingRevisionAttachment', 'New-OCIMarketplacepublisherListingRevisionNote', 'New-OCIMarketplacepublisherListingRevisionPackage', 'New-OCIMarketplacepublisherOffer', 'New-OCIMarketplacepublisherTerm', 'New-OCIMarketplacepublisherTermVersion', 'Remove-OCIMarketplacepublisherArtifact', 'Remove-OCIMarketplacepublisherAttachment', 'Remove-OCIMarketplacepublisherListing', 'Remove-OCIMarketplacepublisherListingRevision', 'Remove-OCIMarketplacepublisherListingRevisionAttachment', 'Remove-OCIMarketplacepublisherListingRevisionNote', 'Remove-OCIMarketplacepublisherListingRevisionPackage', 'Remove-OCIMarketplacepublisherOffer', 'Remove-OCIMarketplacepublisherTerm', 'Remove-OCIMarketplacepublisherTermVersion', 'Stop-OCIMarketplacepublisherWorkRequest', 'Update-OCIMarketplacepublisherArtifact', 'Update-OCIMarketplacepublisherListing', 'Update-OCIMarketplacepublisherListingRevision', 'Update-OCIMarketplacepublisherListingRevisionAttachment', 'Update-OCIMarketplacepublisherListingRevisionAttachmentContent', 'Update-OCIMarketplacepublisherListingRevisionIconContent', 'Update-OCIMarketplacepublisherListingRevisionPackage', 'Update-OCIMarketplacepublisherOffer', 'Update-OCIMarketplacepublisherTerm', 'Update-OCIMarketplacepublisherTermVersion', 'Update-OCIMarketplacepublisherTermVersionContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplacepublisher' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_10_2.ps1
sample_10_2.ps1
#************************************************ # TS_ServicingCorruptionCheck.ps1 # Version 1.0.1 # Date: 12/28/2012 # Author: v-kaw # Description: [Idea ID 5712] [Windows] Run Dism checkhealth on Win8 or 2012 to detect possible servicing corruption # Rule number: 5712 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=5712 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_ServicingCorruptionCheck_Activity -Status $ScriptStrings.ID_ServicingCorruptionCheck_Status $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ServicingCorruptionCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Rule applies to windows 8/ windows server 2012 return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true $filesToCheck = Join-Path $pwd.Path ($ComputerName + "_Dism-CheckHealth.txt") Add-Content -Path $filesToCheck "*************************************************" -Encoding Unicode Add-Content -Path $filesToCheck "dism /online /cleanup-image /checkhealth /English" -Encoding Unicode Add-Content -Path $filesToCheck "*************************************************" -Encoding Unicode $CommandToRun = "cmd.exe /c dism /online /cleanup-image /checkhealth /English >>'$filesToCheck'" RunCMD -commandToRun $CommandToRun -collectFiles $false $fileContent = Get-Content -Path $filesToCheck $problemNotFound = $fileContent | Select-String "No component store corruption detected" $repairableProblem = $fileContent | Select-String "The component store is repairable" $unrepairableProblem = $fileContent | Select-String "The component store cannot be repaired" if($null -ne $problemNotFound) { $OutputMessage = "Dism /online /Cleanup-image /checkhealth /English reported that the Corruption flag was not present. Note: This is not a comprehensive test so if you are troubleshooting a servicing issue you should run Dism /online /cleanup-image /scanhealth for a full test" Add-Content -Path $filesToCheck -Value $OutputMessage -Encoding Unicode $RootCauseDetected = $false } if($null -ne $repairableProblem) { $OutputMessage = "Dism /online /cleanup-image /checkhealth /English has detected possible store corruption. You should run dism /online /cleanup-image /restorehealth" Add-Content -Path $filesToCheck -Value $OutputMessage -Encoding Unicode Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Repairable Problem" -Value "Yes" Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected -SDPFileReference $filesToCheck $RootCauseDetected = $true } if($null -ne $unrepairableProblem) { $OutputMessage = "Dism /online /cleanup-image /checkhealth /English has detected possible store corruption. You should run dism /online /cleanup-image /restorehealth and check the CBS.LOG for additional information" Add-Content -Path $filesToCheck -Value $OutputMessage -Encoding Unicode Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Repairable Problem" -Value "No" Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected -SDPFileReference $filesToCheck $RootCauseDetected = $true } CollectFiles -filesToCollect $filesToCheck -fileDescription "dism /online /cleanup-image /checkhealth output" -sectionDescription "Servicing and related Logs" Update-DiagRootCause -id $RootCauseName -Detected $RootCauseDetected } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBb1bN4avvv/2nm # UjdyZiwjxMnu9LjO/h/ZPC1fBxSCW6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILqzySF8ojvfzvRhtkjHoGdd # OTOlxqk+CLGAx81WDGfUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAeazfj/4N7gFfB29a7rlFzM2sbR5Z3wxZd61IMxfRyGrKWlS5ibb/0+d1 # wrrtK4PR8Nlnkxx8MLI3t4TdJ5m74cNpbeJJCR2ZlS4dNLG6dREQhaW0OuBTsYoK # vdZ4OOiBsPj5jg5XGuhqrvsjBvHEpvraFJbYY3yx61VV9TdxEEcj+FERtuaHJ/SC # DPkOOmItsrMbwOJtTSa0CpX/qk+sRuo7b4QHgkjRyGgrRXM17sd8ArK9O1EX9Yta # PD2e1dJbVDDyNG20ZBrDeIsvpx5R7VThVf9d+7qbRhsxVXNutres5KG3GW/3NFVu # L/yhket4TnlDgjebgKO1+ZoP2wJVeKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD0bUrwO51tjKMgpRRsddj3qSiWXLIBsak5kMqtzRR5wgIGZxqKKzUm # GBMyMDI0MTAyODExNDA0MC4zNTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smlrTAiGA8yMDI0MTAyODA1NTQ1 # M1oYDzIwMjQxMDI5MDU1NDUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaWt # AgEAMAcCAQACAidMMAcCAQACAhM4MAoCBQDqyvctAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAE9NM2oBgxYn7NvFUiKTdXjroEzqqhxWSGvz6KLxlabUeVJ3 # S4zvUMtX1C6NcjnC4YjtX9VVdtfdpxHhUt62JYc7V48lOyla+Pegf2wXgDSv7cxq # h6az1Ql9U0miXewxqvM/5qOyYAdXAgV6PVtG7IGXmXu8FtLTcRy1OyF97pG8O+x2 # MEk9sFMYefIGFxBIxtqQeqM5FPdnNPDy3ZhSkcdHOmkixks3XV+6fPmIIIq7LfZv # gs53ARky3rOxvdLsZDMj081Hcli+UQ0HwG+J2Xy/2rzZXJz4mkAjhbNPMpQbUhKK # jU0fgi+wUda6CDESHJEfW+NMqEYkQJD0OcSID68xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB7zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDnCt0IE7kUjMwc3vtVazPpv0hH3mveYmIhhw1lijhgsTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0DbcdsX # 8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgeShDcrFcwpJG448b+b5dMVUiGXFk # NZd/gVpYymSjj+cwDQYJKoZIhvcNAQELBQAEggIAUlHVW98jMl1KpPGmTcMBj5NT # D4H0++tLuC6hjMRYvQKem9g9ZY29wPAlEVPh9Z4ZHIpbB12Y/Oa5fKItFujxvGRV # 4JjZkvViHfDXQNXDQ9hf4jScX8ZENvZs7KurXpB9VNOD1rV+++ZszFQMFzm9tP+b # E3SSepCLr/6IVCLx+PuHXUuQ6Bjxj5JqkMIfFoKbg6E61zbDfWFk/JzGffCUPPLu # jeZ9KITy22DMRw2ecfR0px6km4nNDazjfKuUVmco4DnGsmx1PJUfYmsCPbbxgd6y # hQ/n6MsW1yfnQNu3m3+UIlyjP6ZRdVAup/Wgfw0Pz0Mr+jzb+RhYN8fk8Tic0aWl # hhsE4FyEGq/+f+7m3ppWdmLTPvEWlAM7dRJWb6oZqWbn2g+ykN5x08GN852kLGLH # BFzaAgvITW/CvUMq3lHUqXojB2F0xDTCTgXBfTFOxcuZ+RIYuHqqSV5CQ48h9Ppi # KfiN7b+eezB+g1i6G4N09ddShYhrRczsibzvBTSHEeO5P7cq4N5nYPdU2ifHXF/e # JYK8VjJZj07yb0yYVx1SqeNlAcE5yzQyc8dCTUjzKVJN4JSzP9Zt0pWnRoxynY3L # MSRaQM1zoUdtaC6xqeueyPRb2YOCHao6O4CCmJvcXrIwF12Uj7urc3/asqHlBKa4 # YptNZugAyXhkbolo6m0= # SIG # End signature block
combined_dataset/train/non-malicious/2241.ps1
2241.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true)] [string]$SiteServer, [parameter(Mandatory=$true)] [ValidateScript({Test-Path -Path $_ -PathType Container})] [string]$DriverSourcePath, [parameter(Mandatory=$true)] [ValidateScript({Test-Path -Path $_ -PathType Container})] [string]$DriverPackagePath, [parameter(Mandatory=$true)] [string]$DPGroupName ) Begin { $CurrentLocation = Get-Location try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug "SiteCode: $($SiteCode)" } } } catch [Exception] { Throw "Unable to determine SiteCode" } try { $SiteDrive = $SiteCode + ":" Import-Module (Join-Path -Path (($env:SMS_ADMIN_UI_PATH).Substring(0,$env:SMS_ADMIN_UI_PATH.Length-5)) -ChildPath "\ConfigurationManager.psd1") -Force if ((Get-PSDrive $SiteCode -ErrorAction SilentlyContinue | Measure-Object).Count -ne 1) { New-PSDrive -Name $SiteCode -PSProvider "AdminUI.PS.Provider\CMSite" -Root $SiteServer } } catch [Exception] { Throw "Unable to determine SiteCode" } } Process { $ValidOSList = New-Object -TypeName System.Collections.ArrayList $OSFolders = Get-ChildItem -Path $DriverSourcePath | Select-Object Name, FullName Write-Verbose -Message "<---- Starting validation of OS and Make folders ---->" foreach ($OSFolder in $OSFolders) { if ((Get-Item -Path $OSFolder.FullName).Attributes -like "Directory") { Write-Verbose -Message "Current OS item: $($OSFolder.FullName)" if (-not((Get-ChildItem -Path $OSFolder.FullName) -eq $null)) { foreach ($OSSubFolder in (Get-ChildItem -Path $OSFolder.FullName)) { Write-Verbose -Message "Current OS Sub-item: $($OSSubFolder)" if (-not((Get-Item -Path $OSSubFolder.FullName).Attributes -like "Directory")) { Throw "ERROR: Unsupported files found" } } Write-Verbose -Message "Validated Operating System folder: $($OSFolder.Name)" $ValidOSList.Add($OSFolder.FullName) | Out-Null } else { Write-Warning -Message "Unable to validate Operating System folder: $($OSFolder.Name)" Write-Warning -Message "REASON: Operating System folder is empty" } } } Write-Verbose -Message "<---- Finished folder structure validation ---->" Write-Verbose -Message "<---- Starting to process objects ---->" foreach ($OS in $ValidOSList) { $CurrentOSName = Get-Item -Path $OS | Select-Object -ExpandProperty Name $CurrentOSPath = $OS $MakeObjects = Get-ChildItem -Path $CurrentOSPath | Select-Object -Property Name, FullName Write-Verbose -Message "Operating System: $($CurrentOSName)" Write-Verbose -Message "Path: $($OS)" Set-Location $SiteDrive -Verbose:$false if ((Get-CMCategory -CategoryType DriverCategories -Name $CurrentOSName -Verbose:$false) -eq $null) { Write-Verbose -Message "Creating new Driver Category: $($CurrentOSName)" New-CMCategory -CategoryType DriverCategories -Name $CurrentOSName | Out-Null } Set-Location $CurrentLocation -Verbose:$false foreach ($Make in $MakeObjects) { $CurrentMakeName = $Make.Name $CurrentMakePath = $Make.FullName $ModelObjects = Get-ChildItem -Path $CurrentMakePath | Select-Object -Property Name, FullName Write-Verbose -Message "-- Make: $($CurrentMakeName)" Write-Verbose -Message "-- Path: $($CurrentMakePath)" Set-Location $SiteDrive -Verbose:$false if ((Get-CMCategory -CategoryType DriverCategories -Name $CurrentMakeName -Verbose:$false) -eq $null) { Write-Verbose -Message "---- Creating new Driver Category: $($CurrentMakeName)" New-CMCategory -CategoryType DriverCategories -Name $CurrentMakeName -Verbose:$false | Out-Null } Set-Location $CurrentLocation -Verbose:$false foreach ($Model in $ModelObjects) { $CurrentModelName = $Model.Name $CurrentModelPath = $Model.FullName Write-Verbose -Message "---- Model: $($CurrentModelName)" Write-Verbose -Message "---- Path: $($CurrentModelPath)" $DriverINFs = Get-ChildItem -Path $CurrentModelPath -Recurse -Include *.inf Write-Verbose -Message "------ Drivers: $(($DriverINFs | Measure-Object).Count)" Set-Location $SiteDrive -Verbose:$false if ((Get-CMCategory -CategoryType DriverCategories -Name $CurrentModelName -Verbose:$false) -eq $null) { Write-Verbose -Message "------ Creating new Driver Category: $($CurrentModelName)" New-CMCategory -CategoryType DriverCategories -Name $CurrentModelName -Verbose:$false | Out-Null } $CurrentDriverPackageName = "$($CurrentMakeName) - $($CurrentModelName) - $($CurrentOSName)" if ((Get-CMDriverPackage -Name $CurrentDriverPackageName -Verbose:$false) -eq $null) { if ($DriverPackagePath.EndsWith("\")) { $NewDriverPackagePath = "$($DriverPackagePath)$($CurrentOSName)\$($CurrentMakeName)\$($CurrentModelName)" } else { $NewDriverPackagePath = "$($DriverPackagePath)\$($CurrentOSName)\$($CurrentMakeName)\$($CurrentModelName)" } Write-Verbose -Message "------ Creating new Driver Package: $($CurrentDriverPackageName)" New-CMDriverPackage -Name $CurrentDriverPackageName -Path $NewDriverPackagePath -Verbose:$false | Out-Null Start-CMContentDistribution -DriverPackageName $CurrentDriverPackageName -DistributionPointGroupName $DPGroupName -Verbose:$false | Out-Null } $CurrentDriverPackage = Get-CMDriverPackage -Name "$($CurrentDriverPackageName)" -Verbose:$false if (($CurrentDriverPackage | Measure-Object).Count -ge 1) { Write-Verbose -Message "------ Current Driver Package: $($CurrentDriverPackage.Name)" } $DriverCategoryArray = @() $DriverCategoryArray += (Get-CMCategory -CategoryType DriverCategories -Name $CurrentOSName -Verbose:$false) $DriverCategoryArray += (Get-CMCategory -CategoryType DriverCategories -Name $CurrentMakeName -Verbose:$false) $DriverCategoryArray += (Get-CMCategory -CategoryType DriverCategories -Name $CurrentModelName -Verbose:$false) foreach ($Category in $DriverCategoryArray) { Write-Verbose -Message "------ Categories: $($Category.LocalizedCategoryInstanceName)" } $DriverCount = ($DriverINFs | Measure-Object).Count $CurrentDriverCount = 0 foreach ($DriverINF in $DriverINFs) { $CurrentDriverCount++ Write-Progress -Id 1 -Activity "Importing Drivers" -Status "Processing driver $($CurrentDriverCount) of $($DriverCount)" -CurrentOperation "Current model: $($CurrentModelName)" -PercentComplete (($CurrentDriverCount / $DriverCount) * 100) try { Import-CMDriver -UncFileLocation $DriverINF.FullName -DriverPackage $CurrentDriverPackage -EnableAndAllowInstall $true -AdministrativeCategory $DriverCategoryArray -ImportDuplicateDriverOption AppendCategory -ErrorAction SilentlyContinue -Verbose:$false | Out-Null } catch { Write-Warning "Failed to import: $($DriverINF.FullName)" } } Write-Progress -Id 1 -Activity "Importing Drivers" -Completed Update-CMDistributionPoint -DriverPackageName $CurrentDriverPackageName -Verbose:$false Set-Location $CurrentLocation -Verbose:$false } } } }
combined_dataset/train/non-malicious/BufferBox _1.6.ps1
BufferBox _1.6.ps1
#################################################################################################### ## This script is just a demonstration of some of the things you can do with the buffer ## in the default PowerShell host... it serves as a reminder of how much work remains on ## PoshConsole, and as an inspiration to anyone who is thinking about trying to create ## "interactive" PowerShell applications. ## ## Try Test-DisplayBox and then Test-BufferBox (note it has tab completion and everything). #################################################################################################### $global:BoxChars = new-object PSObject -Property @{ 'HorizontalDouble' = ([char]9552).ToString() 'VerticalDouble' = ([char]9553).ToString() 'TopLeftDouble' = ([char]9556).ToString() 'TopRightDouble' = ([char]9559).ToString() 'BottomLeftDouble' = ([char]9562).ToString() 'BottomRightDouble' = ([char]9565).ToString() 'HorizontalDoubleSingleDown' = ([char]9572).ToString() 'HorizontalDoubleSingleUp' = ([char]9575).ToString() 'Horizontal' = ([char]9472).ToString() 'Vertical' = ([char]9474).ToString() 'TopLeft' = ([char]9484).ToString() 'TopRight' = ([char]9488).ToString() 'BottomLeft' = ([char]9492).ToString() 'BottomRight' = ([char]9496).ToString() 'Cross' = ([char]9532).ToString() 'VerticalDoubleRightSingle' = ([char]9567).ToString() 'VerticalDoubleLeftSingle' = ([char]9570).ToString() } $global:RectType = "system.management.automation.host.rectangle" function Show-ConsoleMenu { #.Synopsis # Displays a menu in the console and returns the selection #.Description # Displays a numbered list in the console, accepts a typed number from the user, and returns it. #.Example # ls | Show-ConsoleMenu -Title "Please pick a file to delete:" -Passthru | rm -whatif # # Description # ----------- # Creates a menu showing a line for every file, and outputs the selected file. #.Example # if(Test-Path $Profile) { # switch(Show-ConsoleMenu "Profile exists:" "Delete it!","Rename it with 01","Abort" -Debug) { # 0 { rm $Profile -whatif } # 1 { mv $Profile [IO.Path]::ChangeExtension($Profile,"01.ps1") } # 2 { return } # } # } # # Description # ----------- # Shows how to use the return value without the Passthru switch. # This example would check if you have a profile, and if you do, would offer you the choice of removing or renaming it. param( # The items to be chosen from [Parameter(ValueFromPipeline=$true,Position=2)] [Alias("InputObject")] [PSObject[]]$Choices, # A caption to display before the choices [Parameter(Position=1)] [Alias("Title")] [string]$Caption, # A scriptblock expression for formatting the Choices. [Parameter(Position=3)] [ScriptBlock]$Expression=({$_}), # A prompt to display after the choices [Alias("Footer")] [string]$Prompt, # How much to indent the "center" of the selection menu (Defaults to 8) [int]$indentLeft=8, # If set, Show-ConsoleMenu returns the selected value from $choices, otherwise it returns the index (which is usually easier to use in a switch statement) [Switch]$Passthru, # If set, this function works with my New-BufferBox script by using Out-Buffer [Switch]$UseBufferBox, # If set, allows multiple selection (Press Enter to stop selecting more) [Switch]$MultiSelect ) begin { $allchoices = New-Object System.Collections.Generic.List[PSObject] } process { if($choices) { $allchoices.AddRange($choices) } } end { $Format = "{0:D1}"; $Digits = 1 if($allchoices.Count -gt 10) { $Digits = $allchoices.Count.ToString().Length $Format = "{0:D${Digits}}" } # Make a hashtable with keys for($i=0; $i -lt $allchoices.Count; $i++) { $allchoices[$i] = Add-Member -Input $allchoices[$i] -Type NoteProperty -Name ConsoleMenuKey -Value $($format -f $i) -Passthru } Write-Debug "There are $($allChoices.Count) choices, so we'll use $Digits digits" # output the menu to the screen $menu = $allchoices | Format-Table -HideTableHeader @{E="ConsoleMenuKey";A="Right";W=$indentLeft}, @{E=$Expression;A="Left"} -Force | Out-String $menu = $menu.TrimEnd() + "`n" if($UseBufferBox) { Out-Buffer ("`n" + (" " * ($indentLeft/2)) + $Caption + "`n") -ForegroundColor $Host.PrivateData.VerboseForegroundColor -BackgroundColor $Host.PrivateData.VerboseBackgroundColor Out-Buffer $menu } else { Write-Host ("`n" + (" " * ($indentLeft/2)) + $Caption + "`n") -ForegroundColor $Host.PrivateData.VerboseForegroundColor -BackgroundColor $Host.PrivateData.VerboseBackgroundColor Write-Host $menu } do { if($Prompt) { if($UseBufferBox) { Out-Buffer $Prompt -ForegroundColor $Host.PrivateData.VerboseForegroundColor -BackgroundColor $Host.PrivateData.VerboseBackgroundColor } else { Write-Host $Prompt -ForegroundColor $Host.PrivateData.VerboseForegroundColor -BackgroundColor $Host.PrivateData.VerboseBackgroundColor } } # get a choice from the user [string]$PreviousKeys="" do { $Key = $Host.UI.RawUI.ReadKey("IncludeKeyDown,NoEcho").Character try { [int][string]$choice = "${PreviousKeys}${Key}" $PreviousKeys = "${PreviousKeys}${Key}" } catch { ## The "?" causes us to re-show the menu. Useful for long multi-selects, which might scroll off. if(63 -eq [int][char]$Key) { if($UseBufferBox) { Out-Buffer $menu } else { Write-Host $menu } } elseif(13,27,0 -notcontains [int][char]$Key) { $warning = "You must type only numeric characters (hit Esc to exit)" if($UseBufferBox) { Out-Buffer $warning -ForegroundColor $Host.PrivateData.WarningForegroundColor -BackgroundColor $Host.PrivateData.WarningBackgroundColor } else { Write-Warning $warning } } } } while( $PreviousKeys.Length -lt $Digits -and (13,27 -notcontains [int][char]$Key)) if($PreviousKeys.Length -and $allchoices.Count -gt ([int]$PreviousKeys)) { if($Passthru) { $allchoices[([int]$PreviousKeys)] } else { $choice } } } while($key -ne [char]13 -and $MultiSelect) }} function Reset-Buffer { param( $Position = $Host.UI.RawUI.WindowPosition, [int]$Height = $Host.UI.RawUI.WindowSize.Height, [int]$Width = $Host.UI.RawUI.WindowSize.Width, # Note: all edges are padded by 1 for the box edges, but we also pad each side by this ammount: [int]$Padding = 1, $ForegroundColor = $Host.UI.RawUI.ForegroundColor, $BackgroundColor = $Host.UI.RawUI.BackgroundColor, $BorderColor = "Yellow", [switch]$NoBorder, [switch]$ShowInput, [string]$Title = "" ) $global:BufferHeight = $Height $global:BufferWidth = $Width $global:BufferPadding = $Padding $global:BufferForegroundColor = $ForegroundColor $global:BufferBackgroundColor = $BackgroundColor $global:BufferBorderColor = $BorderColor if($NoBorder) { $global:BufferBoxSides = 0 } else { $global:BufferBoxSides = 2 } if($ShowInput) { $global:BufferHeight -= 2 } $Host.UI.RawUI.SetBufferContents($Position,(New-BufferBox $BufferHeight $BufferWidth -Title:$Title -NoBorder:$NoBorder -ShowInput:$ShowInput -Background $BufferBackgroundColor -Border $BufferBorderColor)) $global:BufferPosition = $Position $global:BufferPosition.X += $global:BufferPadding + ($global:BufferBoxSides/2) # this gets set to the BOTTOM line, because I assume text will flow in from the bottom. $global:BufferPosition.Y += $global:BufferHeight - 2 # and this goes below that ... $global:BufferPromptPosition = $BufferPosition $global:BufferPromptPosition.Y += 2 $global:BufferPromptPosition.X += 2 - $global:BufferPadding # Prompt = "> " } function New-BufferBox { param( [int]$Height = $global:BufferHeight, [int]$Width = $global:BufferWidth, $Title = "", [switch]$NoBorder, [switch]$ShowInput, $BackgroundColor = $global:BufferBackgroundColor, $BorderColor = $global:BufferBorderColor ) $Width = $Width - $global:BufferBoxSides $LineTop =( $global:BoxChars.HorizontalDouble * 2) + $Title ` + $($global:BoxChars.HorizontalDouble * ($Width - ($Title.Length+2))) $LineField = ' ' * $Width $LineBottom = $global:BoxChars.HorizontalDouble * $Width $LineSeparator = $global:BoxChars.Horizontal * $Width $LinePrompt = '> ' + ' ' * ($Width-2) # Prompt = "> " if(!$NoBorder) { $LineField = $global:BoxChars.VerticalDouble + $LineField + $global:BoxChars.VerticalDouble $LinePrompt = $global:BoxChars.VerticalDouble + $LinePrompt + $global:BoxChars.VerticalDouble $LineBottom = $global:BoxChars.BottomLeftDouble + $LineBottom + $global:BoxChars.BottomRightDouble $LineTop = $global:BoxChars.TopLeftDouble + $LineTop + $global:BoxChars.TopRightDouble $LineSeparator = $global:BoxChars.VerticalDoubleRightSingle + $LineSeparator + $global:BoxChars.VerticalDoubleLeftSingle } if($ShowInput) { $box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineSeparator;$LinePrompt;$LineBottom} } else { $box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineBottom} } $boxBuffer = $Host.UI.RawUI.NewBufferCellArray($box,$BorderColor,$BackgroundColor) return ,$boxBuffer } function Move-Buffer { param( $Position = $global:BufferPosition, [int]$Left = $($global:BufferBoxSides/2), [int]$Top = (2 - $global:BufferHeight), [int]$Width = $global:BufferWidth - $global:BufferBoxSides, [int]$Height = $global:BufferHeight, [int]$Offset = -1 ) $Position.X += $Left $Position.Y += $Top $Rect = New-Object $RectType $Position.X, $Position.Y, ($Position.X + $width), ($Position.Y + $height -1) $Position.Y += $OffSet $Host.UI.RawUI.ScrollBufferContents($Rect, $Position, $Rect, (new-object System.Management.Automation.Host.BufferCell(' ',$global:BufferForegroundColor,$global:BufferBackgroundColor,'complete'))) } function Out-Buffer { param( [Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true,Position=0,Mandatory=$true)] $Message, [Parameter(ValueFromPipelineByPropertyName=$true)] $ForegroundColor = $global:BufferForegroundColor, [Parameter(ValueFromPipelineByPropertyName=$true)] $BackgroundColor = $global:BufferBackgroundColor, [switch]$NoScroll, [Parameter(ValueFromPipelineByPropertyName=$true)] $Position = $global:BufferPosition, [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Left = 0, [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Top = $(3 - $global:BufferHeight), # Box Edge + New Lines [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Width = ($global:BufferWidth - $global:BufferBoxSides), # Box Edge [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Height = ($global:BufferHeight - $global:BufferBoxSides), # Box Edge [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Offset = $( 0 - ($Message.Split("`n").Count)) ) process { $lineCount = $Message.Split("`n").Count $Width = $Width - ($global:BufferPadding * 2) if(!$NoScroll){ Move-Buffer $Position $Left $Top $Width $Height $Offset } $MessageBuffer = New-Object "System.Management.Automation.Host.BufferCell[,]" $lineCount, $width $index = 0 foreach( $line in $Message.Split("`n") ) { $Buffer = $Host.UI.RawUI.NewBufferCellArray( @($line.Trim("`r").PadRight($Width)), $ForegroundColor, $BackgroundColor ) for($i = 0; $i -lt $width; $i++) { $MessageBuffer[$index,$i] = $Buffer[0,$i] } $index++ } $Y = $global:BufferPosition.Y $global:BufferPosition.Y -= $lineCount - 1 $Host.UI.RawUI.SetBufferContents($global:BufferPosition,$MessageBuffer) $global:BufferPosition.Y = $Y } } function Set-BufferInputLine { param([String]$Line = "") $PromptText = $line.PadRight(($global:BufferWidth - $line.Length - 3)) # Prompt = "> " $CursorPosition = $BufferPromptPosition $CursorPosition.X += $line.Length $Prompt = $Host.UI.RawUI.NewBufferCellArray( @($PromptText),$global:BufferForegroundColor, $global:BufferBackgroundColor) $Host.UI.RawUI.SetBufferContents( $BufferPromptPosition, $prompt ) $Host.UI.RawUI.CursorPosition = $CursorPosition } function Test-DisplayBox { $Position = $Host.UI.RawUI.WindowPosition $Position.X += 10 $Position.Y += 3 Reset-Buffer $Position 20 66 3 -ForegroundColor 'Gray' -BackgroundColor 'Black' -BorderColor 'Green' Out-Buffer 'Greetings!' 'Yellow' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer '- - - Thank you for running this simple demo script! - - -' 'Green' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'We are demonstrating how the scroll buffer works: you can add more than one line at a time, but you don''t really need to, since they add almost as fast one at a time.' 'white' 'black' sleep -m 3000 Out-Buffer '' 'Gray' 'black' Out-Buffer 'That is, as long as you don''t have any delay, you can just' 'white' 'black' Out-Buffer 'write out as many lines as you like, one-at-a-time, like' 'white' 'black' Out-Buffer 'this, and there is really no downside to doing that.' 'white' 'black' sleep -m 3000 Out-Buffer '' 'Gray' 'black' Out-Buffer 'Right? '.PadRight(58,"-") 'Red' 'black' Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'It''s clearly not as slick to just pop in multiple lines' 'white' 'black' sleep -m 1200 Out-Buffer 'with absolutely no scroll delay, and it makes it a little ' 'white' 'black' sleep -m 1200 Out-Buffer 'hard to tell what you have read already, but that''s ok.' 'white' 'black' sleep -m 1200 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'If you delay between paragraphs.' 'Red' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'But: don''t scroll off-screen faster than I can read!' 'Yellow' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' } ## Test-BufferBox 3.1 - Now with Tab completion #################################################################################################### ## Imagine it's a chat window: you can type, but the whole time, the ongoing conversation in the ## chat room you have joined is going on in the background. ## ## NOTE: because this is a "chat" demo, we treat your input as text, and to execute script in-line ## you have to enclose it inside $() braces. #################################################################################################### function Test-BufferBox { param( $title = "PowerShell Interactive Buffer Demo" ) Reset-Buffer -ShowInput -Title $Title ################################################################################################### ##### We only need this for the purposes of the demo... ##### In a real script you would, presumably, be getting stuff from somewhere else to display $noise = $MyInvocation.MyCommand.Definition -split "`n" $index = 0; $random = New-Object "Random" [regex]$chunker = @' [^ \\"']+|([\\"'])[^\\\\1]*?\\\\1[^ \\"']*|([\\"'])[^\\\\1]*$| $ '@ ##### Printing a "How to Exit" message Out-Buffer " " -Fore DarkGray -Back Cyan Out-Buffer " This is just a demo. " -Fore Black -Back Cyan Out-Buffer " We will stream in the source code of this script ... " -Fore Black -Back Cyan Out-Buffer " And you can type at the bottom while it's running. " -Fore Black -Back Cyan Out-Buffer " Imagine this as an n-way chat application like IRC, except that " -Fore Black -Back Cyan Out-Buffer " FOR THIS PERFORMANCE ONLY: " -Fore Black -Back Cyan Out-Buffer " The part of your chatting friends is played by my source code. " -Fore DarkGray -Back Cyan Out-Buffer " " -Fore DarkGray -Back Cyan Out-Buffer " Press ESC to exit, or enter 'exit' and hit Enter" -Fore Black -Back Cyan Out-Buffer " " -Fore DarkGray -Back Cyan ##### Setting the prompt Set-BufferInputLine ##### And initializing our two variables ... $line="" $exit = $false switch(Show-ConsoleMenu "What would you like to do now?" "Continue the demo","Stop the demo","Exit PowerShell" -UseBuffer) { 0 { <# do nothing, will continue #> } 1 { $exit = $true <#this script exits cleanly below#> } 2 { exit <# stop abruptly #> } } while(!$exit){ while(!$exit -and $Host.UI.RawUI.KeyAvailable) { $char = $Host.UI.RawUI.ReadKey("IncludeKeyUp,IncludeKeyDown,NoEcho"); # we don't want the key up events, but we do want to get rid of them if($char.KeyDown) { switch([int]$char.Character) { 13 { # Enter if($line.Trim() -eq "exit") { $exit = $true; break; } ################################################################################################### ################################################################################################### ############# WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING ############# ############# This executes the user input! ############# ############# Don't use this on, say, content you got from a web page or chat room ############# iex "Out-Buffer `"$line`" -Fore Red"; ############# ################################################################################################### ################################################################################################### $line = ""; Set-BufferInputLine break; } 27 { # Esc $exit = $true; break; } 9 { # Tab if($line.Length -gt 0) { [Array]$words = $chunker.Matches($line) if($words.Count -ge 1) { Out-Buffer ($Words | Out-String) -Fore Black -Back White $lastWord = $words[$($words.Count-1)].Value $trim = $lastWord.TrimEnd("`r","`n") ## This may return more than one ... in which case subsequent tabs should iterate through them ## But for demo purposes, this is more than enough work... $replacement = TabExpansion -Line $line -LastWord ($lastWord.Trim() -replace '"') Out-Buffer ($replacement | Out-String) -Fore Black -Back White $line = $line.SubString(0, $line.Length - $lastWord.Length) + @($replacement)[0] Set-BufferInputLine $line } } break; } 8 { # Backspace if($line.Length -gt 0) { $line = $line.SubString(0,$($line.Length-1)) } # $pos = $Host.UI.RawUI.CursorPosition Set-BufferInputLine $line break; } 0 { # Not actually a key # Out-Buffer $($Char | Out-String) break; } default { $line += $char.Character Set-BufferInputLine $line } } } } # Simulate doing useful things 25% of the time if($random.NextDouble() -gt 0.75) { $noise[($index)..($index++)] | Out-Buffer if($index -ge $noise.Length){$index = 0} } sleep -milli 100 } $CursorPosition = $BufferPromptPosition $CursorPosition.Y += 2 $CursorPosition.X = 0 $Host.UI.RawUI.CursorPosition = $CursorPosition }
combined_dataset/train/non-malicious/4021.ps1
4021.ps1
function Test-GetManagementGroup { New-AzManagementGroup -GroupName TestPSGetGroup1 New-AzManagementGroup -GroupName TestPSGetGroup2 -ParentId "/providers/Microsoft.Management/managementGroups/TestPSGetGroup1" $response = Get-AzManagementGroup -GroupName TestPSGetGroup2 Remove-AzManagementGroup -GroupName TestPSGetGroup2 Remove-AzManagementGroup -GroupName TestPSGetGroup1 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup2" $expectedName = "TestPSGetGroup2" $expectedDisplayName = "TestPSGetGroup2" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup1" $expectedParentDisplayName = "TestPSGetGroup1" $expectedParentName = "TestPSGetGroup1" Assert-NotNull $response Assert-Null $response.Children Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName Assert-AreEqual $response.ParentName $expectedParentName } function Test-GetManagementGroupWithExpand { New-AzManagementGroup -GroupName TestPSGetGroup1 New-AzManagementGroup -GroupName TestPSGetGroup2 -ParentId "/providers/Microsoft.Management/managementGroups/TestPSGetGroup1" New-AzManagementGroup -GroupName TestPSGetGroup3 -ParentId "/providers/Microsoft.Management/managementGroups/TestPSGetGroup2" $response = Get-AzManagementGroup -GroupName TestPSGetGroup2 -Expand Remove-AzManagementGroup -GroupName TestPSGetGroup3 Remove-AzManagementGroup -GroupName TestPSGetGroup2 Remove-AzManagementGroup -GroupName TestPSGetGroup1 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup2" $expectedName = "TestPSGetGroup2" $expectedDisplayName = "TestPSGetGroup2" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup1" $expectedParentDisplayName = "TestPSGetGroup1" $expectedParentName = "TestPSGetGroup1" $expectedChild0Id = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup3" $expectedChild0DisplayName = "TestPSGetGroup3" $expectedChild0Name = "TestPSGetGroup3" Assert-NotNull $response Assert-NotNull $response.Children Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName Assert-AreEqual $response.ParentName $expectedParentName Assert-AreEqual $response.Children[0].Type $expectedType Assert-AreEqual $response.Children[0].Id $expectedChild0Id Assert-AreEqual $response.Children[0].DisplayName $expectedChild0DisplayName Assert-AreEqual $response.Children[0].Name $expectedChild0Name } function Test-GetManagementGroupWithExpandAndRecurse { New-AzManagementGroup -GroupName TestPSGetGroup1 New-AzManagementGroup -GroupName TestPSGetGroup2 -ParentId "/providers/Microsoft.Management/managementGroups/TestPSGetGroup1" New-AzManagementGroup -GroupName TestPSGetGroup3 -ParentId "/providers/Microsoft.Management/managementGroups/TestPSGetGroup2" New-AzManagementGroup -GroupName TestPSGetGroup4 -ParentId "/providers/Microsoft.Management/managementGroups/TestPSGetGroup3" $response = Get-AzManagementGroup -GroupName TestPSGetGroup2 -Expand -Recurse Remove-AzManagementGroup -GroupName TestPSGetGroup4 Remove-AzManagementGroup -GroupName TestPSGetGroup3 Remove-AzManagementGroup -GroupName TestPSGetGroup2 Remove-AzManagementGroup -GroupName TestPSGetGroup1 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup2" $expectedName = "TestPSGetGroup2" $expectedDisplayName = "TestPSGetGroup2" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup1" $expectedParentDisplayName = "TestPSGetGroup1" $expectedParentName = "TestPSGetGroup1" $expectedChild0Id = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup3" $expectedChild0DisplayName = "TestPSGetGroup3" $expectedChild0Name = "TestPSGetGroup3" $expectedChild0Child0Id = "/providers/Microsoft.Management/managementGroups/TestPSGetGroup4" $expectedChild0Child0DisplayName = "TestPSGetGroup4" $expectedChild0Child0Name = "TestPSGetGroup4" Assert-NotNull $response Assert-NotNull $response.Children Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName Assert-AreEqual $response.ParentName $expectedParentName Assert-AreEqual $response.Children[0].Type $expectedType Assert-AreEqual $response.Children[0].Id $expectedChild0Id Assert-AreEqual $response.Children[0].DisplayName $expectedChild0DisplayName Assert-AreEqual $response.Children[0].Name $expectedChild0Name Assert-AreEqual $response.Children[0].Children[0].Type $expectedType Assert-AreEqual $response.Children[0].Children[0].Id $expectedChild0Child0Id Assert-AreEqual $response.Children[0].Children[0].DisplayName $expectedChild0Child0DisplayName Assert-AreEqual $response.Children[0].Children[0].Name $expectedChild0Child0Name } function Test-NewManagementGroup { $response = New-AzManagementGroup -GroupName TestPSNewGroup Remove-AzManagementGroup -GroupName TestPSNewGroup $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSNewGroup" $expectedName = "TestPSNewGroup" $expectedDisplayName = "TestPSNewGroup" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-NotNull $response.ParentId Assert-NotNull $response.ParentDisplayName } function Test-NewManagementGroupWithDisplayName { $response = New-AzManagementGroup -GroupName TestPSNewGroup2 -DisplayName TestDisplayName Remove-AzManagementGroup -GroupName TestPSNewGroup2 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSNewGroup2" $expectedName = "TestPSNewGroup2" $expectedDisplayName = "TestDisplayName" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-NotNull $response.ParentId Assert-NotNull $response.ParentDisplayName } function Test-NewManagementGroupWithParentId { New-AzManagementGroup -GroupName TestParent5 $response = New-AzManagementGroup -GroupName TestPSNewGroup5 -ParentId /providers/Microsoft.Management/managementGroups/TestParent5 Remove-AzManagementGroup -GroupName TestPSNewGroup5 Remove-AzManagementGroup -GroupName TestParent5 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSNewGroup5" $expectedName = "TestPSNewGroup5" $expectedDisplayName = "TestPSNewGroup5" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestParent5" $expectedParentDisplayName = "TestParent5" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName } function Test-NewManagementGroupWithDisplayNameAndParentId { New-AzManagementGroup -GroupName TestParent4 $response = New-AzManagementGroup -GroupName TestPSGroup4 -DisplayName TestDisplayName -ParentId /providers/Microsoft.Management/managementGroups/TestParent4 Remove-AzManagementGroup -GroupName TestPSGroup4 Remove-AzManagementGroup -GroupName TestParent4 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSGroup4" $expectedName = "TestPSGroup4" $expectedDisplayName = "TestDisplayName" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestParent4" $expectedParentDisplayName = "TestParent4" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName } function Test-UpdateManagementGroupWithDisplayName { New-AzManagementGroup -GroupName TestPSUpdateGroup1 $response = Update-AzManagementGroup -GroupName TestPSUpdateGroup1 -DisplayName TestDisplayName Remove-AzManagementGroup -GroupName TestPSUpdateGroup1 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSUpdateGroup1" $expectedName = "TestPSUpdateGroup1" $expectedDisplayName = "TestDisplayName" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName } function Test-UpdateManagementGroupWithParentId { New-AzManagementGroup -GroupName TestPSUpdateGroupParent2 New-AzManagementGroup -GroupName TestPSUpdateGroup2 $response = Update-AzManagementGroup -GroupName TestPSUpdateGroup2 -ParentId /providers/Microsoft.Management/managementGroups/TestPSUpdateGroupParent2 Remove-AzManagementGroup -GroupName TestPSUpdateGroup2 Remove-AzManagementGroup -GroupName TestPSUpdateGroupParent2 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSUpdateGroup2" $expectedName = "TestPSUpdateGroup2" $expectedDisplayName = "TestPSUpdateGroup2" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestPSUpdateGroupParent2" $expectedParentDisplayName = "TestPSUpdateGroupParent2" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName } function Test-UpdateManagementGroupWithDisplayNameAndParentId { New-AzManagementGroup -GroupName TestPSUpdateGroupParent3 New-AzManagementGroup -GroupName TestPSUpdateGroup3 $response = Update-AzManagementGroup -GroupName TestPSUpdateGroup3 -DisplayName TestDisplayName -ParentId /providers/Microsoft.Management/managementGroups/TestPSUpdateGroupParent3 Remove-AzManagementGroup -GroupName TestPSUpdateGroup3 Remove-AzManagementGroup -GroupName TestPSUpdateGroupParent3 $expectedType = "/providers/Microsoft.Management/managementGroups" $expectedId = "/providers/Microsoft.Management/managementGroups/TestPSUpdateGroup3" $expectedName = "TestPSUpdateGroup3" $expectedDisplayName = "TestDisplayName" $expectedParentId = "/providers/Microsoft.Management/managementGroups/TestPSUpdateGroupParent3" $expectedParentDisplayName = "TestPSUpdateGroupParent3" Assert-AreEqual $response.Type $expectedType Assert-AreEqual $response.Id $expectedId Assert-AreEqual $response.Name $expectedName Assert-AreEqual $response.DisplayName $expectedDisplayName Assert-AreEqual $response.ParentId $expectedParentId Assert-AreEqual $response.ParentDisplayName $expectedParentDisplayName } function Test-RemoveManagementGroup { New-AzManagementGroup -GroupName TestPSRemoveGroup $getresponse = Get-AzManagementGroup -GroupName TestPSRemoveGroup $response = Remove-AzManagementGroup -GroupName TestPSRemoveGroup $getresponse2 = Get-AzManagementGroup -GroupName TestPSRemoveGroup Assert-NotNull $getresponse Assert-Null $getresponse2 Assert-Null $response } function Test-NewRemoveManagementGroupSubscription { New-AzManagementGroup -GroupName TestSubGroup $response1 = New-AzManagementGroupSubscription -GroupName TestSubGroup -SubscriptionId 394ae65d-9e71-4462-930f-3332dedf845c $getresponse = Get-AzManagementGroup -GroupName TestSubGroup -Expand $response2 = Remove-AzManagementGroupSubscription -GroupName TestSubGroup -SubscriptionId 394ae65d-9e71-4462-930f-3332dedf845c $getresponse2 = Get-AzManagementGroup -GroupName TestSubGroup -Expand Remove-AzManagementGroup -GroupName TestSubGroup $expectedType = "/subscriptions" $expectedId = "/subscriptions/394ae65d-9e71-4462-930f-3332dedf845c" $expectedName = "394ae65d-9e71-4462-930f-3332dedf845c" $expectedDisplayName = "Pay-As-You-Go" Assert-AreEqual $getresponse.Children[0].Type $expectedType Assert-AreEqual $getresponse.Children[0].Id $expectedId Assert-AreEqual $getresponse.Children[0].DisplayName $expectedDisplayName Assert-AreEqual $getresponse.Children[0].Name $expectedName Assert-Null $response1 Assert-Null $response2 Assert-Null $getresponse2.Children }
combined_dataset/train/non-malicious/2220.ps1
2220.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [ValidateNotNullOrEmpty()] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Select an option to clean either ExpiredOnly, SupersededOnly or ExpiredSuperseded Software Updates from each Software Update Group")] [ValidateNotNullOrEmpty()] [ValidateSet("ExpiredOnly","SupersededOnly","ExpiredSuperseded")] [string]$Option, [parameter(Mandatory=$false, HelpMessage="Remove the content for those Software Updates that will be removed from a Software Upgrade Group")] [ValidateNotNullOrEmpty()] [switch]$RemoveContent, [parameter(Mandatory=$false, HelpMessage="Show a progressbar displaying the current operation")] [ValidateNotNullOrEmpty()] [switch]$ShowProgress ) Begin { try { Write-Verbose "Determining Site Code for Site server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Verbose -Message "Site Code: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine Site Code" ; break } $ErrorActionPreference = "Stop" if ($PSBoundParameters["ShowProgress"]) { $ProgressCount = 0 } } Process { try { $StartTime = [Diagnostics.Stopwatch]::StartNew() $SUGResults = (Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -ErrorAction SilentlyContinue | Measure-Object).Count if ($SUGResults -ge 1) { switch ($Option) { "ExpiredOnly" { $Query = "SELECT SU.CI_ID FROM SMS_SoftwareUpdate AS SU JOIN SMS_CIRelation AS CIR ON SU.CI_ID = CIR.ToCIID WHERE CIR.RelationType = 1 AND SU.IsExpired = 1 AND SU.IsSuperseded = 0" } "SupersededOnly" { $Query = "SELECT SU.CI_ID FROM SMS_SoftwareUpdate AS SU JOIN SMS_CIRelation AS CIR ON SU.CI_ID = CIR.ToCIID WHERE CIR.RelationType = 1 AND SU.IsExpired = 0 AND SU.IsSuperseded = 1" } "ExpiredSuperseded" { $Query = "SELECT SU.CI_ID FROM SMS_SoftwareUpdate AS SU JOIN SMS_CIRelation AS CIR ON SU.CI_ID = CIR.ToCIID WHERE CIR.RelationType = 1 AND (SU.IsExpired = 1 OR SU.IsSuperseded = 1)" } } try { $RemovableUpdates = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Query $Query -ComputerName $SiteServer -ErrorAction Stop $RemovableUpdatesList = New-Object -TypeName System.Collections.ArrayList foreach ($RemovableUpdate in $RemovableUpdates) { $RemovableUpdatesList.Add($RemovableUpdate.CI_ID) | Out-Null } } catch [System.Exception] { Write-Warning -Message "Unable to determine removable Software Updates from selected option" } $AuthorizationLists = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -ErrorAction Stop foreach ($AuthorizationList in $AuthorizationLists) { Write-Verbose -Message "Start processing '$($AuthorizationList.LocalizedDisplayName)'" if ($PSBoundParameters["ShowProgress"]) { $ProgressCount++ } Write-Progress -Activity "Processing Software Updates Groups" -Id 1 -Status "$($ProgressCount) / $($SUGResults)" -CurrentOperation "Current Software Update Group: '$($AuthorizationList.LocalizedDisplayName)'" -PercentComplete (($ProgressCount / $SUGResults) * 100) $AuthorizationList = [wmi]"$($AuthorizationList.__PATH)" $UpdatesCount = $AuthorizationList.Updates.Count $UpdatesList = New-Object -TypeName System.Collections.ArrayList $RemovedUpdatesList = New-Object -TypeName System.Collections.ArrayList foreach ($Update in ($AuthorizationList.Updates)) { if ($Update -notin $RemovableUpdatesList) { $UpdatesList.Add($Update) | Out-Null } else { $RemovedUpdatesList.Add($Update) | Out-Null } } if ($UpdatesCount -gt $UpdatesList.Count) { try { if ($PSCmdlet.ShouldProcess("$($AuthorizationList.LocalizedDisplayName)","Clean '$($UpdatesCount - ($UpdatesList.Count))' updates")) { if ($UpdatesList.Count -ge 1) { $AuthorizationList.Updates = $UpdatesList $AuthorizationList.Put() | Out-Null Write-Verbose -Message "Successfully cleaned up $($UpdatesCount - ($UpdatesList.Count)) updates from '$($AuthorizationList.LocalizedDisplayName)'" } else { $AuthorizationList.Updates = @() $AuthorizationList.Put() | Out-Null Write-Verbose -Message "Successfully cleaned up all updates from '$($AuthorizationList.LocalizedDisplayName)'" } } if ($PSBoundParameters["RemoveContent"]) { try { $DeploymentPackageList = New-Object -TypeName System.Collections.ArrayList foreach ($CI_ID in $RemovedUpdatesList) { Write-Verbose -Message "Collecting content data for CI_ID: $($CI_ID)" $ContentQuery = "SELECT SMS_PackageToContent.ContentID,SMS_PackageToContent.PackageID from SMS_PackageToContent JOIN SMS_CIToContent ON SMS_CIToContent.ContentID = SMS_PackageToContent.ContentID WHERE SMS_CIToContent.CI_ID IN ($($CI_ID))" $ContentData = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Query $ContentQuery -ComputerName $SiteServer -ErrorAction Stop Write-Verbose -Message "Found '$(($ContentData | Measure-Object).Count)' objects" foreach ($Content in $ContentData) { $ContentID = $Content | Select-Object -ExpandProperty ContentID $PackageID = $Content | Select-Object -ExpandProperty PackageID $DeploymentPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($PackageID)'" if ($DeploymentPackage.PackageID -notin $DeploymentPackageList) { $DeploymentPackageList.Add($DeploymentPackage.PackageID) | Out-Null } if ($PSCmdlet.ShouldProcess("$($PackageID)","Remove ContentID '$($ContentID)'")) { Write-Verbose -Message "Attempting to remove ContentID '$($ContentID)' from PackageID '$($PackageID)'" $ReturnValue = $DeploymentPackage.RemoveContent($ContentID, $false) if ($ReturnValue.ReturnValue -eq 0) { Write-Verbose -Message "Successfully removed ContentID '$($ContentID)' from PackageID '$($PackageID)'" } } } } } catch [Exception] { Write-Warning -Message "An error occured when attempting to remove ContentID '$($ContentID)' from '$($PackageID)'" } } } catch [Exception] { Write-Warning -Message "Unable to save changes to '$($AuthorizationList.LocalizedDisplayName)'" ; break } } else { Write-Verbose -Message "No changes detected, will not update '$($AuthorizationList.LocalizedDisplayName)'" } if (($DeploymentPackageList.Count -ge 1) -and ($PSBoundParameters["RemoveContent"])) { foreach ($DPackageID in $DeploymentPackageList) { if ($PSCmdlet.ShouldProcess("$($DPackageID)","Refresh content source")) { $DPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($DPackageID)'" Write-Verbose -Message "Attempting to refresh content source for Deployment Package '$($DPackage.Name)'" $ReturnValue = $DPackage.RefreshPkgSource() if ($ReturnValue.ReturnValue -eq 0) { Write-Verbose -Message "Successfully refreshed content source for Deployment Package '$($DPackage.Name)'" } } } } } } else { Write-Warning -Message "Unable to locate any Software Update Groups" } } catch [Exception] { Write-Error -Message $_.Exception.Message } } End { $ErrorActionPreference = "Continue" if ($PSBoundParameters["ShowProgress"]) { Write-Progress -Activity "Processing Software Update Groups" -Completed -ErrorAction SilentlyContinue } $StartTime.Stop() Write-Verbose -Message "Script execution: $($StartTime.Elapsed.Minutes) min and $($StartTime.Elapsed.Seconds) seconds" }
combined_dataset/train/non-malicious/New-FilesystemHardLink.p.ps1
New-FilesystemHardLink.p.ps1
##############################################################################\n##\n## New-FileSystemHardLink\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nCreate a new hard link, which allows you to create a new name by which you\ncan access an existing file. Windows only deletes the actual file once\nyou delete all hard links that point to it.\n\n.EXAMPLE\n\nPS >"Hello" > test.txt\nPS >dir test* | select name\n\nName\n----\ntest.txt\n\nPS >.\\New-FilesystemHardLink.ps1 test.txt test2.txt\nPS >type test2.txt\nHello\nPS >dir test* | select name\n\nName\n----\ntest.txt\ntest2.txt\n\n#>\n\nparam(\n ## The existing file that you want the new name to point to\n [string] $Path,\n\n ## The new filename you want to create\n [string] $Destination\n)\n\nSet-StrictMode -Version Latest\n\n## Ensure that the provided names are absolute paths\n$filename = $executionContext.SessionState.`\n Path.GetUnresolvedProviderPathFromPSPath($destination)\n$existingFilename = Resolve-Path $path\n\n## Prepare the parameter types and parameters for the CreateHardLink function\n$parameterTypes = [string], [string], [IntPtr]\n$parameters = [string] $filename, [string] $existingFilename, [IntPtr]::Zero\n\n## Call the CreateHardLink method in the Kernel32 DLL\n$currentDirectory = Split-Path $myInvocation.MyCommand.Path\n$invokeWindowsApiCommand = Join-Path $currentDirectory Invoke-WindowsApi.ps1\n$result = & $invokeWindowsApiCommand "kernel32" `\n ([bool]) "CreateHardLink" $parameterTypes $parameters\n\n## Provide an error message if the call fails\nif(-not $result)\n{\n $message = "Could not create hard link of $filename to " +\n "existing file $existingFilename"\n Write-Error $message\n}
combined_dataset/train/non-malicious/Backup Hyper-V VMs.ps1
Backup Hyper-V VMs.ps1
# Directions for use: # Import this script using the Import-Module cmdlet # All output is logged to the backup directory in the $($BackupDriveLetter):\\VMBackup\\Backup-VMs.log file # Use the Backup-VMs cmdlet to begin the process # Parameter BackupDriveLetter indicates the drive to put this backup onto. It must be mounted to the host running the script. # Parameter VMHost defines the host that contains the VMs you want to back up. If it's blank, then it just targets the host the script is running on # Parameter VMNames defines the specific VMs you wish to backup, otherwise it'll back up all of them on the target host # Switch parameter ShutHostDownWhenFinished will cause the specified host (and any VMs running on it) to shut down upon completion of the backup # Example: # PS> Import-Module D:\\Backup-VMs.ps1 # PS> Backup-VMs -BackupDriveLetter F -VMHost HyperVHost -VMNames mydevmachine,broker77 # ---------------------------------------------------------------------------- # Note that this script requires administrator privileges for proper execution # ---------------------------------------------------------------------------- # Note that this script requires the following: # # PowerShell Management Library for Hyper-V (for the Get-VM and Export-VM cmdlets) # This installs itself wherever you downloaded it - make sure the HyperV folder finds its way to somewhere in $env:PSModulePath # http://pshyperv.codeplex.com/downloads/get/219013 # # Windows PowerShell Pack (for the Copy-ToZip cmdlet) # This installs to $home\\Documents\\WindowsPowerShell\\Modules, make sure that this path is in $env:PSModulePath # http://archive.msdn.microsoft.com/PowerShellPack/Release/ProjectReleases.aspx?ReleaseId=3341 # our one global variable is for logging $Logfile = "" Function Backup-VMs { [CmdletBinding(SupportsShouldProcess=$True)] Param( [parameter(Mandatory = $true)] [string]$BackupDriveLetter, # $BackupDriveLetter:\\VMBackups\\$backupDate [ValidateNotNullOrEmpty()] [string]$VMHost, # the host that holds the vms we wish to back up, otherwise the one running the script [string[]]$VMNames, # if not specified, back up all of them [switch]$ShutHostDownWhenFinished # when set, shuts down the target host, including any vms on it ) process { # first, run a bunch of checks #region checks # check if the PowerShellPack modules are loaded $isPowerShellPackLoaded = Get-Module -Name PowerShellPack if (!$isPowerShellPackLoaded) { Write-Host "Attempting to load PowerShellPack modules..." Import-Module -Name PowerShellPack $isPowerShellPackLoaded = Get-Module -Name PowerShellPack if (!$isPowerShellPackLoaded) { Write-Host -ForegroundColor Red "Cannot load PowerShellPack module - terminating backup script." Break } } # check if the HyperV module is loaded $isHyperVModuleLoaded = Get-Module -Name HyperV if (!$isHyperVModuleLoaded) { Write-Host "Attempting to load HyperV module..." Import-Module -Name HyperV $isHyperVModuleLoaded = Get-Module -Name HyperV if (!$isHyperVModuleLoaded) { Write-Host -ForegroundColor Red "Cannot load HyperV module - terminating backup script." Break } } # sanitize user input (F: will become F) if ($BackupDriveLetter -like "*:") { $BackupDriveLetter = $BackupDriveLetter -replace ".$" } # check to make sure the user specified a valid backup location if ((Test-Path "$($BackupDriveLetter):") -eq $false) { Write-Host -ForegroundColor Red "Drive $($BackupDriveLetter): does not exist - terminating backup script." Break } # if host was not speicified, use the host running the script if ($VMHost -eq "") { $VMHost = Hostname } # check to make sure the specified host is a vmhost if (!(Get-VMHost) -icontains $VMHost) { Write-Host -ForegroundColor Red "Host $($VMHost) is not listed in Get-VMHost - terminating backup script." Break } # check to make sure the specified host has any vms to back up if (!(Get-VM -Server $VMHost)) { Write-Host -ForegroundColor Red "Host $($VMHost) does not appear to have any VMs running on it according to 'Get-VM -Server $($VMHost)'." Write-Host -ForegroundColor Yellow "This can be occur if PowerShell is not running with elevated privileges." Write-Host -ForegroundColor Yellow "Please make sure that you are running PowerShell with Administrator privileges and try again." Write-Host -ForegroundColor Red "Terminating backup script." Break } #endregion #region directory business # make our parent directory if needed if ((Test-Path "$($BackupDriveLetter):\\VMBackup") -eq $false) { $parentDir = New-Item -Path "$($BackupDriveLetter):\\VMBackup" -ItemType "directory" if ((Test-Path $parentDir) -eq $false) { Write-Host -ForegroundColor Red "Problem creating $parentDir - terminating backup script." Break } } # initialize our logfile $Logfile = "$($BackupDriveLetter):\\VMBackup\\Backup-VMs.log" if ((Test-Path $Logfile) -eq $false) { $newFile = New-Item -Path $Logfile -ItemType "file" if ((Test-Path $Logfile) -eq $false) { Write-Host -ForegroundColor Red "Problem creating $Logfile - terminating backup script." Break } } $backupDate = Get-Date -Format "yyyy-MM-dd" $destDir = "$($BackupDriveLetter):\\VMBackup\\$backupDate-$VMHost-backup\\" # make our backup directory if needed if ((Test-Path $destDir) -eq $false) { $childDir = New-Item -Path $destDir -ItemType "directory" if ((Test-Path $childDir) -eq $false) { Write-Host -ForegroundColor Red "Problem creating $childDir - terminating backup script." Break } } #endregion Add-content -LiteralPath $Logfile -value "===================================================================================================" Add-content -LiteralPath $Logfile -value "===================================================================================================" # now that our checks are done, start backing up T -text "Starting Hyper-V virtual machine backup for host $VMHost at:" $dateTimeStart = date T -text "$($dateTimeStart)" T -text "" # export the vms to the destination ExportMyVms -VMHost $VMHost -Destination $destDir -VMNames $VMNames T -text "" T -text "Exporting finished" #region compression # get what we just backed up $sourceDirectory = Get-ChildItem $destDir if ($sourceDirectory) { # get the total size of all of the files we just backed up $sourceDirSize = Get-ChildItem $destDir -Recurse | Measure-Object -property length -sum -ErrorAction SilentlyContinue $sourceDirSize = ($sourceDirSize.sum / 1GB) # get how much free space is left on our backup drive $hostname = Hostname $backupDrive = Get-WmiObject win32_logicaldisk -ComputerName $hostname | Where-Object { $_.DeviceID -eq "$($BackupDriveLetter):" } $backupDriveFreeSpace = ($backupDrive.FreeSpace / 1GB) # tell the user what we've found $formattedBackupDriveFreeSpace = "{0:N2}" -f $backupDriveFreeSpace $formattedSourceDirSize = "{0:N2}" -f $sourceDirSize T -text "Checking free space for compression:" T -text "Drive $($BackupDriveLetter): has $formattedBackupDriveFreeSpace GB free on it, this backup took $formattedSourceDirSize GB" # check if we need to make any room for the next backup $downToOne = $false while (!$downToOne -and $sourceDirSize > $backupDriveFreeSpace) { # clear out the oldest backup if this is the case $backups = Get-ChildItem -Path "$($BackupDriveLetter):\\VMBackup\\" -include "*-backup.zip" -recurse -name $backups = [array]$backups | Sort-Object # make sure we aren't deleting the only directory! if ($backups.length -gt 1) { T -text "Removing the oldest backup [$($backups[0])] to clear up some more room" Remove-Item "$($BackupDriveLetter):\\VMBackup\\$($backups[0])" -Recurse -Force # now check again $backupDrive = Get-WmiObject win32_logicaldisk -ComputerName $hostname | Where-Object { $_.DeviceID -eq "$($BackupDriveLetter):" } $backupDriveFreeSpace = ($backupDrive.FreeSpace / 1GB) $formattedBackupDriveFreeSpace = "{0:N2}" -f $backupDriveFreeSpace T -text "Now we have $formattedBackupDriveFreeSpace GB of room" } else { # we're down to just one backup left, don't delete it! $downToOne = $true } } T -text "Compressing the backup..." # zip up everything we just did ZipFolder -directory $destDir -VMHost $VMHost $zipFileName = $destDir -replace ".$" $zipFileName = $zipFileName + ".zip" T -text "Backup [$($zipFileName)] created successfully" $destZipFileSize = (Get-ChildItem $zipFileName).Length / 1GB $formattedDestSize = "{0:N2}" -f $destZipFileSize T -text "Uncompressed size:`t$formattedSourceDirSize GB" T -text "Compressed size: `t$formattedDestSize GB" } #endregion # delete the non-compressed directory, leaving just the compressed one Remove-Item $destDir -Recurse -Force T -text "" T -text "Finished backup of $VMHost at:" $dateTimeEnd = date T -text "$($dateTimeEnd)" $length = ($dateTimeEnd - $dateTimeStart).TotalMinutes $length = "{0:N2}" -f $length T -text "The operation took $length minutes" if ($ShutHostDownWhenFinished -eq $true) { T -text "Attempting to shut down host machine $VMHost" ShutdownTheHost -HostToShutDown $VMHost } } } ## this function will shut down any vms running on the host executing this script and then shut down said host Function ShutdownTheHost { [CmdletBinding(SupportsShouldProcess=$True)] Param( [string]$HostToShutDown ) process { ## Get a list of all VMs on $HostToShutDown $VMs = Get-VM -Server $HostToShutDown ## only run through the list if there's anything in it if ($VMs) { ## For each VM on Node, Save (if necessary), Export and Restore (if necessary) foreach ($VM in @($VMs)) { $VMName = $VM.ElementName $summofvm = get-vmsummary $VMName $summhb = $summofvm.heartbeat $summes = $summofvm.enabledstate ## Shutdown the VM if HeartBeat Service responds if ($summhb -eq "OK") { T -text "" T -text "HeartBeat Service for $VMName is responding $summhb, saving the machine state" Save-VM -VM $VMName -Server $VMHost -Force -Wait } ## Checks to see if the VM is already stopped elseif (($summes -eq "Stopped") -or ($summes -eq "Suspended")) { T -text "" T -text "$VMName is $summes" } ## If the HeartBeat service is not OK, aborting this VM elseif ($summhb -ne "OK" -and $summes -ne "Stopped") { T -text T -text "HeartBeat Service for $VMName is responding $summhb. Aborting save state." } } T -text "All VMs on $HostToShutDown shut down or suspended." } T -text "Shutting down machine $HostToShutDown..." Stop-Computer -ComputerName $HostToShutDown } } ## the following three functions relating to zipping up a folder come from Jeremy Jameson ## http://www.technologytoolbox.com/blog/jjameson/archive/2012/02/28/zip-a-folder-using-powershell.aspx ## I have modified his approach to suit the multi-gigabyte files we'll be dealing with function IsFileLocked( [string] $path) { [bool] $fileExists = Test-Path $path If ($fileExists -eq $false) { Throw "File does not exist (" + $path + ")" } [bool] $isFileLocked = $true $file = $null Try { $file = [IO.File]::Open( $path, [IO.FileMode]::Open, [IO.FileAccess]::Read, [IO.FileShare]::None) $isFileLocked = $false } Catch [IO.IOException] { If ($_.Exception.Message.EndsWith("it is being used by another process.") -eq $false) { Throw $_.Exception } } Finally { If ($file -ne $null) { $file.Close() } } return $isFileLocked } function WaitForZipOperationToFinish( [__ComObject] $zipFile, [int] $expectedNumberOfItemsInZipFile) { T -text "Waiting for zip operation to finish on $($zipFile.Self.Path)..." Start-Sleep -Seconds 5 # ensure zip operation had time to start # wait for the operation to finish # the folder is locked while we're zipping stuff up [bool] $isFileLocked = IsFileLocked($zipFile.Self.Path) while($isFileLocked) { Write-Host -NoNewLine "." Start-Sleep -Seconds 5 $isFileLocked = IsFileLocked($zipFile.Self.Path) } T -text "" } function ZipFolder( [IO.DirectoryInfo] $directory) { $backupFullName = $directory.FullName T -text ("Creating zip file for folder ($backupFullName)...") [IO.DirectoryInfo] $parentDir = $directory.Parent [string] $zipFileName If ($parentDir.FullName.EndsWith("\\") -eq $true) { # e.g. $parentDir = "C:\\" $zipFileName = $parentDir.FullName + $directory.Name + ".zip" } Else { $zipFileName = $parentDir.FullName + "\\" + $directory.Name + ".zip" } Set-Content $zipFileName ("PK" + [char]5 + [char]6 + ("$([char]0)" * 18)) $shellApp = New-Object -ComObject Shell.Application $zipFile = $shellApp.NameSpace($zipFileName) If ($zipFile -eq $null) { T -text "Failed to get zip file object." } [int] $expectedCount = (Get-ChildItem $directory -Force -Recurse).Count $expectedCount += 1 # account for the top-level folder T -text "Copying $expectedCount items into file $zipFileName..." $zipFile.CopyHere($directory.FullName) # wait for CopyHere operation to complete WaitForZipOperationToFinish $zipFile $expectedCount T -text "Successfully created zip file for folder ($backupFullName)." } ## Powershell Script to Shutdown and Export Hyper-V 2008 R2 VMs, one at a time. ## Written by Stan Czerno ## http://www.czerno.com/default.asp?inc=/html/windows/hyperv/cluster/HyperV_Export_VMs.asp ## I have modified his approach to suit our purposes Function ExportMyVms { [CmdletBinding(SupportsShouldProcess=$True)] Param( [string]$Destination, [string[]]$VMNames, [string]$VMHost ) process { ## The script requires the PowerShell Management Library for Hyper-V for it to work. ## The PowerShell Management Library for Hyper-V can be downloaded at http://pshyperv.codeplex.com/ ## Be sure to read the documentation before using: ## http://pshyperv.codeplex.com/releases/view/62842 ## http://pshyperv.codeplex.com/releases/view/38769 ## This is how I backup the VMs on my Two-Node Hyper-V Cluster. I can afford for my servers to be down while this is done and ## some of my other resources are clustered so there is minimum down time. ## I also do System State Backups, Exchange Backups and SQL Backups in addition. ## This script can be used on a Stand-Alone Hyper-V Server as well. ## Let me know if you have a better way of doing this as I am not a very good developer and new to Powershell. ## Get a list of all VMs on Node if ($VMNames) { if (($VMNames.Length) -gt 1) { # pass in a multiple-element string array directly $VMs = Get-VM -Name $VMNames -Server $VMHost } else { # turn a single-element string array back into a string $VMNames = [string]$VMNames $VMs = Get-VM -Name "$VMNames" -Server $VMHost } } else { $VMs = Get-VM -Server $VMHost } ## only run through the list if there's anything in it if ($VMs) { foreach ($VM in @($VMs)) { $listOfVmNames += $VM.ElementName + ", " } $listOfVmNames = $listOfVmNames -replace "..$" T -text "Attempting to backup the following VMs:" T -text "$listOfVmNames" T -text "" Write-Host "Do not cancel the export process as it may cause unpredictable VM behavior" -ForegroundColor Yellow ## For each VM on Node, Save (if necessary), Export and Restore (if necessary) foreach ($VM in @($VMs)) { $VMName = $VM.ElementName $summofvm = get-vmsummary $VMName $summhb = $summofvm.heartbeat $summes = $summofvm.enabledstate $restartWhenDone = $false $doexport = "no" ## Shutdown the VM if HeartBeat Service responds if ($summhb -eq "OK") { $doexport = "yes" T -text "" T -text "HeartBeat Service for $VMName is responding $summhb, saving the machine state" $restartWhenDone = $true Save-VM -VM $VMName -Server $VMHost -Force -Wait } ## Checks to see if the VM is already stopped elseif (($summes -eq "Stopped") -or ($summes -eq "Suspended")) { $doexport = "yes" T -text "" T -text "$VMName is $summes, starting export" } ## If the HeartBeat service is not OK, aborting this VM elseif ($summhb -ne "OK" -and $summes -ne "Stopped") { $doexport = "no" T -text T -text "HeartBeat Service for $VMName is responding $summhb. Save state and export aborted for $VMName" } $i = 1 if ($doexport -eq "yes") { $VMState = get-vmsummary $VMName $VMEnabledState = $VMState.enabledstate if ($VMEnabledState -eq "Suspended" -or $VMEnabledState -eq "Stopped") { ## If a folder already exists for the current VM, delete it. if ([IO.Directory]::Exists("$($Destination)\\$($VMName)")) { [IO.Directory]::Delete("$($Destination)\\$($VMName)", $True) } T -text "Exporting $VMName" ## Begin export of the VM export-vm -VM $VMName -Server $VMHost -path $Destination -CopyState -Wait -Force -ErrorAction SilentlyContinue ## check to ensure the export succeeded $exportedCount = (Get-ChildItem $Destination -Force -Recurse).Count ## there should be way more than 5 elements in the destination - this is to account for empty folders if ($exportedCount -lt 5) { T -text "***** Automated export failed for $VMName *****" T -text "***** Manual export advised *****" } if ($restartWhenDone) { T -text "Restarting $VMName..." ## Start the VM and wait for a Heartbeat with a 5 minute time-out Start-VM $VMName -HeartBeatTimeOut 300 -Wait } } else { T -text "Could not properly save state on VM $VMName, skipping this one and moving on." } } } } else { T -text "No VMs found to back up." } } } ## This is just a hand-made wrapper function that mimics the Tee-Object cmdlet with less fuss ## Plus, it makes our log file prettier Function T { [CmdletBinding(SupportsShouldProcess=$True)] Param( [string]$text ) process { Write-Host "$text" $now = date $text = "$now`t: $text" Add-content -LiteralPath $Logfile -value $text } }
combined_dataset/train/non-malicious/1835.ps1
1835.ps1
try { $defaultParamValues = $PSdefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = !$IsWindows Describe "Basic Registry Provider Tests" -Tags @("CI", "RequireAdminOnWindows") { BeforeAll { if ($IsWindows) { $restoreLocation = Get-Location $registryBase = "HKLM:\software\Microsoft\PowerShell\3\" $parentKey = "TestKeyThatWillNotConflict" $testKey = "TestKey" $testKey2 = "TestKey2" $testPropertyName = "TestEntry" $testPropertyValue = 1 $defaultPropertyName = "(Default)" $defaultPropertyValue = "something" $otherPropertyValue = "other" } } AfterAll { if ($IsWindows) { Set-Location -Path $restoreLocation } } BeforeEach { if ($IsWindows) { Set-Location $registryBase New-Item -Path $parentKey > $null Set-Location $parentKey New-Item -Path $testKey > $null New-Item -Path $testKey2 > $null New-ItemProperty -Path $testKey -Name $testPropertyName -Value $testPropertyValue > $null } } AfterEach { if ($IsWindows) { Set-Location $registryBase Remove-Item -Path $parentKey -Recurse -Force -ErrorAction SilentlyContinue } } Context "Validate basic registry provider Cmdlets" { It "Verify Test-Path" { Test-Path -IsValid Registry::HKCU/Software | Should -BeTrue Test-Path -IsValid Registry::foo/Softare | Should -BeFalse } It "Verify Get-Item" { $item = Get-Item $testKey $item.PSChildName | Should -BeExactly $testKey } It "Verify Get-Item on inaccessible path" { { Get-Item HKLM:\SAM\SAM -ErrorAction Stop } | Should -Throw -ErrorId "System.Security.SecurityException,Microsoft.PowerShell.Commands.GetItemCommand" } It "Verify Get-ChildItem" { $items = Get-ChildItem $items.Count | Should -BeExactly 2 $Items.PSChildName -contains $testKey | Should -BeTrue $Items.PSChildName -contains $testKey2 | Should -BeTrue } It "Verify Get-ChildItem can get subkey names" { $items = Get-ChildItem -Name $items.Count | Should -BeExactly 2 $items -contains $testKey | Should -BeTrue $items -contains $testKey2 | Should -BeTrue } It "Verify New-Item" { $newKey = New-Item -Path "NewItemTest" Test-Path "NewItemTest" | Should -BeTrue Split-Path $newKey.Name -Leaf | Should -BeExactly "NewItemTest" } It "Verify Copy-Item" { $copyKey = Copy-Item -Path $testKey -Destination "CopiedKey" -PassThru Test-Path "CopiedKey" | Should -BeTrue Split-Path $copyKey.Name -Leaf | Should -BeExactly "CopiedKey" } It "Verify Move-Item" { $movedKey = Move-Item -Path $testKey -Destination "MovedKey" -PassThru Test-Path "MovedKey" | Should -BeTrue Split-Path $movedKey.Name -Leaf | Should -BeExactly "MovedKey" } It "Verify Rename-Item" { $existBefore = Test-Path $testKey $renamedKey = Rename-Item -path $testKey -NewName "RenamedKey" -PassThru $existAfter = Test-Path $testKey $existBefore | Should -BeTrue $existAfter | Should -BeFalse Test-Path "RenamedKey" | Should -BeTrue Split-Path $renamedKey.Name -Leaf | Should -BeExactly "RenamedKey" } } Context "Valdiate basic registry property Cmdlets" { It "Verify New-ItemProperty" { New-ItemProperty -Path $testKey -Name "NewTestEntry" -Value 99 > $null $property = Get-ItemProperty -Path $testKey -Name "NewTestEntry" $property.NewTestEntry | Should -Be 99 $property.PSChildName | Should -BeExactly $testKey } It "Verify Set-ItemProperty" { Set-ItemProperty -Path $testKey -Name $testPropertyName -Value 2 $property = Get-ItemProperty -Path $testKey -Name $testPropertyName $property."$testPropertyName" | Should -Be 2 } It "Verify Set-Item" { Set-Item -Path $testKey -Value $defaultPropertyValue $property = Get-ItemProperty -Path $testKey -Name $defaultPropertyName $property."$defaultPropertyName" | Should -BeExactly $defaultPropertyValue } It "Verify Set-Item with -WhatIf" { Set-Item -Path $testKey -Value $defaultPropertyValue Set-Item -Path $testKey -Value $otherPropertyValue -WhatIf $property = Get-ItemProperty -Path $testKey -Name $defaultPropertyName $property."$defaultPropertyName" | Should -BeExactly $defaultPropertyValue } It "Verify Get-ItemPropertyValue" { $propertyValue = Get-ItemPropertyValue -Path $testKey -Name $testPropertyName $propertyValue | Should -Be $testPropertyValue } It "Verify Copy-ItemProperty" { Copy-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction SilentlyContinue $property2."$testPropertyName" | Should -BeExactly $property1."$testPropertyName" $property1.PSChildName | Should -BeExactly $testKey $property2.PSChildName | Should -BeExactly $testKey2 } It "Verify Move-ItemProperty" { Move-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction SilentlyContinue $property1 | Should -BeNullOrEmpty $property2."$testPropertyName" | Should -BeExactly $testPropertyValue $property2.PSChildName | Should -BeExactly $testKey2 } It "Verify Rename-ItemProperty" { Rename-ItemProperty -Path $testKey -Name $testPropertyName -NewName "RenamedProperty" $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey -Name "RenamedProperty" -ErrorAction SilentlyContinue $property1 | Should -BeNullOrEmpty $property2.RenamedProperty | Should -BeExactly $testPropertyValue $property2.PSChildName | Should -BeExactly $testKey } It "Verify Clear-ItemProperty" { Clear-ItemProperty -Path $testKey -Name $testPropertyName $property = Get-ItemProperty -Path $testKey -Name $testPropertyName $property."$testPropertyName" | Should -Be 0 } It "Verify Clear-Item" { Set-ItemProperty -Path $testKey -Name $testPropertyName -Value $testPropertyValue Set-Item -Path $testKey -Value $defaultPropertyValue Clear-Item -Path $testKey $key = Get-Item -Path $testKey $key.Property.Length | Should -BeExactly 0 } It "Verify Clear-Item with -WhatIf" { Set-ItemProperty -Path $testKey -Name $testPropertyName -Value $testPropertyValue Set-Item -Path $testKey -Value $defaultPropertyValue Clear-Item -Path $testKey -WhatIf $key = Get-Item -Path $testKey $key.Property.Length | Should -BeExactly 2 } It "Verify Remove-ItemProperty" { Remove-ItemProperty -Path $testKey -Name $testPropertyName $properties = @(Get-ItemProperty -Path $testKey) $properties.Count | Should -Be 0 } } } Describe "Extended Registry Provider Tests" -Tags @("Feature", "RequireAdminOnWindows") { BeforeAll { if ($IsWindows) { $restoreLocation = Get-Location $registryBase = "HKLM:\software\Microsoft\PowerShell\3\" $parentKey = "TestKeyThatWillNotConflict" $testKey = "TestKey" $testKey2 = "TestKey2" $testPropertyName = "TestEntry" $testPropertyValue = 1 } } AfterAll { if ($IsWindows) { Set-Location -Path $restoreLocation } } BeforeEach { if ($IsWindows) { Set-Location $registryBase New-Item -Path $parentKey > $null Set-Location $parentKey New-Item -Path $testKey > $null New-Item -Path $testKey2 > $null New-ItemProperty -Path $testKey -Name $testPropertyName -Value $testPropertyValue > $null New-ItemProperty -Path $testKey2 -Name $testPropertyName -Value $testPropertyValue > $null } } AfterEach { if ($IsWindows) { Set-Location $registryBase Remove-Item -Path $parentKey -Recurse -Force -ErrorAction SilentlyContinue } } Context "Valdiate New-ItemProperty Parameters" { BeforeEach { Remove-ItemProperty -Path $testKey -Name $testPropertyName -Force -ErrorAction SilentlyContinue Remove-ItemProperty -Path $testKey2 -Name $testPropertyName -Force -ErrorAction SilentlyContinue } It "Verify Filter" { { $result = New-ItemProperty -Path ".\*" -Filter "Test*" -Name $testPropertyName -Value $testPropertyValue -ErrorAction Stop } | Should -Throw -ErrorId "NotSupported,Microsoft.PowerShell.Commands.NewItemPropertyCommand" } It "Verify Include" { $result = New-ItemProperty -Path ".\*" -Include "*2" -Name $testPropertyName -Value $testPropertyValue $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey2 } It "Verify Exclude" { $result = New-ItemProperty -Path ".\*" -Exclude "*2" -Name $testPropertyName -Value $testPropertyValue $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey } It "Verify Confirm can be bypassed" { $result = New-ItemProperty -Path $testKey -Name $testPropertyName -Value $testPropertyValue -force -Confirm:$false $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey } It "Verify WhatIf" { $result = New-ItemProperty -Path $testKey -Name $testPropertyName -Value $testPropertyValue -whatif $result | Should -BeNullOrEmpty } } Context "Valdiate Get-ItemProperty Parameters" { It "Verify Name" { $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey } It "Verify Path but no Name" { $result = Get-ItemProperty -Path $testKey $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey } It "Verify Filter" { { $result = Get-ItemProperty -Path ".\*" -Filter "*Test*" -ErrorAction Stop } | Should -Throw -ErrorId "NotSupported,Microsoft.PowerShell.Commands.GetItemPropertyCommand" } It "Verify Include" { $result = Get-ItemProperty -Path ".\*" -Include "*2" $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey2 } It "Verify Exclude" { $result = Get-ItemProperty -Path ".\*" -Exclude "*2" $result."$testPropertyName" | Should -Be $testPropertyValue $result.PSChildName | Should -BeExactly $testKey } } Context "Valdiate Get-ItemPropertyValue Parameters" { It "Verify Name" { $result = Get-ItemPropertyValue -Path $testKey -Name $testPropertyName $result | Should -Be $testPropertyValue } } Context "Valdiate Set-ItemPropertyValue Parameters" { BeforeAll { $newPropertyValue = 2 } It "Verify Name" { Set-ItemProperty -Path $testKey -Name $testPropertyName -Value $newPropertyValue $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $newPropertyValue } It "Verify PassThru" { $result = Set-ItemProperty -Path $testKey -Name $testPropertyName -Value $newPropertyValue -PassThru $result."$testPropertyName" | Should -Be $newPropertyValue } It "Verify Piped Default Parameter" { $prop = Get-ItemProperty -Path $testKey -Name $testPropertyName $prop | Set-ItemProperty -Name $testPropertyName -Value $newPropertyValue $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $newPropertyValue } It "Verify WhatIf" { $result = Set-ItemProperty -Path $testKey -Name $testPropertyName -Value $newPropertyValue -PassThru -WhatIf $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $testPropertyValue } It "Verify Confirm can be bypassed" { $result = Set-ItemProperty -Path $testKey -Name $testPropertyName -Value $newPropertyValue -PassThru -Confirm:$false $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $newPropertyValue } } Context "Valdiate Copy-ItemProperty Parameters" { BeforeEach { Remove-ItemProperty -Path $testKey2 -Name $testPropertyName -Force -ErrorAction SilentlyContinue } It "Verify PassThru" { $property1 = Copy-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 -PassThru $property2 = Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction SilentlyContinue $property2."$testPropertyName" | Should -Be $property1."$testPropertyName" $property1.PSChildName | Should -BeExactly $testKey $property2.PSChildName | Should -BeExactly $testKey2 } It "Verify Confirm can be bypassed" { Copy-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 -Confirm:$false $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction SilentlyContinue $property2."$testPropertyName" | Should -Be $property1."$testPropertyName" $property1.PSChildName | Should -BeExactly $testKey $property2.PSChildName | Should -BeExactly $testKey2 } It "Verify WhatIf" { Copy-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 -WhatIf { Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction Stop } | Should -Throw -ErrorId "System.Management.Automation.PSArgumentException,Microsoft.PowerShell.Commands.GetItemPropertyCommand" } } Context "Valdiate Move-ItemProperty Parameters" { BeforeEach { Remove-ItemProperty -Path $testKey2 -Name $testPropertyName -Force -ErrorAction SilentlyContinue } It "Verify PassThru" { $property2 = Move-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 -PassThru $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property1 | Should -BeNullOrEmpty $property2."$testPropertyName" | Should -Be $testPropertyValue $property2.PSChildName | Should -BeExactly $testKey2 } It "Verify Confirm can be bypassed" { Move-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 -Confirm:$false $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction SilentlyContinue $property1 | Should -BeNullOrEmpty $property2."$testPropertyName" | Should -Be $testPropertyValue $property2.PSChildName | Should -BeExactly $testKey2 } It "Verify WhatIf" { Move-ItemProperty -Path $testKey -Name $testPropertyName -Destination $testKey2 -WhatIf $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey2 -Name $testPropertyName -ErrorAction SilentlyContinue $property1."$testPropertyName" | Should -Be $testPropertyValue $property1.PSChildName | Should -BeExactly $testKey $property2 | Should -BeNullOrEmpty } } Context "Valdiate Rename-ItemProperty Parameters" { BeforeAll { $newPropertyName = "NewEntry" } It "Verify Confirm can be bypassed" { Rename-ItemProperty -Path $testKey -Name $testPropertyName -NewName $newPropertyName -Confirm:$false $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey -Name $newPropertyName -ErrorAction SilentlyContinue $property1 | Should -BeNullOrEmpty $property2."$newPropertyName" | Should -Be $testPropertyValue } It "Verify WhatIf" { Rename-ItemProperty -Path $testKey -Name $testPropertyName -NewName $newPropertyName -WhatIf $property1 = Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction SilentlyContinue $property2 = Get-ItemProperty -Path $testKey -Name $newPropertyName -ErrorAction SilentlyContinue $property1."$testPropertyName" | Should -Be $testPropertyValue $property2 | Should -BeNullOrEmpty } } Context "Valdiate Clear-ItemProperty Parameters" { It "Verify Confirm can be bypassed" { Clear-ItemProperty -Path $testKey -Name $testPropertyName -Confirm:$false $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be 0 } It "Verify WhatIf" { Clear-ItemProperty -Path $testKey -Name $testPropertyName -WhatIf $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $testPropertyValue } } Context "Valdiate Remove-ItemProperty Parameters" { It "Verify Confirm can be bypassed" { Remove-ItemProperty -Path $testKey -Name $testPropertyName -Confirm:$false { Get-ItemProperty -Path $testKey -Name $testPropertyName -ErrorAction Stop } | Should -Throw -ErrorId "System.Management.Automation.PSArgumentException,Microsoft.PowerShell.Commands.GetItemPropertyCommand" } It "Verify WhatIf" { Remove-ItemProperty -Path $testKey -Name $testPropertyName -WhatIf $result = Get-ItemProperty -Path $testKey -Name $testPropertyName $result."$testPropertyName" | Should -Be $testPropertyValue } } Context "Validate -LiteralPath" { It "Verify New-Item and Remove-Item work with asterisk" { try { $tempPath = "HKCU:\_tmp" $testPath = "$tempPath\*\sub" $null = New-Item -Force $testPath $testPath | Should -Exist Remove-Item -LiteralPath $testPath $testPath | Should -Not -Exist } finally { Remove-Item -Recurse $tempPath -ErrorAction SilentlyContinue } } } } } finally { $global:PSdefaultParameterValues = $defaultParamValues }
combined_dataset/train/non-malicious/sample_59_75.ps1
sample_59_75.ps1
#requires -Version 5.0 enum BcArtifactSource { OnPrem Sandbox Insider } Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psd1) -Global Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psm1) -Global Import-Module (Join-Path $PSScriptRoot EntraIdAuth\EntraIdAuth.psm1) Import-Module (Join-Path $PSScriptRoot ALTestRunnerInternal.psm1) Import-Module (Join-Path $PSScriptRoot ALTestRunner.psm1) #Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psd1) -Global #Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psm1) -Global function Invoke-NPAlTests { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string]$SmbAlExtPath, [Parameter(Mandatory=$false)] [ValidateSet('All','Codeunit','Test')] [string]$Tests = 'All', [Parameter(Mandatory=$false)] [string]$FileName = '', [Parameter(Mandatory=$false)] [int]$SelectionStart = 0, [Parameter(Mandatory=$false)] [string]$ExtensionId, [Parameter(Mandatory=$false)] [string]$ExtensionName, [Parameter(Mandatory = $false)] [switch]$GetCodeCoverage, [Parameter(Mandatory = $false)] $DisabledTests, [switch]$GetPerformanceProfile, [string]$ResultsFilePath ) $Params = @{} $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = Get-ServiceUrl switch ($environmentType) { OnPrem { $serviceUrlCredCacheKey = Get-ServiceUrlCredentialCacheKey $serviceUrlCredCacheKey = $serviceUrlCredCacheKey.ToLower(); $creds = Get-NavUserPasswordCredentials -SmbAlExtPath $SmbAlExtPath -WebClientUrl $serviceUrlCredCacheKey if (!$creds) { throw "Can't find credential for the key $serviceUrlCredCacheKey!" } [securestring]$secStringPassword = ConvertTo-SecureString $creds.Password -AsPlainText -Force [pscredential]$creds = New-Object System.Management.Automation.PSCredential ($creds.Username, $secStringPassword) if (!$creds) { throw "Can't find credentials in the AL development credential cache for $serviceUrlCredCacheKey!" } $Params.Add('Credential', $creds) $Params.Add('AutorizationType', 'NavUserPassword') } Sandbox { # Sandbox with AAD auth. $environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName' if (!$bcAuthContext) { $bcAuthContext = New-BcAuthContext -includeDeviceLogin } $bcAuthContext = Renew-BcAuthContext $bcAuthContext $Global:BCAuthContext = $bcAuthContext #$accessToken = $bcAuthContext.accessToken #$credential = New-Object pscredential -ArgumentList $bcAuthContext.upn, (ConvertTo-SecureString -String $accessToken -AsPlainText -Force) $response = Invoke-RestMethod -Method Get -Uri "https://businesscentral.dynamics.com/$($bcAuthContext.tenantID)/$environmentName/deployment/url" if($response.status -ne 'Ready') { throw "environment not ready, status is $($response.status)" } $useUrl = $response.data.Split('?')[0] $tenant = ($response.data.Split('?')[1]).Split('=')[1] $publicWebBaseUrl = $useUrl.TrimEnd('/') $serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant" if ($companyName) { $serviceUrl += "&company=$([Uri]::EscapeDataString($companyName))" } $Params.Add('AutorizationType', 'AAD') } Default { throw "Environment type '$environmentType' is not supported!" } } if ($FileName -ne '') { if (Get-FileIsTestCodeunit -FileName $FileName) { $Params.Add('TestCodeunitsRange', (Get-ObjectIdFromFile $FileName)) } else { throw "$FileName is not an AL test codeunit" } } if ($SelectionStart -ne 0) { $TestName = Get-TestNameFromSelectionStart -Path $FileName -SelectionStart $SelectionStart if ($TestName -eq '') { throw "Please place the cursor within the test method that you want to run and try again." } else { $Params.Add('TestProcedureRange', $TestName) } } if (-not [string]::IsNullOrEmpty($ResultsFilePath)) { $Params.Add('ResultsFilePath', $ResultsFilePath) $Params.Add('SaveResultFile', $true); } else { $Params.Add('SaveResultFile', $false); } #Run-AlTests -ServiceUrl $serviceUrl -Credential $creds -AutorizationType NavUserPassword -TestCodeunitsRange 85004 -TestProcedureRange 'LookupReversedTransaction' -SaveResultFile $true # Run-AlTests -ServiceUrl $serviceUrl -Credential $creds -AutorizationType NavUserPassword @Params Run-AlTests -ServiceUrl $serviceUrl @Params } function Get-OnPremServiceUrlCredentialKey { [CmdletBinding()] param ( [CmdletBinding(Mandatory=$true)] [string]$ServiceUrl ) $url = ([System.Uri]$ServiceUrl).AbsoluteUri.Replace('/','_').Replace('__','//') return $url } function Get-ServiceUrl { [CmdletBinding()] param ( ) $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' switch ($environmentType) { OnPrem { # TODO: Optimize => Read once and then parse each property. $server = Get-ValueFromLaunchJson -KeyName 'server' $serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance' $port = Get-ValueFromLaunchJson -KeyName 'port' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($server.TrimEnd('/'))" if (-not ([string]::IsNullOrEmpty($port))) { $serviceUrl = "$serviceUrl`:$port" } $serviceUrl = "$serviceUrl/$serverInstance" if (-not ([string]::IsNullOrEmpty($tenant))) { $serviceUrl = "$serviceUrl/?tenant=$tenant" } return $serviceUrl } Sandbox { # TODO: Base URL for SaaS maybe configurable? $serviceUrl = 'https://businesscentral.dynamics.com/' $environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url" $response = Invoke-RestMethod -Method Get -Uri $serviceUrl $useUrl = $response.data.Split('?')[0] $tenant = ($response.data.Split('?')[1]).Split('=')[1] $publicWebBaseUrl = $useUrl.TrimEnd('/') $serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant" return $serviceUrl } Default { throw "Environment type '$environmentType' is not supported!" } } } function Get-ServiceUrlCredentialCacheKey { [CmdletBinding()] param ( ) $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' switch ($environmentType) { OnPrem { # TODO: Optimize => Read once and then parse each property. $server = Get-ValueFromLaunchJson -KeyName 'server' $serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance' $port = Get-ValueFromLaunchJson -KeyName 'port' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($server.TrimEnd('/'))" if (-not ([string]::IsNullOrEmpty($port))) { $serviceUrl = "$serviceUrl`:$port" } $serviceUrl = ([System.Uri]$serviceUrl).AbsoluteUri.TrimEnd('/') $serviceUrl = "$serviceUrl`_$serverInstance" <# The 'UserPasswordCache.dat' file contains entries without tenant id so let's remove the next code: if ((-not ([string]::IsNullOrEmpty($tenant))) -and ($tenant -ne 'default')) { $serviceUrl = "$serviceUrl?tenant=$tenant" } #> return $serviceUrl } Sandbox { # TODO: Base URL for SaaS maybe configurable? throw "Not implemented yet!" $serviceUrl = 'https://businesscentral.dynamics.com/' $environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url" $response = Invoke-RestMethod -Method Get -Uri $serviceUrl $useUrl = $response.data.Split('?')[0] $tenant = ($response.data.Split('?')[1]).Split('=')[1] $publicWebBaseUrl = $useUrl.TrimEnd('/') $serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant" return $serviceUrl } Default { throw "Environment type '$environmentType' is not supported!" } } } function Invoke-RipUnzip { [CmdletBinding()] param ( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [string]$Uri, [Parameter(Mandatory=$true)] [string]$DestinationPath, [string]$ExtractionFilter ) #"$PSScriptRoot\.\ripunzip\ripunzip.exe unzip-uri -d Libs https://bcartifacts.azureedge.net/onprem/23.3.14876.15024/platform 'Test Assemblies\*'" $cmd = "$PSScriptRoot\..\ripunzip\ripunzip.exe unzip-uri -d $DestinationPath $Uri $ExtractionFilter" Invoke-Expression -Command $cmd } function Get-ClientSessionLibrariesFromBcArtifacts { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] #[ValidateSet("OnPrem", "Sandbox", "Insider")] [BcArtifactSource]$BcArtifactSource, [Parameter(Mandatory=$true)] [string]$Version ) $url = Get-BcArtifactsSourceUrl -BcArtifactSource $BcArtifactSource $url = $url.TrimEnd("/") $url = "$url/$Version/platform" Invoke-RipUnzip -Uri $url -DestinationPath $Global:ClientSessionLibsPath -ExtractionFilter "'Test Assemblies\*'" } function Get-BcArtifactsSourceUrl { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [BcArtifactSource]$BcArtifactSource ) switch ($BcArtifactSource) { OnPrem { return "https://bcartifacts.blob.core.windows.net/onprem/" } Sandbox { return "https://bcartifacts.blob.core.windows.net/sandbox/" } Insider { return "https://bcinsider.blob.core.windows.net/sandbox/" } Default { throw "Unsupported value: '$BcArtifactSource'" } } } $code = @" using Microsoft.AspNetCore.DataProtection; using System.Text; using System.IO; namespace ALCredentialCacheLibrary { public static class ALCredentailCacheReader { public static string GetDataFromCredentialCache(string credentialFolderPath, string credentialCacheFileName) { var credentailFilePath = Path.Combine(credentialFolderPath, credentialCacheFileName); if (!File.Exists(credentailFilePath)) throw new FileNotFoundException(string.Format("Credential file {0} doesn't exist!", credentailFilePath)); var bytes = File.ReadAllBytes(credentailFilePath); var purpose = new string[] { "Microsoft.Dynamics.Nav.Deployment", credentialCacheFileName }; var dirInfo = new DirectoryInfo(credentialFolderPath); var provider = DataProtectionProvider.Create(dirInfo); var protector = provider.CreateProtector(purpose); return Encoding.UTF8.GetString(protector.Unprotect(bytes)); } } } "@ function Get-MsbAlExtBinariesPath { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$msDynamicsSmbAlExtPath ) # TODO: What about macOS (OS X) or Linux? return (Join-Path $msDynamicsSmbAlExtPath '\bin\win32\') } function Get-ExternalLibraries { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$msDynamicsSmbAlExtPath ) $libs = @() # TODO: What about macOS (OS X) or Linux? $Global:MsDynamicsSmbAlExtPath = $msDynamicsSmbAlExtPath $Global:MsDynamicsSmbAlExtLibPath = Get-MsbAlExtBinariesPath -msDynamicsSmbAlExtPath $msDynamicsSmbAlExtPath $libPath = $Global:MsDynamicsSmbAlExtLibPath $libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Abstractions.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Extensions.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.Cryptography.Internal.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.Connections.Abstractions.dll" #$libs += Join-Path $libPath "mscorlib.dll" $libs += Join-Path $libPath "System.dll" $libs += Join-Path $libPath "System.Runtime.dll" $libs += Join-Path $libPath "System.IO.FileSystem.dll" return $libs } function Get-NavUserPasswordCredentials { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$SmbAlExtPath, [Parameter(Mandatory=$true)] [string]$WebClientUrl ) $creds = Get-ALDevCacheFileContent -SmbAlExtPath $SmbAlExtPath -FileName UserPasswordCache.dat -ReturnPSObject if (!$creds) { throw "You should authenticate using standard AL dev approach. Then you can try again." } $record = $creds.$WebClientUrl if (!$record) { throw "You were not authenticated against $WebClientUrl yet or the cache has expired. Please, authenticate using the standard Microsoft AL development extension and try again." } return $record } function Get-ALDevCacheFileContent { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$SmbAlExtPath, [Parameter(Mandatory=$true)] [ValidateSet("UserPasswordCache.dat", "TokenKeyCache.dat", "TokenCache.dat", "TenantMapCache.dat", "ServerInfoCache.dat")] [string]$FileName, [switch]$ReturnPSObject ) if (-not ('ALCredentialCacheLibrary.ALCredentailCacheReader' -as [type])) { $assemblies = Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath $assemblies | ForEach-Object { [void][Reflection.Assembly]::LoadFrom($_) } $credentialReader = Add-Type -TypeDefinition $code -Language CSharp -ReferencedAssemblies (Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath) -WarningAction Ignore -IgnoreWarnings -PassThru } else { $credentialReader = [ALCredentialCacheLibrary.ALCredentailCacheReader] } $SmbAlExtBinPath = Join-Path $SmbAlExtPath '\bin\win32\' $smbAlCacheFilePath = Join-Path $SmbAlExtBinPath $FileName if (-not (Test-Path $smbAlCacheFilePath)) { Write-Error "Requested credential cache file $FileName doesn't exist." } try { $fileContent = $credentialReader::GetDataFromCredentialCache($SmbAlExtBinPath,$FileName) } catch { Write-Error "Can not decrypt file $FileName. $($_.Exception)" } if (!$ReturnPSObject) { return $fileContent } $fileContentObject = ConvertFrom-Json $fileContent return $fileContentObject } function Get-NavUserPasswordCredentialsNotWorking { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$WebClientUrl ) #$purpose = @("Microsoft.Dynamics.Nav.Deployment", "UserPasswordCache.dat") $purpose = New-Object System.Collections.Generic.List[System.String] $purpose.Add('Microsoft.Dynamics.Nav.Deployment') $purpose.Add('UserPasswordCache.dat') $protectedFile = Join-Path $Global:MsDynamicsSmbAlExtLibPath $purpose[1] #$dirInfo = New-Object System.IO.DirectoryInfo -ArgumentList $Global:MsDynamicsSmbAlExtLibPath $dirInfo = New-Object "System.IO.DirectoryInfo, Version=6.0.0.0" -ArgumentList $Global:MsDynamicsSmbAlExtLibPath $provider = [Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create($dirInfo) $protector = $provider.CreateProtector($purpose); $bytes = [System.IO.File]::ReadAllBytes($protectedFile) $unprotectedValues = $protector.Unprotect($bytes); $unprotectedString = [System.Text.Encoding]::UTF8.GetString($unprotectedValues) Write-Host "Creds: $unprotectedString" #[Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create(() } ########################## # From BcContainerHelper # ########################## function Parse-JWTtoken([string]$token) { if ($token.Contains(".") -and $token.StartsWith("eyJ")) { $tokenPayload = $token.Split(".")[1].Replace('-', '+').Replace('_', '/') while ($tokenPayload.Length % 4) { $tokenPayload += "=" } return [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($tokenPayload)) | ConvertFrom-Json } throw "Invalid token" } function Test-BcAuthContext { Param( $bcAuthContext ) if (!(($bcAuthContext -is [Hashtable]) -and ($bcAuthContext.ContainsKey('ClientID')) -and ($bcAuthContext.ContainsKey('Credential')) -and ($bcAuthContext.ContainsKey('authority')) -and ($bcAuthContext.ContainsKey('RefreshToken')) -and ($bcAuthContext.ContainsKey('UtcExpiresOn')) -and ($bcAuthContext.ContainsKey('tenantID')) -and ($bcAuthContext.ContainsKey('AccessToken')) -and ($bcAuthContext.ContainsKey('includeDeviceLogin')) -and ($bcAuthContext.ContainsKey('deviceLoginTimeout')))) { throw 'BcAuthContext should be a HashTable created by New-BcAuthContext.' } } $Global:ExtensionSystemFolderPath = Join-Path $PSScriptRoot ".test-runner" $Global:ClientSessionLibsPath = Join-Path $Global:ExtensionSystemFolderPath "CSLibs" Export-ModuleMember -Function *
combined_dataset/train/non-malicious/3751.ps1
3751.ps1
function GetDefaultClusterProperties { $orchestratorType = "Kubernetes" $location = "East US 2" $clusterType = "ACS" $description = "Deployed from powershell" $containerServiceProps = New-Object Microsoft.Azure.Management.MachineLearningCompute.Models.AcsClusterProperties($orchestratorType) $cluster = New-Object Microsoft.Azure.Management.MachineLearningCompute.Models.OperationalizationCluster ` -Property @{Location = $location; ClusterType = $clusterType; ContainerService = $containerServiceProps; Description = $description} $psCluster = New-Object Microsoft.Azure.Commands.MachineLearningCompute.Models.PSOperationalizationCluster($cluster) return $psCluster } function GetDefaultLocalClusterProperties { $location = "East US 2" $clusterType = "Local" $description = "Deployed from powershell" $cluster = New-Object Microsoft.Azure.Management.MachineLearningCompute.Models.OperationalizationCluster ` -Property @{Location = $location; ClusterType = $clusterType; Description = $description} $psCluster = New-Object Microsoft.Azure.Commands.MachineLearningCompute.Models.PSOperationalizationCluster($cluster) return $psCluster } function SetupTest([String] $ResourceGroupName, [String] $Location = "East US 2") { Write-Debug "Create resource group" Write-Debug " Resource Group Name : $resourceGroupName" New-AzResourceGroup -Name $ResourceGroupName -Location $Location -Force } function TeardownTest([String] $ResourceGroupName, [String] $ManagedByResourceGroupName) { if (!$ManagedByResourceGroupName) { $ManagedByResourceGroupName = GetManagedByResourceGroupName -ResourceGroupName $ResourceGroupName } Write-Debug "Delete resource group" Write-Debug " Resource Group Name : $ResourceGroupName" Remove-AzResourceGroup -Name $ResourceGroupName -Force Write-Debug "Deleting managed by resource group: $ManagedByResourceGroupName" Remove-AzResourceGroup -Name $ManagedByResourceGroupName -Force } function GetUniqueName([String] $prefix) { $suffix = getAssetName return "$prefix-$suffix" } function GetManagedByResourceGroupName([String] $ResourceGroupName) { $cluster = Get-AzMlOpCluster -ResourceGroupName $ResourceGroupName $success = $cluster.StorageAccount.ResourceId -match "$ResourceGroupName-azureml-\w{5}" $managedByResourceGroupName = $matches[0] return $managedByResourceGroupName } function Test-NewGetRemove { $resourceGroupName = GetUniqueName("mlcrp-cmdlet-test-new") $clusterName = GetUniqueName("mlcrp-cmdlet-test-new") SetupTest $resourceGroupName $result = New-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -Location "East US 2" ` -ClusterType "ACS" -Description "Powershell test cluster" -OrchestratorType "Kubernetes" ` -ClientId "00000000-0000-0000-0000-000000000000" -Secret "abcde" ` -MasterCount 1 -AgentCount 2 -AgentVmSize Standard_D3_v2 Assert-True { $result.ProvisioningState -eq "Succeeded" } $result = Get-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName Assert-True { $result.ProvisioningState -eq "Succeeded" } $result = Get-AzMlOpCluster -ResourceGroupName $resourceGroupName Assert-NotNull { $result } $clusterExists = $False Foreach ($c in $result) { If ($c.Name -eq $clusterName) { $clusterExists = $True } } Assert-True { $clusterExists } $result = Get-AzMlOpCluster $clusterExists = $False Foreach ($c in $result) { If ($c.Name -eq $clusterName) { $clusterExists = $True } } Assert-True { $clusterExists } $managedByResourceGroupName = GetManagedByResourceGroupName -ResourceGroupName $resourceGroupName Get-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName | Remove-AzMlOpCluster Assert-ThrowsContains { Get-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName } "NotFound" TeardownTest -ResourceGroupName $resourceGroupName -ManagedByResourceGroupName $managedByResourceGroupName } function Test-GetKeys { $resourceGroupName = GetUniqueName("mlcrp-cmdlet-test-keys") $clusterName = GetUniqueName("mlcrp-cmdlet-test-keys") SetupTest $resourceGroupName $cluster = GetDefaultClusterProperties $result = New-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -Cluster $cluster Assert-True { $result.ProvisioningState -eq "Succeeded" } $keys = Get-AzMlOpClusterKey -ResourceGroupName $resourceGroupName -Name $clusterName Assert-NotNull { $keys.StorageAccount.ResourceId } Assert-NotNull { $keys.StorageAccount.PrimaryKey } Assert-NotNull { $keys.StorageAccount.SecondaryKey } Assert-NotNull { $keys.ContainerRegistry.LoginServer } Assert-NotNull { $keys.ContainerRegistry.Password } Assert-NotNull { $keys.ContainerRegistry.Password2 } Assert-NotNull { $keys.ContainerRegistry.Username } Assert-NotNull { $keys.ContainerService.AcsKubeConfig } Assert-NotNull { $keys.ContainerService.ImagePullSecretName } Assert-NotNull { $keys.AppInsights.AppId } Assert-NotNull { $keys.AppInsights.InstrumentationKey } $keys = Get-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName | Get-AzMlOpClusterKey Assert-NotNull { $keys.StorageAccount.ResourceId } Assert-NotNull { $keys.StorageAccount.PrimaryKey } Assert-NotNull { $keys.StorageAccount.SecondaryKey } Assert-NotNull { $keys.ContainerRegistry.LoginServer } Assert-NotNull { $keys.ContainerRegistry.Password } Assert-NotNull { $keys.ContainerRegistry.Password2 } Assert-NotNull { $keys.ContainerRegistry.Username } Assert-NotNull { $keys.ContainerService.AcsKubeConfig } Assert-NotNull { $keys.ContainerService.ImagePullSecretName } Assert-NotNull { $keys.AppInsights.AppId } Assert-NotNull { $keys.AppInsights.InstrumentationKey } TeardownTest -ResourceGroupName $resourceGroupName } function Test-UpdateSystemServices { $resourceGroupName = GetUniqueName("mlcrp-cmdlet-test-system-update") $clusterName = GetUniqueName("mlcrp-cmdlet-test-system-update") SetupTest $resourceGroupName $cluster = GetDefaultClusterProperties $result = New-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -Cluster $cluster $updateAvailability = Test-AzMlOpClusterSystemServicesUpdateAvailability -ResourceGroupName $resourceGroupName -Name $clusterName Assert-NotNull { $updateAvailability } $updateAvailability = Get-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName | Test-AzMlOpClusterSystemServicesUpdateAvailability Assert-NotNull { $updateAvailability } $updateResult = Update-AzMlOpClusterSystemService -ResourceGroupName $resourceGroupName -Name $clusterName Assert-True { $updateResult.UpdateStatus -eq "Succeeded" } Assert-NotNull { $updateResult.UpdateStartedOn } Assert-NotNull { $updateResult.UpdateCompletedOn } $updateAvailability = Test-AzMlOpClusterSystemServicesUpdateAvailability -ResourceGroupName $resourceGroupName -Name $clusterName Assert-True { $updateAvailability.UpdatesAvailable -eq "No" } TeardownTest -ResourceGroupName $resourceGroupName } function Test-Set { $resourceGroupName = GetUniqueName("mlcrp-cmdlet-test-set") $clusterName = GetUniqueName("mlcrp-cmdlet-test-set") SetupTest $resourceGroupName $cluster = GetDefaultClusterProperties $createdCluster = New-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -Cluster $cluster $newAgentCount = $createdCluster.ContainerService.AgentCount + 1 $updatedCluster = Set-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -AgentCount $newAgentCount Assert-True { $updatedCluster.ProvisioningState -eq "Succeeded" } Assert-True { $updatedCluster.ContainerService.AgentCount -eq $newAgentCount } $newAgentCount = $newAgentCount - 1 $updatedCluster.ContainerService.AgentCount = $newAgentCount $updatedCluster = Set-AzMlOpCluster -InputObject $updatedCluster Assert-True { $updatedCluster.ProvisioningState -eq "Succeeded" } Assert-True { $updatedCluster.ContainerService.AgentCount -eq $newAgentCount } $newAgentCount = $newAgentCount + 1 $updatedCluster = Set-AzMlOpCluster -ResourceId $updatedCluster.Id -AgentCount $newAgentCount Assert-True { $updatedCluster.ProvisioningState -eq "Succeeded" } Assert-True { $updatedCluster.ContainerService.AgentCount -eq $newAgentCount } TeardownTest -ResourceGroupName $resourceGroupName } function Test-RemoveIncludeAllResources { $resourceGroupName = GetUniqueName("mlcrp-cmdlet-test-remove-all") $clusterName = GetUniqueName("mlcrp-cmdlet-test-remove-all") SetupTest $resourceGroupName $cluster = GetDefaultLocalClusterProperties $createdCluster = New-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -Cluster $cluster $managedByResourceGroupName = GetManagedByResourceGroupName -ResourceGroupName $resourceGroupName Remove-AzMlOpCluster -ResourceGroupName $resourceGroupName -Name $clusterName -IncludeAllResources Assert-Throws ( Get-AzResourceGroup -ResourceGroupName $managedByResourceGroupName ) Remove-AzResourceGroup -ResourceGroupName $resourceGroupName -Force }
combined_dataset/train/non-malicious/sample_28_61.ps1
sample_28_61.ps1
# # Module manifest for module 'OCI.PSModules.Psql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Psql.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Psql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList', 'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList', 'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem', 'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration', 'Get-OCIPsqlDefaultConfigurationsList', 'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList', 'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList', 'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList', 'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem', 'Move-OCIPsqlBackupCompartment', 'Move-OCIPsqlConfigurationCompartment', 'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup', 'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem', 'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration', 'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword', 'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem', 'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration', 'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2718.ps1
2718.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$True,Position=1)] [String[]]$FileHashes, [Parameter(Mandatory=$False,Position=2)] [ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")] [string]$HashType = "SHA256", [Parameter(Mandatory=$False,Position=3)] [String]$BasePaths, [Parameter(Mandatory=$False,Position=4)] [String]$extRegex="\.(exe|sys|dll|ps1)$", [Parameter(Mandatory=$False,Position=5)] [int]$MinB=4096, [Parameter(Mandatory=$False,Position=6)] [int]$MaxB=10485760 ) $ErrorActionPreference = "Continue" function Get-LocalDrives { foreach ($disk in (Get-WmiObject win32_logicaldisk -Filter "DriveType=3" | Select-Object -ExpandProperty DeviceID)) { [string[]]$drives += "$disk\" } $driveCount = $drives.Count.ToString() Write-Verbose "Found $driveCount local drives." return $drives } workflow Get-HashesWorkflow { [CmdletBinding()] Param ( [Parameter(Mandatory=$True,Position=0)] [String]$BasePath, [Parameter(Mandatory=$True,Position=1)] [string[]]$SearchHashes, [Parameter(Mandatory=$True,Position=2)] [ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")] [string]$HashType = "SHA256", [Parameter(Mandatory=$False,Position=3)] [int]$MinB=4096, [Parameter(Mandatory=$False,Position=4)] [int]$MaxB=10485760, [Parameter(Mandatory=$False,Position=5)] [string]$extRegex="\.(exe|sys|dll|ps1)$" ) $hashList = "" | Select-Object -Property File,Hash $Files = ( Get-ChildItem -Force -Path $basePath -Recurse -ErrorAction SilentlyContinue | ? -FilterScript { ($_.Length -ge $MinB -and $_.Length -le $_.Length) -and ($_.Extension -match $extRegex) } | Select-Object -ExpandProperty FullName ) foreach -parallel ($File in $Files) { sequence { $entry = inlinescript { switch -CaseSensitive ($using:HashType) { "MD5" { $hash = [System.Security.Cryptography.MD5]::Create() } "SHA1" { $hash = [System.Security.Cryptography.SHA1]::Create() } "SHA256" { $hash = [System.Security.Cryptography.SHA256]::Create() } "SHA384" { $hash = [System.Security.Cryptography.SHA384]::Create() } "SHA512" { $hash = [System.Security.Cryptography.SHA512]::Create() } "RIPEMD160" { $hash = [System.Security.Cryptography.RIPEMD160]::Create() } } Write-Debug -Message "Calculating hash of $using:File." if (Test-Path -LiteralPath $using:File -PathType Leaf) { $FileData = [System.IO.File]::ReadAllBytes($using:File) $HashBytes = $hash.ComputeHash($FileData) $paddedHex = "" foreach( $byte in $HashBytes ) { $byteInHex = [String]::Format("{0:X}", $byte) $paddedHex += $byteInHex.PadLeft(2,"0") } Write-Debug -Message "Hash value was $paddedHex." $hashes = $using:searchHashes $index = $hashes.IndexOf($paddedHex) if ($index -gt -1) { $hashList.File = $using:File $hashList.Hash = $hashes[$index] $hashList } } } if ($entry) { $workflow:hashList += $entry } } } return ,$hashList } function Get-Hashes { [CmdletBinding()] Param ( [Parameter(Mandatory=$True,Position=0)] [String]$BasePath, [Parameter(Mandatory=$True,Position=1)] [string[]]$SearchHash, [Parameter(Mandatory=$True,Position=2)] [ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")] [string]$HashType = "SHA256", [Parameter(Mandatory=$False,Position=3)] [int]$MinB=4096, [Parameter(Mandatory=$False,Position=4)] [int]$MaxB=10485760, [Parameter(Mandatory=$False,Position=5)] [string]$extRegex="\.(exe|sys|dll|ps1)$" ) $hashList = "" | Select-Object File,Hash $Files = ( Get-ChildItem -Force -Path $basePath -Recurse -ErrorAction SilentlyContinue | ? -FilterScript { ($_.Length -ge $MinB -and $_.Length -le $_.Length) -and ($_.Extension -match $extRegex) } | Select-Object -ExpandProperty FullName ) switch -CaseSensitive ($HashType) { "MD5" { $hash = [System.Security.Cryptography.MD5]::Create() } "SHA1" { $hash = [System.Security.Cryptography.SHA1]::Create() } "SHA256" { $hash = [System.Security.Cryptography.SHA256]::Create() } "SHA384" { $hash = [System.Security.Cryptography.SHA384]::Create() } "SHA512" { $hash = [System.Security.Cryptography.SHA512]::Create() } "RIPEMD160" { $hash = [System.Security.Cryptography.RIPEMD160]::Create() } } foreach ($File in $Files) { Write-Debug -Message "Calculating hash of $File." if (Test-Path -LiteralPath $File -PathType Leaf) { $FileData = [System.IO.File]::ReadAllBytes($File) $HashBytes = $hash.ComputeHash($FileData) $paddedHex = "" foreach( $byte in $HashBytes ) { $byteInHex = [String]::Format("{0:X}", $byte) $paddedHex += $byteInHex.PadLeft(2,"0") } Write-Debug -Message "Hash value was $paddedHex." $index = $searchHashes.IndexOf($paddedHex) if ($index -gt -1) { $hashList.File = $Files $hashList.Hash = $hashes[$index] $objs += $hashList } } } $objs } function Get-Matches { [CmdletBinding()] Param ( [Parameter(Mandatory=$True,Position=0)] [String]$BasePath, [Parameter(Mandatory=$True,Position=1)] [string[]]$SearchHash, [Parameter(Mandatory=$True,Position=2)] [ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")] [string]$HashType = "SHA256", [Parameter(Mandatory=$False,Position=3)] [int]$MinB=4096, [Parameter(Mandatory=$False,Position=4)] [int]$MaxB=10485760, [Parameter(Mandatory=$False,Position=5)] [string]$extRegex="\.(exe|sys|dll|ps1)$" ) if ((Test-Path env:\PROCESSOR_ARCHITEW6432) -and ([Intptr]::Size -eq 4)) { $sysRegex = $env:SystemDrive.ToString() + "\\($|windows($|\\($|system32($|\\))))" if ($BasePath -match $sysRegex) { Write-Verbose "Searching %windir%\System32 with a 32-bit process on a 64-bit host can return false negatives. See comments in Get-FilesByHash.ps1 module for details." } } $HashType = $HashType.ToUpper() try { $hashList = Get-HashesWorkflow -BasePath $BasePath -SearchHash $FileHashes -HashType $HashType -extRegex $extRegex -MinB $MinB -MaxB $MaxB } catch { Write-Verbose -Message "Workflows not supported. Running in single-threaded mode." $hashList = Get-Hashes -BasePath $BasePath -SearchHash $FileHashes -HashType $HashType -extRegex $extRegex -MinB $MinB -MaxB $MaxB } if ($hashList) { Write-Verbose "Found files matching hash $FileHash (TK)." foreach($entry in $hashList) { $o = "" | Select-Object File, Hash $o.File = $entry $o.Hash = $FileHash $o } } else { Write-Verbose "Found no matching files." } } if ($BasePaths.Length -eq 0) { Write-Verbose "No path specified, enumerating local drives." $BasePaths = Get-LocalDrives } foreach ($basePath in $BasePaths) { Write-Verbose "Getting file hashes for $basePath." Get-Matches -BasePath $BasePath -SearchHash $FileHashes -HashType $HashType -extRegex $extRegex -MinB $MinB -MaxB $MaxB }
combined_dataset/train/non-malicious/sample_64_94.ps1
sample_64_94.ps1
#Since InstallShied suite advanced now runs in x86, #64bit registry is set in different function #Tests the path is present and then Unhides function Test-Hide($path) { if (Test-Path -Path $path) { Set-ItemProperty -Path $path -Name "SystemComponent" -Value 0 } } function Test-Hide64 { param($path, $displayName) $key = [Microsoft.Win32.RegistryKey]::OpenBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, [Microsoft.Win32.RegistryView]::Registry64) $subKey = $key.OpenSubKey($path, $true) If($subKey -eq $null){ trace-suiteinfo -LogMessage ("$displayName >> Registry entry does not exist") #Write-Output "$displayName >> Registry entry does not exist" } else{ $subKey.SetValue("SystemComponent", 0); trace-suiteinfo -LogMessage ("$displayName >> Set SystemComponent = 0") #Write-Output "$displayName >> Set SystemComponent = 0" } } #1-IO Peripheral Installer 2-Qisda Display Installer 3-Wistron Display Installer Test-Hide64 "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AWDisplayInstaller" "Qisda Display" Test-Hide64 "SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{AD537852-303F-410B-89CB-1CB95FF5A139}_is1" "Wistron Display" # SIG # Begin signature block # MIIvMAYJKoZIhvcNAQcCoIIvITCCLx0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAsxC3izNshTEDy # Zy/ytdCFjJ1EKA5sWyWwCZ3X3N2ycKCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50 # cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My # MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT # MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB # gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW # RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6 # YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n # aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW # xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j # R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk # j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW # FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg # tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr # 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3 # i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm # Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC # ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn # +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB # BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB # BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG # A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js # MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX # MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1 # YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3 # diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc # VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw # Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX # 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY # KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V # HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL # eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA # S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM # ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw # HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500 # H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE # CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg # Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5 # MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv # biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP # RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG # 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7 # 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv # 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs # 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29 # p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu # 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH # yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2 # +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7 # AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj # ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi # yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr # BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0 # MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu # Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE # PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l # dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT # ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh # 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj # xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu # AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c # QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb # fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq # 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS # zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ # 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm # DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF # A3d/YNjCvHTJlZFot7d+YRl1MYIbnjCCG5oCAQEwdzBjMQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl # ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm # hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIIBFTAZBgkqhkiG9w0BCQMxDAYKKwYBBAGC # NwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQx # IgQg0aHaXBy9rl5PbqV5Tc3eoYntXvsvB77dJI0vBWsP1mQwgagGCisGAQQBgjcC # AQwxgZkwgZaggZOAgZAAUAByAGkAbgBjAHkAXABGAHUAbABsAFwASQBuAHMAdABh # AGwAbABhAHQAaQBvAG4ATQBhAG4AYQBnAGUAcgBcAEkAbgBzAHQAYQBsAGwAYQB0 # AGkAbwBuAE0AYQBuAGEAZwBlAHIAXABSAGUAbABlAGEAcwBlAFMAaQBnAG4AZQBk # AFwASQBuAHQAZQByAG0wDQYJKoZIhvcNAQEBBQAEggGAueyKFY6jrR2hLNcenSOd # uXw7QtQW/1yS7IOt3XZpidiIO3Sw7G9yPNYL9AyYROlrzeteBSmF5c+E6V0vGXHf # +kJvSwES/r7sukmf6gC/qQCnE+ErJwVc36SSQ6XEeT9uOBOOQy3VFFjkm/481b+5 # lUbdRmYWlciPiunt/xTbU2J6Xu6VqG59eTZ1CAk9ZrD0JI+xzp31jbbhoGIgIeoD # RDk0y2yrnus2hZ3Z47JZPz+fG9kpOQNHw+q73EfWKyYtFoMPcx0E/2AuuYmyynZn # xhiqMGGSoKxHJB/gUwCmg+6wPhNCO/2aYSgpD8G5PwDUaQ9BaVEPaVl4rCVG9jhU # 0DDLcu2V0TYVNhMR6LM6as9xGJGmEc5WzP6OUG/lyuTb5cOSWv1UhNAYBSf1y81+ # hWHdZw/PI45V0GfuReUFMow9a2ObT3OseTSTUB4pLdKEE2oVXWUACqcuQAG5sJ2P # aff1tm+Zee7eQEmsN1X6Es9JMKA42k5OE52AJwNgHqQfoYIYXzCCGFsGCisGAQQB # gjcDAwExghhLMIIYRwYJKoZIhvcNAQcCoIIYODCCGDQCAQMxDTALBglghkgBZQME # AgMwgfMGCyqGSIb3DQEJEAEEoIHjBIHgMIHdAgEBBgpghkgBhvpsCgMFMDEwDQYJ # YIZIAWUDBAIBBQAEIG4z1nauixsPrsaifgQW9mYsUv/GeDRQimRxqPiVhfpcAggh # ERpe08CRDhgPMjAyNDAzMjIxMDM2MjFaMAMCAQGgeaR3MHUxCzAJBgNVBAYTAkNB # MRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhvcml0 # eSAtIFRTQTKgghMOMIIF3zCCBMegAwIBAgIQTkDkN1Tt5owAAAAAUdOUfzANBgkq # hkiG9w0BAQsFADCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIElu # Yy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3 # BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1 # c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0 # aG9yaXR5IC0gRzIwHhcNMjEwNTA3MTU0MzQ1WhcNMzAxMTA3MTYxMzQ1WjBpMQsw # CQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50 # cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAt # IENTQlIxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp4GP9xRFtmJD # 8tiu0yVeSE9Rv8V9n1AcNdHWfmEqlBltJ0akphpd91RRaoAixqhmdU1Ug8leaBur # 9ltksK2tIL1U70ZrbQLnRa519o6KuTIui7h3HFJNeYhfpToYyVAslyctv9oAfWN/ # 7zLsRodj25qfw1ohNnv5m9XKoG5yLPzh8Z5wTQhWFW+Qq/tIurnXwYJ4hWUuf7XJ # wOIUtzcRQQbiiuCo9uV+tngFAcNg7U8HQS4KE0njkJt/3b36rL9kUdFcm7T1XOdc # /zubpaAa130JssK3/24cvMh95ukr/HKzFOlKVRKEnEQldR32KvBPpSA9aCXrYZd8 # D+W2PfOuw8ERvBuOzOBHMF5CAIZx41isBsplH3uUpktXZwx+Xq14Z1tV417rx9js # TG6Gy/Pc+J+HqnJYEg99pvj4Qjk7PCzkMk1JjODhAMI4oJz6hD5B3G5WrsYaW/Rn # aAUBzRu/roe8nVP2Lui2a+SZ3sVPh1io0mUeyB/Vcm7uWRxXOwlyndfKt5DGzXtF # kpFCA0x9P8ryqrjCDobzEJ9GLqRmhmhaaBhwKTgRgGBrikOjc2zjs2s3/+adZwGS # ht8vSNH7UGDVXP4h0wFCY/7vcLQXwI+o7tPBS18S6v39Lg6HRGDjqfTCGKPj/c4M # hCIN86d42pPz2zjPuS8zxv8HPF6+RdMCAwEAAaOCASswggEnMA4GA1UdDwEB/wQE # AwIBhjASBgNVHRMBAf8ECDAGAQH/AgEBMB0GA1UdJQQWMBQGCCsGAQUFBwMDBggr # BgEFBQcDCDA7BgNVHSAENDAyMDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDov # L3d3dy5lbnRydXN0Lm5ldC9ycGEwMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzAB # hhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAwBgNVHR8EKTAnMCWgI6Ahhh9odHRw # Oi8vY3JsLmVudHJ1c3QubmV0L2cyY2EuY3JsMB0GA1UdDgQWBBSCutY9l86fz3Ho # kjev/bO1aTVXzzAfBgNVHSMEGDAWgBRqciZ60B7vfec7aVHUbI2fkBJmqzANBgkq # hkiG9w0BAQsFAAOCAQEAH15BBLaDcCRTLFVzHWU6wOy0ewSYXlk4EwmkWZRCXlC/ # T2xuJSCQk1hADfUZtGLuJF7CAVgVAh0QCW+o1PuSfjc4Pi8UfY8dQzZks2YTXxTM # pXH3WyFLxpe+3JX8cH0RHNMh3dAkOSnF/goapc97ee46b97cv+kR3RaDCNMsjX9N # qBR5LwVhUjjrYPMUaH3LsoqtwJRc5CYOLIrdRsPO5FZRxVbjhbhNm0VyiwfxivtJ # uF/R8paBXWlSJPEII9LWIw/ri9d+i8GTa/rxYntY6VCbl24XiA3hxkOY14FhtoWd # R+yxnq4/IDtDndiiHODUfAjCr3YG+GJmerb3+sivNTCCBm8wggRXoAMCAQICECW8 # K/MpyhB/Hqm6iIXUnTswDQYJKoZIhvcNAQENBQAwaTELMAkGA1UEBhMCVVMxFjAU # BgNVBAoMDUVudHJ1c3QsIEluYy4xQjBABgNVBAMMOUVudHJ1c3QgQ29kZSBTaWdu # aW5nIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBDU0JSMTAeFw0yMTA1 # MDcxOTIyMTRaFw00MDEyMjkyMzU5MDBaME4xCzAJBgNVBAYTAlVTMRYwFAYDVQQK # Ew1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBpbmcg # Q0EgLSBUUzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1AyoGtoRP # NMyeMb7qjsZ7biAkDwPXvYE2M+Zv0j67xJ6qoMxmXUJgNFHiLWGDujyeaLhLw2aO # pd4rupstQaXe0MtXBS2I2cBGiG08NQ0ZkKy4DBnwTMXbRVvcO8K8jUQA4Dj//13I # zwiaPdSy63uVw8SlAOBiAWRZX4zje4up+UW3xrCiCjdDuEaBq4Z+fy/e8F/rzSDM # pS0x46gumZvgeN30212CY30wOYh+JAbmfGCEeMhcKeWVy/V7T89Y3JDPp6J7FFTE # 4DeYMMGbtq6cKfZrJUPnEmo+GYu+wOeB10owCH58jd8880iTId6Bg2qdAD7XYLrR # s2IIlum2SQA49Fx2Ddp3aj2gld4eocxZel6fz+l2XUDytRW1YGgs81rJI4PY9Rpr # aSikttSuYgbeJkW93ulWd6rcZLBBzcwT8V1xdLKUCEtPMm5+cLh36dUyN8J63kIS # 6HEc4thiv6prQYYGW+ZpviYJ9JfC/kz0gHKEbtvexQepjhWibeEb4AkP9aAHoLvE # d3MJPAeTjQG1EmctTRm1uMXJEKtwz0L/pScd1hLW5BhEYPs5XYS7ZrVTEp0DFIJl # KbTsSXL9s0PlwwIpJLof+Li+XaO3Lqn8z2LZ+pfEE3jjVblaeoTr/7vPaYjAtvmL # YIVBEFDHBRDSXnadPjXs9k+K+RJ7P68LNwIDAQABo4IBLDCCASgwEgYDVR0TAQH/ # BAgwBgEB/wIBADAdBgNVHQ4EFgQUJg/wxEgIG83dkfVUVLazs/yZ8QgwHwYDVR0j # BBgwFoAUgrrWPZfOn89x6JI3r/2ztWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsG # AQUFBzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAi # hiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMC # AYYwEwYDVR0lBAwwCgYIKwYBBQUHAwgwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYI # KwYBBQUHAgEWGmh0dHA6Ly93d3cuZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEAjAN # BgkqhkiG9w0BAQ0FAAOCAgEAdj1GaIVfCcDOyfjHuNd+p1w7C0ZzziJTizj2Ebp3 # xMKHIY8n2QyV6+hL5VzXkBVvqCosimrgIhE0efq9lnnIdhbNsUTqcVEPm1XJGHzV # gnmc86a3k6kFOHICBpehqLJ5fl4I4m5seZqoh5TOf49VNkAPnz9R1Wa+e6uG5m6H # uk5jXbHYjh/LZ8MNcNp665OyFITSPn2TPxYMNqBceQCfC27lhCrYiMFtBLc385Ka # cOA7A/3NuyeCzi/8jeSyyr74JYXG7XTIPTVfOAk9eU/rG+BBXqV0gT9RFcD4SYiP # ursF1K1FgjN5wSWNX1Q9keS4nxeYAF2tKOVPXxv7+FS1pcQk/PB2O/gNXsxHsMqq # u25R31O1SRrxYIe3+f1pBnVfc9YRkPKAWI7lww8DmIwEU7Mph98/97DpTFeBJER5 # aP4bNgfWZT3sb9bCtaphfGYG7NLlaYD4cZIuXOIRRhhFS9b6BWTvu94GykMlvd+N # yQF0YYjb8MemPeMMcbx/S+fI4G7g2oD5AJ7AayXVo7pcK/7EYCAUSgcjMeUay5FE # spp7Q/FbmLUhS7gxOyJU7nlh95qUG2YnKsbf4WVd73E55lAl/Yc0ua5dfCc752WT # +CiEsW+GkyyTk7Zwr6HuyKRhqYQ7+wq3+LhtJu5HTvVeBfqcDxF918uRrkMg9xVZ # Y7wwgga0MIIEnKADAgECAhBbcCbMlvZ4GruF9hH1bbtuMA0GCSqGSIb3DQEBDQUA # ME4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQD # Ex5FbnRydXN0IFRpbWUgU3RhbXBpbmcgQ0EgLSBUUzIwHhcNMjQwMTE5MTY0NzQ3 # WhcNMzUwNDE4MDAwMDAwWjB1MQswCQYDVQQGEwJDQTEQMA4GA1UECBMHT250YXJp # bzEPMA0GA1UEBxMGT3R0YXdhMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSswKQYD # VQQDEyJFbnRydXN0IFRpbWVzdGFtcCBBdXRob3JpdHkgLSBUU0EyMIICIjANBgkq # hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqoYEOF6PaL+D9Vr9VJvFfTp1ncSnLU9t # 6dAFH1HjM7svXzqxllSK6Qh8NK2Jg1WknwLMIwvYG3pApMyfQuoTf3y44LdKAgXi # g0kEbwaGzXNBqYPUmGf69FIZeuNKWSiHVhddSPGGkQu4ImTbQfldVLU1pG443AgN # GlYYQMN+mDxCM4QNxaVhUc4gbU8Ay0LwqHUb20b+Kdwbntf4GAVRdjCbdL2VHxlT # ZRVHLFZja+m6SKwKOLbBcv0gCqN0GmsHf9HdrBfOtRzHeokM7G0cMI0F8K89l8w1 # tLUFA2a6nnb8OdrImtYSEuRBwoUiQPDLuojp0ofCq8Y0O+WrDQAGDga1i3vRCyLa # PKjJVnvwNQSW6llGjI/UoLWpg7DOhPtLROVBqBbzr9rRoCdw3wfvN/Oukc7UIX+G # mNxe7o/A2kfbacoQuZGVgBVj8SsawpahH8L3PNT2fSQHJahUlG8KVdvbJENuLjui # e0m7tdYYj9kEs77qx7VkmkvOUmEeKwUeYzdGnbHJ1V6HpOrXNLIhQhe4Oig6XqXt # Pv03F39jIPJ71l/K8xQ/4c7/ineUZm2JweDsfwRwOGQn9acXfU3KDIEbxeXxNsV6 # rn0ppEc1OPoN9FMDKQX8b6GLyc3xuIhA09LbniUxrdfmWtgEtIS7BEZhZv9dMt78 # 0z58Thjvft8CAwEAAaOCAWUwggFhMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFPV2 # GvgQmJKhG3epACzxlWICC3knMB8GA1UdIwQYMBaAFCYP8MRICBvN3ZH1VFS2s7P8 # mfEIMGgGCCsGAQUFBwEBBFwwWjAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50 # cnVzdC5uZXQwMwYIKwYBBQUHMAKGJ2h0dHA6Ly9haWEuZW50cnVzdC5uZXQvdHMy # LWNoYWluMjU2LnA3YzAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1 # c3QubmV0L3RzMmNhLmNybDAOBgNVHQ8BAf8EBAMCB4AwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwTAYDVR0gBEUwQzA3BgpghkgBhvpsCgEHMCkwJwYIKwYBBQUHAgEW # G2h0dHBzOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAIBgZngQwBBAIwDQYJKoZIhvcN # AQENBQADggIBAKmrfb8aAIVb3O1xJl6Ugq9cgkv6HDnFU7XDBt0DYH75YZpBIMKu # QRcupUIIkQlelzCYgUXWsrWEPYvphwfaAT/gCFhnESCUHsAWjmN3vZtsBY09tcua # MalKXGIyohPOkJwNx5BPZ8PgqH+HhEvX8sEhDxDnF7n7vQnMvoqmAf5Ngk9pIJp1 # a+QN91AmU/wz9/4brqdqwKjrHq8i0z1gFZ+65NUppLVXn7Fl9rFMYdXSyNq3rKoY # HyAYiqb49Qf5civ2Y9glnBb++5TfhnSiILTyCN8W7zmAdjqSsdCWg2rafFOJWRsN # XPG7KfIhT2EsJIn4dgl/2WiQjlcMZNV2AHFZ89SEyDyhiH+ob/O9bn+wqI7mk2zp # FMV1HAwrzvIH+7Wu1EExv8HMaZgYrlsIj6tcZLmEar1cOKHfT0K3S1tS0973O8uf # b8JZQiJOCxi3Isgv/GoJhe1QKVF6xJRLtnFlikqGmkt4S1aKod4vi5NbMsyhue+p # tgzYBgsXML8Nb4+TrMsR9fHHAJ7QGdecX45UfGupQztj3MFEq72MOkPwcj8klc2E # kV0hAA14aw1cIySfTK80yxRa3rHkRVD9r2+nBYKnc8/P6ZLqcyqx4d2iA+YgvB1n # GlbCLvasX8pOgbDmWh1zz9IU81B4KAVOFW6FJPgzqIivdG30Us6MqISeMYIEFjCC # BBICAQEwYjBOMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEn # MCUGA1UEAxMeRW50cnVzdCBUaW1lIFN0YW1waW5nIENBIC0gVFMyAhBbcCbMlvZ4 # GruF9hH1bbtuMAsGCWCGSAFlAwQCA6CCAYkwGgYJKoZIhvcNAQkDMQ0GCyqGSIb3 # DQEJEAEEMBwGCSqGSIb3DQEJBTEPFw0yNDAzMjIxMDM2MjFaMCkGCSqGSIb3DQEJ # NDEcMBowCwYJYIZIAWUDBAIDoQsGCSqGSIb3DQEBDTBPBgkqhkiG9w0BCQQxQgRA # Q6jqsru1L0JY7vQmUyy2ZHkyoh8qPWCsotizlboIIsvzcuI3GTEEH/zMUxWtyOuC # IAagkAgwobw7RIenTTch+TCB0AYLKoZIhvcNAQkQAi8xgcAwgb0wgbowgbcwCwYJ # YIZIAWUDBAIDBEA5EUIuFwI+qpkkmXQODsjo0nLTVfxc9mz5EVavl1U05ICv07x8 # TFtX79H/vNt1FGXg1AVahU6bETnZ9+xV1f4kMGYwUqRQME4xCzAJBgNVBAYTAlVT # MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUg # U3RhbXBpbmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJKoZIhvcNAQEN # BIICAInj74W8iLI0KpfX4CWzJVx8y4r/PGj2FHgVipZZcKTTTrX7dM34cVy3QmP7 # CYMOybVEE6ju+znGyKZ5gzoUBoUophgzTnU6OHBi66dNPp8uP+F0EYN8DaEm6gsG # J3ye3O8uCHhJmJwz/h33EUVPOq2+R1PaO/26Lg8PpyaQSCuNfw4NoVyEbp9V9BVG # eZU7IPahfHJM4ts+dya9QQ7wWtG1ab4vmQjO+pqbP/mlcr3FFAPR05JHEpqPnV4N # s9Cp3h9HadkGfIMkHLxUilfPpv4QtkbqybFvH/vI1fF1Vn9htXs9xVYLEcwMjjqW # d3u9nh3utcIPw3lVk2N8LZ9xKh1NztE4DoVtyHwFMp22TJY49pTJKZOQhs8x4Gvy # AuRppJudGp5mDr6DeS2SPnCmQ3gRsRyChJr1BFnXZjoGu+wIo3u59PUlYmPcmfP9 # 5Azw/+Sx5lxnf2ISz9aqL+/lLGvIoIbh7eRTtEi8Xf3Cn0pkcogKLOfqS8zLqKKF # qKCwW5vEKt3ijqMf/u3cUEDyKtMp3D4g9mIjzi4fhjL9+prnUKpR9zkB0EppyCE4 # 3U7USsVbkTKbsXjDcf6+1UjfC4X3do6wuDQAU3Bd/bnZNfWJFhW59ojf11QGkizs # d1yQ40k0ArTqcGwzvnZADM+vrMaQLhN+jOXuPi9dqb6fDu4x # SIG # End signature block
combined_dataset/train/non-malicious/sample_30_65.ps1
sample_30_65.ps1
# # Module manifest for module 'OCI.PSModules.Datalabelingservicedataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datalabelingservicedataplane.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c7f9095b-be8f-42bb-88ca-422eca4176a1' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datalabelingservicedataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservicedataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDatalabelingservicedataplaneAnnotation', 'Get-OCIDatalabelingservicedataplaneAnnotationsList', 'Get-OCIDatalabelingservicedataplaneDataset', 'Get-OCIDatalabelingservicedataplaneRecord', 'Get-OCIDatalabelingservicedataplaneRecordContent', 'Get-OCIDatalabelingservicedataplaneRecordPreviewContent', 'Get-OCIDatalabelingservicedataplaneRecordsList', 'Invoke-OCIDatalabelingservicedataplaneSummarizeAnnotationAnalytics', 'Invoke-OCIDatalabelingservicedataplaneSummarizeRecordAnalytics', 'New-OCIDatalabelingservicedataplaneAnnotation', 'New-OCIDatalabelingservicedataplaneRecord', 'Remove-OCIDatalabelingservicedataplaneAnnotation', 'Remove-OCIDatalabelingservicedataplaneRecord', 'Update-OCIDatalabelingservicedataplaneAnnotation', 'Update-OCIDatalabelingservicedataplaneRecord' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservicedataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_28_83.ps1
sample_28_83.ps1
# # Module manifest for module 'OCI.PSModules.Events' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Events.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e1c10f7-8832-4248-b692-89297c84ea32' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Events Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList', 'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule', 'Remove-OCIEventsRule', 'Update-OCIEventsRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_52.ps1
sample_44_52.ps1
# # Script module for module 'Az.DataProtection' that is executed when 'Az.DataProtection' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 04/23/2024 13:01:40 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"2.19.0") { Write-Error "This module requires Az.Accounts version 2.19.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 2.19.0 -Scope Global } if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @() if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDj9ooq3BX16a9m # VHbkZ0AC2J8R0LlXzuDb/sXdiEsT1KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOZW1N9bQAUQfKmhqupvpXeJ # eV7h1XuH2oxIAOZpXSTkMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAS8iEDM2oaoEZR3T6SeE8ZU49DiMkC574qnTRkQFp3Mu7JQ/wIoItB1RU # qOyokJdGa5b9ijgzdsaMWtHkyDfi9+/QYuEGPV7u4zBRtlFFLV0Aq0sKbS+tuvXr # mQLvaQVleo27GnXvodQT61Z6FfZuYiXzbp0rwDBGbZ0jrJ0H8+NY0fJnD1G3G2Hd # anZIbhKMpFL+OnA+InMk+9wgp5rczJ8e+SRWHPaHk5hNGUg02HVUv5WUqDkLUYfq # 1R2NPLs7dx1119DDJTjDe+bxf9B8eyKRT8A3WtU5+TzFz7TuWa3x2yWwhqj0Xter # 0JDDbzAX9QTDv+TWJgAJnh50p8NGyaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCfchXTWHeo9du++G0BPyyrIx2OJv1Rym95/kcEyNvoLgIGZhfNGBKD # GBMyMDI0MDQyMzEzMTYxMS4xNjZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIcTDAiGA8yMDI0MDQyMzExMzg1 # MloYDzIwMjQwNDI0MTEzODUyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0hxM # AgEAMAoCAQACAghFAgH/MAcCAQACAhNpMAoCBQDp023MAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAK8eH3rZdn1zSVWz/62/4QXWc469a0821JsUCszUNQE7 # zofGTI2pXfcLRkid5HDMoyzHaxFyQd7BlB9RiWflQDCbmJDXi+gQvIkxjCTCRBlC # ur00RnLzUEmS1uJPOLOL/bOqar9Ef8dldb6m5FXynuOMavaqfurd40q4GBqB6frP # +NXQ2XPKm+yNQ9eFgWq4QfuetnD8+P6G4T+Mv6nxbUeZURvBPR5FA9fsJpjoKDc9 # w9ekBTznBDZfbQ5BcayMyUd+K0eOSstGOQ0kwrQkFJUjB+EDHoNJVO3T4Migd36w # R6XnZTD4GG7mwxX0i8EYxg0lKounpH1hw7E6P5VgX74xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAZJ16wUfUC4pg5+2tNL8Ya01VnFp/TGQFUhS0nQQnh # mDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgfEHm2ExKtPF0slQuA53nCHBP # mRCZtnL9CXNnAqBr+34wDQYJKoZIhvcNAQELBQAEggIAYV1WM5qiUqWJVCTFWXYd # ebtuaxaLLcmrisI7ipoPet3N9M047OaNpOCH3tHrwSVahsnjGH2XasBR5+0oxd6Z # OQqB1EqVJ0bLbWJs3RodTDLgLVzmJkuvdl0Votfb4T+jWWWc+OhIVGW9FqdFI/qn # EGhEDk2z4+RSwETJT7/noSPGHRpsLgB/9TliA3gqZ8jfXqyZyz4dFuIVRzHuX961 # s4cB5yxDNlhFVVwWZ74xN3XQNcOKZknnWbPq0uhCrl32fOXETmLhnPXTwiLv4rvr # UzPqYZWG367v/NCsk/rSeietb843sVAFnP5+FOqknzPcLcK/ItbgXoJyVXOCKxyq # UqX0i65zN7mA8kbtECT1JwX6Q1dNCg9oa+PLVM0wJTkoLkv7XHT+uiEWqR5ENn02 # i83D2D8NlsQvLk248Cdmn5YZ7ZH1hJZoQGq6iqC6FWYmYfA7oecEtx5gr6FxY/lc # yzd2QOvY45LIssw5Fhz5vHsj/atmpSbSfpuC9rjxQgCZz/iWJm60LjUlxSpuMIHV # PBhZ2lUAc2LbvGLF/RCInKQItqHLXPqwjFZwQJRI/pv3hWPJ+O+qijz0dscv8vNG # gtglQyWh3QBt6yOnzB3155xYuBaNuRR9ULyEtQb1ATxuPWF6dy//3T3QjjeUlWaS # SjafnrlbcxzztTbhssPN7oE= # SIG # End signature block
combined_dataset/train/non-malicious/24.ps1
24.ps1
. $PSScriptRoot\Shared.ps1 Describe 'Module Manifest Tests' { It 'Passes Test-ModuleManifest' { Test-ModuleManifest -Path $moduleManifestPath | Should Not BeNullOrEmpty $? | Should Be $true } }
combined_dataset/train/non-malicious/sample_52_35.ps1
sample_52_35.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module $PSScriptRoot\HelperFiles\TestObsHelper.psm1 -Force -Verbose:$false Import-Module $PSScriptRoot\HelperFiles\ReportHelper.psm1 -Force -Verbose:$false Import-Module $PSScriptRoot\HelperFiles\HTMLReportHelper.psm1 -Force -Verbose:$false Import-Module $PSScriptRoot\HelperFiles\GeneralReportInformation.psm1 -Force -Verbose:$false function Test-Observability { [CmdletBinding(DefaultParametersetName='RunTests')] Param( [Parameter(Mandatory=$false, ParameterSetName='RunTests')] [string[]] $TestsToRun, [Parameter(Mandatory=$false, ParameterSetName='ListTests')] [switch] $ListTests, [Parameter(Mandatory=$false, ParameterSetName='RunTestCategories')] [string[]] $TestCategoriesToRun, [Parameter(Mandatory=$false, ParameterSetName='ListTestCategories')] [switch] $ListTestCategories ) $OutputFilePath = "$env:SystemDrive\Observability\TestObservability" if (-not (Test-Path $OutputFilePath)) { New-Item -Path $OutputFilePath -ItemType Directory } # don't create transript if we are just listing tests if (!$ListTests -and !$ListTestCategories) { $functionName = $($MyInvocation.MyCommand.Name) $transcriptName = "TestObservability.log" $transcriptPath = Join-Path $OutputFilePath $transcriptName Start-Transcript $transcriptPath } try { $deviceType = Get-DeviceType # If we can't get device type, set to unknown if ($null -eq $deviceType) { $deviceType = "Unknown" } $availableTestsJSON = "$PSScriptRoot\HelperFiles\ListTests.json" $availableTests = Get-TestNamesFromJson -TestsJSONFile $availableTestsJSON $availableTestCategories = Get-TestCategoryNamesFromJSON -TestsJSONFile $availableTestsJSON if ($ListTests) { $availableTests | Out-String return } if ($ListTestCategories) { $availableTestCategories | Out-String return } if (!$TestCategoriesToRun) { $testNames = Get-FilteredTestNames -AllTests $availableTests -TestsToRun $TestsToRun } else { $testNames = Get-TestNamesFromJson -TestsJSONFile $availableTestsJSON -CategoriesToRun $TestCategoriesToRun } if ([string]::IsNullOrEmpty($testNames)) { Trace-Progress "$functionName : There are no tests to run. Aborting Test-Observability." return } # Remove everything in TestObservability path, except TestObservability.log Get-ChildItem -Path $OutputFilePath -Recurse ` | Where-Object { -not ($_.Name.EndsWith($transcriptName)) } ` | Remove-Item -Recurse -Force $pathToTestReports = Join-Path $OutputFilePath "TestReports" New-Item -Path $pathToTestReports -ItemType Directory $testsLocation = "$PSScriptRoot\TestModules" Get-GeneralReportInformation -PathToTestReports $pathToTestReports foreach ($nameOfTest in $testNames) { try { $testReportJSON = $nameOfTest + ".json" $testReportJSONName = Join-Path $PathToTestReports $testReportJSON $testLocation = Join-Path $testsLocation $nameOfTest $testFile = $nameOfTest + ".psm1" $testModule = Join-Path $testLocation $testFile Import-Module $testModule $component = $nameOfTest.Replace("Test", "-") $functionName = "Test" + $component $testReport = New-TestReport -TestName $nameOfTest $testReport = & $functionName -TestReport $testReport -DeviceType $deviceType $testReport.OverallResult = Get-OverallResult -TestReport $testReport $testReport | ConvertTo-Json | Out-File $TestReportJSONName } catch { Trace-Progress "$functionName : Error running test $nameOfTest. $_" -Error } } $functionName = $($MyInvocation.MyCommand.Name) Trace-Progress "$functionName : Attempting to generate TestObservability HTML report." try { $reportPath = Generate-HTMLReport -PathToTestReports $pathToTestReports -TestNames $testNames Trace-Progress "$functionName : Successfully generated the TestObservability report at $reportPath." } catch { Trace-Progress "$functionName : Failed to generate TestObservability HTML report. Failed with errror: $_" } } catch { Trace-Progress "$functionName failed with: $_" -Error } finally { if (!$ListTests -and !$ListTestCategories) { Stop-Transcript } } } Export-ModuleMember -Function Test-Observability # SIG # Begin signature block # MIIoKwYJKoZIhvcNAQcCoIIoHDCCKBgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAcdumctyVVHMZ6 # VjTVylvro4zwes1BOFupM4TACw8PPaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgswghoHAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINsUx6TC16QZKQHyYxcf2HtJ # PdeTByO3oWnxqF5z+GMkMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAb94wP1ZSJyC3c1two98D/YZCUjfRTXso3n0Frd87ATrzUH03JEc0IT4Q # N1QIRQYTtD9a2SXr0EJ7A76YafROwmQaN8/oCEc/vyWWa5S6p1U63SaVaaZuK8JH # iI1aWkVYFNLe3MTv91HHi1fvNV9lsmgTDZq7Q5cprp3zPw4AiZ+DrHFfdahpTx30 # LV8GreA9dMBVb11c1wPGObs6vk722Z0pMcP+mjR2PD5Vzp1jKk96RRnv7Wc6TgY8 # rCi6Q4KOfpSLTuhSTTZF9YEQpPqWvLMLSnRd6RW97WtfDcpbAGr8hwGU20B730dz # XV5IXjWDyxzgFyYczheduR3EW6n+u6GCF5UwgheRBgorBgEEAYI3AwMBMYIXgTCC # F30GCSqGSIb3DQEHAqCCF24wghdqAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFQBgsq # hkiG9w0BCRABBKCCAT8EggE7MIIBNwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDemIxggGmLdaFWGzkpM6lMC8W19zf2rlAjhaJfXbLwegIGZbwTMZFC # GBEyMDI0MDIxMjE0MDgyNC43WjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # 7TCCByAwggUIoAMCAQICEzMAAAHpD3Ewfl3xEjYAAQAAAekwDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTI2 # WhcNMjUwMzA1MTg0NTI2WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEArJqMMUEVYKeE0nN502usqwDyZ1egO2mWJ08P8sfdLtQ0 # h/PZ730Dc2/uX5gSvKaR++k5ic4x1HCJnfOOQP6b2WOTvDwgbuxqvseV3uqZULeM # cFVFHECE8ZJTmdUZvXyeZ4fIJ8TsWnsxTDONbAyOyzKSsCCkDMFw3LWCrwskMupD # trFSwetpBfPdmcHGKYiFcdy09Sz3TLdSHkt+SmOTMcpUXU0uxNSaHJd9DYHAYiX6 # pzHHtOXhIqSLEzuAyJ//07T9Ucee1V37wjvDUgofXcbMr54NJVFWPrq6vxvEERaD # pf+6DiNEX/EIPt4cmGsh7CPcLbwxxp099Da+Ncc06cNiOmVmiIT8DLuQ73ZBBs1e # 72E97W/bU74mN6bLpdU+Q/d/PwHzS6mp1QibT+Ms9FSQUhlfoeumXGlCTsaW0iIy # JmjixdfDTo5n9Z8A2rbAaLl1lxSuxOUtFS0cqE6gwsRxuJlt5qTUKKTP1NViZ47L # FkJbivHm/jAypZPRP4TgWCrNin3kOBxu3TnCvsDDmphn8L5CHu3ZMpc5vAXgFEAv # C8awEMpIUh8vhWkPdwwJX0GKMGA7cxl6hOsDgE3ihSN9LvWJcQ08wLiwytO93J3T # FeKmg93rlwOsVDQqM4O64oYh1GjONwJm/RBrkZdNtvsj8HJZspLLJN9GuEad7/UC # AwEAAaOCAUkwggFFMB0GA1UdDgQWBBSRfjOJxQh2I7iI9Frr/o3I7QfsTjAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIH # gDANBgkqhkiG9w0BAQsFAAOCAgEAVrEqfq5rMRS3utQBPdCnp9lz4EByQ4kuEmy4 # b831Ywzw5jnURO+bkKIWIRTHRsBym1ZiytJR1dQKc/x3ImaKMnqAL5B0Gh5i4cAR # pKMgAFcXGmlJxzSFEvS73i9ND8JnEgy4DdFfxcpNtEKRwxLpMCkfJH2gRF/NwMr0 # M5X/26AzaFihIKXQLC/Esws1xS5w6M8wiRqtEc8EIHhAa/BOCtsENllyP2ScWUv/ # ndxXcBuBKwRc81Ikm1dpt8bDD93KgkRQ7SdQt/yZ41zAoZ5vWyww9cGie0z6ecGH # b9DpffmjdLdQZjswo/A5qirlMM4AivU47cOSlI2jukI3oB853V/7Wa2O/dnX0QF6 # +XRqypKbLCB6uq61juD5S9zkvuHIi/5fKZvqDSV1hl2CS+R+izZyslyVRMP9RWzu # Phs/lOHxRcbNkvFML6wW2HHFUPTvhZY+8UwHiEybB6bQL0RKgnPv2Mc4SCpAPPEP # EISSlA7Ws2rSR+2TnYtCwisIKkDuB/NSmRg0i5LRbzUYYfGQQHp59aVvuVARmM9h # qYHMVVyk9QrlGHZR0fQ+ja1YRqnYRk4OzoP3f/KDJTxt2I7qhcYnYiLKAMNvjISN # c16yIuereiZCe+SevRfpZIfZsiSaTZMeNbEgdVytoyVoKu1ZQbj9Qbl42d6oMpva # 9cL9DLUwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3 # DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw # MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx # MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/ # XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1 # hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7 # M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K # Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy # 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80 # 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc # NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha # YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL # iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV # 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG # CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp # zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT # MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI # KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG # MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a # GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br # aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG # AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN # AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 # OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA # A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz # aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L # GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m # Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0 # SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko # JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm # PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482 # 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7 # vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC # AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAl # BgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBOTM1LTAzRTAtRDk0NzElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAq2mH # 9cQ5NqzJ1P1SaNhhitZ8aPGggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOl0aJwwIhgPMjAyNDAyMTIwOTUxMjRa # GA8yMDI0MDIxMzA5NTEyNFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6XRonAIB # ADAKAgEAAgItuQIB/zAHAgEAAgIT/zAKAgUA6XW6HAIBADA2BgorBgEEAYRZCgQC # MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG # SIb3DQEBCwUAA4IBAQAEn7XGAcba+00JpDuImk+yxSvNtcVnuFZHwzlnxkHPeqq/ # iXGDMMdtjBY37VZLFghDsAblhz8MlMPbH+x0LjuHH1RLk/12N7/8k5pGE3CQzM/o # 6kJXy9dDUgPsYX0lgYr54BJ4aSHJfQMIBZGI1YH7whpXqWij43QuoJIn7J/puKW+ # s9CmMJuUEMhy9Kv0yxTr35WeI8b7w8z33GK83+J2FtoDZGYuNcNzhbB5Iu4t5J+L # yf6WvYXvNOsjwD8Hg7FSRS87QbtmxcXCv/mrcklnohUIhRBoV4MTRTskmjm5p22j # 6hPcfxjYRSTDqnln3VV6hp2FYjRp8uZ4AxFfvgWfMYIEDTCCBAkCAQEwgZMwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekw # DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv # BgkqhkiG9w0BCQQxIgQgNIwgWdNZZyuwQ1nujQyC1dQDbzJcsi2i0LugG5sX9wow # gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCkkJJ4l2k3Jo9UykFhfsdlOK4l # aKxg/E8JoFWzfarEJTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwAhMzAAAB6Q9xMH5d8RI2AAEAAAHpMCIEIEvuuwh53GZXFDr89wDnAkDzQPid # 5ZrJ8dezDouZmqH9MA0GCSqGSIb3DQEBCwUABIICACLmbSjER6gD/pLf7ubrlHKa # QbZl+fwwfzynaeygD0dNELvVXsD50IXJgfT7mFaGLvgA68mmWCEUmgOg+Rh0VobA # jcxOTPS9gO+DgASibfqeiRQgV1b0VbWMVwm+lcBUZHkGkDa29/RotoG7G4mj97eU # Bv6jpjuPtoufw+9Ko5NtG8D3/qZep+24eR3/5kpX37fbaSKLNd5kD9JjatQlsmRd # xpxPvr6Z7nn9c/cr3JEXlgWhwpk9j0qDa6IR3Wl+rS3krqx6NQ6AfrUxnbyU9Wfo # vbWasLfcn7SH6YNLglhGXG3r9QhZHL1qQyCS88xNXfKExKPDqzY6ur4xCE6mMrWN # kGPaW1RNlcCnQiJ3UgZEcTTfD05MZ9lcNUQ9PsgO71F0eFrSOk4jssoBRC8suvS1 # P86eRJNaNF5hhQ4S1RELLkgODKWnYBYhM3AcgRF9l+SO+7FnHr1wG4mOY/l7svgO # X3ITl83fJ/r6rGWWiMvWO3rbWvugS5C6BcTffNQU5UpfTGpJfWmqDCxjLGkS4G3e # atf3tVAppqvYfnQLJbm4XiU2/2zJbxdqfBofBN7Wd7WOuh67pU6pAn/LMsz4CEBN # 1vjAyfj2EHqpBWqf4eA8PPofPUeIvOLTqGBIPFoHykM9tS1XEy1MlRa9i9KSIW6G # O8oC+uHTE0+7nVDQ+y5a # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_36.ps1
sample_15_36.ps1
######################################################################################### # # Copyright (c) Microsoft Corporation. All rights reserved. # # Localized PSGet.Resource.psd1 # ######################################################################################### ConvertFrom-StringData @' ###PSLOC InstallModulewhatIfMessage=Version '{1}' of module '{0}' InstallScriptwhatIfMessage=Version '{1}' of script '{0}' UpdateModulewhatIfMessage=Version '__OLDVERSION__' of module '{0}', updating to version '{1}' UpdateScriptwhatIfMessage=Version '__OLDVERSION__' of script '{0}', updating to version '{1}' PublishModulewhatIfMessage=Version '{0}' of module '{1}' PublishScriptwhatIfMessage=Version '{0}' of script '{1}' NewScriptFileInfowhatIfMessage=Creating the '{0}' PowerShell Script file UpdateScriptFileInfowhatIfMessage=Updating the '{0}' PowerShell Script file NameShouldNotContainWildcardCharacters=The specified name '{0}' should not contain any wildcard characters, please correct it and try again. AllVersionsCannotBeUsedWithOtherVersionParameters=You cannot use the parameter AllVersions with RequiredVersion, MinimumVersion or MaximumVersion in the same command. VersionRangeAndRequiredVersionCannotBeSpecifiedTogether=You cannot use the parameters RequiredVersion and either MinimumVersion or MaximumVersion in the same command. Specify only one of these parameters in your command. RequiredVersionAllowedOnlyWithSingleModuleName=The RequiredVersion parameter is allowed only when a single module name is specified as the value of the Name parameter, without any wildcard characters. MinimumVersionIsGreaterThanMaximumVersion=The specified MinimumVersion '{0}' is greater than the specified MaximumVersion '{1}'. AllowPrereleaseRequiredToUsePrereleaseStringInVersion=The '-AllowPrerelease' parameter must be specified when using the Prerelease string in MinimumVersion, MaximumVersion, or RequiredVersion. UpdateModuleAdminPrivilegeRequiredForAllUsersScope=Administrator rights are required to update modules in '{0}'. Log on to the computer with an account that has Administrator rights, and then try again, or update '{1}' by adding "-Scope CurrentUser" to your command. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). InstallModuleAdminPrivilegeRequiredForAllUsersScope=Administrator rights are required to install modules in '{0}'. Log on to the computer with an account that has Administrator rights, and then try again, or install '{1}' by adding "-Scope CurrentUser" to your command. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). InstallScriptAdminPrivilegeRequiredForAllUsersScope=Administrator rights are required to install scripts in '{0}'. Log on to the computer with an account that has Administrator rights, and then try again, or install '{1}' by adding "-Scope CurrentUser" to your command. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). AdministratorRightsNeededOrSpecifyCurrentUserScope=Administrator rights are required to install or update. Log on to the computer with an account that has Administrator rights, and then try again, or install by adding "-Scope CurrentUser" to your command. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). VersionParametersAreAllowedOnlyWithSingleName=The RequiredVersion, MinimumVersion, MaximumVersion, AllVersions or AllowPrerelease parameters are allowed only when you specify a single name as the value of the Name parameter, without any wildcard characters. PathIsNotADirectory=The specified path '{0}' is not a valid directory. ModuleAlreadyInstalled=Version '{0}' of module '{1}' is already installed at '{2}'. To delete version '{3}' and install version '{4}', run Install-Module, and add the -Force parameter. ScriptAlreadyInstalled=Version '{0}' of script '{1}' is already installed at '{2}'. To delete version '{3}' and install version '{4}', run Install-Script, and add the -Force parameter. CommandAlreadyAvailable=A command with name '{0}' is already available on this system. This script '{0}' may override the existing command. If you still want to install this script '{0}', use -Force parameter. ModuleAlreadyInstalledSxS=Version '{0}' of module '{1}' is already installed at '{2}'. To install version '{3}', run Install-Module and add the -Force parameter, this command will install version '{5}' side-by-side with version '{4}'. ModuleAlreadyInstalledVerbose=Version '{0}' of module '{1}' is already installed at '{2}'. ScriptAlreadyInstalledVerbose=Version '{0}' of script '{1}' is already installed at '{2}'. ModuleWithRequiredVersionAlreadyInstalled=Version '{0}' of module '{1}' is already installed at '{2}'. To reinstall this version '{3}', run Install-Module or Updated-Module cmdlet with the -Force parameter. InvalidPSModule=The module '{0}' cannot be installed or updated because it is not a properly-formed module. InvalidPowerShellScriptFile=The script '{0}' cannot be installed or updated because it is not a properly-formed script. InvalidAuthenticodeSignature=The module '{0}' cannot be installed or updated because the Authenticode signature for the file '{1}' is not valid. ModuleNotInstalledOnThisMachine=Module '{0}' was not updated because no valid module was found in the module directory. Verify that the module is located in the folder specified by $env:PSModulePath. ScriptNotInstalledOnThisMachine=Script '{0}' was not updated because no valid script was found in the script directories '{1}' and '{2}'. AdminPrivilegesRequiredForUpdate=Module '{0}' (installed at '{1}') cannot be updated because Administrator rights are required to change that directory. Log on to the computer with an account that has Administrator rights, and then try again. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). AdminPrivilegesRequiredForScriptUpdate=Script '{0}' (installed at '{1}') cannot be updated because Administrator rights are required to change that script. Log on to the computer with an account that has Administrator rights, and then try again. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). ModuleNotInstalledUsingPowerShellGet=Module '{0}' was not installed by using Install-Module, so it cannot be updated. ScriptNotInstalledUsingPowerShellGet=Script '{0}' was not installed by using Install-Script, so it cannot be updated. DownloadingModuleFromGallery=Downloading module '{0}' with version '{1}' from the repository '{2}'. DownloadingScriptFromGallery=Downloading script '{0}' with version '{1}' from the repository '{2}'. NoUpdateAvailable=No updates were found for module '{0}'. NoScriptUpdateAvailable=No updates were found for script '{0}'. FoundModuleUpdate=An update for the module '{0}' was found with version '{1}'. FoundScriptUpdate=An update for the script '{0}' was found with version '{1}'. InvalidPSModuleDuringUpdate= Module '{0}' was not updated because the module in the repository '{1}' is not a valid Windows PowerShell module. ModuleGotUpdated=Module '{0}' has been updated successfully. TestingModuleInUse=Testing if the module to update is in use. ModuleDestination= The specified module will be installed in '{0}'. ScriptDestination= The specified script will be installed in '{0}' and its dependent modules will be installed in '{1}'. ModuleIsInUse=Module '{0}' is in currently in use or you don't have the required permissions. ModuleInstalledSuccessfully=Module '{0}' was installed successfully to path '{1}'. ModuleSavedSuccessfully=Module '{0}' was saved successfully to path '{1}'. ScriptInstalledSuccessfully=Script '{0}' was installed successfully to path '{1}'. ScriptSavedSuccessfully=Script '{0}' was saved successfully to path '{1}'. CheckingForModuleUpdate= Checking for updates for module '{0}'. CheckingForScriptUpdate= Checking for updates for script '{0}'. ModuleInUseWithProcessDetails=The version '{0}' of module '{1}' is currently in use. Retry the operation after closing the following applications: '{2}'. ModuleVersionInUse=The version '{0}' of module '{1}' is currently in use. Retry the operation after closing the applications. ModuleNotAvailableLocally=The specified module '{0}' was not published because no module with that name was found in any module directory. InvalidModulePathToPublish=The specified module with path '{0}' was not published because no valid module was found with that path. ModuleWithRequiredVersionNotAvailableLocally= The specified module '{0}' with version '{1}' was not published because no module with that name and version was found in any module directory. AmbiguousModuleName=Modules with the name '{0}' are available under multiple paths. Add the -RequiredVersion parameter or the -Path parameter to specify the module to publish. AmbiguousModulePath=Multiple versions are available under the specified module path '{0}'. Specify the full path to the module to be published. PublishModuleLocation=Module '{0}' was found in '{1}'. InvalidModuleToPublish=Module '{0}' cannot be published because it does not have a module manifest file. Run New-ModuleManifest -Path <PathName> to create a module manifest with metadata before publishing. MissingRequiredManifestKeys=Module '{0}' cannot be published because it is missing required metadata. Verify that the module manifest specifies Description and Author. InvalidCharactersInPrereleaseString=The Prerelease string '{0}' contains invalid characters. Please ensure that only characters 'a-zA-Z0-9' and possibly hyphen ('-') at the beginning are in the Prerelease string. IncorrectVersionPartsCountForPrereleaseStringUsage=Version '{0}' must have exactly 3 parts for a Prerelease string to be used. ModuleVersionShouldBeGreaterThanGalleryVersion=Module '{0}' with version '{1}' cannot be published. The version must exceed the current version '{2}' that exists in the repository '{3}', or you must specify -Force. ModuleVersionIsAlreadyAvailableInTheGallery=The module '{0}' with version '{1}' cannot be published as the current version '{2}' is already available in the repository '{3}'. CouldNotInstallNuGetProvider=NuGet provider is required to interact with NuGet-based repositories. Please ensure that '{0}' or newer version of NuGet provider is installed. CouldNotInstallNuGetExe=NuGet.exe version '{0}' or newer, or dotnet command version '{1}' or newer is required to interact with NuGet-based repositories. Please ensure that NuGet.exe or dotnet command is available under one of the paths specified in PATH environment variable value. CouldNotUpgradeNuGetExe=NuGet.exe version '{0}' or newer, or dotnet command version '{1}' or newer is required to interact with NuGet-based repositories. Please ensure that required version of NuGet.exe or dotnet command is available under one of the paths specified in PATH environment variable value. CouldNotFindDotnetCommand=For publish operations, dotnet command version '{0}' or newer is required to interact with the NuGet-based repositories. Please ensure that dotnet command version '{0}' or newer is installed and available under one of the paths specified in PATH environment variable value. You can also install the dotnet command by following the instructions specified at '{1}'. CouldNotInstallNuGetBinaries2=PowerShellGet requires NuGet.exe (or dotnet command) and NuGet provider version '{0}' or newer to interact with the NuGet-based repositories. Please ensure that '{0}' or newer version of NuGet provider is installed and NuGet.exe (or dotnet command) is available under one of the paths specified in PATH environment variable value. InstallNugetBinariesUpgradeShouldContinueQuery=This version of PowerShellGet requires minimum version '{0}' of NuGet.exe and minimum version '{1}' of NuGet provider to publish an item to NuGet-based repositories. The NuGet provider must be available in '{2}' or '{3}'. You can also install the NuGet provider by running 'Install-PackageProvider -Name NuGet -MinimumVersion {0} -Force'. NuGet.exe must be available in '{4}' or '{5}', or under one of the paths specified in PATH environment variable value. NuGet.exe can be downloaded from https://aka.ms/psget-nugetexe. For more information, see https://go.microsoft.com/fwlink/?linkid=875534. Do you want PowerShellGet to upgrade NuGet.exe to the latest version and install the NuGet provider now? InstallNuGetBinariesShouldContinueQuery=This version of PowerShellGet requires minimum version '{0}' of NuGet.exe and minimum version '{1}' of NuGet provider to publish an item to NuGet-based repositories. The NuGet provider must be available in '{3}' or '{3}'. You can also install the NuGet provider by running 'Install-PackageProvider -Name NuGet -MinimumVersion {0} -Force'. NuGet.exe must be available in '{4}' or '{5}', or under one of the paths specified in PATH environment variable value. NuGet.exe can be downloaded from https://aka.ms/psget-nugetexe. For more information, see https://go.microsoft.com/fwlink/?linkid=875534. Do you want PowerShellGet to install both the latest NuGet.exe and NuGet provider now? InstallNugetExeUpgradeShouldContinueQuery=This version of PowerShellGet requires minimum version '{0}' of NuGet.exe to publish an item to the NuGet-based repositories. NuGet.exe must be available in '{1}' or '{2}', or under one of the paths specified in PATH environment variable value. NuGet.exe can be downloaded from https://aka.ms/psget-nugetexe. For more information, see https://aka.ms/installing-powershellget . Do you want PowerShellGet to upgrade to the latest version of NuGet.exe now? InstallNuGetExeShouldContinueQuery=This version of PowerShellGet requires minimum version '{0}' of NuGet.exe to publish an item to the NuGet-based repositories. NuGet.exe must be available in '{1}' or '{2}', or under one of the paths specified in PATH environment variable value. NuGet.exe can be downloaded from https://aka.ms/psget-nugetexe. For more information, see https://aka.ms/installing-powershellget . Do you want PowerShellGet to install the latest version of NuGet.exe now? InstallNuGetProviderShouldContinueQuery=This version of PowerShellGet requires minimum version '{0}' of NuGet provider to publish an item to NuGet-based repositories. The NuGet provider must be available in '{1}' or '{2}'. You can also install the NuGet provider by running 'Install-PackageProvider -Name NuGet -MinimumVersion {0} -Force'. Do you want PowerShellGet to install and import the NuGet provider now? InstallNuGetBinariesUpgradeShouldContinueCaption=NuGet.exe upgrade and NuGet provider installation are required to continue InstallNuGetBinariesShouldContinueCaption=NuGet.exe and NuGet provider installation are required to continue InstallNuGetExeUpgradeShouldContinueCaption=NuGet.exe upgrade is required to continue InstallNuGetExeShouldContinueCaption=NuGet.exe is required to continue InstallNuGetProviderShouldContinueCaption=NuGet provider is required to continue DownloadingNugetExe=Installing NuGet.exe. DownloadingNugetProvider=Installing NuGet provider. ModuleNotFound=Module '{0}' was not found. NoMatchFound=No match was found for the specified search criteria and module names '{0}'. NoMatchFoundForScriptName=No match was found for the specified search criteria and script names '{0}'. MatchInvalidType=The name '{0}' is a {1} not a {2}. FailedToCreateCompressedModule=Failed to generate the compressed file for module '{0}'. FailedToPublish=Failed to publish module '{0}': '{1}'. PublishedSuccessfully=Successfully published module '{0}' to the module publish location '{1}'. Please allow few minutes for '{2}' to show up in the search results. InvalidWebUri=The specified Uri '{0}' for parameter '{1}' is an invalid Web Uri. Please ensure that it meets the Web Uri requirements. RepositoryAlreadyRegistered=The repository could not be registered because there exists a registered repository with Name '{0}' and SourceLocation '{1}'. To register another repository with Name '{2}', please unregister the existing repository using the Unregister-PSRepository cmdlet. RepositoryToBeUnregisteredNotFound=The repository '{0}' was not removed because no repository was found with that name. Please run Get-PSRepository and ensure that a repository of that name is present. RepositoryCannotBeUnregistered=The specified repository '{0}' cannot be unregistered. RepositoryNotFound=No repository with the name '{0}' was found. PSGalleryNotFound=Unable to find repository '{0}'. Use Get-PSRepository to see all available repositories. Try again after specifying a valid repository name. You can use 'Register-PSRepository -Default' to register the PSGallery repository. ParameterIsNotAllowedWithPSGallery=The PSGallery repository has pre-defined locations. The '{0}' parameter is not allowed, try again after removing the '{0}' parameter. UseDefaultParameterSetOnRegisterPSRepository=Use 'Register-PSRepository -Default' to register the PSGallery repository. RepositoryNameContainsWildCards=The repository name '{0}' should not have wildcards, correct it and try again. InvalidRepository=The specified repository '{0}' is not a valid registered repository name. Please ensure that '{1}' is a registered repository. RepositoryCannotBeRegistered=The specified repository '{0}' is unauthorized and cannot be registered. Try running with -Credential. RepositoryRegistered=Successfully registered the repository '{0}' with source location '{1}'. RepositoryUnregistered=Successfully unregistered the repository '{0}'. PSGalleryPublishLocationIsMissing=The specified repository '{0}' does not have a valid PublishLocation. Retry after setting the PublishLocation for repository '{1}' to a valid NuGet publishing endpoint using the Set-PSRepository cmdlet. PSRepositoryScriptPublishLocationIsMissing=The specified repository '{0}' does not have a valid ScriptPublishLocation. Retry after setting the ScriptPublishLocation for repository '{1}' to a valid NuGet publishing endpoint using the Set-PSRepository cmdlet. ScriptSourceLocationIsMissing=The specified repository '{0}' does not have a valid ScriptSourceLocation. Retry after setting the ScriptSourceLocation for repository '{0}' to a valid NuGet endpoint for scripts using the Set-PSRepository cmdlet. PublishModuleSupportsOnlyNuGetBasedPublishLocations=Publish-Module only supports the NuGet-based publish locations. The PublishLocation '{0}' of the repository '{1}' is not a NuGet-based publish location. Retry after setting the PublishLocation for repository '{1}' to a valid NuGet publishing endpoint using the Set-PSRepository cmdlet. PublishScriptSupportsOnlyNuGetBasedPublishLocations=Publish-Script only supports the NuGet-based publish locations. The ScriptPublishLocation '{0}' of the repository '{1}' is not a NuGet-based publish location. Retry after setting the ScriptPublishLocation for repository '{1}' to a valid NuGet publishing endpoint using the Set-PSRepository cmdlet. DynamicParameterHelpMessage=The dynamic parameter '{0}' is required for Find-Module and Install-Module when using the PackageManagement provider '{1}' and source location '{2}'. Please enter your value for the '{3}' dynamic parameter: ProviderApiDebugMessage=In PowerShellGet Provider - '{0}'. ModuleUninstallNotSupported=Module uninstallation is not supported. To remove a module, please delete the module folder. FastPackageReference=The FastPackageReference is '{0}'. PackageManagementProviderIsNotAvailable=The specified PackageManagement provider '{0}' is not available. SpecifiedSourceName=Using the specified source names : '{0}'. SpecifiedLocationAndOGP=The specified Location is '{0}' and PackageManagementProvider is '{1}'. NoSourceNameIsSpecified=The -Repository parameter was not specified. PowerShellGet will use all of the registered repositories. GettingPackageManagementProviderObject=Getting the provider object for the PackageManagement Provider '{0}'. InvalidInputObjectValue=Invalid value is specified for InputObject parameter. SpecifiedInstallationScope=The installation scope is specified to be '{0}'. SourceLocationValueForPSGalleryCannotBeChanged=The SourceLocation value for the PSGallery repository can not be changed. PublishLocationValueForPSGalleryCannotBeChanged=The PublishLocation value for the PSGallery repository can not be changed. SpecifiedProviderName=The specified PackageManagement provider name '{0}'. ProviderNameNotSpecified=User did not specify the PackageManagement provider name, trying with the provider name '{0}'. SpecifiedProviderNotAvailable=The specified PackageManagement provider '{0}' is not available. SpecifiedProviderDoesnotSupportPSModules=The specified PackageManagement Provider '{0}' does not support PowerShell Modules. PackageManagement Providers must support the 'supports-powershell-modules' feature. PollingPackageManagementProvidersForLocation=Polling available PackageManagement Providers to find one that can support the specified source location '{0}'. PollingSingleProviderForLocation=Resolving the source location '{0}' with PackageManagement Provider '{1}'. FoundProviderForLocation=The PackageManagement provider '{0}' supports the source location '{1}'. SpecifiedLocationCannotBeRegistered=The specified location '{0}' cannot be registered. RepositoryDetails=Repository details, Name = '{0}', Location = '{1}'; IsTrusted = '{2}'; IsRegistered = '{3}'. NotSupportedPowerShellGetFormatVersion=The specified module '{0}' with PowerShellGetFormatVersion '{1}' is not supported by the current version of PowerShellGet. Get the latest version of the PowerShellGet module to install this module, '{2}'. NotSupportedPowerShellGetFormatVersionScripts=The specified script '{0}' with PowerShellGetFormatVersion '{1}' is not supported by the current version of PowerShellGet. Get the latest version of the PowerShellGet module to install this script, '{2}'. PathNotFound=Cannot find the path '{0}' because it does not exist. ModuleIsNotTrusted=Untrusted module '{0}'. ScriptIsNotTrusted=Untrusted script '{0}'. SkippedModuleDependency=Because dependent module '{0}' was skipped in the module dependencies list, users might not know how to install it. MissingExternallyManagedModuleDependency=The externally managed, dependent module '{0}' is not installed on this computer. To use the current module '{1}', ensure that its dependent module '{2}' is installed. ExternallyManagedModuleDependencyIsInstalled=The externally managed, dependent module '{0}' is already installed on this computer. ScriptMissingExternallyManagedModuleDependency=The externally managed, dependent module '{0}' is not installed on this computer. To use the current script '{1}', ensure that its dependent module '{2}' is installed. ScriptMissingExternallyManagedScriptDependency=The externally managed, dependent module '{0}' is not installed on this computer. To use the current script '{1}', ensure that its dependent script '{2}' is installed. ScriptExternallyManagedScriptDependencyIsInstalled=The externally managed, dependent script '{0}' is already installed on this computer. UnableToResolveModuleDependency=PowerShellGet cannot resolve the module dependency '{0}' of the module '{1}' on the repository '{2}'. Verify that the dependent module '{3}' is available in the repository '{4}'. If this dependent module '{5}' is managed externally, add it to the ExternalModuleDependencies entry in the PSData section of the module manifest. FindingModuleDependencies=Finding module dependencies for version '{1}' of the module '{0}' from repository '{2}'. InstallingDependencyModule=Installing the dependency module '{0}' with version '{1}' for the module '{2}'. InstallingDependencyScript=Installing the dependency script '{0}' with version '{1}' for the script '{2}'. SavingDependencyModule=Saving the dependency module '{0}' with version '{1}' for the module '{2}'. SavingDependencyScript=Saving the dependency script '{0}' with version '{1}' for the script '{2}'. ModuleUninstallationSucceeded=Successfully uninstalled the module '{0}' from module base '{1}'. ScriptUninstallationSucceeded=Successfully uninstalled the script '{0}' from script base '{1}'. AdminPrivilegesRequiredForUninstall=You cannot uninstall the module '{0}' from '{1}' because Administrator rights are required to uninstall from that folder. Log on to the computer with an account that has Administrator rights, and then try again. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). AdminPrivilegesRequiredForScriptUninstall=You cannot uninstall the script '{0}' from '{1}' because Administrator rights are required to uninstall from that folder. Log on to the computer with an account that has Administrator rights, and then try again. You can also try running the Windows PowerShell session with elevated rights (Run as Administrator). ModuleUninstallationNotPossibleAsItIsNotInstalledUsingPowerShellGet=Module '{0}' was not installed on this computer by using either the PowerShellGet cmdlets or the PowerShellGet provider, so it cannot be uninstalled. ScriptUninstallationNotPossibleAsItIsNotInstalledUsingPowerShellGet=Script '{0}' was not installed on this computer by using either the PowerShellGet cmdlets or the PowerShellGet provider, so it cannot be uninstalled. UnableToUninstallModuleVersion=The module '{0}' of version '{1}' in module base folder '{2}' was installed without side-by-side version support. Some versions are installed in this module base with side-by-side version support. Uninstall other versions of this module before uninstalling the most current version. UnableToUninstallAsOtherModulesNeedThisModule=The module '{0}' of version '{1}' in module base folder '{2}' cannot be uninstalled, because one or more other modules '{3}' are dependent on this module. Uninstall the modules that depend on this module before uninstalling module '{4}'. UnableToUninstallAsOtherScriptsNeedThisScript=The script '{0}' of version '{1}' in script base folder '{2}' cannot be uninstalled, because one or more other scripts '{3}' are dependent on this script. Uninstall the scripts that depend on this script before uninstalling script '{4}'. RepositoryIsNotTrusted=Untrusted repository QueryInstallUntrustedPackage=You are installing the modules from an untrusted repository. If you trust this repository, change its InstallationPolicy value by running the Set-PSRepository cmdlet. Are you sure you want to install the modules from '{1}'? QueryInstallUntrustedScriptPackage=You are installing the scripts from an untrusted repository. If you trust this repository, change its InstallationPolicy value by running the Set-PSRepository cmdlet. Are you sure you want to install the scripts from '{1}'? QuerySaveUntrustedPackage=You are downloading the modules from an untrusted repository. If you trust this repository, change its InstallationPolicy value by running the Set-PSRepository cmdlet. Are you sure you want to download the modules from '{1}'? QuerySaveUntrustedScriptPackage=You are downloading the scripts from an untrusted repository. If you trust this repository, change its InstallationPolicy value by running the Set-PSRepository cmdlet. Are you sure you want to download the scripts from '{1}'? SourceNotFound=Unable to find repository '{0}'. Use Get-PSRepository to see all available repositories. PSGalleryApiV2Deprecated=PowerShell Gallery v2 has been deprecated. Please run 'Update-Module -Name PowerShellGet' to update to PowerShell Gallery v3. For more information, please visit our website at 'https://www.powershellgallery.com'. PSGalleryApiV2Discontinued=PowerShell Gallery v2 has been discontinued. Please run 'Update-Module -Name PowerShellGet' to update to PowerShell Gallery v3. For more information, please visit our website at 'https://www.powershellgallery.com'. PowerShellGalleryUnavailable=PowerShell Gallery is currently unavailable. Please try again later. PowerShellGetModuleIsNotInstalledProperly=The PowerShellGet module was not installed properly. Be sure that only one instance or version of the PowerShellGet module is installed in the path '{0}'. PowerShelLGetModuleGotUpdated=The PowerShellGet module was updated successfully. Restart the process to use the updated version of the PowerShellGet module. TagsShouldBeIncludedInManifestFile=Tags are now supported in the module manifest file (.psd1). Update the module manifest file of module '{0}' in '{1}' with the newest tag changes. You can run Update-ModuleManifest -Tags to update the manifest with tags. ReleaseNotesShouldBeIncludedInManifestFile=ReleaseNotes is now supported in the module manifest file (.psd1). Update the module manifest file of module '{0}' in '{1}' with the newest ReleaseNotes changes. You can run Update-ModuleManifest -ReleaseNotes to update the manifest with ReleaseNotes. LicenseUriShouldBeIncludedInManifestFile=LicenseUri is now supported in the module manifest file (.psd1). Update the module manifest file of module '{0}' with the newest LicenseUri changes. You can run Update-ModuleManifest -LicenseUri to update the manifest with LicenseUri. IconUriShouldBeIncludedInManifestFile=IconUri is now supported in the module manifest file (.psd1). Update the module manifest file of module '{0}' in '{1}' with the newest IconUri changes. You can run Update-ModuleManifest -IconUri to update the manifest with IconUri. ProjectUriShouldBeIncludedInManifestFile=ProjectUri is now supported in the module manifest file (.psd1). Update the module manifest file of module '{0}' in '{1}' with the newest ProjectUri changes. You can run Update-ModuleManifest -ProjectUri to update the manifest with ProjectUri. ShouldIncludeFunctionsToExport=This module '{0}' has exported functions. As a best practice, include exported functions in the module manifest file(.psd1). You can run Update-ModuleManifest -FunctionsToExport to update the manifest with ExportedFunctions field. ShouldIncludeCmdletsToExport=This module '{0}' has exported cmdlets. As a best practice, include exported cmdlets in the module manifest file(.psd1). You can run Update-ModuleManifest -CmdletsToExport to update the manifest with ExportedCmdlets field. ShouldIncludeDscResourcesToExport=This module '{0}' has exported DscResources. As a best practice, include exported DSC resources in the module manifest file(.psd1). If your PowerShell version is higher than 5.0, run Update-ModuleManifest -DscResourcesToExport to update the manifest with ExportedDscResources field. UpdateModuleManifestPathCannotFound=Cannot load the manifest file '{0}' properly. Please specify the correct manifest path. UpdatedModuleManifestNotValid=Cannot update the manifest file '{0}' because the manifest is not valid. Verify that the manifest file is valid, and then try again.'{1}' ExportedDscResourcesNotSupportedOnLowerPowerShellVersion=The ExportedDscResources property is not supported in module manifests on PowerShell versions that are older than 5.0. Remove the value for the parameter 'DscResourcesToExport', and then try again. CompatiblePSEditionsNotSupportedOnLowerPowerShellVersion=The CompatiblePSEditions property is not supported in module manifests on PowerShell versions that are older than 5.1. Remove the value for the parameter 'CompatiblePSEditions', and then try again. ExternalModuleDependenciesNotSpecifiedInRequiredOrNestedModules='{0}' is listed in ExternalModuleDependencies, but it is not found in either the RequiredModules or NestedModules properties. Verify that this module is required for ExternalModuleDependencies, and then add it to NestedModules or RequiredModules. TestModuleManifestFail=Cannot update the manifest properly. '{0}' PackageManagementProvidersNotInModuleBaseFolder=PackageManagementProvider '{0}' is not found in the module base '{1}'. Verify that the PackageManagementProvider specified is within the module base. UpdateManifestContentMessage=Update manifest file with new contents: InvalidPackageManagementProviderValue=The PackageManagementProvider value cannot be '{0}'. Valid values for provider names include '{1}', and the default value for this parameter is '{2}'. PowerShellGetUpdateIsNotSupportedOnLowerPSVersions=Self update of the PowerShellGet module is supported only in PowerShell 5.0 and newer releases. It is not supported in PowerShell 3.0 or 4.0. ScriptVersionShouldBeGreaterThanGalleryVersion=Script '{0}' with version '{1}' cannot be published. The version must exceed the current version '{2}' that exists in the repository '{3}', or you must specify -Force. ScriptVersionIsAlreadyAvailableInTheGallery=The script '{0}' with version '{1}' cannot be published as the current version '{2}' is already available in the repository '{3}'. ScriptPrereleaseStringShouldBeGreaterThanGalleryPrereleaseString=Script '{0}' with version '{1}' and prerelease '{2}' cannot be published. The prerelease string must exceed the current prerelease string '{3}' that exists in the repository '{4}', or you must specify -Force. ScriptParseError=The specified script file '{0}' has parse errors, try again after fixing the parse errors. InvalidScriptToPublish=Script file '{0}' cannot be published because it does not have the required script metadata. Run Update-ScriptFileInfo -Path '{1}' to add the script metadata. FailedToCreateCompressedScript=Failed to generate the compressed file for script '{0}'. FailedToPublishScript=Failed to publish script '{0}': '{1}'. PublishedScriptSuccessfully=Successfully published script '{0}' to the publish location '{1}'. Please allow few minutes for '{2}' to show up in the search results. UnableToResolveScriptDependency=PowerShellGet cannot resolve the {0} dependency '{1}' of the script '{2}' on the repository '{3}'. Verify that the dependent {0} '{1}' is available in the repository '{3}'. If this dependent {0} '{1}' is managed externally, add it to the '{4}' entry in the script metadata. InvalidVersion=Cannot convert value '{0}' to type 'System.Version'. InvalidGuid=Cannot convert value '{0}' to type 'System.Guid'. InvalidParameterValue=The specified value '{0}' for the parameter '{1}' is invalid. Ensure that it does not contain '<#' or '#>'. MissingPSScriptInfo=PSScriptInfo is not specified in the script file '{0}'. You can use the Update-ScriptFileInfo with -Force or New-ScriptFileInfo cmdlet to add the PSScriptInfo to the script file. MissingRequiredPSScriptInfoProperties=Script '{0}' is missing required metadata properties. Verify that the script file has Version, Guid, Description and Author properties. You can use the Update-ScriptFileInfo or New-ScriptFileInfo cmdlet to add or update the PSScriptInfo to the script file. SkippedScriptDependency=Because dependent script '{0}' was skipped in the script dependencies list, users might not know how to install it. SourceLocationPathsForModulesAndScriptsShouldBeEqual=SourceLocation '{0}' and ScriptSourceLocation '{1}' should be same for SMB Share or Local directory based repositories. PublishLocationPathsForModulesAndScriptsShouldBeEqual=PublishLocation '{0}' and ScriptPublishLocation '{1}' should be same for SMB Share or Local directory based repositories. SpecifiedNameIsAlearyUsed=The specified name '{0}' is already used for a different item on the specified repository '{1}'. Run '{2} -Name {0} -Repository {1}' to check whether the specified name '{0}' is already taken. InvalidScriptFilePath=The script file path '{0}' is not valid. The value of the Path argument must resolve to a single file that has a '.ps1' extension. Change the value of the Path argument to point to a valid ps1 file, and then try again. NuGetApiKeyIsRequiredForNuGetBasedGalleryService=NuGetApiKey is required for publishing a module or script file to the specified repository '{0}' whose publish location is '{1}'. Try again after specifying a valid value for the NuGetApiKey parameter. To get your API key, view your profile page. ScriptFileExist=The specified script file '{0}' already exists. InvalidEnvironmentVariableName=The specified environment variable name '{0}' exceeded the allowed limit of '{1}' characters. PublishLocation=Publish Location:'{0}'. ScriptPATHPromptCaption=PATH Environment Variable Change ScriptPATHPromptQuery=Your system has not been configured with a default script installation path yet, which means you can only run a script by specifying the full path to the script file. This action places the script into the folder '{0}', and adds that folder to your PATH environment variable. Do you want to add the script installation path '{0}' to the PATH environment variable? AddedScopePathToProcessSpecificPATHVariable=Added scripts installation location '{0}' for '{1}' scope to process specific PATH environment variable. AddedScopePathToPATHVariable=Added scripts installation location '{0}' for '{1}' scope to PATH environment variable. FilePathInFileListNotWithinModuleBase=Path '{0}' defined in FileList is not within module base '{1}'. Provide the correct FileList parameters and then try again. ManifestFileReadWritePermissionDenied=The current user does not have read-write permissions for the file:'{0}'. Check the file permissions and then try again. MissingTheRequiredPathOrPassThruParameter=The Path or PassThru parameter is required for creating the script file info. A new script file will be created with the script file info when the Path parameter is specified. Script file info will be returned if the PassThru parameter is specified. Try again after specifying the required parameter. DescriptionParameterIsMissingForAddingTheScriptFileInfo=Description parameter is missing for adding the metadata to the script file. Try again after specifying the description. UnableToAddPSScriptInfo=Unable to add PSScriptInfo to the script file '{0}'. You can use the New-ScriptFileInfo cmdlet to add the metadata to the existing script file. RegisterVSTSFeedAsNuGetPackageSource=Publishing to a VSTS package management feed '{0}' requires it to be registered as a NuGet package source. Retry after adding this source '{0}' as NuGet package source by following the instructions specified at '{1}' InvalidModuleAuthenticodeSignature=The module '{0}' cannot be installed or updated because the authenticode signature of the file '{1}' is not valid. InvalidCatalogSignature=The module '{0}' cannot be installed because the catalog signature in '{1}' does not match the hash generated from the module. AuthenticodeIssuerMismatch=Authenticode issuer '{0}' of the new module '{1}' with version '{2}' from root certificate authority '{3}' is not matching with the authenticode issuer '{4}' of the previously-installed module '{5}' with version '{6}' from root certificate authority '{7}'. If you still want to install or update, use -SkipPublisherCheck parameter. ModuleCommandAlreadyAvailable=The following commands are already available on this system:'{0}'. This module '{1}' may override the existing commands. If you still want to install this module '{1}', use -AllowClobber parameter. CatalogFileFound=Found the catalog file '{0}' in the module '{1}' contents. CatalogFileNotFoundInAvailableModule=Catalog file '{0}' is not found in the contents of the previously-installed module '{1}' with the same name. CatalogFileNotFoundInNewModule=Catalog file '{0}' is not found in the contents of the module '{1}' being installed. ValidAuthenticodeSignature=Valid authenticode signature found in the catalog file '{0}' for the module '{1}'. ValidAuthenticodeSignatureInFile=Valid authenticode signature found in the file '{0}' for the module '{1}'. ValidatingCatalogSignature=Validating the '{0}' module files for catalog signing using the catalog file '{1}'. AuthenticodeIssuerMatch=Authenticode issuer '{0}' of the new module '{1}' with version '{2}' matches with the authenticode issuer '{3}' of the previously-installed module '{4}' with version '{5}'. ValidCatalogSignature=The catalog signature in '{0}' of the module '{1}' is valid and matches with the hash generated from the module contents. SkippingPublisherCheck=Skipping the Publisher check for the version '{0}' of module '{1}'. SourceModuleDetailsForPublisherValidation=For publisher validation, using the previously-installed module '{0}' with version '{1}' under '{2}' with publisher name '{3}' from root certificate authority '{4}'. Is this module signed by Microsoft: '{5}'. NewModuleVersionDetailsForPublisherValidation=For publisher validation, current module '{0}' with version '{1}' with publisher name '{2}' from root certificate authority '{3}'. Is this module signed by Microsoft: '{4}'. PublishersMatch=Publisher '{0}' of the new module '{1}' with version '{2}' matches with the publisher '{3}' of the previously-installed module '{4}' with version '{5}'. Both versions are signed with a Microsoft root certificate. PublishersMismatch=A Microsoft-signed module named '{0}' with version '{1}' that was previously installed conflicts with the new module '{2}' from publisher '{3}' with version '{4}'. Installing the new module may result in system instability. If you still want to install or update, use -SkipPublisherCheck parameter. ModuleIsNotCatalogSigned=The version '{0}' of the module '{1}' being installed is not catalog signed. Ensure that the version '{0}' of the module '{1}' has the catalog file '{2}' and signed with the same publisher '{3}' as the previously-installed module '{1}' with version '{4}' under the directory '{5}'. If you still want to install or update, use -SkipPublisherCheck parameter. SentEnvironmentVariableChangeMessage=Successfully broadcasted the Environment variable changes. UnableToSendEnvironmentVariableChangeMessage=Error in broadcasting the Environment variable changes. LicenseUriNotSpecified='LicenseUri' is not specified. 'LicenseUri' must be provided when user license acceptance is required. LicenseTxtNotFound=License.txt not Found. License.txt must be provided when user license acceptance is required. LicenseTxtEmpty=License.txt is empty. requireLicenseAcceptanceNotSupported=Require License Acceptance is not supported on Format version '{0}'. AcceptanceLicenseQuery=Do you accept the license terms for module '{0}'. ForceAcceptLicense=License Acceptance is required for module '{0}'. Please specify '-AcceptLicense' to perform this operation. InvalidValueBoolean=The specified value '{0}' for the parameter '{1}' is invalid. It should be $true or $false. UserDeclinedLicenseAcceptance=User declined license acceptance. AcceptLicense=License Acceptance RequiredScriptVersion=REQUIREDSCRIPTS: Required version of script '{0}' is '{1}'. RequiredScriptVersoinFormat=<ScriptName>, <ScriptName>:<MinimumVersion>, <ScriptName>:[<RequiredVersion>], <ScriptName>:[<MinimumVersion>,<MaximumVersion>], <ScriptName>:[,<MaximumVersion>] FailedToParseRequiredScripts=Cannot parse REQUIREDSCRIPTS '{0}'. Acceptable formats are: '{1}'. FailedToParseRequiredScriptsVersion=Version format error: {0}, '{1}'. Acceptable formats are: '{2}'. PublishersMismatchAsWarning=Module '{0}' version '{1}' published by '{2}' will be superceded by version '{3}' published by '{4}'. If you do not trust the new publisher, uninstall the module. UnableToDownloadThePackage=The PackageManagement provider '{0}' is unable to download the package '{1}' version '{2}' to '{3}' path. ValidatingTheModule=Validating the '{0}' module contents under '{1}' path. ModuleValidationFailed=Unable to validate the '{0}' module contents under '{1}' path. ValidatedModuleManifestFile=Test-ModuleManifest successfully validated the module manifest file '{0}'. ValidateModuleAuthenticodeSignature=Validating the authenticode signature and publisher of the catalog file or module manifest file of the module '{0}'. ValidateModuleCommandAlreadyAvailable=Checking for possible command collisions for the module '{0}' commands. UnauthorizedAccessError=Access to the path '{0}' is denied. ###PSLOC '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAUMj4wb0r0V933 # Kxwf6eV800i5N8GnGMPseytvd1lnEKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICyLu3/JXoENJ3U3fIMgBHtH # 5zQa4QrBFHxw/rqRMm+6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJlFwU9pIj6pUIUbkepa4dkIarLeQ3r+IAQWoN34qRUAl6WAUvI0PPHle # D+rXzluh+x0CEiEVEF+RukwfdxGQjgjx7MQDRjS9UuAuaj3YK6p0rHoeRatZAJjq # 43I8iBX+pY7uwVuDye+udtqG6DEO4oRBcOmg+lQH/Xu2iXvfcq6WviaHutnt2TnJ # ma03jw4SMvjgyn/B/So5K44/Lo5dWKvB1z6prdr00lBxmXJ1iFXPGL1QGs9FXsI8 # LJfrJD9mjLRUkN5+pPwoBPDYPDHRDp3YClHLGufnHQlyH8H70sYZftuVT1tPAEKs # 72AWOhXMPWxOlx3vkS3wuQyMLbNl36GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBpYqwBUy/Fbjd+VcrBq0TspqG2Dc1XEAaLTu09g3n66AIGZbwTgT91 # GBMyMDI0MDIxNDIxMDAzMC42ODNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XcLlzAiGA8yMDI0MDIxNDA5NTEx # OVoYDzIwMjQwMjE1MDk1MTE5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdwuX # AgEAMAoCAQACAgcYAgH/MAcCAQACAhN4MAoCBQDpeF0XAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBADqLMXyC5Dog3YPoQyl5Wi6JlxW00Bnxt67c0MjcCxW1 # lOXV/E0xIbft0kjMLLCQe/CIOREMBMPb1xDQhQip9W7a0EH0//hJz+jRc+EAHL2b # UzsOJXHcN103ZlvDZ6fgxIdfY+DxhQKp2ShxAR8cnDEPMQN7IPBo/QZb4Rob6Qt5 # XwucDmbhGcO4gFgi+pHDLzz2Qzo5xUMti7FWHJDgta5n4Tun8doewXWcVy5qGMZ1 # rKviMMgQOsz8XopWa4BUj84vNRl57XvYGDvMMUhLNEpb3+6wSLQhBC93iG2xa8JT # EzE33ONpzwfo/o9rlokyeESNvC+YIX9WnWOaa6C2VRwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB # 7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA4DcwJ+ZX9E5f/s2+9N2UnPkdcvu/fxuenupjkz96g # WzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/ # xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQg5bppgcuBz9hZCzRrhf5eOIBx # ViF59zkfDOzCrlpGUcMwDQYJKoZIhvcNAQELBQAEggIAYozJyRHKjteIJSUTmkKD # GnBmIBbiA4gKGk1M+RV4OquhAVN6nLY26p3BhJRSqMles8hK8iIBCbP1sqypL30S # 2uhxjRCftVJnLTZqEm2muHF2BNnQqNrYQhwNmGDZVZlTE7+xxsC0LKW3jfF5hJAV # iGv3VvhykP3dp6EvfAjG01G3BUZa7CXnIqiQ7xPhW2hhkFNsV06w+uM2tuFpEm5d # OrRvEzk4AHLaJhnUf8Rcg0Ts96pMopQ8LcJvjO2rnxV7EO1ZIdj53/Omtc2KjhgE # rErXK2qNMb9KVLha8RIWQtDZQ7+QQZpkDItzhWwO7GhajQado27Dq6uEFzq8MBS/ # pCj3uQMnwPjrXlzif3dKZq8Mx5lyxYuoaUXMt42x1OvgLHpBI6w0em/6ZKevP3fK # VbE4AooinWYvWp3zr3hf1AS6m0jNfmTWvgCc+87XxvK7ejADaKFG657dftGMXKfw # pibHhRNQMl9XVRnYoxpWiKb3m51QQGffJ7xgkmgDh4+9TDTU/Qe/Ejpr5nGfRAJ3 # NZTwA8gU07ek1sRa1S31e4hz440A9lQG8B4OcNXbHV61bX7OC4YWFMoI/WZDwyTg # SLID12POHwS3qG3b4k0YWFTsIAR+cv6jdAfqLYgLYzd7JBilC8npoKs5DtZ/Xr8D # FnK/q86vATHA89xcsRxOEv4= # SIG # End signature block
combined_dataset/train/non-malicious/Get-CrystalReportTable.ps1
Get-CrystalReportTable.ps1
function Get-CrystalReportTable() { #Requires -Version 2 <# .Synopsis Examines a Crystal Report and returns the tables used .Description Examines a Crystal Report and returns the tables used by the main report and subreports .Example $reports = Dir *.rpt | Get-CrystalReportTable .Notes Written by Steven Murawski on 11/12/09 http://blog.usepowershell.com Version 0.1 #> [cmdletbinding()] param ( [parameter(ValueFromPipelineByPropertyName=$true,Mandatory=$true)] [Alias('FullName')] [string]$Path ) begin { [reflection.assembly]::LoadWithPartialName('CrystalDecisions.Shared') | Out-Null [reflection.assembly]::LoadWithPartialName('CrystalDecisions.CrystalReports.Engine') | Out-Null } process { try { $output = New-Object PSObject | Select-Object Name, Tables, SubReports $output.name = Split-Path $path -Leaf $report = New-Object CrystalDecisions.CrystalReports.Engine.ReportDocument $report.load($path) $output.Tables = $report.Database.Tables | Select-Object -expand Name $subreports = @($report.ReportDefinition.ReportObjects | Where-Object {$_ -is [CrystalDecisions.CrystalReports.Engine.SubreportObject]}) if ($subreports.count -gt 0 ) { $output.subreports = @() foreach ($subreport in $subreports) { $subreportdata = New-Object PSObject | Select-Object Name, Tables $subreportdata.name = $subreport.SubreportName $subreportobject = $report.OpenSubreport($subreport.SubreportName) $subreportdata.Tables = $subreportobject.Database.Tables | Select-Object -expand Name $output.subreports += $subreportdata } } Write-Output $output } finally { $report.dispose() } } }
combined_dataset/train/non-malicious/sample_19_10.ps1
sample_19_10.ps1
data LocalizedData { # culture="en-US" ConvertFrom-StringData @' PathNotFoundError=The path '{0}' either does not exist or is not a valid file system path. ExpandArchiveInValidDestinationPath=The path '{0}' is not a valid file system directory path. InvalidZipFileExtensionError={0} is not a supported archive file format. {1} is the only supported archive file format. ArchiveFileIsReadOnly=The attributes of the archive file {0} is set to 'ReadOnly' hence it cannot be updated. If you intend to update the existing archive file, remove the 'ReadOnly' attribute on the archive file else use -Force parameter to override and create a new archive file. ZipFileExistError=The archive file {0} already exists. Use the -Update parameter to update the existing archive file or use the -Force parameter to overwrite the existing archive file. DuplicatePathFoundError=The input to {0} parameter contains a duplicate path '{1}'. Provide a unique set of paths as input to {2} parameter. ArchiveFileIsEmpty=The archive file {0} is empty. CompressProgressBarText=The archive file '{0}' creation is in progress... ExpandProgressBarText=The archive file '{0}' expansion is in progress... AppendArchiveFileExtensionMessage=The archive file path '{0}' supplied to the DestinationPath parameter does not include .zip extension. Hence .zip is appended to the supplied DestinationPath path and the archive file would be created at '{1}'. AddItemtoArchiveFile=Adding '{0}'. BadArchiveEntry=Can not process invalid archive entry '{0}'. CreateFileAtExpandedPath=Created '{0}'. InvalidArchiveFilePathError=The archive file path '{0}' specified as input to the {1} parameter is resolving to multiple file system paths. Provide a unique path to the {2} parameter where the archive file has to be created. InvalidExpandedDirPathError=The directory path '{0}' specified as input to the DestinationPath parameter is resolving to multiple file system paths. Provide a unique path to the Destination parameter where the archive file contents have to be expanded. FileExistsError=Failed to create file '{0}' while expanding the archive file '{1}' contents as the file '{2}' already exists. Use the -Force parameter if you want to overwrite the existing directory '{3}' contents when expanding the archive file. DeleteArchiveFile=The partially created archive file '{0}' is deleted as it is not usable. InvalidDestinationPath=The destination path '{0}' does not contain a valid archive file name. PreparingToCompressVerboseMessage=Preparing to compress... PreparingToExpandVerboseMessage=Preparing to expand... ItemDoesNotAppearToBeAValidZipArchive=File '{0}' does not appear to be a valid zip archive. '@ } Import-LocalizedData LocalizedData -filename ArchiveResources -ErrorAction Ignore $zipFileExtension = ".zip" <############################################################################################ # The Compress-Archive cmdlet can be used to zip/compress one or more files/directories. ############################################################################################> function Compress-Archive { [CmdletBinding( DefaultParameterSetName="Path", SupportsShouldProcess=$true, HelpUri="https://go.microsoft.com/fwlink/?linkid=2096473")] [OutputType([System.IO.File])] param ( [parameter (mandatory=$true, Position=0, ParameterSetName="Path", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [parameter (mandatory=$true, Position=0, ParameterSetName="PathWithForce", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [parameter (mandatory=$true, Position=0, ParameterSetName="PathWithUpdate", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [string[]] $Path, [parameter (mandatory=$true, ParameterSetName="LiteralPath", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$true)] [parameter (mandatory=$true, ParameterSetName="LiteralPathWithForce", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$true)] [parameter (mandatory=$true, ParameterSetName="LiteralPathWithUpdate", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("PSPath")] [string[]] $LiteralPath, [parameter (mandatory=$true, Position=1, ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [ValidateNotNullOrEmpty()] [string] $DestinationPath, [parameter ( mandatory=$false, ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [ValidateSet("Optimal","NoCompression","Fastest")] [string] $CompressionLevel = "Optimal", [parameter(mandatory=$true, ParameterSetName="PathWithUpdate", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [parameter(mandatory=$true, ParameterSetName="LiteralPathWithUpdate", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [switch] $Update = $false, [parameter(mandatory=$true, ParameterSetName="PathWithForce", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [parameter(mandatory=$true, ParameterSetName="LiteralPathWithForce", ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [switch] $Force = $false, [switch] $PassThru = $false ) BEGIN { # Ensure the destination path is in a non-PS-specific format $DestinationPath = $PSCmdlet.GetUnresolvedProviderPathFromPSPath($DestinationPath) $inputPaths = @() $destinationParentDir = [system.IO.Path]::GetDirectoryName($DestinationPath) if($null -eq $destinationParentDir) { $errorMessage = ($LocalizedData.InvalidDestinationPath -f $DestinationPath) ThrowTerminatingErrorHelper "InvalidArchiveFilePath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $DestinationPath } if($destinationParentDir -eq [string]::Empty) { $destinationParentDir = '.' } $archiveFileName = [system.IO.Path]::GetFileName($DestinationPath) $destinationParentDir = GetResolvedPathHelper $destinationParentDir $false $PSCmdlet if($destinationParentDir.Count -gt 1) { $errorMessage = ($LocalizedData.InvalidArchiveFilePathError -f $DestinationPath, "DestinationPath", "DestinationPath") ThrowTerminatingErrorHelper "InvalidArchiveFilePath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $DestinationPath } IsValidFileSystemPath $destinationParentDir | Out-Null $DestinationPath = Join-Path -Path $destinationParentDir -ChildPath $archiveFileName # GetExtension API does not validate for the actual existence of the path. $extension = [system.IO.Path]::GetExtension($DestinationPath) # If user does not specify an extension, we append the .zip extension automatically. If($extension -eq [string]::Empty) { $DestinationPathWithOutExtension = $DestinationPath $DestinationPath = $DestinationPathWithOutExtension + $zipFileExtension $appendArchiveFileExtensionMessage = ($LocalizedData.AppendArchiveFileExtensionMessage -f $DestinationPathWithOutExtension, $DestinationPath) Write-Verbose $appendArchiveFileExtensionMessage } $archiveFileExist = Test-Path -LiteralPath $DestinationPath -PathType Leaf if($archiveFileExist -and ($Update -eq $false -and $Force -eq $false)) { $errorMessage = ($LocalizedData.ZipFileExistError -f $DestinationPath) ThrowTerminatingErrorHelper "ArchiveFileExists" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $DestinationPath } # If archive file already exists and if -Update is specified, then we check to see # if we have write access permission to update the existing archive file. if($archiveFileExist -and $Update -eq $true) { $item = Get-Item -Path $DestinationPath if($item.Attributes.ToString().Contains("ReadOnly")) { $errorMessage = ($LocalizedData.ArchiveFileIsReadOnly -f $DestinationPath) ThrowTerminatingErrorHelper "ArchiveFileIsReadOnly" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidOperation) $DestinationPath } } $isWhatIf = $psboundparameters.ContainsKey("WhatIf") if(!$isWhatIf) { $preparingToCompressVerboseMessage = ($LocalizedData.PreparingToCompressVerboseMessage) Write-Verbose $preparingToCompressVerboseMessage $progressBarStatus = ($LocalizedData.CompressProgressBarText -f $DestinationPath) ProgressBarHelper "Compress-Archive" $progressBarStatus 0 100 100 1 } } PROCESS { if($PsCmdlet.ParameterSetName -eq "Path" -or $PsCmdlet.ParameterSetName -eq "PathWithForce" -or $PsCmdlet.ParameterSetName -eq "PathWithUpdate") { $inputPaths += $Path } if($PsCmdlet.ParameterSetName -eq "LiteralPath" -or $PsCmdlet.ParameterSetName -eq "LiteralPathWithForce" -or $PsCmdlet.ParameterSetName -eq "LiteralPathWithUpdate") { $inputPaths += $LiteralPath } } END { # If archive file already exists and if -Force is specified, we delete the # existing archive file and create a brand new one. if(($PsCmdlet.ParameterSetName -eq "PathWithForce" -or $PsCmdlet.ParameterSetName -eq "LiteralPathWithForce") -and $archiveFileExist) { Remove-Item -Path $DestinationPath -Force -ErrorAction Stop } # Validate Source Path depending on parameter set being used. # The specified source path contains one or more files or directories that needs # to be compressed. $isLiteralPathUsed = $false if($PsCmdlet.ParameterSetName -eq "LiteralPath" -or $PsCmdlet.ParameterSetName -eq "LiteralPathWithForce" -or $PsCmdlet.ParameterSetName -eq "LiteralPathWithUpdate") { $isLiteralPathUsed = $true } ValidateDuplicateFileSystemPath $PsCmdlet.ParameterSetName $inputPaths $resolvedPaths = GetResolvedPathHelper $inputPaths $isLiteralPathUsed $PSCmdlet IsValidFileSystemPath $resolvedPaths | Out-Null $sourcePath = $resolvedPaths; # CSVHelper: This is a helper function used to append comma after each path specified by # the $sourcePath array. The comma separated paths are displayed in the -WhatIf message. $sourcePathInCsvFormat = CSVHelper $sourcePath if($pscmdlet.ShouldProcess($sourcePathInCsvFormat)) { try { # StopProcessing is not available in Script cmdlets. However the pipeline execution # is terminated when ever 'CTRL + C' is entered by user to terminate the cmdlet execution. # The finally block is executed whenever pipeline is terminated. # $isArchiveFileProcessingComplete variable is used to track if 'CTRL + C' is entered by the # user. $isArchiveFileProcessingComplete = $false $numberOfItemsArchived = CompressArchiveHelper $sourcePath $DestinationPath $CompressionLevel $Update $isArchiveFileProcessingComplete = $true } finally { # The $isArchiveFileProcessingComplete would be set to $false if user has typed 'CTRL + C' to # terminate the cmdlet execution or if an unhandled exception is thrown. # $numberOfItemsArchived contains the count of number of files or directories add to the archive file. # If the newly created archive file is empty then we delete it as it's not usable. if(($isArchiveFileProcessingComplete -eq $false) -or ($numberOfItemsArchived -eq 0)) { $DeleteArchiveFileMessage = ($LocalizedData.DeleteArchiveFile -f $DestinationPath) Write-Verbose $DeleteArchiveFileMessage # delete the partial archive file created. if (Test-Path $DestinationPath) { Remove-Item -LiteralPath $DestinationPath -Force -Recurse -ErrorAction SilentlyContinue } } elseif ($PassThru) { Get-Item -LiteralPath $DestinationPath } } } } } <############################################################################################ # The Expand-Archive cmdlet can be used to expand/extract an zip file. ############################################################################################> function Expand-Archive { [CmdletBinding( DefaultParameterSetName="Path", SupportsShouldProcess=$true, HelpUri="https://go.microsoft.com/fwlink/?linkid=2096769")] [OutputType([System.IO.FileSystemInfo])] param ( [parameter ( mandatory=$true, Position=0, ParameterSetName="Path", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [string] $Path, [parameter ( mandatory=$true, ParameterSetName="LiteralPath", ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("PSPath")] [string] $LiteralPath, [parameter (mandatory=$false, Position=1, ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [ValidateNotNullOrEmpty()] [string] $DestinationPath, [parameter (mandatory=$false, ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [switch] $Force, [switch] $PassThru = $false ) BEGIN { $isVerbose = $psboundparameters.ContainsKey("Verbose") $isConfirm = $psboundparameters.ContainsKey("Confirm") $isDestinationPathProvided = $true if($DestinationPath -eq [string]::Empty) { $resolvedDestinationPath = (Get-Location).ProviderPath $isDestinationPathProvided = $false } else { $destinationPathExists = Test-Path -Path $DestinationPath -PathType Container if($destinationPathExists) { $resolvedDestinationPath = GetResolvedPathHelper $DestinationPath $false $PSCmdlet if($resolvedDestinationPath.Count -gt 1) { $errorMessage = ($LocalizedData.InvalidExpandedDirPathError -f $DestinationPath) ThrowTerminatingErrorHelper "InvalidDestinationPath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $DestinationPath } # At this point we are sure that the provided path resolves to a valid single path. # Calling Resolve-Path again to get the underlying provider name. $suppliedDestinationPath = Resolve-Path -Path $DestinationPath if($suppliedDestinationPath.Provider.Name-ne "FileSystem") { $errorMessage = ($LocalizedData.ExpandArchiveInValidDestinationPath -f $DestinationPath) ThrowTerminatingErrorHelper "InvalidDirectoryPath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $DestinationPath } } else { $createdItem = New-Item -Path $DestinationPath -ItemType Directory -Confirm:$isConfirm -Verbose:$isVerbose -ErrorAction Stop if($createdItem -ne $null -and $createdItem.PSProvider.Name -ne "FileSystem") { Remove-Item "$DestinationPath" -Force -Recurse -ErrorAction SilentlyContinue $errorMessage = ($LocalizedData.ExpandArchiveInValidDestinationPath -f $DestinationPath) ThrowTerminatingErrorHelper "InvalidDirectoryPath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $DestinationPath } $resolvedDestinationPath = GetResolvedPathHelper $DestinationPath $true $PSCmdlet } } $isWhatIf = $psboundparameters.ContainsKey("WhatIf") if(!$isWhatIf) { $preparingToExpandVerboseMessage = ($LocalizedData.PreparingToExpandVerboseMessage) Write-Verbose $preparingToExpandVerboseMessage $progressBarStatus = ($LocalizedData.ExpandProgressBarText -f $DestinationPath) ProgressBarHelper "Expand-Archive" $progressBarStatus 0 100 100 1 } } PROCESS { switch($PsCmdlet.ParameterSetName) { "Path" { $resolvedSourcePaths = GetResolvedPathHelper $Path $false $PSCmdlet if($resolvedSourcePaths.Count -gt 1) { $errorMessage = ($LocalizedData.InvalidArchiveFilePathError -f $Path, $PsCmdlet.ParameterSetName, $PsCmdlet.ParameterSetName) ThrowTerminatingErrorHelper "InvalidArchiveFilePath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $Path } } "LiteralPath" { $resolvedSourcePaths = GetResolvedPathHelper $LiteralPath $true $PSCmdlet if($resolvedSourcePaths.Count -gt 1) { $errorMessage = ($LocalizedData.InvalidArchiveFilePathError -f $LiteralPath, $PsCmdlet.ParameterSetName, $PsCmdlet.ParameterSetName) ThrowTerminatingErrorHelper "InvalidArchiveFilePath" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $LiteralPath } } } ValidateArchivePathHelper $resolvedSourcePaths if($pscmdlet.ShouldProcess($resolvedSourcePaths)) { $expandedItems = @() try { # StopProcessing is not available in Script cmdlets. However the pipeline execution # is terminated when ever 'CTRL + C' is entered by user to terminate the cmdlet execution. # The finally block is executed whenever pipeline is terminated. # $isArchiveFileProcessingComplete variable is used to track if 'CTRL + C' is entered by the # user. $isArchiveFileProcessingComplete = $false # The User has not provided a destination path, hence we use '$pwd\ArchiveFileName' as the directory where the # archive file contents would be expanded. If the path '$pwd\ArchiveFileName' already exists then we use the # Windows default mechanism of appending a counter value at the end of the directory name where the contents # would be expanded. if(!$isDestinationPathProvided) { $archiveFile = New-Object System.IO.FileInfo $resolvedSourcePaths $resolvedDestinationPath = Join-Path -Path $resolvedDestinationPath -ChildPath $archiveFile.BaseName $destinationPathExists = Test-Path -LiteralPath $resolvedDestinationPath -PathType Container if(!$destinationPathExists) { New-Item -Path $resolvedDestinationPath -ItemType Directory -Confirm:$isConfirm -Verbose:$isVerbose -ErrorAction Stop | Out-Null } } ExpandArchiveHelper $resolvedSourcePaths $resolvedDestinationPath ([ref]$expandedItems) $Force $isVerbose $isConfirm $isArchiveFileProcessingComplete = $true } finally { # The $isArchiveFileProcessingComplete would be set to $false if user has typed 'CTRL + C' to # terminate the cmdlet execution or if an unhandled exception is thrown. if($isArchiveFileProcessingComplete -eq $false) { if($expandedItems.Count -gt 0) { # delete the expanded file/directory as the archive # file was not completely expanded. $expandedItems | % { Remove-Item "$_" -Force -Recurse } } } elseif ($PassThru -and $expandedItems.Count -gt 0) { # Return the expanded items, being careful to remove trailing directory separators from # any folder paths for consistency $trailingDirSeparators = '\' + [System.IO.Path]::DirectorySeparatorChar + '+$' Get-Item -LiteralPath ($expandedItems -replace $trailingDirSeparators) } } } } } <############################################################################################ # GetResolvedPathHelper: This is a helper function used to resolve the user specified Path. # The path can either be absolute or relative path. ############################################################################################> function GetResolvedPathHelper { param ( [string[]] $path, [boolean] $isLiteralPath, [System.Management.Automation.PSCmdlet] $callerPSCmdlet ) $resolvedPaths =@() # null and empty check are are already done on Path parameter at the cmdlet layer. foreach($currentPath in $path) { try { if($isLiteralPath) { $currentResolvedPaths = Resolve-Path -LiteralPath $currentPath -ErrorAction Stop } else { $currentResolvedPaths = Resolve-Path -Path $currentPath -ErrorAction Stop } } catch { $errorMessage = ($LocalizedData.PathNotFoundError -f $currentPath) $exception = New-Object System.InvalidOperationException $errorMessage, $_.Exception $errorRecord = CreateErrorRecordHelper "ArchiveCmdletPathNotFound" $null ([System.Management.Automation.ErrorCategory]::InvalidArgument) $exception $currentPath $callerPSCmdlet.ThrowTerminatingError($errorRecord) } foreach($currentResolvedPath in $currentResolvedPaths) { $resolvedPaths += $currentResolvedPath.ProviderPath } } $resolvedPaths } function Add-CompressionAssemblies { Add-Type -AssemblyName System.IO.Compression if ($psedition -eq "Core") { Add-Type -AssemblyName System.IO.Compression.ZipFile } else { Add-Type -AssemblyName System.IO.Compression.FileSystem } } function IsValidFileSystemPath { param ( [string[]] $path ) $result = $true; # null and empty check are are already done on Path parameter at the cmdlet layer. foreach($currentPath in $path) { if(!([System.IO.File]::Exists($currentPath) -or [System.IO.Directory]::Exists($currentPath))) { $errorMessage = ($LocalizedData.PathNotFoundError -f $currentPath) ThrowTerminatingErrorHelper "PathNotFound" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $currentPath } } return $result; } function ValidateDuplicateFileSystemPath { param ( [string] $inputParameter, [string[]] $path ) $uniqueInputPaths = @() # null and empty check are are already done on Path parameter at the cmdlet layer. foreach($currentPath in $path) { $currentInputPath = $currentPath.ToUpper() if($uniqueInputPaths.Contains($currentInputPath)) { $errorMessage = ($LocalizedData.DuplicatePathFoundError -f $inputParameter, $currentPath, $inputParameter) ThrowTerminatingErrorHelper "DuplicatePathFound" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $currentPath } else { $uniqueInputPaths += $currentInputPath } } } function CompressionLevelMapper { param ( [string] $compressionLevel ) $compressionLevelFormat = [System.IO.Compression.CompressionLevel]::Optimal # CompressionLevel format is already validated at the cmdlet layer. switch($compressionLevel.ToString()) { "Fastest" { $compressionLevelFormat = [System.IO.Compression.CompressionLevel]::Fastest } "NoCompression" { $compressionLevelFormat = [System.IO.Compression.CompressionLevel]::NoCompression } } return $compressionLevelFormat } function CompressArchiveHelper { param ( [string[]] $sourcePath, [string] $destinationPath, [string] $compressionLevel, [bool] $isUpdateMode ) $numberOfItemsArchived = 0 $sourceFilePaths = @() $sourceDirPaths = @() foreach($currentPath in $sourcePath) { $result = Test-Path -LiteralPath $currentPath -Type Leaf if($result -eq $true) { $sourceFilePaths += $currentPath } else { $sourceDirPaths += $currentPath } } # The Source Path contains one or more directory (this directory can have files under it) and no files to be compressed. if($sourceFilePaths.Count -eq 0 -and $sourceDirPaths.Count -gt 0) { $currentSegmentWeight = 100/[double]$sourceDirPaths.Count $previousSegmentWeight = 0 foreach($currentSourceDirPath in $sourceDirPaths) { $count = CompressSingleDirHelper $currentSourceDirPath $destinationPath $compressionLevel $true $isUpdateMode $previousSegmentWeight $currentSegmentWeight $numberOfItemsArchived += $count $previousSegmentWeight += $currentSegmentWeight } } # The Source Path contains only files to be compressed. elseIf($sourceFilePaths.Count -gt 0 -and $sourceDirPaths.Count -eq 0) { # $previousSegmentWeight is equal to 0 as there are no prior segments. # $currentSegmentWeight is set to 100 as all files have equal weightage. $previousSegmentWeight = 0 $currentSegmentWeight = 100 $numberOfItemsArchived = CompressFilesHelper $sourceFilePaths $destinationPath $compressionLevel $isUpdateMode $previousSegmentWeight $currentSegmentWeight } # The Source Path contains one or more files and one or more directories (this directory can have files under it) to be compressed. elseif($sourceFilePaths.Count -gt 0 -and $sourceDirPaths.Count -gt 0) { # each directory is considered as an individual segments & all the individual files are clubed in to a separate segment. $currentSegmentWeight = 100/[double]($sourceDirPaths.Count +1) $previousSegmentWeight = 0 foreach($currentSourceDirPath in $sourceDirPaths) { $count = CompressSingleDirHelper $currentSourceDirPath $destinationPath $compressionLevel $true $isUpdateMode $previousSegmentWeight $currentSegmentWeight $numberOfItemsArchived += $count $previousSegmentWeight += $currentSegmentWeight } $count = CompressFilesHelper $sourceFilePaths $destinationPath $compressionLevel $isUpdateMode $previousSegmentWeight $currentSegmentWeight $numberOfItemsArchived += $count } return $numberOfItemsArchived } function CompressFilesHelper { param ( [string[]] $sourceFilePaths, [string] $destinationPath, [string] $compressionLevel, [bool] $isUpdateMode, [double] $previousSegmentWeight, [double] $currentSegmentWeight ) $numberOfItemsArchived = ZipArchiveHelper $sourceFilePaths $destinationPath $compressionLevel $isUpdateMode $null $previousSegmentWeight $currentSegmentWeight return $numberOfItemsArchived } function CompressSingleDirHelper { param ( [string] $sourceDirPath, [string] $destinationPath, [string] $compressionLevel, [bool] $useParentDirAsRoot, [bool] $isUpdateMode, [double] $previousSegmentWeight, [double] $currentSegmentWeight ) [System.Collections.Generic.List[System.String]]$subDirFiles = @() if($useParentDirAsRoot) { $sourceDirInfo = New-Object -TypeName System.IO.DirectoryInfo -ArgumentList $sourceDirPath $sourceDirFullName = $sourceDirInfo.Parent.FullName # If the directory is present at the drive level the DirectoryInfo.Parent include directory separator. example: C:\ # On the other hand if the directory exists at a deper level then DirectoryInfo.Parent # has just the path (without an ending directory separator). example C:\source if($sourceDirFullName.Length -eq 3) { $modifiedSourceDirFullName = $sourceDirFullName } else { $modifiedSourceDirFullName = $sourceDirFullName + [System.IO.Path]::DirectorySeparatorChar } } else { $sourceDirFullName = $sourceDirPath $modifiedSourceDirFullName = $sourceDirFullName + [System.IO.Path]::DirectorySeparatorChar } $dirContents = Get-ChildItem -LiteralPath $sourceDirPath -Recurse foreach($currentContent in $dirContents) { $isContainer = $currentContent -is [System.IO.DirectoryInfo] if(!$isContainer) { $subDirFiles.Add($currentContent.FullName) } else { # The currentContent points to a directory. # We need to check if the directory is an empty directory, if so such a # directory has to be explicitly added to the archive file. # if there are no files in the directory the GetFiles() API returns an empty array. $files = $currentContent.GetFiles() if($files.Count -eq 0) { $subDirFiles.Add($currentContent.FullName + [System.IO.Path]::DirectorySeparatorChar) } } } $numberOfItemsArchived = ZipArchiveHelper $subDirFiles.ToArray() $destinationPath $compressionLevel $isUpdateMode $modifiedSourceDirFullName $previousSegmentWeight $currentSegmentWeight return $numberOfItemsArchived } function ZipArchiveHelper { param ( [System.Collections.Generic.List[System.String]] $sourcePaths, [string] $destinationPath, [string] $compressionLevel, [bool] $isUpdateMode, [string] $modifiedSourceDirFullName, [double] $previousSegmentWeight, [double] $currentSegmentWeight ) $numberOfItemsArchived = 0 $fileMode = [System.IO.FileMode]::Create $result = Test-Path -LiteralPath $DestinationPath -Type Leaf if($result -eq $true) { $fileMode = [System.IO.FileMode]::Open } Add-CompressionAssemblies try { # At this point we are sure that the archive file has write access. $archiveFileStreamArgs = @($destinationPath, $fileMode) $archiveFileStream = New-Object -TypeName System.IO.FileStream -ArgumentList $archiveFileStreamArgs $zipArchiveArgs = @($archiveFileStream, [System.IO.Compression.ZipArchiveMode]::Update, $false) $zipArchive = New-Object -TypeName System.IO.Compression.ZipArchive -ArgumentList $zipArchiveArgs $currentEntryCount = 0 $progressBarStatus = ($LocalizedData.CompressProgressBarText -f $destinationPath) $bufferSize = 4kb $buffer = New-Object Byte[] $bufferSize foreach($currentFilePath in $sourcePaths) { if($modifiedSourceDirFullName -ne $null -and $modifiedSourceDirFullName.Length -gt 0) { $index = $currentFilePath.IndexOf($modifiedSourceDirFullName, [System.StringComparison]::OrdinalIgnoreCase) $currentFilePathSubString = $currentFilePath.Substring($index, $modifiedSourceDirFullName.Length) $relativeFilePath = $currentFilePath.Replace($currentFilePathSubString, "").Trim() } else { $relativeFilePath = [System.IO.Path]::GetFileName($currentFilePath) } # Update mode is selected. # Check to see if archive file already contains one or more zip files in it. if($isUpdateMode -eq $true -and $zipArchive.Entries.Count -gt 0) { $entryToBeUpdated = $null # Check if the file already exists in the archive file. # If so replace it with new file from the input source. # If the file does not exist in the archive file then default to # create mode and create the entry in the archive file. foreach($currentArchiveEntry in $zipArchive.Entries) { if(ArchivePathCompareHelper $currentArchiveEntry.FullName $relativeFilePath) { $entryToBeUpdated = $currentArchiveEntry break } } if($entryToBeUpdated -ne $null) { $addItemtoArchiveFileMessage = ($LocalizedData.AddItemtoArchiveFile -f $currentFilePath) $entryToBeUpdated.Delete() } } $compression = CompressionLevelMapper $compressionLevel # If a directory needs to be added to an archive file, # by convention the .Net API's expect the path of the directory # to end with directory separator to detect the path as an directory. if(!$relativeFilePath.EndsWith([System.IO.Path]::DirectorySeparatorChar, [StringComparison]::OrdinalIgnoreCase)) { try { try { $currentFileStream = [System.IO.File]::Open($currentFilePath, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read) } catch { # Failed to access the file. Write a non terminating error to the pipeline # and move on with the remaining files. $exception = $_.Exception if($null -ne $_.Exception -and $null -ne $_.Exception.InnerException) { $exception = $_.Exception.InnerException } $errorRecord = CreateErrorRecordHelper "CompressArchiveUnauthorizedAccessError" $null ([System.Management.Automation.ErrorCategory]::PermissionDenied) $exception $currentFilePath Write-Error -ErrorRecord $errorRecord } if($null -ne $currentFileStream) { $srcStream = New-Object System.IO.BinaryReader $currentFileStream $entryPath = DirectorySeparatorNormalizeHelper $relativeFilePath $currentArchiveEntry = $zipArchive.CreateEntry($entryPath, $compression) # Updating the File Creation time so that the same timestamp would be retained after expanding the compressed file. # At this point we are sure that Get-ChildItem would succeed. $lastWriteTime = (Get-Item -LiteralPath $currentFilePath).LastWriteTime if ($lastWriteTime.Year -lt 1980) { Write-Warning "'$currentFilePath' has LastWriteTime earlier than 1980. Compress-Archive will store any files with LastWriteTime values earlier than 1980 as 1/1/1980 00:00." $lastWriteTime = [DateTime]::Parse('1980-01-01T00:00:00') } $currentArchiveEntry.LastWriteTime = $lastWriteTime $destStream = New-Object System.IO.BinaryWriter $currentArchiveEntry.Open() while($numberOfBytesRead = $srcStream.Read($buffer, 0, $bufferSize)) { $destStream.Write($buffer, 0, $numberOfBytesRead) $destStream.Flush() } $numberOfItemsArchived += 1 $addItemtoArchiveFileMessage = ($LocalizedData.AddItemtoArchiveFile -f $currentFilePath) } } finally { If($null -ne $currentFileStream) { $currentFileStream.Dispose() } If($null -ne $srcStream) { $srcStream.Dispose() } If($null -ne $destStream) { $destStream.Dispose() } } } else { $entryPath = DirectorySeparatorNormalizeHelper $relativeFilePath $currentArchiveEntry = $zipArchive.CreateEntry($entryPath, $compression) $numberOfItemsArchived += 1 $addItemtoArchiveFileMessage = ($LocalizedData.AddItemtoArchiveFile -f $currentFilePath) } if($null -ne $addItemtoArchiveFileMessage) { Write-Verbose $addItemtoArchiveFileMessage } $currentEntryCount += 1 ProgressBarHelper "Compress-Archive" $progressBarStatus $previousSegmentWeight $currentSegmentWeight $sourcePaths.Count $currentEntryCount } } finally { If($null -ne $zipArchive) { $zipArchive.Dispose() } If($null -ne $archiveFileStream) { $archiveFileStream.Dispose() } # Complete writing progress. Write-Progress -Activity "Compress-Archive" -Completed } return $numberOfItemsArchived } <############################################################################################ # ValidateArchivePathHelper: This is a helper function used to validate the archive file # path & its file format. The only supported archive file format is .zip ############################################################################################> function ValidateArchivePathHelper { param ( [string] $archiveFile ) if(-not [System.IO.File]::Exists($archiveFile)) { $errorMessage = ($LocalizedData.PathNotFoundError -f $archiveFile) ThrowTerminatingErrorHelper "PathNotFound" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidArgument) $archiveFile } } <############################################################################################ # ExpandArchiveHelper: This is a helper function used to expand the archive file contents # to the specified directory. ############################################################################################> function ExpandArchiveHelper { param ( [string] $archiveFile, [string] $expandedDir, [ref] $expandedItems, [boolean] $force, [boolean] $isVerbose, [boolean] $isConfirm ) Add-CompressionAssemblies try { # The existence of archive file has already been validated by ValidateArchivePathHelper # before calling this helper function. $archiveFileStreamArgs = @($archiveFile, [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read) $archiveFileStream = New-Object -TypeName System.IO.FileStream -ArgumentList $archiveFileStreamArgs $zipArchiveArgs = @($archiveFileStream, [System.IO.Compression.ZipArchiveMode]::Read, $false) try { $zipArchive = New-Object -TypeName System.IO.Compression.ZipArchive -ArgumentList $zipArchiveArgs } catch [System.IO.InvalidDataException] { # Failed to open the file for reading as a zip archive. Wrap the exception # and re-throw it indicating it does not appear to be a valid zip file. $exception = $_.Exception if($null -ne $_.Exception -and $null -ne $_.Exception.InnerException) { $exception = $_.Exception.InnerException } # Load the WindowsBase.dll assembly to get access to the System.IO.FileFormatException class [System.Reflection.Assembly]::Load('WindowsBase,Version=4.0.0.0,Culture=neutral,PublicKeyToken=31bf3856ad364e35') $invalidFileFormatException = New-Object -TypeName System.IO.FileFormatException -ArgumentList @( ($LocalizedData.ItemDoesNotAppearToBeAValidZipArchive -f $archiveFile) $exception ) throw $invalidFileFormatException } if($zipArchive.Entries.Count -eq 0) { $archiveFileIsEmpty = ($LocalizedData.ArchiveFileIsEmpty -f $archiveFile) Write-Verbose $archiveFileIsEmpty return } $currentEntryCount = 0 $progressBarStatus = ($LocalizedData.ExpandProgressBarText -f $archiveFile) # Ensures that the last character on the extraction path is the directory separator char. # Without this, a bad zip file could try to traverse outside of the expected extraction path. # At this point $expandedDir is a fully qualified path without any relative segments. if (-not $expandedDir.EndsWith([System.IO.Path]::DirectorySeparatorChar)) { $expandedDir += [System.IO.Path]::DirectorySeparatorChar } # The archive entries can either be empty directories or files. foreach($currentArchiveEntry in $zipArchive.Entries) { # Windows filesystem provider will internally convert from `/` to `\` $currentArchiveEntryPath = Join-Path -Path $expandedDir -ChildPath $currentArchiveEntry.FullName # Remove possible relative segments from target # This is similar to [System.IO.Path]::GetFullPath($currentArchiveEntryPath) but uses PS current dir instead of process-wide current dir $currentArchiveEntryPath = $PSCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($currentArchiveEntryPath) # Check that expanded relative paths and absolute paths from the archive are Not going outside of target directory # Ordinal match is safest, case-sensitive volumes can be mounted within volumes that are case-insensitive. if (-not ($currentArchiveEntryPath.StartsWith($expandedDir, [System.StringComparison]::Ordinal))) { $BadArchiveEntryMessage = ($LocalizedData.BadArchiveEntry -f $currentArchiveEntry.FullName) # notify user of bad archive entry Write-Error $BadArchiveEntryMessage # move on to the next entry in the archive continue } $extension = [system.IO.Path]::GetExtension($currentArchiveEntryPath) # The current archive entry is an empty directory # The FullName of the Archive Entry representing a directory would end with a trailing directory separator. if($extension -eq [string]::Empty -and $currentArchiveEntryPath.EndsWith([System.IO.Path]::DirectorySeparatorChar, [StringComparison]::OrdinalIgnoreCase)) { $pathExists = Test-Path -LiteralPath $currentArchiveEntryPath # The current archive entry expects an empty directory. # Check if the existing directory is empty. If it's not empty # then it means that user has added this directory by other means. if($pathExists -eq $false) { New-Item $currentArchiveEntryPath -Type Directory -Confirm:$isConfirm | Out-Null if(Test-Path -LiteralPath $currentArchiveEntryPath -PathType Container) { $addEmptyDirectorytoExpandedPathMessage = ($LocalizedData.AddItemtoArchiveFile -f $currentArchiveEntryPath) Write-Verbose $addEmptyDirectorytoExpandedPathMessage $expandedItems.Value += $currentArchiveEntryPath } } } else { try { $currentArchiveEntryFileInfo = New-Object -TypeName System.IO.FileInfo -ArgumentList $currentArchiveEntryPath $parentDirExists = Test-Path -LiteralPath $currentArchiveEntryFileInfo.DirectoryName -PathType Container # If the Parent directory of the current entry in the archive file does not exist, then create it. if($parentDirExists -eq $false) { # note that if any ancestor of this directory doesn't exist, we don't recursively create each one as New-Item # takes care of this already, so only one DirectoryInfo is returned instead of one for each parent directory # that only contains directories New-Item $currentArchiveEntryFileInfo.DirectoryName -Type Directory -Confirm:$isConfirm | Out-Null if(!(Test-Path -LiteralPath $currentArchiveEntryFileInfo.DirectoryName -PathType Container)) { # The directory referred by $currentArchiveEntryFileInfo.DirectoryName was not successfully created. # This could be because the user has specified -Confirm parameter when Expand-Archive was invoked # and authorization was not provided when confirmation was prompted. In such a scenario, # we skip the current file in the archive and continue with the remaining archive file contents. Continue } $expandedItems.Value += $currentArchiveEntryFileInfo.DirectoryName } $hasNonTerminatingError = $false # Check if the file in to which the current archive entry contents # would be expanded already exists. if($currentArchiveEntryFileInfo.Exists) { if($force) { Remove-Item -LiteralPath $currentArchiveEntryFileInfo.FullName -Force -ErrorVariable ev -Verbose:$isVerbose -Confirm:$isConfirm if($ev -ne $null) { $hasNonTerminatingError = $true } if(Test-Path -LiteralPath $currentArchiveEntryFileInfo.FullName -PathType Leaf) { # The file referred by $currentArchiveEntryFileInfo.FullName was not successfully removed. # This could be because the user has specified -Confirm parameter when Expand-Archive was invoked # and authorization was not provided when confirmation was prompted. In such a scenario, # we skip the current file in the archive and continue with the remaining archive file contents. Continue } } else { # Write non-terminating error to the pipeline. $errorMessage = ($LocalizedData.FileExistsError -f $currentArchiveEntryFileInfo.FullName, $archiveFile, $currentArchiveEntryFileInfo.FullName, $currentArchiveEntryFileInfo.FullName) $errorRecord = CreateErrorRecordHelper "ExpandArchiveFileExists" $errorMessage ([System.Management.Automation.ErrorCategory]::InvalidOperation) $null $currentArchiveEntryFileInfo.FullName Write-Error -ErrorRecord $errorRecord $hasNonTerminatingError = $true } } if(!$hasNonTerminatingError) { # The ExtractToFile() method doesn't handle whitespace correctly, strip whitespace which is consistent with how Explorer handles archives # There is an edge case where an archive contains files whose only difference is whitespace, but this is uncommon and likely not legitimate [string[]] $parts = $currentArchiveEntryPath.Split([System.IO.Path]::DirectorySeparatorChar) | % { $_.Trim() } $currentArchiveEntryPath = [string]::Join([System.IO.Path]::DirectorySeparatorChar, $parts) [System.IO.Compression.ZipFileExtensions]::ExtractToFile($currentArchiveEntry, $currentArchiveEntryPath, $false) # Add the expanded file path to the $expandedItems array, # to keep track of all the expanded files created while expanding the archive file. # If user enters CTRL + C then at that point of time, all these expanded files # would be deleted as part of the clean up process. $expandedItems.Value += $currentArchiveEntryPath $addFiletoExpandedPathMessage = ($LocalizedData.CreateFileAtExpandedPath -f $currentArchiveEntryPath) Write-Verbose $addFiletoExpandedPathMessage } } finally { If($null -ne $destStream) { $destStream.Dispose() } If($null -ne $srcStream) { $srcStream.Dispose() } } } $currentEntryCount += 1 # $currentSegmentWeight is Set to 100 giving equal weightage to each file that is getting expanded. # $previousSegmentWeight is set to 0 as there are no prior segments. $previousSegmentWeight = 0 $currentSegmentWeight = 100 ProgressBarHelper "Expand-Archive" $progressBarStatus $previousSegmentWeight $currentSegmentWeight $zipArchive.Entries.Count $currentEntryCount } } finally { If($null -ne $zipArchive) { $zipArchive.Dispose() } If($null -ne $archiveFileStream) { $archiveFileStream.Dispose() } # Complete writing progress. Write-Progress -Activity "Expand-Archive" -Completed } } <############################################################################################ # ProgressBarHelper: This is a helper function used to display progress message. # This function is used by both Compress-Archive & Expand-Archive to display archive file # creation/expansion progress. ############################################################################################> function ProgressBarHelper { param ( [string] $cmdletName, [string] $status, [double] $previousSegmentWeight, [double] $currentSegmentWeight, [int] $totalNumberofEntries, [int] $currentEntryCount ) if($currentEntryCount -gt 0 -and $totalNumberofEntries -gt 0 -and $previousSegmentWeight -ge 0 -and $currentSegmentWeight -gt 0) { $entryDefaultWeight = $currentSegmentWeight/[double]$totalNumberofEntries $percentComplete = $previousSegmentWeight + ($entryDefaultWeight * $currentEntryCount) Write-Progress -Activity $cmdletName -Status $status -PercentComplete $percentComplete } } <############################################################################################ # CSVHelper: This is a helper function used to append comma after each path specified by # the SourcePath array. This helper function is used to display all the user supplied paths # in the WhatIf message. ############################################################################################> function CSVHelper { param ( [string[]] $sourcePath ) # SourcePath has already been validated by the calling function. if($sourcePath.Count -gt 1) { $sourcePathInCsvFormat = "`n" for($currentIndex=0; $currentIndex -lt $sourcePath.Count; $currentIndex++) { if($currentIndex -eq $sourcePath.Count - 1) { $sourcePathInCsvFormat += $sourcePath[$currentIndex] } else { $sourcePathInCsvFormat += $sourcePath[$currentIndex] + "`n" } } } else { $sourcePathInCsvFormat = $sourcePath } return $sourcePathInCsvFormat } <############################################################################################ # ThrowTerminatingErrorHelper: This is a helper function used to throw terminating error. ############################################################################################> function ThrowTerminatingErrorHelper { param ( [string] $errorId, [string] $errorMessage, [System.Management.Automation.ErrorCategory] $errorCategory, [object] $targetObject, [Exception] $innerException ) if($innerException -eq $null) { $exception = New-object System.IO.IOException $errorMessage } else { $exception = New-Object System.IO.IOException $errorMessage, $innerException } $exception = New-Object System.IO.IOException $errorMessage $errorRecord = New-Object System.Management.Automation.ErrorRecord $exception, $errorId, $errorCategory, $targetObject $PSCmdlet.ThrowTerminatingError($errorRecord) } <############################################################################################ # CreateErrorRecordHelper: This is a helper function used to create an ErrorRecord ############################################################################################> function CreateErrorRecordHelper { param ( [string] $errorId, [string] $errorMessage, [System.Management.Automation.ErrorCategory] $errorCategory, [Exception] $exception, [object] $targetObject ) if($null -eq $exception) { $exception = New-Object System.IO.IOException $errorMessage } $errorRecord = New-Object System.Management.Automation.ErrorRecord $exception, $errorId, $errorCategory, $targetObject return $errorRecord } <############################################################################################ # DirectorySeparatorNormalizeHelper: This is a helper function used to normalize separators # when compressing archives, creating cross platform archives. # # The approach taken is leveraging the fact that .net on Windows all the way back to # Framework 1.1 specifies `\` as DirectoryPathSeparatorChar and `/` as # AltDirectoryPathSeparatorChar, while other platforms in .net Core use `/` for # DirectoryPathSeparatorChar and AltDirectoryPathSeparatorChar. When using a *nix platform, # the replacements will be no-ops, while Windows will convert all `\` to `/` for the # purposes of the ZipEntry FullName. ############################################################################################> function DirectorySeparatorNormalizeHelper { param ( [string] $archivePath ) if($null -eq $archivePath) { return $archivePath } return $archivePath.replace([System.IO.Path]::DirectorySeparatorChar, [System.IO.Path]::AltDirectorySeparatorChar) } <############################################################################################ # ArchivePathCompareHelper: This is a helper function used to compare with normalized # separators. ############################################################################################> function ArchivePathCompareHelper { param ( [string] $pathArgA, [string] $pathArgB ) $normalizedPathArgA = DirectorySeparatorNormalizeHelper $pathArgA $normalizedPathArgB = DirectorySeparatorNormalizeHelper $pathArgB return $normalizedPathArgA -eq $normalizedPathArgB } # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCxWUVaNUPabUNe # T6XgWNeKW3CfCVc/X+PBlTJ8w9y52qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDtqicg7O3t+8aEthrg0b2qP # 4aWs9LkzLpmfTq0zfyrgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAWXqqpzUJ0KNw0xnNH9uTyAF+BVTQwwkE8vvMzAQKD0oBS8ByiDQi9L32 # dKEoV66V9VFZ1xuLit6iEvvECQhffc6y5e2KzxmIKIsHA9PUkUNNg2WbRjeYr4Xr # SHejZYXLJQwl45E+rFkjUcEhykgaeQcTAc2mXP2bFe4JXxX9c71qvhH6Yr1Qlz/q # y/li4M8vb13vfJbGOyzn1qARFx12uV6+zpjZk5D9zRXDNV6o/NrXtvUaTlIm8O0V # hxKnoimWDzWwOlp0+7P0ogM+5bBztcYokfhQ6DecDdYM0wh/0TXKJ2dbw2aO0mru # bn0j6CXCP15fS1hLuN+09XEDZp0iq6GCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC6dQnjt/Z/9xMdw1ffmmR0bRj1h4x4bxqjEhA2NW1W2gIGZh/d1CXq # GBMyMDI0MDQxNzE0NDMyMC42MDNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnKXFQwIhgPMjAyNDA0MTcyMjMzNTZaGA8yMDI0MDQxODIyMzM1NlowczA5Bgor # BgEEAYRZCgQBMSswKTAKAgUA6cpcVAIBADAGAgEAAgEFMAcCAQACAhE/MAoCBQDp # y63UAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAYKXBk+c4g6pUrtj19UP/ # 7rMM6a/6zTbayuE+hVnnnOe5vttZVtGP+ew7AST+BoRYSt6AlHjgeXA5kNLol9J/ # 0Rs2kJoTKQA6L0TxYm5Hw/GtRv2F5+OKyPmnAmnnRlpfZsWt7v9JiD5mKkTjcYGa # 29P/xWqgp5xzcTVUpKwGtQsxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8TFR9+XQABAAAB4DANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCDBvc8b3OSGOGg6y0RzGX7J57by4QOZFbezxONQUN7rdDCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIOPuUr/yOeVtOM+9zvsMIJJvhNkClj2cmbnCGwr/aQrB # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1Pwf # ExUffl0AAQAAAeAwIgQgi32+uBM5JnOMxmxCYghA41vB43U6XthUpo8z5tkvi5Mw # DQYJKoZIhvcNAQELBQAEggIAYcXhVskiuIyKVke1FsSEk7O8b75x0luq0RhoyKYJ # s/nx/a8Ml+tDqgrYG+ix2wwGBq+Dvz26WBa7GSpLFd/mVaMlw3KjNFpvDOIiiRy8 # wSslzB9xnWJdeUTPC+QGqxPkyzxCzuP6VwSFcOwhZlxYJPE7iqqgugLApDX86nFM # ZowBlwdtAnojjbvatWDKyY/rFYx9fcceRuQ4Gpabyqt6Zu57wHfnvoqx0ESom+EK # vnHhs77WqDvtn0hPQPmbH7KOGfuK8DxA70EEbPoQYtYANXajRwtE1f/oZuEHBM+y # nFVaGwH3aLGwSRcKsu12r3ThcoILWTTu3Ltaw7jP6F57gRajgnMGK55d9zwCsQvQ # vLMcoYa6eZG55x/gdnwEVBwGRiWDTId0wo8od79rLEgNP7ySXrHd9XSbmS7hfXNc # EA7BE478+wYfdPrVqp18hJOHElKy7lCLE5T3yROtZsMvHVc3ucc+H99C9cGY5lWV # EYmDxVld7jN5u6imIvvWJn4kn+BEoTSOGeGBqNdZnDM57g5Ww5F6ggXI+CvLXeqv # ZdLQSktBgG75p7R7BpfKhyYtkt++eJLfir0ecXeGV/rtGK2Ey/FqZk/6Uulnm3Uk # 3UHRgzRy+ceZl1i6raZsBzwtSfxQJXMWi819T/rkHz+rV4NuU8tumgjvUnr5VSzJ # wwI= # SIG # End signature block
combined_dataset/train/non-malicious/SqlProxy_1.psm1.ps1
SqlProxy_1.psm1.ps1
# --------------------------------------------------------------------------- ### <Author> ### Chad Miller ### </Author> ### <Description> ### Based on functions in SQLPSX. SqlProxy.psm1 module is used for administering ### SQL Server logins, users, and roles. Designed to be used with PS Remoting. ### All actions audited to a custom Eventlog. ### See Write-SqlProxyLog for log setup details ### </Description> # --------------------------------------------------------------------------- try {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo"} try {add-type -AssemblyName "Microsoft.SqlServer.Smo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10} catch {add-type -AssemblyName "Microsoft.SqlServer.Smo"; $smoVersion = 9} try {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10} catch {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum"; $smoVersion = 9} try { try {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended" -EA Stop} } catch {Write-Warning "SMOExtended not available"} $EventID = @{ "Add-SqlDatabaseRoleMember"=0 "Add-SqlLogin"=1 "Add-SqlServerRoleMember"=2 "Add-SqlUser"=3 "Remove-SqlDatabaseRoleMember"=4 "Remove-SqlLogin"=5 "Remove-SqlServerRoleMember"=6 "Remove-SqlUser"=7 "Rename-SqlLogin"=8 "Set-SqlLogin"=9 "Set-SqlLoginDefaultDatabase"=10 } ####################### <# .SYNOPSIS Gets a ServerConnection. .DESCRIPTION The Get-SqlConnection function gets a ServerConnection to the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlConnection .OUTPUTS Microsoft.SqlServer.Management.Common.ServerConnection Get-SqlConnection returns a Microsoft.SqlServer.Management.Common.ServerConnection object. .EXAMPLE Get-SqlConnection "Z002\\sql2K8" This command gets a ServerConnection to SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlConnection "Z002\\sql2K8" "sa" "Passw0rd" This command gets a ServerConnection to SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlConnection #> function Get-SqlConnection { param( [Parameter(Position=0, Mandatory=$true)] [string]$sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$username, [Parameter(Position=2, Mandatory=$false)] [string]$password ) Write-Verbose "Get-SqlConnection $sqlserver" if($Username -and $Password) { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $sqlserver,$username,$password } else { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $sqlserver } $con.Connect() Write-Output $con } #Get-ServerConnection ####################### <# .SYNOPSIS Gets an SMO Server object. .DESCRIPTION The Get-SqlServer function gets a SMO Server object for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlServer .OUTPUTS Microsoft.SqlServer.Management.Smo.Server Get-SqlServer returns a Microsoft.SqlServer.Management.Smo.Server object. .EXAMPLE Get-SqlServer "Z002\\sql2K8" This command gets an SMO Server object for SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" This command gets a SMO Server object for SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlServer #> function Get-SqlServer { param( [Parameter(Position=0, Mandatory=$true)] [string]$sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$username, [Parameter(Position=2, Mandatory=$false)] [string]$password, [Parameter(Position=3, Mandatory=$false)] [string]$StatementTimeout=0 ) #When $sqlserver passed in from the SMO Name property, brackets #are automatically inserted which then need to be removed $sqlserver = $sqlserver -replace "\\[|\\]" Write-Verbose "Get-SqlServer $sqlserver" $con = Get-SqlConnection $sqlserver $Username $Password $server = new-object ("Microsoft.SqlServer.Management.Smo.Server") $con #Some operations might take longer than the default timeout of 600 seconnds (10 minutes). Set new default to unlimited $server.ConnectionContext.StatementTimeout = $StatementTimeout $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.StoredProcedure], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.Table], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.View], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.UserDefinedFunction], "IsSystemObject") #trap { "Check $SqlServer Name"; continue} $server.ConnectionContext.Connect() Write-Output $server } #Get-SqlServer ####################### <# .SYNOPSIS Gets an SMO Database object. .DESCRIPTION The Get-SqlDatabase function gets an SMO Database object for the specified SQL Database or collection of Database objects. .INPUTS None You cannot pipe objects to Get-SqlDatabase .OUTPUTS Microsoft.SqlServer.Management.Smo.Database Get-SqlDatabase returns a Microsoft.SqlServer.Management.Smo.Database object. .EXAMPLE Get-SqlDatabase "Z002\\sql2K8" This command gets a collection of SMO Database objects for SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlDatabase $(Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd") "pubs" This command gets a SMO Database object for SQL database pubs on the SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlDatabase #> function Get-SqlDatabase { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$dbname, [Parameter(Position=2, Mandatory=$false)] [switch]$force ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlDatabase:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlDatabase $($server.Name) $dbname" if ($dbname) { if ($server.Databases.Contains("$dbname") -and $server.Databases[$dbname].IsAccessible) {$server.Databases[$dbname]} else {throw "Database $dname does not exist or is not accessible."} } elseif ($force) { $server.Databases | where {$_.IsAccessible -eq $true} } #Skip systems databases else { $server.Databases | where {$_.IsSystemObject -eq $false -and $_.IsAccessible -eq $true} } } # Get-SqlDatabase ####################### <# .SYNOPSIS Executes a query and returns an array of System.Data.DataRow. .DESCRIPTION The Get-SqlData function executes a query and returns an array of System.Data.DataRow. .INPUTS None You cannot pipe objects to Get-SqlData .OUTPUTS System.Data.DataRow Get-SqlData returns an array of System.Data.DataRow. .EXAMPLE Get-SqlData "Z002\\sql2K8" "pubs" "select * from authors" This command executes the specified SQL query using Windows authentication. .EXAMPLE $server = Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" Get-SqlData $server "pubs" "select * from authors" This command executes the specified SQL query using SQL authentication. .LINK Get-SqlData #> function Get-SqlData { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$qry ) switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Get-SqlData:Param '`$dbname' must be a String or Database object." } } #Write-Verbose "Get-SqlData $($database.Parent.Name) $($database.Name) $qry" Write-Verbose "Get-SqlData $($database.Parent.Name) $($database.Name)" $ds = $database.ExecuteWithResults("$qry") $ds.Tables | foreach { $_.Rows} }# Get-SqlData ####################### <# .SYNOPSIS Executes a query that does not return a result set. .DESCRIPTION The Set-SqlData function executes a query that does not return a result set. .INPUTS None You cannot pipe objects to Set-SqlData .OUTPUTS None Set-SqlData does not produce any output. .EXAMPLE Set-SqlData "Z002\\sql2K8" "pubs" "Update authors set au_lname = 'Brown' WHERE au_lname = 'White'" This command executes the specified SQL query using Windows authentication. .EXAMPLE $server = Set-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" Set-SqlData $server "pubs" "Update authors set au_lname = 'Brown' WHERE au_lname = 'White'" This command executes the specified SQL query using SQL authentication. .LINK Set-SqlData #> function Set-SqlData { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$dbname, [Parameter(Position=2, Mandatory=$true)] [string]$qry ) switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Set-SqlData:Param '`$dbname' must be a String or Database object." } } #Write-Verbose "Set-SqlData $($database.Parent.Name) $($database.Name) $qry" Write-Verbose "Set-SqlData $($database.Parent.Name) $($database.Name)" $database.ExecuteNonQuery("$qry") }# Set-SqlData ####################### <# .SYNOPSIS Gets an SMO Login object. .DESCRIPTION The Get-SqlLogin function gets a collection of SMO Login objects for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlLogin .OUTPUTS Microsoft.SqlServer.Management.Smo.Login Get-SqlLogin returns a Microsoft.SqlServer.Management.Smo.Login object. .EXAMPLE Get-SqlLogin "Z002\\sql2K8" This command gets a collection of SMO Login objects for SQL Server Z002\\SQL2K8. .LINK Get-SqlLogin #> function Get-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlLogin $($server.Name)" foreach ($login in $server.Logins | where {$_.LoginType.ToString() -ne 'Certificate'}) { #Return Login Object $login } } # Get-SqlLogin ####################### <# .SYNOPSIS Adds a login to a SQL Server. .DESCRIPTION The Add-SqlLogin function adds a new login to the specified SQL server. .INPUTS None You cannot pipe objects to Add-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlLogin "Z002\\sql2k8" "TestPSUnit" "SQLPSXTesting" 'SqlLogin' This command adds the TestPSUnit login to the Z002\\sql2k8 server. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Add-SqlLogin $server "TestPSUnit" "SQLPSXTesting" 'SqlLogin' This command adds the TestPSUnit login to the Z002\\sql2k8 server. .LINK Add-SqlLogin #> function Add-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$false)] [System.Security.SecureString]$password, [Parameter(Position=3, Mandatory=$false)] [Microsoft.SqlServer.Management.Smo.LoginType]$logintype='WindowsUser', [Parameter(Position=4, Mandatory=$false)] [string]$DefaultDatabase='master', [Parameter(Position=5, Mandatory=$false)] [switch]$PasswordExpirationEnabled, [Parameter(Position=6, Mandatory=$false)] [switch]$PasswordPolicyEnforced, [Parameter(Position=7, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=8, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Add-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Add-SqlLogin $($server.Name) $name" $login = new-object ('Microsoft.SqlServer.Management.Smo.Login') $server, $name $login.DefaultDatabase = $defaultDatabase if ($logintype -eq 'SqlLogin') { $login.LoginType = $logintype if ($server.Information.Version.Major -ne '8') { $login.PasswordExpirationEnabled = $($PasswordExpirationEnabled.IsPresent) $login.PasswordPolicyEnforced = $($PasswordPolicyEnforced.IsPresent) } try { $login.Create($password) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } elseif ($logintype -eq 'WindowsUser' -or $logintype -eq 'WindowsGroup') { $login.LoginType = $logintype try { $login.Create() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | % {"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } } #Add-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Remove-SqlLogin function removes a login from the specified SQL server. .INPUTS None You cannot pipe objects to Remove-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlLogin "Z002\\sql2k8" "TestPSUnit" This command removes the TestPSUnit login from the Z002\\sql2k8 server. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Remove-SqlLogin $server "TestPSUnit" This command removes the TestPSUnit login from the Z002\\sql2k8 server. .LINK Remove-SqlLogin #> function Remove-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=3, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Remove-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Remove-SqlLogin $($server.Name) $name" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.Drop() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Remove-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Set-SqlLogin function changes a SQL Login Password. .INPUTS None You cannot pipe objects to Set-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE $pwd_secure_string = read-host "Enter a Password:" -assecurestring Set-SqlLogin "Z002\\sql2k8" "TestPSUnit" $pwd_secure_string This command sets the password for TestPSUnit login. .LINK Set-SqlLogin #> function Set-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [System.Security.SecureString]$password, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Set-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Set-SqlLogin $($server.Name) $name" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.ChangePassword($password,$true,$false) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Set-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Set-SqlLoginDefaultDatabase function changes a SQL Login default database. .INPUTS None You cannot pipe objects to Set-SqlLoginDefaultDatabase .OUTPUTS None This function does not generate any output. .EXAMPLE Set-SqlLoginDefaultDatabase "Z002\\sql2k8" "TestPSUnit" 'master' This command sets the default database for TestPSUnit login. .LINK Set-SqlLoginDefaultDatabase #> function Set-SqlLoginDefaultDatabase { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$DefaultDatabase, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Set-SqlLoginDefaultDatabase:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Set-SqlLoginDefaultDatabase $($server.Name) $name" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.DefaultDatabase = $DefaultDatabase $login.Alter() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Set-SqlLoginDefaultDatabase ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Rename-SqlLogin function renames a SQL Login. .INPUTS None You cannot pipe objects to Rename-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Rename-SqlLogin "Z002\\sql2k8" "TestPSUnit" "CheckPSUnit" This command renames the login TestPSUnit. .LINK Rename-SqlLogin #> function Rename-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$newname, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Rename-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Rename-SqlLogin $($server.Name) $name $newname" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.Rename("$newName") $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Rename-SqlLogin ####################### <# .SYNOPSIS Adds a new user to a database. .DESCRIPTION The Add-SqlUser function adds a new user to the specified database. .INPUTS None You cannot pipe objects to Add-SqlUser .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlUser "Z002\\sql2k8" "pubs" "TestPSUnit" This command adds the TestPSUnit login to the pubs database. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Add-SqlUser -dbname $database "TestPSUnit" This command adds the TestPSUnit login to the pubs database. .LINK Add-SqlUser #> function Add-SqlUser { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$false)] [string]$login=$name, [Parameter(Position=4, Mandatory=$false)] [string]$defaultSchema='dbo', [Parameter(Position=5, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=6, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Add-SqlUser:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Add-SqlUser $($database.Name) $name" $user = new-object ('Microsoft.SqlServer.Management.Smo.User') $database, $name $user.Login = $login if ($db.parent.Information.Version.Major -ne '8') { $user.DefaultSchema = $defaultschema } try { $user.Create() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Add-SqlUser ####################### <# .SYNOPSIS Removes a user from a database. .DESCRIPTION The Remove-SqlUser function removes a user from the specified database. .INPUTS None You cannot pipe objects to Remove-SqlUser .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlUser "Z002\\sql2k8" "pubs" "TestPSUnit" This command Removes the TestPSUnit user from the pubs database. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Remove-SqlUser -dbname $database "TestPSUnit" This command Removes the TestPSUnit user from the pubs database. .LINK Remove-SqlUser #> function Remove-SqlUser { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Remove-SqlUser:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Remove-SqlUser $($database.Name) $name" $user = $database.Users[$name] try { if ($user) { $user.Drop() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "User $name does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Remove-SqlUser ####################### <# .SYNOPSIS Gets an SMO ServerRole object. .DESCRIPTION The Get-SqlServerRole function gets a collection of SMO ServerRole objects for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlServerRole .OUTPUTS Microsoft.SqlServer.Management.Smo.ServerRole Get-SqlServerRole returns a Microsoft.SqlServer.Management.Smo.ServerRole object. .EXAMPLE Get-SqlServerRole "Z002\\sql2K8" This command gets a collection of SMO ServerRole objects for SQL Server Z002\\SQL2K8. .LINK Get-SqlServerRole #> function Get-SqlServerRole { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlServerRole:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlServerRole $($server.Name)" foreach ($svrole in $server.Roles) { #Return ServerRole Object $svrole } } #Get-SqlServerRole ####################### <# .SYNOPSIS Adds a login to a server role. .DESCRIPTION The Add-SqlServerRoleMember function adds a login to the specified server role. .INPUTS None You cannot pipe objects to Add-SqlServerRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlServerRoleMember "Z002\\sql2k8" "TestPSUnit" "bulkadmin" This command adds the TestPSUnit login to the bulkadmin server role. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Add-SqlServerRoleMember $server "TestPSUnit" "bulkadmin" This command adds the TestPSUnit login to the bulkadmin server role. .LINK Add-SqlServerRoleMember #> function Add-SqlServerRoleMember { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$loginame, [Parameter(Position=2, Mandatory=$true)] [string]$rolename, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Add-SqlServerRoleMember:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Add-SqlServerRoleMember $($server.Name) $name" if($server.Logins | where {$_.name -eq $loginame}) { $svrole = Get-SqlServerRole $server | where {$_.name -eq $rolename} try { if ($svrole) { $svrole.AddMember($loginame) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "ServerRole $rolename does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Login $loginame does not exist on server $($server.Name)." } } #Add-SqlServerRoleMember ####################### <# .SYNOPSIS Removes a login from a server role. .DESCRIPTION The Remove-SqlServerRoleMember function removes a login from the specified server role. .INPUTS None You cannot pipe objects to Remove-SqlServerRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlServerRoleMember "Z002\\sql2k8" "TestPSUnit" "bulkadmin" This command Removes the TestPSUnit login from the bulkadmin server role. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Remove-SqlServerRoleMember $server "TestPSUnit" "bulkadmin" This command Removes the TestPSUnit login from the bulkadmin server role. .LINK Remove-SqlServerRoleMember #> function Remove-SqlServerRoleMember { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$loginame, [Parameter(Position=2, Mandatory=$true)] [string]$rolename, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Remove-SqlServerRoleMember:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Remove-SqlServerRoleMember $($server.Name) $name" if($server.Logins | where {$_.name -eq $loginame}) { $svrole = Get-SqlServerRole $server | where {$_.name -eq $rolename} try { if ($svrole) { $svrole.DropMember($loginame) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "ServerRole $rolename does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Login $loginame does not exist on server $($server.Name)." } } #Remove-SqlServerRoleMember ####################### <# .SYNOPSIS Returns a SMO DatabaseRole object with additional properties. .DESCRIPTION The Get-SqlDatabaseRole function gets a collection of SMO DatabaseRole objects for the specified SQL Database. .INPUTS Microsoft.SqlServer.Management.Smo.Database You can pipe database objects to Get-SqlDatabaseRole .OUTPUTS Microsoft.SqlServer.Management.Smo.DatabaseRole Get-SqlDatabaseRole returns a Microsoft.SqlServer.Management.Smo.DatabaseRole object. .EXAMPLE Get-SqlDatabaseRole $(Get-SqlDatabase "Z002\\sql2K8" pubs) This command gets a collection of SMO DatabaseRole objects for SQL Server Z002\\SQL2K8, pubs database. .EXAMPLE Get-SqlDatabase "Z002\\sql2K8" | Get-SqlDatabaseRole This command gets a collection SMO DatabaseRole objects for all SQL databases on the SQL Server Z002\\SQL2K8. .LINK Get-SqlDatabaseRole #> function Get-SqlDatabaseRole { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline = $true)] [Microsoft.SqlServer.Management.Smo.Database]$database ) process { foreach ($role in $database.Roles) { #Return DatabaseRole Object $role } } } #Get-SqlDatabaseRole ####################### <# .SYNOPSIS Adds a user or role to a database role. .DESCRIPTION The Add-SqlDatabaseRoleMember function adds a user or role to the specified database role. .INPUTS None You cannot pipe objects to Add-SqlDatabaseRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlDatabaseRoleMember "Z002\\sql2k8" "pubs" "TestPSUnit" "TestPSUnitDBRole" This command adds the TestUnit user to the TestPSUnitDBRole database role. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Add-SqlDatabaseRoleMember -dbname $database -name "TestPSUnit" -rolename "TestPSUnitDBRole" This command adds the TestUnit user to the TestPSUnitDBRole database role. .LINK Add-SqlDatabaseRoleMember #> function Add-SqlDatabaseRoleMember { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$rolename, [Parameter(Position=4, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=5, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Add-SqlDatabaseRoleMember:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Add-SqlDatabaseRoleMember $($database.Name) $name $rolename" if(($database.Users | where {$_.name -eq $name}) -or ($database.Roles | where {$_.name -eq $name})) { $role = Get-SqlDatabaseRole $database | where {$_.name -eq $rolename} try { if ($role) { $role.AddMember($name) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "DatabaseRole $rolename does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Role or User $name does not exist in database $($database.Name)." } } #Add-SqlDatabaseRoleMember ####################### <# .SYNOPSIS Removes a user or role from a database role. .DESCRIPTION The Remove-SqlDatabaseRoleMember function removes a user or role from the specified database role. .INPUTS None You cannot pipe objects to Remove-SqlDatabaseRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlDatabaseRoleMember "Z002\\sql2k8" "pubs" "TestPSUnit" "TestPSUnitDBRole" This command removes the TestUnit user to the TestPSUnitDBRole database role. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Remove-SqlDatabaseRoleMember -dbname $database -name "TestPSUnit" -rolename "TestPSUnitDBRole" This command removes the TestUnit user to the TestPSUnitDBRole database role. .LINK Remove-SqlDatabaseRoleMember #> function Remove-SqlDatabaseRoleMember { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$rolename, [Parameter(Position=4, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=5, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Remove-SqlDatabaseRoleMember:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Remove-SqlDatabaseRoleMember $($database.Name) $name $rolename" if(($database.Users | where {$_.name -eq $name}) -or ($database.Roles | where {$_.name -eq $name})) { $role = Get-SqlDatabaseRole $database | where {$_.name -eq $rolename} try { if ($role) { $role.DropMember($name) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "DatabaseRole $rolename does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Role or User $name does not exist in database $($database.Name)." } } #Remove-SqlDatabaseRoleMember ####################### <# .SYNOPSIS Writes an entry to SqlProxy Log File. .DESCRIPTION The Write-SqlProxyLog function writes an entry to the SqlProxy Log File. .INPUTS None You cannot pipe objects to Write-SqlProxyLog .OUTPUTS None This function does not generate any output. .EXAMPLE $message = "PSUserName=$PSUserName`n" + $($psBoundParameters.GetEnumerator() | %{"$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $message This command writes a message to the SQLProxy Log .NOTES This must be run as administrator to create the new EventLog and EventLog Source!!! New-EventLog -LogName SqlProxy -Source SqlProxy .LINK Write-SqlProxyLog #> function Write-SqlProxyLog { param( [Parameter(Position=0, Mandatory=$true)] $EventID, [Parameter(Position=1, Mandatory=$true)] $Message, [Parameter(Position=2, Mandatory=$false)] $EntryType='SuccessAudit' ) write-eventlog -logname SqlProxy -source SqlProxy -eventID $eventID -message $message -EntryType $EntryType } #Write-SqlProxyLog
combined_dataset/train/non-malicious/777.ps1
777.ps1
$copyrightHeaderString = @' // // Copyright (c) Microsoft. All rights reserved. // Licensed under the MIT license. See LICENSE file in the project root for full license information. // '@ $global:updateCount = 0; function Add-CopyrightHeaders($basePath) { Push-Location $basePath $allSourceFiles = Get-ChildItem $basePath -Recurse -Filter *.cs | ?{ $_.FullName -notmatch "\\obj\\?" } foreach ($sourceFile in $allSourceFiles) { $fileContent = (Get-Content $sourceFile.FullName -Raw).TrimStart() if ($fileContent.StartsWith($copyrightHeaderString) -eq $false) { Set-Content $sourceFile.FullName ($copyrightHeaderString + "`r`n`r`n" + $fileContent) Write-Output ("Updated {0}" -f (Resolve-Path $sourceFile.FullName -Relative)) $global:updateCount++ } } Pop-Location } Add-CopyrightHeaders(Resolve-Path $PSScriptRoot\..\src) Add-CopyrightHeaders(Resolve-Path $PSScriptRoot\..\test) Write-Output "`r`nDone, $global:updateCount file(s) updated."
combined_dataset/train/non-malicious/e3d743cf-73b0-4cbc-b91e-bf279e52655e.ps1
e3d743cf-73b0-4cbc-b91e-bf279e52655e.ps1
param( [string] $dirRoot = ".", [string] $Spec = "*.*" ) # # Description: # Use the wide unicode versions (FindFirstFileW and FindNextFileW) to report a directory listing of all files, including those that exceed the MAX_PATH ANSI limitations # # Assumptions, this script works on the assumption that: # There's a console to write the output from the compiled VB.Net # # Author: # Wayne Martin, 15/05/2008, http://waynes-world-it.blogspot.com/ # # Usage # PowerShell . .\\FindFiles.ps1 -d c:\\temp -s *.* # # PowerShell . .\\FindFiles.ps1 -d c:\\temp # # References: # http://msdn.microsoft.com/en-us/library/aa364418(VS.85).aspx # http://blogs.msdn.com/jaredpar/archive/2008/03/14/making-pinvoke-easy.aspx $provider = new-object Microsoft.VisualBasic.VBCodeProvider $params = new-object System.CodeDom.Compiler.CompilerParameters $params.GenerateInMemory = $True $refs = "System.dll","Microsoft.VisualBasic.dll" $params.ReferencedAssemblies.AddRange($refs) $txtCode = @' Imports System Imports System.Runtime.InteropServices Class FindFiles Const ERROR_SUCCESS As Long = 0 Private Const MAX_PREFERRED_LENGTH As Long = -1 <System.Runtime.InteropServices.StructLayoutAttribute(System.Runtime.InteropServices.LayoutKind.Sequential, CharSet:=System.Runtime.InteropServices.CharSet.[Unicode])> _ Public Structure WIN32_FIND_DATAW '''DWORD->unsigned int Public dwFileAttributes As UInteger '''FILETIME->_FILETIME Public ftCreationTime As FILETIME '''FILETIME->_FILETIME Public ftLastAccessTime As FILETIME '''FILETIME->_FILETIME Public ftLastWriteTime As FILETIME '''DWORD->unsigned int Public nFileSizeHigh As UInteger '''DWORD->unsigned int Public nFileSizeLow As UInteger '''DWORD->unsigned int Public dwReserved0 As UInteger '''DWORD->unsigned int Public dwReserved1 As UInteger '''WCHAR[260] <System.Runtime.InteropServices.MarshalAsAttribute(System.Runtime.InteropServices.UnmanagedType.ByValTStr, SizeConst:=260)> _ Public cFileName As String '''WCHAR[14] <System.Runtime.InteropServices.MarshalAsAttribute(System.Runtime.InteropServices.UnmanagedType.ByValTStr, SizeConst:=14)> _ Public cAlternateFileName As String End Structure <System.Runtime.InteropServices.StructLayoutAttribute(System.Runtime.InteropServices.LayoutKind.Sequential)> _ Public Structure FILETIME '''DWORD->unsigned int Public dwLowDateTime As UInteger '''DWORD->unsigned int Public dwHighDateTime As UInteger End Structure Partial Public Class NativeMethods '''Return Type: HANDLE->void* '''lpFileName: LPCWSTR->WCHAR* '''lpFindFileData: LPWIN32_FIND_DATAW->_WIN32_FIND_DATAW* <System.Runtime.InteropServices.DllImportAttribute("kernel32.dll", EntryPoint:="FindFirstFileW")> _ Public Shared Function FindFirstFileW(<System.Runtime.InteropServices.InAttribute(), System.Runtime.InteropServices.MarshalAsAttribute(System.Runtime.InteropServices.UnmanagedType.LPWStr)> ByVal lpFileName As String, <System.Runtime.InteropServices.OutAttribute()> ByRef lpFindFileData As WIN32_FIND_DATAW) As System.IntPtr End Function '''Return Type: BOOL->int '''hFindFile: HANDLE->void* '''lpFindFileData: LPWIN32_FIND_DATAW->_WIN32_FIND_DATAW* <System.Runtime.InteropServices.DllImportAttribute("kernel32.dll", EntryPoint:="FindNextFileW")> _ Public Shared Function FindNextFileW(<System.Runtime.InteropServices.InAttribute()> ByVal hFindFile As System.IntPtr, <System.Runtime.InteropServices.OutAttribute()> ByRef lpFindFileData As WIN32_FIND_DATAW) As <System.Runtime.InteropServices.MarshalAsAttribute(System.Runtime.InteropServices.UnmanagedType.Bool)> Boolean End Function '''Return Type: BOOL->int '''hFindFile: HANDLE->void* <System.Runtime.InteropServices.DllImportAttribute("kernel32.dll", EntryPoint:="FindClose")> _ Public Shared Function FindClose(ByVal hFindFile As System.IntPtr) As <System.Runtime.InteropServices.MarshalAsAttribute(System.Runtime.InteropServices.UnmanagedType.Bool)> Boolean End Function End Class Private Const FILE_ATTRIBUTE_DIRECTORY As Long = &H10 Dim FFW as New NativeMethods Function Main(ByVal dirRoot As String, ByVal sFileSpec As String) As Long Dim result As Long result = FindFiles(dirRoot, sFileSpec) main = result ' Return the result End Function Function FindFiles(ByRef sDir As String, ByVal sFileSpec as String) Dim FindFileData as WIN32_FIND_DATAW Dim hFile As Long Dim sFullPath As String sFullPath = "\\\\?\\" & sDir 'console.writeline(sFullPath & "\\" & sFileSpec) hFile = FFW.FindFirstFileW(sFullPath & "\\" & sFileSpec, FindFileData) ' Find the first object if hFile > 0 Then ' Has something been found? If (FindFileData.dwFileAttributes AND FILE_ATTRIBUTE_DIRECTORY) <> FILE_ATTRIBUTE_DIRECTORY Then ' Is this a file? console.writeline(sFullPath & "\\" & FindFileData.cFileName) ' Yes, report the full path and filename End If While FFW.FindNextFileW(hFile, FindFileData) ' For all the items in this directory If (FindFileData.dwFileAttributes AND FILE_ATTRIBUTE_DIRECTORY) <> FILE_ATTRIBUTE_DIRECTORY Then ' Is this a file? console.writeline(sFullPath & "\\" & FindFileData.cFileName) ' Yes, report the full path and filename End If End While FFW.FindClose(hFile) ' Close the handle FindFileData = Nothing End If hFile = FFW.FindFirstFileW(sFullPath & "\\" & "*.*", FindFileData) ' Repeat the process looking for sub-directories using *.* if hFile > 0 Then If (FindFileData.dwFileAttributes AND FILE_ATTRIBUTE_DIRECTORY) AND _ (FindFileData.cFileName <> ".") AND (FindFileData.cFileName <> "..") Then Call FindFiles(sDir & "\\" & FindFileData.cFileName, sFileSpec) ' Recurse End If While FFW.FindNextFileW(hFile, FindFileData) If (FindFileData.dwFileAttributes AND FILE_ATTRIBUTE_DIRECTORY) AND _ (FindFileData.cFileName <> ".") AND (FindFileData.cFileName <> "..") Then Call FindFiles(sDir & "\\" & FindFileData.cFileName, sFileSpec) ' Recurse End If End While FFW.FindClose(hFile) ' Close the handle FindFileData = Nothing End If End Function end class '@ $cr = $provider.CompileAssemblyFromSource($params, $txtCode) if ($cr.Errors.Count) { $codeLines = $txtCode.Split("`n"); foreach ($ce in $cr.Errors) { write-host "Error: $($codeLines[$($ce.Line - 1)])" write-host $ce #$ce out-default } Throw "INVALID DATA: Errors encountered while compiling code" } $mAssembly = $cr.CompiledAssembly $instance = $mAssembly.CreateInstance("FindFiles") $result = $instance.main($dirRoot, $Spec)
combined_dataset/train/non-malicious/sample_13_77.ps1
sample_13_77.ps1
#************************************************ # TS_SkypeFailureForMissingKB2703761Check.ps1 # Version 1.0.1 # Date: 3/13/2013 # Author: v-blchen # Description: [Idea ID 7499] [Windows] Win8:APP - Skype fails to start # Rule number: 7499 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=7499 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 7499 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_SkypeFailureForMissingKB2703761Check" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { return ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or ($OSVersion.Major -eq 10)) } Function CheckHotFixKB2703761Installed { $WindowsMediaReg = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\WindowsFeatures" if(Test-Path $WindowsMediaReg) { $WmplayerPath = Join-Path $Env:ProgramFiles "Windows Media Player\wmplayer.exe" if(Test-Path $WmplayerPath) { return $true } else { "$WmplayerPath does not exist" | WriteTo-StdOut } } else { "$WindowsMediaReg does not exist" | WriteTo-StdOut } return $false } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if ($RuleApplicable) { $RootCauseDetected = !(CheckHotFixKB2703761Installed) } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJs3ymvu8APjqv # w94KprOxZ8ewW8wpndZIWXZ/b1h4zKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG/Anl8Sw9FTMH9AZIRSI4YR # G4G1uRo1h3+UOMTpbFfdMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAnlnmjILYaNsthV+DrKmaRRzU8xvLZQsredCqZHnyGA3uleyVUQ2fpdi0 # 5DMW+Ng5TtrW67RvH2dEugHawum2RLpefoAMtk57XRd/BR5ZW9tTVphLIg/Yl4om # Y6FyJF6EefDrNt/D9NNA4HgNklSEDlXwErYH0pJiriH3nDg4FxAvTGQ6G9wuDNg7 # UmGuCZjVhi4AWr5Un9FiyrtItWJreclOzN7qhVCqw04FDKWAj9Rr73dwTKpZZd9b # GrZgMKiTzE3ZITbyN35bB80pj1K2fi+VbH6gGM0d+hUNhMUzXUSvSMDU3l4QsVa2 # LCHTK/aAsUYgqCoM37rBJ/RdhvESSaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA7VNtSJHJwQPKm+WMKTkzBg8cGHz9DEmuBpnOmfSwB0wIGZxqItyOU # GBMyMDI0MTAyODExNDA0Ny45NTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAiGA8yMDI0MTAyODA1NDg0 # MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaQ5 # AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEgEa636VH1IhLDsW3Fa0AD # cc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeqPPb9X5bmbVFXObHp67Wi # gFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/nqvDz8msZXcAtE96/FvXd # 43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6hMlUIcog3CD8TCcit1MW # EuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/jpNVEuQ5uey+mvVyZ/Ka # PkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAyOVxOkTT62WQbCKPzmvXTyl+dCZ8DyuwOeb9IICEIGzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u # KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlHi0Od4rfyi3FO/mCmLpu/ # ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIABUg905Bh6z7969AymMUxjkgZ # EQxpYs6PlNpQB2D/mdSzEbVnEUipyxco4gLnmNuM2v2aZM2cnAj75FIKXcCn5CVg # hZD2LbDQxbig0PAWmsDKIEvPPjFJ6yWCnT+yeO3Wl0cypTxSWkn+W18YuGVanO4/ # p0oTSWR8rmSP6forQsT85MM1pxyhfIQhtpf0g1JsrgUhIZq/LXNvR2yk/7Wf5OD+ # t2TnOceadkwKkj5HdYm7H3JAaEZMXZzutmzUvxx49nwEDDLZRt/Ji5fT6Tl+6dcI # hGGD8a/P2KVC7GampIBzBgogpQHcUmNyDlojQnfekf3sUHaufH7I+xlADCU6+Jmn # TL/5xKub0sssaJZtUJgFNQbayyQBl4i+uUJgjCSoUFYbw6spg+tPkNrxMMc41Uua # HP/A7nspivegQL2JDGhSyWqmYBldRBY5tpgP9DhzPKhfD9OqpIUTmbkb3hGgot4k # Yi6+61Vwa+F6qnltmgTQI7B7Q1dSS+Tl5RIAew8oEE7l+X5F35gFuwsQqx3w6ahW # AizaqnbW4WJO/AR0KVgZWl5WbJCeI7X4ZlQDvMIXbt9fVDqapZ++/nxLh8WHvLmV # QJUE2k9NC6P2WkPeX2iYraleFy1p5+15wq5I0C0RdjUi7drHYb/gvxCJF9YmFOjK # 7EWAIupraCwKuqFcgAs= # SIG # End signature block
combined_dataset/train/non-malicious/GPRS Online log_7.ps1
GPRS Online log_7.ps1
<# .SYNOPSIS Get-GprsTime (V4.0 Update for Windows 7 and allow time correction) Check the total connect time of any GPRS devices from a specified date. Use 'Get-Help .\\Get-GprsTime -full' to view Help for this script. .DESCRIPTION Display all the GPRS modem Event Log entries. While applications issued by the mobile phone manufacturers will invariably monitor only their own usage, this will show any logged GPRS activity, be it via PCMCIA, USB, mobile phone, etc. Use the -Verbose switch for some extra information if desired. A default value can be set with the -Monthly switch but can be temporarily overridden with any -Start value and deleted by entering an invalid date. Now uses .NET Parse to use any culture date input. Switches -M and -S cannot be used together. A Balloon prompt will be issued in the Notification area for the 5 days before the nominal month end. NOTE: this can effectively be suppressed by using a value higher than the SIM card term, ie something like -Account 90 for a 30 day card which will override the default setting. Define a function in $profile to set any permanent switches, for example to remove 1hour 15 minutes from the total each time. function GPRS { Invoke-Expression ".\\Get-GprsTime -Adjust 1:15:00- $args" } .EXAMPLE .\\Get-GprsTime.ps1 -Monthly 4/8/2011 This will set the default search date to start from 4/8/2011 and is used to reset the start date each month for the average 30/31 day SIM card. .EXAMPLE .\\Get-GprsTime.ps1 -Start 12/07/2009 -Account 100 -Verbose Search from 12/07/2011 and also show (Verbose) details for each session. The Account switch will override any balloon prompt near the SIM expiry date. .EXAMPLE .\\Get-GprsTime.ps1 5/9/2011 -v Search one day only and show session details. .EXAMPLE .\\Get-GprsTime.ps1 -Today Show all sessions for today. This always defaults to verbose output. .EXAMPLE .\\Get-GprsTime.ps1 -Debug This shows the first available Event Log record & confirms switch settings. (Note that it will probably not be the first 'RemoteAccess' or 'RasClient' record). .EXAMPLE .\\Get-GprsTime -Adjust 1:20:00 If the same SIM card is used on another computer then such times will have to be added here manually (this should be put in a function in $profile so that it will automatically be included - see example above). To remove an amount of time, just put a '-' sign after the desired figure. .NOTES A shorter total time than that actually used will result if the Event Log does not contain earlier dates; just increase the log size in such a case. The author can be contacted at www.SeaStarDevelopment.Bravehost.com and a (binary compiled) Module version of this procedure is included in the file Gprs3xxx.zip download there; the execution time of the module being about 10 times faster than this script. Use '(measure-Command {.\\Get-GprsTime}).TotalSeconds' to confirm the times. For the Event Log to record connect & disconnect events, the modem software should be set to RAS rather than NDIS if possible. #> Param ([String] $start, [alias("PERIOD")][string] $adjust, [String] $monthly, [Int] $account = 0, [Switch] $today, [Switch] $verbose, [Switch] $debug) Trap [System.Management.Automation.MethodInvocationException] { [Int]$line = $error[0].InvocationInfo.ScriptLineNumber [System.Media.SystemSounds]::Hand.Play() if ($line -eq 205) { Write-Warning "[$name] Current GPRS variable has been deleted." $monthly = "" [Environment]::SetEnvironmentVariable("GPRS",$monthly,"User") } else { Write-Warning "[$name] Date is missing or invalid $SCRIPT:form" } exit 1 } #Establish the Operating System...We only need to confirm XP here. #The result will be written to the 'out' variable '$osv'. function Get-OSVersion($computer,[ref]$osv) { $os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer Switch -regex ($os.Version) { '^5\\.1\\.(\\d{1,4})$' { $osv.value = "xp" } #Find XP & variants. default { $osv.value = "unknown" } } } $osv = $null Get-OSVersion -computer 'localhost' -osv ([ref]$osv) if ($osv -eq 'xp') { $logname = 'System' $connEvent = 20158 $discEvent = 20159 $source = 'RemoteAccess' } else { #Treat As Vista or Windows 7. $logname = 'Application' $connEvent = 20225 $discEvent = 20226 $source = 'RasClient' } $entryType = 'Information' $logEntry = $null $oldest = Get-eventlog -LogName $logname | #Get the earliest Log record. Sort-Object TimeGenerated | Select-Object -first 1 if ($oldest.TimeGenerated) { $logEntry = "System Event records available from - $($oldest.TimeGenerated.ToLongDateString())" } $name = $myInvocation.MyCommand $newLine = "[$name] The switches -Start and -Monthly can only be used separately." if ($debug) { $DebugPreference = 'Continue' } if ($start -and $monthly) { [System.Media.SystemSounds]::Hand.Play() Write-Warning "$newLine" exit 1 } $SCRIPT:form = "" #In certain cases Culture & UICulture can be different and have been known to # return conflicting results regarding '-is [DateTime]' queries, etc. if ($Host.CurrentCulture -eq $Host.CurrentUICulture) { $SCRIPT:form = '-Use format mm/dd/year' [Int]$culture = "{0:%d}" -f [DateTime] "6/5/2009" #Returns local day. if ($culture -eq 6) { $SCRIPT:form = '-Use format dd/mm/year' } } $ErrorActionPreference = 'SilentlyContinue' $VerbosePreference = 'SilentlyContinue' $WarningPreference = 'Continue' $conn = $disc = $default = $print = $null $timeNow = [DateTime]::Now $total = $timeNow - $timeNow #Set initial value to 00:00:00. $insert = "since" if ($verbose) { $VerbosePreference = 'Continue' } function CreditMsg ($value, $value2) { $value = [Math]::Abs($value) $prefix = "CURRENT" [DateTime] $creditDT = $value2 $creditDT = $creditDT.AddDays($value) #Add the -Account days. $thisDay = "{0:M/d/yyyy}" -f [DateTime]::Now #Force US format. #If we use '$number = $creditDT - (Get-Date)' instead of the line below we #can sometimes get a value of 1 returned instead 2, hence the above lines. $number = $creditDT - [DateTime] $thisDay [String] $credit = $creditDT $credit = $credit.Replace('00:00:00','') #Remove any trailing time. $credit = "{0:d}" -f [DateTime]$credit Switch($number.Days) { 1 {$prefix = "($value days) will expire tomorrow"; break} 0 {$prefix = "($value days) will expire today"; break} -1 {$prefix = "($value days) expired yesterday"; break} {($_ -lt 0)} {$prefix = "($value days) expired on $credit"; break} {($_ -le 5)} {$prefix = "($value days) will expire on $credit"} Default {$prefix = "CURRENT"} #Only come here if over 5 days. } return $prefix } function Interval ([String] $value) { Switch -regex ($value) { '^00?:00?:\\d+(.*)$' {$suffix = "seconds"; break} '^00?:\\d+:\\d+(.*)$' {$suffix = "minutes"; break} '^\\d+:\\d+:\\d+(.*)$' {$suffix = " hours"; break} '^(\\d+)\\D(\\d+)(.*)$' {$suffix = " hours" $pDays = $matches[1] $pHours = $matches[2] [string]$pMinSec = $matches[3] [string]$tHours = (([int]$pDays) * 24)+[int]$pHours $value = $tHours + $pminSec; break} default {$suffix = " hours"} #Should never come here! } return "$value $suffix" } function CheckSetting ($value) { if ($value) { #Correct for local culture. $print = $default.ToShortDateString() } else { $print = "(Value not set)" } return $print } #The Script effectively starts here............................................. $getGprs = [Environment]::GetEnvironmentVariable("GPRS","User") #First check for GPRS variable and change from US date format to current locale. if ([DateTime]::TryParse($getGprs, [Ref]$timeNow)) { #No error as date is valid. $default = "{0:d}" -f [datetime]$getGprs $default = [DateTime]::Parse($default) $checkParts = "{0:yyyy},{0:%M}" -f $default $times = $checkParts.Split(',') $dayCount = [DateTime]::DaysInMonth($times[0],$times[1]) #Range 28-31. if($account -eq 0) { $account = $dayCount $summary = "$($dayCount.ToString()) days" } else { $summary = "$($account.Tostring()) days" } $text = CreditMsg $account $getGprs #Check if within 5 days of expiry date. if ($text -ne "CURRENT") { [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon $objNotifyIcon.Icon = [System.Drawing.SystemIcons]::Exclamation $objNotifyIcon.BalloonTipIcon = "Info" $objNotifyIcon.BalloonTipTitle = "GPRS online account" $objNotifyIcon.BalloonTipText = "Credit $text" $objNotifyIcon.Visible = $True $objNotifyIcon.ShowBalloonTip(10000) } } else { $summary = "(Days not set)" if ((!$today) -and (!$monthly) -and (!$start)) { [System.Media.SystemSounds]::Hand.Play() Write-Warning("Monthly date is either invalid or not set.") exit 1 } } if ($start) { $start = [DateTime]::Parse($start) #Trigger TRAP if invalid! [DateTime]$limit = $start $convert = "{0:D}" -f $limit $print = CheckSetting $default } if ($monthly) { $start = [DateTime]::Parse($monthly) #Trigger TRAP if invalid! Write-Output "Setting GPRS (monthly) environment variable to: $monthly" $gprs = [String]$start.Replace('00:00:00','') [Environment]::SetEnvironmentVariable("GPRS",$gprs,"User") [DateTime] $limit = $start #Change to required US date format. $convert = "{0:D}" -f $limit $print = $limit.ToShortDateString() $summary = "(Days undetermined)" #Will show next time around. } if ($today) { $verBosePreference = 'Continue' #Show VERBOSE by default. [DateTime] $limit = (Get-Date) $convert = "{0:D}" -f $limit $limit = $limit.Date #Override any start date if using -Today input. $insert = "for today" $print = CheckSetting $default } if ((!$today) -and (!$monthly) -and (!$start)) { if ($default) { $monthly = $default [DateTime] $limit = $monthly $convert = "{0:D}" -f $limit $print = CheckSetting $default } } $adjustment = $null #Otherwise 'Set-Strictmode -Version latest' will catch. if ($adjust) { $pattern = '^(\\d{1,3}):(\\d{1,2}):(\\d{1,2})-?$' if ($adjust -notmatch $pattern ) { Write-Warning "Invalid format - use <hours>:<minutes>:<seconds>" return } #Now create the 'adjustment' to add later. $adjustment = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3] $outString = $adjust.Replace('-','') $outString = interval $outString } Write-Verbose "All records $($insert.Replace('for ','')) - $convert" Write-Verbose "Script activation - User [$($env:UserName)] Computer [$($env:ComputerName)]" Write-Output "" Write-Output "Calculating total connect time of all GPRS modem devices..." #We cannot proceed beyond here without a valid $limit value. Write-Debug "Using - [Search date] $($limit.ToShortDateString()) [Account] $summary [GPRS Monthly] $print" if ($logEntry) { Write-Debug "$logEntry" } $lines = Get-EventLog $logname | Where-Object {($_.TimeGenerated -ge $limit) -and ` ($_.EventID -eq $discEvent -or $_.EventID -eq $connEvent)} if ($lines) { Write-Verbose "A total of $([Math]::Truncate($lines.Count/2)) online sessions extracted from the System Event Log." } else { Write-Output "(There are no events indicated in the System Event Log)" } $lines | ForEach-Object { try { $source = $_.Source } catch { return } if ($_.EventID -eq $discEvent) { #Event 20159 is Disconnect. $disc = $_.TimeGenerated } else { #Event 20158 is Connect. $conn = $_.TimeGenerated } #We are only interested in matching pairs of DISC/CONN... if ($disc -ne $null -and $conn -ne $null -and $disc -gt $conn) { $diff = $disc - $conn $total += $diff $convDisc = "{0:G}" -f $disc $convConn = "{0:G}" -f $conn $period = Interval $diff Write-Verbose "Disconnect at $convDisc. Online - $period" Write-Verbose " Connect at $convConn." } } #End ForEach if (!$source) { $source = '(Undetermined)' } Write-Verbose "Using local event source - System Event Log [$source]" $period = Interval $total function formatSpan ($timespan) { #Convert returns of '1.11:00:00'. $addHours = $timespan.Days * 24 $addHours+= $timespan.Hours $h = $addHours.ToString().PadLeft(2,'0') + ':' $m = $timespan.Minutes.ToString().PadLeft(2,'0') + ':' $s = $timespan.Seconds.ToString().PadLeft(2,'0') return $h + $m + $s } if ($adjustment -and ($total -match $pattern)) { $outDate = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3] if (!$adjust.EndsWith('-')) { $period = $outDate + $adjustment #The '-adjust' value added at start. $show = formatSpan $period $show = interval $show #Get hours,minutes suffix. Write-Output "Total online usage $insert $convert is $show" Write-Output "(Including $($outString.Replace(' ',' ')) adjustment time)" } else { if ($outDate.TotalSeconds -gt $adjustment.TotalSeconds) { $period = $outDate - $adjustment $show = formatSpan $period $show = interval $show Write-Output "Total online usage $insert $convert is $show" Write-Output "(Excluding $($outString.Replace(' ',' ')) adjustment time)" } else { Write-Output "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))." $adjust = $adjust.Replace('-','') Write-Warning "Invalid amount entered ($adjust) - no adjustment performed" } } } else { Write-OutPut "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))." } Write-Output ""
combined_dataset/train/non-malicious/sample_33_97.ps1
sample_33_97.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function Test-ScriptExtent { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [OutputType([bool], ParameterSetName='__AllParameterSets')] [OutputType([System.Management.Automation.Language.IScriptExtent], ParameterSetName='PassThru')] [CmdletBinding()] param( [Parameter(Position=0, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Extent, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Inside, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $After, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Before, [Parameter(ParameterSetName='PassThru')] [switch] $PassThru ) process { if (-not $Extent) { return $false } $passes = (-not $After -or $Extent.StartOffset -gt $After.EndOffset) -and (-not $Before -or $Extent.EndOffset -lt $Before.StartOffset) -and (-not $Inside -or ($Extent.StartOffset -ge $Inside.StartOffset -and $Extent.EndOffset -le $Inside.EndOffset)) if (-not $PassThru.IsPresent) { return $passes } if ($passes) { $Extent # yield } } } # SIG # Begin signature block # MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDh3KaxT3eCSr09 # 0zGLQhhCZ8P7A0AsbPcbsnG6DpAmJqCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGAQN+mOQZxzZyVbmfEFx8KczzZKcpC3 # M4HV8vsum11uMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # M/ZA/kqBKMS/BMqMXm78lJUIC/rV5XS3bCsXLjy1RrT92b+rxJ+XAfYyc8qj/nCw # J6WOpZ0/KDW38TVJVppyX42VnVCTW4Xvzqdrh9bOvZkfQKzXk2hawhsgo17gAYz+ # Y54J4W3Upq0u6PoNGzAcNorskFbUfzX3/onlDMndFawwhdso6RbZVqcC1/qQn9oR # IsuGDNPL1nNA3KkMtT65uuP1yk61x7IRtB7KIzaNmSGURl6aVzkWAlmHbGTvMkmP # CCTjxaetBwdh0cs0t1RIPfyZKIZBKA4NfKAoGh6bg10ZiZ+y8jMxwbF9l/3LWlBq # p89fQhy7Q6w4Iw3oihBLvKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG # SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCCzAz6WHT6XwrCtuNoSKySt6Miq5M1DmYYXW4HojlFe2gIGZfxpJR9SGBMyMDI0 # MDQwMzIxMzMzOS45OTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH # IDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NDFaFw0y # NTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbzCVyYQNsz # 8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCddseF2i+aM # MjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4xLqv7DZUz # 8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+TgnrLR7A # TRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJsGEo3QrM # 2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9f7B0Ayh1 # 4Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stPaojR+PDA # 2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22XjaVVRwCgjg # JnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOnWRfe8N21 # tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/91QcGoZFm # VbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2MwqQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4emancp6KPN+ # xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eoifm0Nud7 # /4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5EdeafH2A # oG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+xoD1qRz2 # QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7ws5YrA2I # 8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zHu2oGGeCB # g4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ03833Tsv # Tgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D18rZni9pU # wN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CINZmoirEWm # CtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvhy5ku/inU # ++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0SbQgS9qs # dzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDuHayKTCaY # sYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bgJ9jAiGA8yMDI0MDQwMzE3MDE0MloYDzIw # MjQwNDA0MTcwMTQyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuAn2AgEAMAoC # AQACAgSUAgH/MAcCAQACAhQ5MAoCBQDpuVt2AgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQELBQADggEBAD3Vla1jFcZVCUHeWybFSR/TXbfm6GGYLdMNaxcaZ4g4lneuf/Eq # Ep4fbwb8sWEF73tQFDTADNU5B/MXQ+Mi07oORkY4eXZfneDPAfcAJ1R5WFAmRzsF # EGJrz83IWcDF/fQnhIBN1glqCKxmckocX6+++QXWX04P5Tx9B+Pj9VZcayYbFH6e # F7l0BE9K+OKjNNtFYXE5RlmRTEy89btw82vdsUttKbqKwUda6W+9kpgCCUJipFxM # kGALgaRLvBTAUHfC7luPHhE2LNYj9ccBGKpzeJx5GaBeBeB8uptkYMlyO64bMmrq # XJatodVYkRR3A4Se6Tqm8LVw4KeZMB1U7VMxggQNMIIECQIBATCBkzB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TANBglg # hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG # SIb3DQEJBDEiBCBxs/b8WcAhA2Hqc1c77dGT5neW0KD1QfTDwciAc027fDCB+gYL # KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsSDrXZ # 6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHt4V/L1felXXMAAQAAAe0wIgQgdGoqzWxBTvwHvsTIxYqr5oiVCTGJOeKF # nbWbhY8yNTgwDQYJKoZIhvcNAQELBQAEggIAmija78o09BZozOBlk9qB2pHgSQF3 # J6fp+68E7801n2f8GUJuSdyKvl3B14DkRiZ6YIOzmx2g2FDAILBjaBBrQuroWldd # FY+auyqqcWMkM27I7EXIwbhBXeMuQACGH/e7nMIirrYRGnRuNp9e0ZdIIUJKghZn # hXUbgkwLJz1QbchSeRui0O89Yiuy87sNulI0QAs++GOTQtyp7Nas9lcfGALQjEa9 # 97qg/fS3DUFEVEl1iXX5Yhkaju8Kv9VXmcwI0VpBPqnto+v1c1B09Nj8Cr/oSk0l # +Sli0r8u8hiqjVZ7RKPXQRSs7JsMDbHz47QD+gR0yy0lf8AjApYK1jnzJIrO2rfJ # e7xonjViV/y0eSD4UbjKmu4d9AeaMO1+FwUbX4G9KYVZz1WCWToY9bVZP+SUIrG0 # luHkpeBMAqE1ZxO7REu9UYzkySR/V5nNKzLe8JfUXU35GsXeV60XfTJSvGYz62zb # 7LKWsfK7u+dY+A5WTONMZ6VcBcz45ARlexAqEiojLWtnD5LC45B3JXszDExlH5Ya # vW6UkeJUf8BVFnPEMm5a4Q2uO9w3sH1HOm+0voNokP3dtUHXoP/59xSYjENrFZm9 # PJqVgx5aCii/StHsc5vyv67elZ+GnFdwFs/2s8fnlmuwOWUhvzcb4E9woUfPA7He # xzXrgdq1eJ4P3X8= # SIG # End signature block
combined_dataset/train/non-malicious/750.ps1
750.ps1
$branch = [uri]::EscapeDataString($env:PSES_BRANCH) $headers = @{Authorization = "Bearer $env:SYSTEM_ACCESSTOKEN"} $buildsUrl = $env:VSTS_PSES_URL_TEMPLATE -f $branch, "succeeded" $succeededBuilds = Invoke-RestMethod -ContentType application/json -Uri $buildsUrl -Headers $headers Write-Host "Requested URL: $buildsUrl" Write-Host "Got response:`n$(ConvertTo-Json $succeededBuilds)" $buildsUrl = $env:VSTS_PSES_URL_TEMPLATE -f $branch, "partiallySucceeded" $partiallySucceededBuilds = Invoke-RestMethod -ContentType application/json -Uri $buildsUrl -Headers $headers Write-Host "Requested URL: $buildsUrl" Write-Host "Got response:`n$(ConvertTo-Json $partiallySucceededBuilds)" $builds = @( $succeededBuilds.value $partiallySucceededBuilds.value ) | Sort-Object finishTime -Descending Write-Host "Got PSES_BRANCH: ${env:PSES_BRANCH}" Write-Host "setting PSES_BUILDID to $($builds[0].Id)" Write-Host "
combined_dataset/train/non-malicious/4025.ps1
4025.ps1
function Test-DeploymentEndToEnd { try { $rgname = Get-ResourceGroupName $deploymentName = Get-ResourceName $location = "WestUS" New-AzResourceGroup -Name $rgname -Location $location $deployment = New-AzDeployment -Name $deploymentName -Location $location -TemplateFile subscription_level_template.json -TemplateParameterFile subscription_level_parameters.json -nestedDeploymentRG $rgname Assert-AreEqual Succeeded $deployment.ProvisioningState $subId = (Get-AzContext).Subscription.SubscriptionId $deploymentId = "/subscriptions/$subId/providers/Microsoft.Resources/deployments/$deploymentName" $getById = Get-AzDeployment -Id $deploymentId Assert-AreEqual $getById.DeploymentName $deployment.DeploymentName $templatePath = Save-AzDeploymentTemplate -Name $deploymentName -Force Assert-NotNull $templatePath.Path $operations = Get-AzDeploymentOperation -DeploymentName $deploymentName Assert-AreEqual 4 @($operations).Count Remove-AzDeployment -Name $deploymentName } finally { Clean-ResourceGroup $rgname } } function Test-DeploymentAsJob { try { $rgname = Get-ResourceGroupName $deploymentName = Get-ResourceName $storageAccountName = Get-ResourceName $location = "WestUS" New-AzResourceGroup -Name $rgname -Location $location $job = New-AzDeployment -Name $deploymentName -Location $location -TemplateFile subscription_level_template.json -nestedDeploymentRG $rgname -storageAccountName $storageAccountName -AsJob Assert-AreEqual Running $job[0].State $job = $job | Wait-Job Assert-AreEqual Completed $job[0].State $deployment = $job | Receive-Job Assert-AreEqual Succeeded $deployment.ProvisioningState $subId = (Get-AzContext).Subscription.SubscriptionId $deploymentId = "/subscriptions/$subId/providers/Microsoft.Resources/deployments/$deploymentName" $getById = Get-AzDeployment -Id $deploymentId Assert-AreEqual $getById.DeploymentName $deployment.DeploymentName $operations = Get-AzDeploymentOperation -DeploymentName $deploymentName Assert-AreEqual 4 @($operations).Count Remove-AzDeployment -Name $deploymentName } finally { Clean-ResourceGroup $rgname } } function Test-StopDeployment { try { $rgname = Get-ResourceGroupName $deploymentName = Get-ResourceName $storageAccountName = Get-ResourceName $location = "WestUS" New-AzResourceGroup -Name $rgname -Location $location $job = New-AzDeployment -Name $deploymentName -Location $location -TemplateFile subscription_level_template.json -nestedDeploymentRG $rgname -storageAccountName $storageAccountName -AsJob Assert-AreEqual Running $job[0].State Stop-AzDeployment -Name $deploymentName $job = $job | Wait-Job Assert-AreEqual Completed $job[0].State $deployment = $job | Receive-Job Assert-AreEqual Canceled $deployment.ProvisioningState Remove-AzDeployment -Name $deploymentName } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/2393.ps1
2393.ps1
function Get-Uptime { [OutputType('System.Management.Automation.PSCustomObject')] [CmdletBinding()] param ( [Parameter(ValueFromPipeline)] [string[]]$ComputerName = $env:COMPUTERNAME ) begin { $today = Get-Date } process { foreach ($computer in $ComputerName) { try { $output = [Ordered]@{ 'ComputerName' = $computer 'StartTime' = $null 'Uptime (Months)' = $null 'Uptime (Days)' = $null 'Status' = $null 'MightNeedPatched' = $false } if (-not (Test-Connection -ComputerName $computer -Count 1 -Quiet)) { $output.Status = 'OFFLINE' throw "The computer [$($computer)] is offline." } $filterHt = @{ 'LogName' = 'System' 'ID' = 6005 } $startEvent = Get-WinEvent -ComputerName $computer -FilterHashtable $filterHt | select -First 1 if (-not $startEvent) { $output.Status = 'ERROR' throw "Unable to determine uptime for computer [$($computer)]" } $output.Status = 'OK' $output.StartTime = [dateTime]$startEvent.TimeCreated $daysUp = [math]::Round((New-TimeSpan -Start $startEvent.TimeCreated -End $today).TotalDays, 2) $output.'Uptime (Days)' = $daysUp if ($daysUp -gt 30) { $output.'MightNeedPatched' = $true } } catch { Write-Warning $_.Exception.Message } finally { [pscustomobject]$output } } } }
combined_dataset/train/non-malicious/sample_22_32.ps1
sample_22_32.ps1
# # Module manifest for module 'OCI.PSModules.Redis' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Redis.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bd4757ae-2cb1-4507-acfd-0f3be713db44' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Redis Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Redis.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRedisCluster', 'Get-OCIRedisClustersList', 'Get-OCIRedisWorkRequest', 'Get-OCIRedisWorkRequestErrorsList', 'Get-OCIRedisWorkRequestLogsList', 'Get-OCIRedisWorkRequestsList', 'Move-OCIRedisClusterCompartment', 'New-OCIRedisCluster', 'Remove-OCIRedisCluster', 'Stop-OCIRedisWorkRequest', 'Update-OCIRedisCluster' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Redis' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_52_75.ps1
sample_52_75.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Get-AMTIDER { <# .Synopsis Lists the Intel Active Management Technology IDE redirection sessions .Description This CmdLet lists the Intel Active Management Technology (AMT) IDE redirection (IDER) sessions. .Notes Status: Status output designates whether or not the command was completed successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Get-AMTIDER ComputerName IDERSessionID IDERPath IDERState ------------ ------------- -------- --------- 192.168.1.100 1 boot.iso Disabled #> PROCESS { if (!$global:imrLib -or $AMTIDERSessions.Count -eq 0) { Write-Output "There are no open IDER sessions" return } $Results = @() ForEach ($session in $AMTIDERSessions) { $Obj = new-object psobject [Intel.Management.Redirection.IDERDeviceState]$state = new-object Intel.Management.Redirection.IDERDeviceState $output = $global:imrlib.IDERGetDeviceState($session.IDERSessionID, [ref]$state) [Intel.Management.Redirection.ClientInfo]$ci = new-object Intel.Management.Redirection.ClientInfo $output = $global:imrlib.GetClientInfo($session.IDERSessionID, [ref]$ci) $Comp = $ci.ip #Add Member to Object. Include Computer Name and Operation sucess $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name IDERSessionID -value $session.IDERSessionID $Obj | Add-Member -MemberType noteproperty -Name IDERPath -value $session.IDERPath $Obj | Add-Member -MemberType noteproperty -Name IDERState -value $state.pri_current $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBh00yPyjX38zgx # 9MqB3MsgJ9KRk9uJa9ISyhV3xuIKbKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg+1p8UygffytTPotp # C9enPwvD0Jy+LCwRN0LRuUokW6cwDQYJKoZIhvcNAQEBBQAEggGAmfiHnxr3f+wq # RCqLNHPqJDwqOPkaeTMaJmTYHc8i0/byVWCo6wDwgngcHKWqKTF9WTEcjKMlNltB # NT8lANutxZiTFInrC5iOAJgbR3GfqjuDXhqp+E93V7Zi9+IuJs2HXG+JA+TLwp5H # M4KE+JUVdOqONwuvxkPlQ2NOVDiadAWWZhin5f2YUjyskwihvPNU8j9C4vZXIbeK # JvsXjNUYuKXFHP+PxThpAsLaFe78n+SoAXlvUKPCSS/J0qXHO8DPQzD6RHJicFfT # CGRni+ykU+yZhwXdahIWsejzSUt/F74T94WH7D87/rSMrrKlBv8AlEDrITspb80c # sW94kohJXqM93TnIn0QzuDNU4hsrJgjzqE5cr805wXyNSAYhsv5mB56yibCyyWLv # 0V1R5sWJpvDW9nXBQI3tl+Iq653pXkRnKdJ2ikMD19GB6rgReikNc+0/Z+hmgAJY # m2jgIF0u8dWPgkzR3RrAvN9+437tE7PX+T2xD4BN9Z2dMyYOEynGoYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIEgsUbqawuqSz8FHP7/WBdjlqfaS5gbwIaxX # epnVuye7AhRzfJMBddWcAjRHjMxSwpsvTEAoQhgPMjAyMTA3MTkxNjI5MzdaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjEwNzE5MTYyOTM3WjA/BgkqhkiG9w0BCQQxMgQwwIC6IyQI10Lm # XjSxMlP/0MkjVFay0/skd5B7xYviyGc1HYquzX3e51vUzR3CM68VMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICACZRuIxoVYMp6SiRomJlLKFz//aHJiBp43naR4paLPcgAlbyV62U # B8XHRZucmzNZYEJQ6peO+nrL4hPphg94yoqgRlxruN64HR1Yj9dB5upcRP7udCbR # 0m9INLsvQoX45J9eCKjzzQB+LMzd22+cleOuKRPuhRE8TtWsAWVE11p+4H+16KXe # Zc2TJVsRs/MC66jlCR41+fCoJ2v5ucJpQaigU0MvvE8YNpjhKv/1N193f0zVrRFT # uVH48N3JvQg7DDL7AVpw/D4Zaq/RQiFhJVZ7Ukc1PR/jMq6RiOdE++fnkzJkxgV5 # GkYLEdcr6tHzBnpqkJWiiRx511lTdfMS1bm02LSwPElTJoO6h1xHWiAnJ0uNpkfv # AIMoKtaWiQveRgVWLw3yz6oa9JMZ/NZkuk5IgcXAixE+3YEhxRX6Rkg7PY20oGgZ # GkC5pBRH8full3ZyOqmOlFa1Zb3M4KnNJYcQYHge+wjjnneryzOwJ2zSwNOjbJ/7 # cCni82IBu9EG8nUNMEn65Lftyf36pH4qznys6JNQMwN/n+WCNoV+zBM/q3hopsSQ # w3VoUJvo3iMTkiUut9p2bUpetQLhg8dgD6Q9dDH5gVeVRlAKJWJS4BnRdsFwf+iO # cOjUOlBkWu9KZ7JgneosaGhirSg4uc+N0CV1AIbSyhR3KpMyCxXnOpAE # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_3.ps1
sample_6_3.ps1
ConvertFrom-StringData @' id_clustervalidationreport=Cluster Validation Report id_clustervalidationreportobtaining=Obtaining Cluster Validation Report id_clustervalidationreportstatus=Connecting to %Node% Service Control Manager id_clustervalidationreporttestnet=Testing Networking and obtaining Cluster Validation report id_clustervalidationdetecthyperv=Detected Hyper-V - Checking for clustered VMs id_clustervalidationaddhyperv=Detected Clustered VMs - Adding Hyper-V tests to the report id_clustervalidationdetects2d=Detected S2D adding the S2D tests to the validation reports '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAkNGZyInnFzNwU # cG3Ae6mllH4JILI2+WNTf5f/U94mFaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICo9+wVVYSh4ATiurSiTyOa0 # Tf9pWT94ixB4q1LAAosiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZURqWkGKsufYpwQuUep8+NB/q3/XyUotH/rTkFsZU2MiVor1tVsUdaXU # VcgnFA0Ebm9Uiwe0Ni/4vXanrFfpl6y9APwOaHWlxyCgMr3z17Ow8uzr4eze6VQP # eTBKIJbb5KCITp6VId4YCC4PPQ/x7XbALzYHJs/U8SAiAqKzMk328SU0uNJ31ArM # 8ml64Rahd/AdgBKE9P39r7zNrIqODyg+QoLX7GMWxbl5oNcklc45/D5CUg+Di+77 # ZgHJaA7UHY2MVHtXQUmhFN7vRQk/lGCx6yxLREfNtTMreYfenMWOMLp3zoeiewiv # KsPX9+VEOuF4XzaxqOmNKUO8lRX1vqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBsfGLsmNkMZYzakaCb4pFFT8F0UAGuLV+rJdcIQBBIPgIGZutTTeP0 # GBMyMDI0MTAyODExNDA0MS45MTJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7RNN3M8bTAAEAAAH6MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQzMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyhZVBM3PZcBfEpAf7fII # hygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpGyDGX+EbCbHhS5Td4J0Yl # c83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJdenpQ6UciM4nMYZvdQjyb # A4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ45oQIp7Sx57RPQ/0O6qay # J2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVKrRV5YelRvWNTg1pH4EC2 # KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah14t7Yk+xl5P4Tw3xfAGg # Hsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1NroJKwBCW11Pwi0z/ki9 # 0ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7Lk0Z/pATRwAINqwdvzpdt # X2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8pSwGewrffwgAbNKm82ZDF # vqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbNh5tDv3GeJ3EKvC4vNSAx # tGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG3zcsYHaa4+w+YmMrhTEz # D4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRjjHKbL5WV # 6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAuFbCorFrvodG # +ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xWdL1kygaW5BOZ3xBlPY7V # puf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJfUQRThDL4zxI2pYc1wnPp # 7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yatcm4kBqIH6db1+weM4q46 # NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJSKcJ3nMVyfNlnv6yvttYz # LK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0VCM11rHM11ZmN0euJbbBC # VfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6CqLKjtHSoeoAGPeeX24f # 5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRstZajbYEeX/N7RvSbkn0d # jD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M0TKOduihhKxAt/6Yyk17 # Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe5N0e4HWFf8WW2ZL0+c83 # Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87ZymXG3MO2wUjhL9HvSQzj # oquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKwBvII6sg0Ny7aPDaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0MTAyOTEwMTQwMVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEAAgIa4zAHAgEAAgITSTAK # AgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBDp2k9IO7lePSu # N2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypOa+QZHboICRCPw0/gWqlr # vDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNLMl1wOoWE3WfiBV23XWqi # qgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKLQri7U/CWGo0EhKQQh5XE # qgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj7KSuuVKsMWeLMNH4sRgs # 1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBcudKw24qBm3gFHJ2uSv/o # CRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg3mvRlxegJQnM # bj1jsqOPFV5VQzkXegVxSuJ5zDgqrJAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYocbkOeVjCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+vs7RNN3M8bTAAEAAAH6 # MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hWGYq3MA0GCSqGSIb3DQEB # CwUABIICABhHn0jdOSijBS6TSsUW/Ccac3iklnNLZY2esrVz7t8lBVZ5N+mrxGiw # ZrKmbLQEadm58CD4DJEnklmWKzLcj/Ruut4pcxlYV/qfnNkuZZNw+UbaMuS0cfVc # MeMKbdZFAwkifFu1cQmLFY0q3ZYQ9gJgivXJ9Dt17I+NKaSo8OCAF6ooJ6dXik1i # /w6E4HPwkH3dSLLSalkGB+W9+K+WgN6RcyLM9XEaRZqgmjxLlYRqtfObCEdRHolr # NlKSRjK/rU2KHRc/MLF1/LW/nmk5BEHCLfQv/+s4xGiQW5BV/s3o8ZX7ZfhMcrTA # nSZZSGHCKswiR2VLWpSgVTMyfrKJ9DFrW81S6bwE+N6R73URZaN3P7hDfSdBx932 # ca9HH22TVMVWsBJBeRKBvw4vx2PQcppp2J3Ts+bkJCc2d5YZC3bPNaMbz0t9Lz4t # gWFMnkcoNZ6XvNOM1EbqktRErEPDA1+fBWTmgM2i/50jLohUmdYcMVbd4AM4Y/Qd # GzHyKpElht5QR9MsGOJiCFxYu5oqnA+ydEu7CJ2PlfeCNdyWVewFYHwR93PDsncV # gDblJfbtteM87pPf2GjtZCEmdGkNsBM6is38bQrMIQGwK86XMMd3gPr/MUwpFtGb # 9exl84NbdilO4V3q9xmeXW11c6AThmv2W545+prv+epBEDXpafo8 # SIG # End signature block
combined_dataset/train/non-malicious/Select-Alive.ps1
Select-Alive.ps1
filter Select-Alive { param ( [switch]$Verbose ) trap { Write-Verbose "$(get-date -f 's') ping failed: $computer" continue } if ($Verbose) { $VerbosePreference = "continue" $ErrorActionPreference = "continue" } else { $VerbosePreference = "silentlycontinue" $ErrorActionPreference = "silentlycontinue" } Write-Verbose "$(get-date -f 's') ping start" $ping = New-Object System.Net.NetworkInformation.Ping $reply = $null $_ | foreach-object { $obj = $_ # Accomodate different input object types # thx Gaurhoth (http://thepowershellguy.com/blogs/gaurhoth/archive/2007/10/08/an-example-of-how-to-use-new-taskpool.aspx) switch ($obj.psbase.gettype().name) { "DirectoryEntry" { $cn = $obj.dnshostname[0] } "IPHostEntry" { $cn = $obj.HostName } "PSCustomObject" { $cn = $obj.Name } "SearchResult" { $cn = $obj.properties['dnshostname'][0] } "String" { $cn = $obj.trim() } } Write-Verbose "$(get-date -f 's') pinging $cn..." $searchCount++ $reply = $ping.Send($cn) if ($reply.status -eq "Success") { $cn; $pingCount++ } } Write-Verbose "$(get-date -f 's') ping end - $pingCount/$searchCount online" }
combined_dataset/train/non-malicious/4035.ps1
4035.ps1
$managementGroup = 'AzGovTest7' $description = 'Unit test junk: sorry for littering. Please delete me!' $updatedDescription = "Updated $description" $metadataName = 'testName' $metadataValue = 'testValue' $metadata = "{'$metadataName':'$metadataValue'}" $enforcementModeDefault = 'Default' $enforcementModeDoNotEnforce = 'DoNotEnforce' $updatedMetadataName = 'newTestName' $updatedMetadataValue = 'newTestValue' $updatedMetadata = "{'$metadataName':'$metadataValue', '$updatedMetadataName': '$updatedMetadataValue'}" $parameterDisplayName = 'List of locations' $parameterDescription = 'An array of permitted locations for resources.' $parameterDefinition = "{ 'listOfAllowedLocations': { 'type': 'array', 'metadata': { 'description': '$parameterDescription', 'strongType': 'location', 'displayName': '$parameterDisplayName' } } }" $fullParameterDefinition = "{ 'listOfAllowedLocations': { 'type': 'array', 'metadata': { 'description': '$parameterDescription', 'strongType': 'location', 'displayName': '$parameterDisplayName' } }, 'effectParam': { 'type': 'string', 'defaultValue': 'deny' } }" function Test-PolicyDefinitionCRUD { $policyName = Get-ResourceName $expected = New-AzPolicyDefinition -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Mode Indexed -Description $description $actual = Get-AzPolicyDefinition -Name $policyName Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual $expected.Properties.Mode $actual.Properties.Mode $actual = Set-AzPolicyDefinition -Name $policyName -DisplayName testDisplay -Description $updatedDescription -Policy ".\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName New-AzPolicyDefinition -Name test2 -Policy "{""if"":{""source"":""action"",""equals"":""blah""},""then"":{""effect"":""deny""}}" -Description $description $list = Get-AzPolicyDefinition | ?{ $_.Name -in @($policyName, 'test2') } Assert-True { $list.Count -eq 2 } $list = Get-AzPolicyDefinition -Custom Assert-True { $list.Count -gt 0 } $builtIns = $list | Where-Object { $_.Properties.policyType -ieq 'BuiltIn' } Assert-True { $builtIns.Count -eq 0 } $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name 'test2' -Force Assert-AreEqual True $remove } function Test-PolicyDefinitionMode { $policyName = Get-ResourceName $expected = New-AzPolicyDefinition -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Mode All -Description $description $actual = Get-AzPolicyDefinition -Name $policyName Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -Name $policyName -DisplayName testDisplay -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -Name $policyName -DisplayName testDisplay -Mode 'All' -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -Name $policyName -DisplayName testDisplay -Mode 'Indexed' -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'Indexed' $actual.Properties.Mode Assert-AreEqual 'Indexed' $expected.Properties.Mode $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove $expected = New-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Mode All -Description $description $actual = Get-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName -DisplayName testDisplay -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName -DisplayName testDisplay -Mode 'All' -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName -DisplayName testDisplay -Mode 'Indexed' -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'Indexed' $actual.Properties.Mode Assert-AreEqual 'Indexed' $expected.Properties.Mode $remove = Remove-AzPolicyDefinition -ManagementGroupName $managementGroup -Name $policyName -Force Assert-AreEqual True $remove $subscriptionId = $subscriptionId = (Get-AzContext).Subscription.Id $expected = New-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Mode All -Description $description $actual = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -DisplayName testDisplay -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -DisplayName testDisplay -Mode 'All' -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'All' $actual.Properties.Mode Assert-AreEqual 'All' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -DisplayName testDisplay -Mode 'Indexed' -Description $updatedDescription -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'Indexed' $actual.Properties.Mode Assert-AreEqual 'Indexed' $expected.Properties.Mode $remove = Remove-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -Force Assert-AreEqual True $remove $expected = New-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -Policy "$TestOutputRoot\SampleKeyVaultDataPolicyDefinition.json" -Mode 'Microsoft.KeyVault.Data' -Description $description $actual = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual 'Microsoft.KeyVault.Data' $actual.Properties.Mode Assert-AreEqual 'Microsoft.KeyVault.Data' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -DisplayName testDisplay -Description $updatedDescription -Policy "$TestOutputRoot\SampleKeyVaultDataPolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'Microsoft.KeyVault.Data' $actual.Properties.Mode Assert-AreEqual 'Microsoft.KeyVault.Data' $expected.Properties.Mode $actual = Set-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -DisplayName testDisplay -Mode 'Microsoft.KeyVault.Data' -Description $updatedDescription -Policy "$TestOutputRoot\SampleKeyVaultDataPolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual 'Microsoft.KeyVault.Data' $actual.Properties.Mode Assert-AreEqual 'Microsoft.KeyVault.Data' $expected.Properties.Mode $remove = Remove-AzPolicyDefinition -SubscriptionId $subscriptionId -Name $policyName -Force Assert-AreEqual True $remove } function Test-PolicyDefinitionWithUri { $policyName = Get-ResourceName $actual = New-AzPolicyDefinition -Name $policyName -Policy "https://raw.githubusercontent.com/vivsriaus/armtemplates/master/policyDef.json" -Mode All -Description $description $expected = Get-AzPolicyDefinition -Name $policyName Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual $expected.Properties.Mode $actual.Properties.Mode $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove } function Test-PolicyAssignmentCRUD { $rgname = Get-ResourceGroupName $policyName = Get-ResourceName $rg = New-AzResourceGroup -Name $rgname -Location "west us" $policy = New-AzPolicyDefinition -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Description $description $actual = New-AzPolicyAssignment -Name testPA -PolicyDefinition $policy -Scope $rg.ResourceId -Description $description $expected = Get-AzPolicyAssignment -Name testPA -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId $actualId = Get-AzPolicyAssignment -Id $actual.ResourceId Assert-AreEqual $actual.ResourceId $actualId.ResourceId $set = Set-AzPolicyAssignment -Id $actualId.ResourceId -DisplayName testDisplay Assert-AreEqual testDisplay $set.Properties.DisplayName $expected = New-AzPolicyAssignment -Name test2 -Scope $rg.ResourceId -PolicyDefinition $policy -Description $description $list = Get-AzPolicyAssignment -Scope $rg.ResourceId | ?{ $_.Name -in @('testPA', 'test2') } Assert-AreEqual 2 @($list).Count $list = Get-AzPolicyAssignment -IncludeDescendent | ?{ $_.Name -in @('testPA', 'test2') } Assert-AreEqual 2 @($list).Count $list = Get-AzPolicyAssignment | ?{ $_.Name -in @('testPA', 'test2') } Assert-AreEqual 0 @($list).Count $remove = Remove-AzPolicyAssignment -Name testPA -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyAssignment -Name test2 -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove $remove = Remove-AzResourceGroup -Name $rgname -Force Assert-AreEqual True $remove } function Test-PolicyAssignmentIdentity { $rgname = Get-ResourceGroupName $policyName = Get-ResourceName $location = "westus" $rg = New-AzResourceGroup -Name $rgname -Location $location $policy = New-AzPolicyDefinition -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Description $description $actual = New-AzPolicyAssignment -Name testPA -PolicyDefinition $policy -Scope $rg.ResourceId -Description $description -AssignIdentity -Location $location $expected = Get-AzPolicyAssignment -Name testPA -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual "SystemAssigned" $expected.Identity.Type Assert-NotNull($expected.Identity.PrincipalId) Assert-NotNull($expected.Identity.TenantId) Assert-AreEqual $location $actual.Location Assert-AreEqual $expected.Location $actual.Location $actualById = Get-AzPolicyAssignment -Id $actual.ResourceId Assert-AreEqual $actual.ResourceId $actualById.ResourceId Assert-AreEqual "SystemAssigned" $actualById.Identity.Type Assert-NotNull($actualById.Identity.PrincipalId) Assert-NotNull($actualById.Identity.TenantId) Assert-AreEqual $location $actualById.Location $setResult = Set-AzPolicyAssignment -Id $actualById.ResourceId -DisplayName "testDisplay" Assert-AreEqual "testDisplay" $setResult.Properties.DisplayName Assert-AreEqual "SystemAssigned" $setResult.Identity.Type Assert-NotNull($setResult.Identity.PrincipalId) Assert-NotNull($setResult.Identity.TenantId) Assert-AreEqual $location $setResult.Location $withoutIdentityResult = New-AzPolicyAssignment -Name test2 -Scope $rg.ResourceId -PolicyDefinition $policy -Description $description Assert-Null($withoutIdentityResult.Identity) Assert-Null($withoutIdentityResult.Location) $setResult = Set-AzPolicyAssignment -Id $withoutIdentityResult.ResourceId -AssignIdentity -Location $location Assert-AreEqual "SystemAssigned" $setResult.Identity.Type Assert-NotNull($setResult.Identity.PrincipalId) Assert-NotNull($setResult.Identity.TenantId) Assert-AreEqual $location $setResult.Location $list = Get-AzPolicyAssignment -Scope $rg.ResourceId | ?{ $_.Name -in @('testPA', 'test2') } Assert-AreEqual "SystemAssigned" ($list.Identity.Type | Select -Unique) Assert-AreEqual 2 @($list.Identity.PrincipalId | Select -Unique).Count Assert-AreEqual 1 @($list.Identity.TenantId | Select -Unique).Count Assert-NotNull($list.Identity.TenantId | Select -Unique) Assert-AreEqual $location ($list.Location | Select -Unique) $remove = Remove-AzPolicyAssignment -Name testPA -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyAssignment -Name test2 -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove $remove = Remove-AzResourceGroup -Name $rgname -Force Assert-AreEqual True $remove } function Test-PolicyAssignmentEnforcementMode { $rgname = Get-ResourceGroupName $policyName = Get-ResourceName $location = "westus" $rg = New-AzResourceGroup -Name $rgname -Location $location $policy = New-AzPolicyDefinition -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Description $description $actual = New-AzPolicyAssignment -Name testPA -PolicyDefinition $policy -Scope $rg.ResourceId -Description $description -Location $location -EnforcementMode DoNotEnforce $expected = Get-AzPolicyAssignment -Name testPA -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual $expected.Properties.EnforcementMode $actual.Properties.EnforcementMode Assert-AreEqual $expected.Properties.EnforcementMode $enforcementModeDoNotEnforce Assert-AreEqual $location $actual.Location Assert-AreEqual $expected.Location $actual.Location $actualById = Get-AzPolicyAssignment -Id $actual.ResourceId Assert-AreEqual $actual.Properties.EnforcementMode $actualById.Properties.EnforcementMode $setResult = Set-AzPolicyAssignment -Id $actualById.ResourceId -DisplayName "testDisplay" -EnforcementMode Default Assert-AreEqual "testDisplay" $setResult.Properties.DisplayName Assert-AreEqual $enforcementModeDefault $setResult.Properties.EnforcementMode $setResult = Set-AzPolicyAssignment -Id $actualById.ResourceId -DisplayName "testDisplay" -EnforcementMode $enforcementModeDefault Assert-AreEqual "testDisplay" $setResult.Properties.DisplayName Assert-AreEqual $enforcementModeDefault $setResult.Properties.EnforcementMode $withoutEnforcementMode = New-AzPolicyAssignment -Name test2 -Scope $rg.ResourceId -PolicyDefinition $policy -Description $description Assert-AreEqual $enforcementModeDefault $withoutEnforcementMode.Properties.EnforcementMode $setResult = Set-AzPolicyAssignment -Id $withoutEnforcementMode.ResourceId -Location $location -EnforcementMode $enforcementModeDoNotEnforce Assert-AreEqual $enforcementModeDoNotEnforce $setResult.Properties.EnforcementMode $setResult = Set-AzPolicyAssignment -Id $withoutEnforcementMode.ResourceId -Location $location -EnforcementMode DoNotEnforce Assert-AreEqual $enforcementModeDoNotEnforce $setResult.Properties.EnforcementMode $list = Get-AzPolicyAssignment -Scope $rg.ResourceId | ?{ $_.Name -in @('testPA', 'test2') } Assert-AreEqual 2 @($list.Properties.EnforcementMode | Select -Unique).Count $remove = Remove-AzPolicyAssignment -Name testPA -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyAssignment -Name test2 -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove $remove = Remove-AzResourceGroup -Name $rgname -Force Assert-AreEqual True $remove } function Test-PolicySetDefinitionCRUD { $policySetDefName = Get-ResourceName $policyDefName = Get-ResourceName $policyDefinition = New-AzPolicyDefinition -Name $policyDefName -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Description $description $policySet = "[{""policyDefinitionId"":""" + $policyDefinition.PolicyDefinitionId + """}]" $expected = New-AzPolicySetDefinition -Name $policySetDefName -PolicyDefinition $policySet -Description $description -Metadata $metadata $actual = Get-AzPolicySetDefinition -Name $policySetDefName Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicySetDefinitionId $actual.PolicySetDefinitionId Assert-NotNull($actual.Properties.PolicyDefinitions) Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName $expected = Set-AzPolicySetDefinition -Name $policySetDefName -DisplayName testDisplay -Description $updatedDescription $actual = Get-AzPolicySetDefinition -Name $policySetDefName Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName $actual = Get-AzPolicySetDefinition | ?{ $_.Name -eq $policySetDefName } Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicySetDefinitionId $actual.PolicySetDefinitionId Assert-NotNull($actual.Properties.PolicyDefinitions) Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName $list = Get-AzPolicySetDefinition -Custom Assert-True { $list.Count -gt 0 } $builtIns = $list | Where-Object { $_.Properties.policyType -ieq 'BuiltIn' } Assert-True { $builtIns.Count -eq 0 } $remove = Remove-AzPolicySetDefinition -Name $policySetDefName -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyDefName -Force Assert-AreEqual True $remove } function Test-PolicyDefinitionWithParameters { $actual = New-AzPolicyDefinition -Name testPDWP -Policy "$TestOutputRoot\SamplePolicyDefinitionWithParameters.json" -Parameter "$TestOutputRoot\SamplePolicyDefinitionParameters.json" -Description $description $expected = Get-AzPolicyDefinition -Name testPDWP Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-NotNull($actual.Properties.Parameters) Assert-NotNull($expected.Properties.Parameters) Assert-NotNull($expected.Properties.Parameters.listOfAllowedLocations) Assert-AreEqual "array" $expected.Properties.Parameters.listOfAllowedLocations.type Assert-AreEqual "location" $expected.Properties.Parameters.listOfAllowedLocations.metadata.strongType Assert-NotNull($expected.Properties.Parameters.effectParam) Assert-AreEqual "deny" $expected.Properties.Parameters.effectParam.defaultValue Assert-AreEqual "string" $expected.Properties.Parameters.effectParam.type $remove = Remove-AzPolicyDefinition -Name testPDWP -Force Assert-AreEqual True $remove $actual = New-AzPolicyDefinition -Name testPDWP -Policy "$TestOutputRoot\SamplePolicyDefinitionWithParameters.json" -Parameter $fullParameterDefinition -Description $description $expected = Get-AzPolicyDefinition -Name testPDWP Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-NotNull($actual.Properties.Parameters) Assert-NotNull($expected.Properties.Parameters) Assert-NotNull($expected.Properties.Parameters.listOfAllowedLocations) Assert-AreEqual "array" $expected.Properties.Parameters.listOfAllowedLocations.type Assert-AreEqual "location" $expected.Properties.Parameters.listOfAllowedLocations.metadata.strongType Assert-NotNull($expected.Properties.Parameters.effectParam) Assert-AreEqual "deny" $expected.Properties.Parameters.effectParam.defaultValue Assert-AreEqual "string" $expected.Properties.Parameters.effectParam.type $remove = Remove-AzPolicyDefinition -Name testPDWP -Force Assert-AreEqual True $remove } function Test-PolicySetDefinitionWithParameters { $policyDefName = Get-ResourceName $policySetDefName = Get-ResourceName $policyDefinition = New-AzPolicyDefinition -Name $policyDefName -Policy "$TestOutputRoot\SamplePolicyDefinitionWithParameters.json" -Description $description -Parameter "$TestOutputRoot\SamplePolicyDefinitionParameters.json" $parameters = "{ 'listOfAllowedLocations': { 'value': ""[parameters('listOfAllowedLocations')]"" } }" $policySet = "[{'policyDefinitionId': '$($policyDefinition.PolicyDefinitionId)', 'parameters': $parameters}]" $expected = New-AzPolicySetDefinition -Name $policySetDefName -PolicyDefinition $policySet -Description $description -Metadata $metadata -Parameter $parameterDefinition $actual = Get-AzPolicySetDefinition -Name $policySetDefName Assert-AreEqual $metadataValue $actual.Properties.metadata.testName Assert-AreEqual $parameterDescription $expected.Properties.Parameters.listOfAllowedLocations.metadata.description Assert-AreEqual $parameterDisplayName $expected.Properties.Parameters.listOfAllowedLocations.metadata.displayName $updatedParameterDisplayName = 'Location Array' $updatedParameterDescription = 'Array of allowed resource locations.' $updatedParameterDefinition = "{ 'listOfAllowedLocations': { 'type': 'array', 'metadata': { 'description': '$updatedParameterDescription', 'strongType': 'location', 'displayName': '$updatedParameterDisplayName' } } }" $expected = Set-AzPolicySetDefinition -Name $policySetDefName -PolicyDefinition $policySet -Description $updatedDescription -Metadata $updatedMetadata -Parameter $updatedParameterDefinition $actual = Get-AzPolicySetDefinition -Name $policySetDefName Assert-AreEqual $metadataValue $actual.Properties.metadata.testName Assert-AreEqual $updatedMetadataValue $actual.Properties.metadata.newTestName Assert-AreEqual $updatedParameterDescription $expected.Properties.Parameters.listOfAllowedLocations.metadata.description Assert-AreEqual $updatedParameterDisplayName $expected.Properties.Parameters.listOfAllowedLocations.metadata.displayName $remove = Remove-AzPolicySetDefinition -Name $policySetDefName -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyDefName -Force Assert-AreEqual True $remove } function Test-PolicyAssignmentWithParameters { $rgname = Get-ResourceGroupName $policyName = Get-ResourceName $rg = New-AzResourceGroup -Name $rgname -Location "west us" $policy = New-AzPolicyDefinition -Name $policyName -Policy "$TestOutputRoot\SamplePolicyDefinitionWithParameters.json" -Parameter "$TestOutputRoot\SamplePolicyDefinitionParameters.json" -Description $description $array = @("West US", "West US 2") $param = @{"listOfAllowedLocations"=$array} $actual = New-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyDefinition $policy -PolicyParameterObject $param -Description $description $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual $array[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $remove = Remove-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual True $remove $actual = New-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyDefinition $policy -PolicyParameter "$TestOutputRoot\SamplePolicyAssignmentParameters.json" -Description $description $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual $array[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $actual = Set-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyParameter '{ "listOfAllowedLocations": { "value": [ "something", "something else" ] } }' $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual "something" $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual "something else" $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $remove = Remove-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual True $remove $actual = New-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyDefinition $policy -PolicyParameter '{ "listOfAllowedLocations": { "value": [ "West US", "West US 2" ] } }' -Description $description -Metadata $metadata $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual $array[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $remove = Remove-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual True $remove $actual = New-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyDefinition $policy -listOfAllowedLocations $array -Description $description -Metadata $metadata $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual $array[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $remove = Remove-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual True $remove $actual = New-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyDefinition $policy -listOfAllowedLocations $array -effectParam "Disabled" -Description $description -Metadata $metadata $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName Assert-AreEqual "Disabled" $expected.Properties.Parameters.effectParam.Value Assert-AreEqual $array[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $newDescription = "$description - Updated" $newMetadata = "{'Meta1': 'Value1', 'Meta2': { 'Meta22': 'Value22' }}" $actual = Set-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -Description $newDescription -Metadata $newMetadata $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual $array[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] Assert-AreEqual $newDescription $expected.Properties.Description Assert-NotNull $expected.Properties.Metadata Assert-AreEqual 'Value1' $expected.Properties.Metadata.Meta1 Assert-AreEqual 'Value22' $expected.Properties.Metadata.Meta2.Meta22 $array2 = @("West2 US2", "West2 US22") $param2 = @{"listOfAllowedLocations"=$array2} $actual = Set-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId -PolicyParameterObject $param2 $expected = Get-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual Microsoft.Authorization/policyAssignments $actual.ResourceType Assert-AreEqual $expected.PolicyAssignmentId $actual.PolicyAssignmentId Assert-AreEqual $expected.Properties.PolicyDefinitionId $policy.PolicyDefinitionId Assert-AreEqual $expected.Properties.Scope $rg.ResourceId Assert-AreEqual $array2[0] $expected.Properties.Parameters.listOfAllowedLocations.Value[0] Assert-AreEqual $array2[1] $expected.Properties.Parameters.listOfAllowedLocations.Value[1] $remove = Remove-AzPolicyAssignment -Name testPAWP -Scope $rg.ResourceId Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyName -Force Assert-AreEqual True $remove $remove = Remove-AzResourceGroup -Name $rgname -Force Assert-AreEqual True $remove } function Test-PolicyDefinitionCRUDAtManagementGroup { $policyName = Get-ResourceName $expected = New-AzPolicyDefinition -Name $policyName -ManagementGroupName $managementGroup -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Mode Indexed -Description $description $actual = Get-AzPolicyDefinition -Name $policyName -ManagementGroupName $managementGroup Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual $expected.Properties.Mode $actual.Properties.Mode $actual = Set-AzPolicyDefinition -Name $policyName -ManagementGroupName $managementGroup -DisplayName testDisplay -Description $updatedDescription -Policy ".\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -Name $policyName -ManagementGroupName $managementGroup Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName New-AzPolicyDefinition -Name test2 -ManagementGroupName $managementGroup -Policy "{""if"":{""source"":""action"",""equals"":""blah""},""then"":{""effect"":""deny""}}" -Description $description $list = Get-AzPolicyDefinition -ManagementGroupName $managementGroup | ?{ $_.Name -in @($policyName, 'test2') } Assert-True { $list.Count -eq 2 } $remove = Remove-AzPolicyDefinition -Name $policyName -ManagementGroupName $managementGroup -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name 'test2' -ManagementGroupName $managementGroup -Force Assert-AreEqual True $remove } function Test-PolicyDefinitionCRUDAtSubscription { $policyName = Get-ResourceName $subscriptionId = (Get-AzContext).Subscription.Id $expected = New-AzPolicyDefinition -Name $policyName -SubscriptionId $subscriptionId -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Mode Indexed -Description $description $actual = Get-AzPolicyDefinition -Name $policyName -SubscriptionId $subscriptionId Assert-NotNull $actual Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicyDefinitionId $actual.PolicyDefinitionId Assert-NotNull($actual.Properties.PolicyRule) Assert-AreEqual $expected.Properties.Mode $actual.Properties.Mode $actual = Set-AzPolicyDefinition -Name $policyName -SubscriptionId $subscriptionId -DisplayName testDisplay -Description $updatedDescription -Policy ".\SamplePolicyDefinition.json" -Metadata $metadata $expected = Get-AzPolicyDefinition -Name $policyName -SubscriptionId $subscriptionId Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description Assert-NotNull($actual.Properties.Metadata) Assert-AreEqual $metadataValue $actual.Properties.Metadata.$metadataName New-AzPolicyDefinition -Name test2 -SubscriptionId $subscriptionId -Policy "{""if"":{""source"":""action"",""equals"":""blah""},""then"":{""effect"":""deny""}}" -Description $description $list = Get-AzPolicyDefinition -SubscriptionId $subscriptionId | ?{ $_.Name -in @($policyName, 'test2') } Assert-True { $list.Count -eq 2 } $remove = Remove-AzPolicyDefinition -Name $policyName -SubscriptionId $subscriptionId -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name 'test2' -SubscriptionId $subscriptionId -Force Assert-AreEqual True $remove } function Test-PolicySetDefinitionCRUDAtManagementGroup { $policySetDefName = Get-ResourceName $policyDefName = Get-ResourceName $policyDefinition = New-AzPolicyDefinition -Name $policyDefName -ManagementGroupName $managementGroup -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Description $description $policySet = "[{""policyDefinitionId"":""" + $policyDefinition.PolicyDefinitionId + """}]" $expected = New-AzPolicySetDefinition -Name $policySetDefName -ManagementGroupName $managementGroup -PolicyDefinition $policySet -Description $description $actual = Get-AzPolicySetDefinition -Name $policySetDefName -ManagementGroupName $managementGroup Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicySetDefinitionId $actual.PolicySetDefinitionId Assert-NotNull($actual.Properties.PolicyDefinitions) $expected = Set-AzPolicySetDefinition -Name $policySetDefName -ManagementGroupName $managementGroup -DisplayName testDisplay -Description $updatedDescription $actual = Get-AzPolicySetDefinition -Name $policySetDefName -ManagementGroupName $managementGroup Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description $actual = Get-AzPolicySetDefinition -ManagementGroupName $managementGroup | ?{ $_.Name -eq $policySetDefName } Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicySetDefinitionId $actual.PolicySetDefinitionId Assert-NotNull($actual.Properties.PolicyDefinitions) Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description $remove = Remove-AzPolicySetDefinition -Name $policySetDefName -ManagementGroupName $managementGroup -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyDefName -ManagementGroupName $managementGroup -Force Assert-AreEqual True $remove } function Test-PolicySetDefinitionCRUDAtSubscription { $policySetDefName = Get-ResourceName $policyDefName = Get-ResourceName $subscriptionId = (Get-AzContext).Subscription.Id $policyDefinition = New-AzPolicyDefinition -Name $policyDefName -SubscriptionId $subscriptionId -Policy "$TestOutputRoot\SamplePolicyDefinition.json" -Description $description $policySet = "[{""policyDefinitionId"":""" + $policyDefinition.PolicyDefinitionId + """}]" $expected = New-AzPolicySetDefinition -Name $policySetDefName -SubscriptionId $subscriptionId -PolicyDefinition $policySet -Description $description $actual = Get-AzPolicySetDefinition -Name $policySetDefName -SubscriptionId $subscriptionId Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicySetDefinitionId $actual.PolicySetDefinitionId Assert-NotNull($actual.Properties.PolicyDefinitions) $expected = Set-AzPolicySetDefinition -Name $policySetDefName -SubscriptionId $subscriptionId -DisplayName testDisplay -Description $updatedDescription $actual = Get-AzPolicySetDefinition -Name $policySetDefName -SubscriptionId $subscriptionId Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description $actual = Get-AzPolicySetDefinition -SubscriptionId $subscriptionId | ?{ $_.Name -eq $policySetDefName } Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.PolicySetDefinitionId $actual.PolicySetDefinitionId Assert-NotNull($actual.Properties.PolicyDefinitions) Assert-AreEqual $expected.Properties.DisplayName $actual.Properties.DisplayName Assert-AreEqual $expected.Properties.Description $actual.Properties.Description $remove = Remove-AzPolicySetDefinition -Name $policySetDefName -SubscriptionId $subscriptionId -Force Assert-AreEqual True $remove $remove = Remove-AzPolicyDefinition -Name $policyDefName -SubscriptionId $subscriptionId -Force Assert-AreEqual True $remove } function Test-GetCmdletFilterParameter { $builtins = Get-AzureRmPolicyDefinition -Builtin $builtins | %{ Assert-AreEqual $_.Properties.PolicyType "Builtin" } $custom = Get-AzureRmPolicyDefinition -Custom $custom | %{ Assert-AreEqual $_.Properties.PolicyType "Custom" } $all = Get-AzureRmPolicyDefinition Assert-AreEqual ($builtins.Count + $custom.Count) $all.Count $builtins = Get-AzureRmPolicySetDefinition -Builtin $builtins | %{ Assert-AreEqual $_.Properties.PolicyType "Builtin" } $custom = Get-AzureRmPolicySetDefinition -Custom $custom | %{ Assert-AreEqual $_.Properties.PolicyType "Custom" } $all = Get-AzureRmPolicySetDefinition Assert-AreEqual ($builtins.Count + $custom.Count) $all.Count } function Test-GetBuiltinsByName { $builtins = Get-AzureRmPolicyDefinition -Builtin foreach ($builtin in $builtins) { $definition = Get-AzureRmPolicyDefinition -Name $builtin.Name Assert-AreEqual $builtin.ResourceId $definition.ResourceId } $builtins = Get-AzureRmPolicySetDefinition -Builtin foreach ($builtin in $builtins) { $setDefinition = Get-AzureRmPolicySetDefinition -Name $builtin.Name Assert-AreEqual $builtin.ResourceId $setDefinition.ResourceId } } $someName = 'someName' $someScope = 'someScope' $someId = 'someId' $someManagementGroup = 'someManagementGroup' $someJsonSnippet = "{ 'someThing': 'someOtherThing' }" $someJsonArray = "[$someJsonSnippet]" $somePolicyDefinition = 'somePolicyDefinition' $somePolicySetDefinition = 'somePolicySetDefinition' $somePolicyParameter = 'somePolicyParameter' $someParameterObject = @{'parm1'='a'; 'parm2'='b' } $someDisplayName = "Some display name" $parameterSetError = 'Parameter set cannot be resolved using the specified named parameters.' $missingParameters = 'Cannot process command because of one or more missing mandatory parameters:' $onlyDefinitionOrSetDefinition = 'Only one of PolicyDefinition or PolicySetDefinition can be specified, not both.' $policyAssignmentNotFound = 'PolicyAssignmentNotFound : ' $policySetDefinitionNotFound = 'PolicySetDefinitionNotFound : ' $policyDefinitionNotFound = 'PolicyDefinitionNotFound : ' $invalidRequestContent = 'InvalidRequestContent : The request content was invalid and could not be deserialized: ' $missingSubscription = 'MissingSubscription : The request did not have a subscription or a valid tenant level resource provider.' $undefinedPolicyParameter = 'UndefinedPolicyParameter : The policy assignment' $invalidPolicyRule = 'InvalidPolicyRule : Failed to parse policy rule: ' $authorizationFailed = 'AuthorizationFailed : ' $allSwitchNotSupported = 'The -IncludeDescendent switch is not supported for management group scopes.' $httpMethodNotSupported = "HttpMethodNotSupported : The http method 'DELETE' is not supported for a resource collection." $parameterNullOrEmpty = '. The argument is null or empty. Provide an argument that is not null or empty, and then try the command again.' function Test-GetPolicyAssignmentParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $mgScope = "/providers/Microsoft.Management/managementGroups/$someManagementGroup" $goodId = "$goodScope/providers/Microsoft.Authorization/policyAssignments/$someName" $ok = Get-AzPolicyAssignment Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName } $policyAssignmentNotFound Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -Scope $goodScope } $policyAssignmentNotFound Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -PolicyDefinitionId $someId } $policyAssignmentNotFound Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -IncludeDescendent } $parameterSetError Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -Scope $someScope -Id $someId } $parameterSetError Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyDefinitionId $someId } $missingSubscription Assert-ThrowsContains { Get-AzPolicyAssignment -Name $someName -Scope $someScope -IncludeDescendent } $parameterSetError $ok = Get-AzPolicyAssignment -Scope $goodScope Assert-ThrowsContains { Get-AzPolicyAssignment -Scope $someScope -Id $someId } $parameterSetError $ok = Get-AzPolicyAssignment -Scope $goodScope -PolicyDefinitionId $someId Assert-AreEqual 0 $ok.Count $ok = Get-AzPolicyAssignment -Scope $goodScope -IncludeDescendent Assert-ThrowsContains { Get-AzPolicyAssignment -Scope $mgScope -IncludeDescendent } $allSwitchNotSupported Assert-ThrowsContains { Get-AzPolicyAssignment -Scope $someScope -PolicyDefinitionId $someId -IncludeDescendent } $parameterSetError Assert-ThrowsContains { Get-AzPolicyAssignment -Id $goodId } $policyAssignmentNotFound Assert-ThrowsContains { Get-AzPolicyAssignment -Id $someId -PolicyDefinitionId $someId } $missingSubscription Assert-ThrowsContains { Get-AzPolicyAssignment -Id $someId -IncludeDescendent } $parameterSetError $ok = Get-AzPolicyAssignment -PolicyDefinitionId $someId Assert-AreEqual 0 $ok.Count Assert-ThrowsContains { Get-AzPolicyAssignment -PolicyDefinitionId $someId -IncludeDescendent } $parameterSetError $ok = Get-AzPolicyAssignment -IncludeDescendent } function Test-NewPolicyAssignmentParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodPolicyDefinition = Get-AzPolicyDefinition | ?{ $_.Properties.parameters -eq $null } | select -First 1 $goodPolicySetDefinition = Get-AzPolicySetDefinition | ?{ $_.Properties.parameters -eq $null } | select -First 1 $wrongParameters = '{ "someKindaParameter": { "value": [ "Mmmm", "Doh!" ] } }' Assert-ThrowsContains { New-AzPolicyAssignment } $missingParameters Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName } $missingParameters Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $goodScope } $invalidRequestContent Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyDefinition $goodPolicyDefinition } $missingSubscription Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyDefinition $goodPolicyDefinition -PolicySetDefinition $goodPolicySetDefinition } $onlyDefinitionOrSetDefinition Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $goodScope -PolicyDefinition $goodPolicyDefinition -PolicyParameterObject $someParameterObject } $undefinedPolicyParameter Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $goodScope -PolicyDefinition $goodPolicyDefinition -PolicyParameter $wrongParameters } $undefinedPolicyParameter Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyDefinition $goodPolicyDefinition -PolicyParameterObject $someParameterObject -PolicyParameter $somePolicyParameter } $parameterSetError Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicySetDefinition $goodPolicySetDefinition -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicySetDefinition $goodPolicySetDefinition -PolicyParameterObject $someParameterObject -PolicyParameter $somePolicyParameter } $parameterSetError Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyParameterObject $someParameterObject } $parameterSetError Assert-ThrowsContains { New-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyParameter $somePolicyParameter } $parameterSetError Assert-ThrowsContains { New-AzPolicyAssignment -Scope $someScope } $missingParameters } function Test-RemovePolicyAssignmentParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policyAssignments/$someName" $goodObject = Get-AzPolicyAssignment | ?{ $_.Name -like '*test*' -or $_.Properties.Description -like '*test*' } | select -First 1 Assert-ThrowsContains { Remove-AzPolicyAssignment } $missingParameters Assert-ThrowsContains { Remove-AzPolicyAssignment -Name $someName } $missingParameters $ok = Remove-AzPolicyAssignment -Name $someName -Scope $goodScope Assert-AreEqual True $ok Assert-ThrowsContains { Remove-AzPolicyAssignment -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Remove-AzPolicyAssignment -Name $someName -Scope $someScope -Id $someId } $parameterSetError Assert-ThrowsContains { Remove-AzPolicyAssignment -Scope $someScope } $missingParameters Assert-ThrowsContains { Remove-AzPolicyAssignment -Scope $someScope -Id $someId } $parameterSetError $ok = Remove-AzPolicyAssignment -Id $goodId Assert-AreEqual True $ok } function Test-SetPolicyAssignmentParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policyAssignments/$someName" $someParameters = '{ "someKindaParameter": { "value": [ "Mmmm", "Doh!" ] } }' $someLocation = 'west us' $someNotScope = 'not scope' Assert-ThrowsContains { Set-AzPolicyAssignment } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $goodScope } $policyAssignmentNotFound Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -NotScope $someNotScope } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -DisplayName $someDisplayName } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Description $description } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Metadata $metadata } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -PolicyParameterObject $someParameterObject } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -PolicyParameter $someParameters } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -AssignIdentity } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Location $someLocation } $missingParameters Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -Id $someId } $parameterSetError Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -DisplayName $someDisplayName } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -Description $description } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -Id $someId } $parameterSetError Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -Description $description } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -PolicyParameter $someParameters } $parameterSetError Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Name $someName -Scope $someScope -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -AssignIdentity -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $goodId } $policyAssignmentNotFound Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -DisplayName $someDisplayName } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -Description $description } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -Description $description } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameter $someParameters } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -PolicyParameter $someParameters } $parameterSetError Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -AssignIdentity } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -Location $someLocation } $missingSubscription Assert-ThrowsContains { Set-AzPolicyAssignment -Id $someId -NotScope $someNotScope -DisplayName $someDisplayName -Description $description -Metadata $metadata -PolicyParameterObject $someParameterObject -AssignIdentity -Location $someLocation } $missingSubscription } function Test-GetPolicyDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policyDefinitions/$someName" $ok = Get-AzPolicyDefinition Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName } $policyDefinitionNotFound Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -ManagementGroupName $someManagementGroup } $policyDefinitionNotFound Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -SubscriptionId $subscriptionId } $policyDefinitionNotFound Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Builtin } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Custom } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Id $someId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Id $someId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Id $someId -BuiltIn } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Name $someName -Id $someId -Custom } $parameterSetError $ok = Get-AzureRmPolicyDefinition -Id $goodId Assert-ThrowsContains { Get-AzPolicyDefinition -Id $goodId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Id $goodId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Id $goodId -BuiltIn } $parameterSetError Assert-ThrowsContains { Get-AzPolicyDefinition -Id $goodId -Custom } $parameterSetError $ok = Get-AzPolicyDefinition -ManagementGroupName $someManagementGroup Assert-ThrowsContains { Get-AzPolicyDefinition -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError $ok = Get-AzPolicyDefinition -ManagementGroupName $someManagementGroup -BuiltIn $ok = Get-AzPolicyDefinition -ManagementGroupName $someManagementGroup -Custom Assert-ThrowsContains { Get-AzPolicyDefinition -ManagementGroupName $someManagementGroup -BuiltIn -Custom } $parameterSetError $ok = Get-AzPolicyDefinition -SubscriptionId $subscriptionId $ok = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -BuiltIn $ok = Get-AzPolicyDefinition -SubscriptionId $subscriptionId -Custom Assert-ThrowsContains { Get-AzPolicyDefinition -SubscriptionId $subscriptionId -BuiltIn -Custom } $parameterSetError $ok = Get-AzPolicyDefinition -BuiltIn Assert-ThrowsContains { Get-AzPolicyDefinition -BuiltIn -Custom } $parameterSetError $ok = Get-AzPolicyDefinition -Custom } function Test-NewPolicyDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id Assert-ThrowsContains { New-AzPolicyDefinition } $missingParameters Assert-ThrowsContains { New-AzPolicyDefinition -Name $someName } $missingParameters Assert-ThrowsContains { New-AzPolicyDefinition -Name $someName -Policy $someJsonSnippet } $invalidPolicyRule Assert-ThrowsContains { New-AzPolicyDefinition -Name $someName -Policy $someJsonSnippet -ManagementGroupName $someManagementGroup } $authorizationFailed Assert-ThrowsContains { New-AzPolicyDefinition -Name $someName -Policy $someJsonSnippet -SubscriptionId $subscriptionId } $invalidPolicyRule Assert-ThrowsContains { New-AzPolicyDefinition -Name $someName -Policy $someJsonSnippet -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { New-AzPolicyDefinition -Policy $someJsonSnippet } $missingParameters } function Test-RemovePolicyDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policyDefinitions/$someName" $goodObject = Get-AzPolicyDefinition -Builtin | select -First 1 Assert-ThrowsContains { Remove-AzPolicyDefinition } $missingParameters Assert-ThrowsContains { Remove-AzPolicyDefinition -Name $someName -Id $someId } $parameterSetError $ok = Remove-AzPolicyDefinition -Name $someName -Force Assert-AreEqual True $ok $ok = Remove-AzPolicyDefinition -Name $someName -ManagementGroupName $managementGroup -Force Assert-AreEqual True $ok $ok = Remove-AzPolicyDefinition -Name $someName -SubscriptionId $subscriptionId -Force Assert-AreEqual True $ok $ok = Remove-AzPolicyDefinition -Id $goodId -Force Assert-AreEqual True $ok Assert-ThrowsContains { Remove-AzPolicyDefinition -Id $someId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Remove-AzPolicyDefinition -Id $someId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Remove-AzPolicyDefinition -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Remove-AzPolicyDefinition -SubscriptionId $subscriptionId -Force } $missingParameters } function Test-SetPolicyDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policyDefinitions/$someName" $goodObject = Get-AzPolicyDefinition -Builtin | select -First 1 Assert-ThrowsContains { Set-AzPolicyDefinition } $missingParameters Assert-ThrowsContains { Set-AzPolicyDefinition -Name $someName } $policyDefinitionNotFound Assert-ThrowsContains { Set-AzPolicyDefinition -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Set-AzPolicyDefinition -Name $someName -ManagementGroupName $someManagementGroup } $policyDefinitionNotFound Assert-ThrowsContains { Set-AzPolicyDefinition -Name $someName -SubscriptionId $subscriptionId } $policyDefinitionNotFound Assert-ThrowsContains { Set-AzPolicyDefinition -Id $goodId } $policyDefinitionNotFound Assert-ThrowsContains { Set-AzPolicyDefinition -Id $someId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Set-AzPolicyDefinition -Id $someId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Set-AzPolicyDefinition -ManagementGroupName $someManagementGroup } $missingParameters Assert-ThrowsContains { Set-AzPolicyDefinition -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Set-AzPolicyDefinition -SubscriptionId $subscriptionId } $missingParameters } function Test-GetPolicySetDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policySetDefinitions/$someName" $ok = Get-AzPolicySetDefinition Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName } $policySetDefinitionNotFound Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -ManagementGroupName $someManagementGroup } $policySetDefinitionNotFound Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -SubscriptionId $subscriptionId } $policySetDefinitionNotFound Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Builtin } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Custom } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Id $someId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Id $someId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Id $someId -BuiltIn } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Name $someName -Id $someId -Custom } $parameterSetError $ok = Get-AzPolicySetDefinition -Id $goodId Assert-ThrowsContains { Get-AzPolicySetDefinition -Id $goodId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Id $goodId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Id $goodId -BuiltIn } $parameterSetError Assert-ThrowsContains { Get-AzPolicySetDefinition -Id $goodId -Custom } $parameterSetError $ok = Get-AzPolicySetDefinition -ManagementGroupName $someManagementGroup Assert-ThrowsContains { Get-AzPolicySetDefinition -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError $ok = Get-AzPolicySetDefinition -ManagementGroupName $someManagementGroup -BuiltIn $ok = Get-AzPolicySetDefinition -ManagementGroupName $someManagementGroup -Custom Assert-ThrowsContains { Get-AzPolicySetDefinition -ManagementGroupName $someManagementGroup -BuiltIn -Custom } $parameterSetError $ok = Get-AzPolicySetDefinition -SubscriptionId $subscriptionId $ok = Get-AzPolicySetDefinition -SubscriptionId $subscriptionId -BuiltIn $ok = Get-AzPolicySetDefinition -SubscriptionId $subscriptionId -Custom Assert-ThrowsContains { Get-AzPolicySetDefinition -SubscriptionId $subscriptionId -BuiltIn -Custom } $parameterSetError $ok = Get-AzPolicySetDefinition -BuiltIn Assert-ThrowsContains { Get-AzPolicySetDefinition -BuiltIn -Custom } $parameterSetError $ok = Get-AzPolicySetDefinition -Custom } function Test-NewPolicySetDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id Assert-ThrowsContains { New-AzPolicySetDefinition } $missingParameters Assert-ThrowsContains { New-AzPolicySetDefinition -Name $someName } $missingParameters Assert-ThrowsContains { New-AzPolicySetDefinition -Name $someName -PolicyDefinition $someJsonArray } $invalidRequestContent Assert-ThrowsContains { New-AzPolicySetDefinition -Name $someName -PolicyDefinition $someJsonArray -ManagementGroupName $someManagementGroup } $authorizationFailed Assert-ThrowsContains { New-AzPolicySetDefinition -Name $someName -PolicyDefinition $someJsonArray -SubscriptionId $subscriptionId } $invalidRequestContent Assert-ThrowsContains { New-AzPolicySetDefinition -Name $someName -PolicyDefinition $someJsonArray -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { New-AzPolicySetDefinition -PolicyDefinition $someJsonArray } $missingParameters } function Test-RemovePolicySetDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policySetDefinitions/$someName" $goodObject = Get-AzPolicySetDefinition -Builtin | select -First 1 Assert-ThrowsContains { Remove-AzPolicySetDefinition } $missingParameters Assert-ThrowsContains { Remove-AzPolicySetDefinition -Name $someName -Id $someId } $parameterSetError $ok = Remove-AzPolicySetDefinition -Name $someName -Force Assert-AreEqual True $ok $ok = Remove-AzPolicySetDefinition -Name $someName -ManagementGroupName $managementGroup -Force Assert-AreEqual True $ok $ok = Remove-AzPolicySetDefinition -Name $someName -SubscriptionId $subscriptionId -Force Assert-AreEqual True $ok $ok = Remove-AzPolicySetDefinition -Id $goodId -Force Assert-AreEqual True $ok Assert-ThrowsContains { Remove-AzPolicySetDefinition -Id $someId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Remove-AzPolicySetDefinition -Id $someId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Remove-AzPolicySetDefinition -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Remove-AzPolicySetDefinition -SubscriptionId $subscriptionId -Force } $httpMethodNotSupported } function Test-SetPolicySetDefinitionParameters { $subscriptionId = (Get-AzContext).Subscription.Id $goodScope = "/subscriptions/$subscriptionId" $goodId = "$goodScope/providers/Microsoft.Authorization/policySetDefinitions/$someName" $goodObject = Get-AzPolicySetDefinition -Builtin | select -First 1 Assert-ThrowsContains { Set-AzPolicySetDefinition } $missingParameters Assert-ThrowsContains { Set-AzPolicySetDefinition -Name $someName } $policySetDefinitionNotFound Assert-ThrowsContains { Set-AzPolicySetDefinition -Name $someName -Id $someId } $parameterSetError Assert-ThrowsContains { Set-AzPolicySetDefinition -Name $someName -ManagementGroupName $someManagementGroup } $policySetDefinitionNotFound Assert-ThrowsContains { Set-AzPolicySetDefinition -Name $someName -SubscriptionId $subscriptionId } $policySetDefinitionNotFound Assert-ThrowsContains { Set-AzPolicySetDefinition -Id $goodId } $policySetDefinitionNotFound Assert-ThrowsContains { Set-AzPolicySetDefinition -Id $someId -ManagementGroupName $someManagementGroup } $parameterSetError Assert-ThrowsContains { Set-AzPolicySetDefinition -Id $someId -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Set-AzPolicySetDefinition -ManagementGroupName $someManagementGroup } $missingParameters Assert-ThrowsContains { Set-AzPolicySetDefinition -ManagementGroupName $someManagementGroup -SubscriptionId $subscriptionId } $parameterSetError Assert-ThrowsContains { Set-AzPolicySetDefinition -SubscriptionId $subscriptionId } $missingParameters }
combined_dataset/train/non-malicious/sample_50_88.ps1
sample_50_88.ps1
param($installPath, $toolsPath, $package, $project) Import-Module (Join-Path $toolsPath common.psm1) -Force try { # Indicates if current project is a VB project $IsVbProject = ($project.CodeModel.Language -eq [EnvDTE.CodeModelLanguageConstants]::vsCMLanguageVB) if ($IsVbProject) { # Remove added Imports for VB project $VbImports | ForEach-Object { if ($project.Object.Imports -contains $_) { $project.Object.Imports.Remove($_) } } } # Remove references Foreach ($spRef in $ReferencesToRemoveWhenUninstall) { $project.Object.References | Where-Object { $_.Identity -eq $spRef } | ForEach-Object { $_.Remove() } } } catch { Write-Host "Error uninstalling package: " + $_.Exception -ForegroundColor Red exit } # SIG # Begin signature block # MIImHgYJKoZIhvcNAQcCoIImDzCCJgsCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAN/6dBHJ45hY+Y # N8R45TKbxt2wbCsKlOEE8Hxkc3JCuqCCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghoNMIIaCQIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBik60Fvv7StsjRLeltISQX # xTxRG+19Nl87Pn4qBCdVDjBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBAGchWr/Ur5d2+alAWqesWHkw+3wG8nI5J/mHz/XvXMGFrycOqKbJXgMP # bMBU+Ko3k3PtrEN0W/y/o91SZ6tqHHiQ8JmTfk/Q0sOZxBT20e3Uaa3XH6VxX2Wy # vF5O9irUUREuQjKA3VssfcJg/pxQ+elhh90+skyGtOpXFo2cThnnAyC0vhOyHSoK # iIplRPdPJknFyse+3Q4DkHmSlUYTMGWtrBH7ngnT9nYhAIi0II1SanoghAdvqts4 # ssvc5uasuIu2R8UR7fuq6UGgm1rOAg8viIE62btiSyuDZ3bXrh547gnVatP+dvNv # lZ5gTY9n394cNbM342ZAm89fcrLu7M2hgheXMIIXkwYKKwYBBAGCNwMDATGCF4Mw # ghd/BgkqhkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYL # KoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgEN1223Uh47OfWggcWu2com4Cw4SpnlfQt3c/cvAzlfQCBmXOBkxM # qhgTMjAyNDAyMjcxMzQ5MTEuODk3WjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt # ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # oIIR7TCCByAwggUIoAMCAQICEzMAAAHr4BhstbbvOO0AAQAAAeswDQYJKoZIhvcN # AQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0 # NTM0WhcNMjUwMzA1MTg0NTM0WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u # czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYD # VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAwRVoIdpW4Fd3iadNaKomhQbmGzXO4UippLbydeTa # wfwwW6FKMPFjzkz8W5+4HJiDhpsCZHfk8hceyjp868Z6Ad4br7/dX2blLoCLCk5w # L4NgVP53ze2c5/SpNZqbidu0usVAx+KHRYl+dSAnCpehBuHMSoHAwIp4oU/Ma6CV # lQEy+6fG2358LHNaYoWZnLyLmBp29U2PbZ6XQoVq/RAEbgqN04kRozNi6eKYk9pQ # +YZ3d1Whk3qTasmpKZAhldPnCvFbvx5CGXb8vs+RC96I03RSy+byfSAKIFn91wLt # 3e0qRWmqHosdHtaueQA/eGcAz/os6i2nbAUd7c46tkX6wjS/k5ov42pUbaPyem4e # Hz4RxE5wwu/E9cn11EHRrZif7rSPwDcYux1fIAD84nfU2IzD22KhvMucc/oCP0hc # o/mirRx1pisxFz7bV8wHHsSdRB+8G7olZN7BKzyvTC4NV2+oTORyFgNIxAGYShMn # eYR9lzIm82pG6drNhCUFmrEHOAzGhdRLENQs4ApQ2CGBuq1IbnXyO5PC/SighLn0 # WyuZXUWDQKnXa/8kiX7mb9z0t/r7Q+l+qtR+FDpowynY6Ft6rOyUTGZh/X5BZDM2 # +mEs6+nl9S6GJtz6ztSXmuN0mM5Qd08/ODr7lUlezXInVbTaomXllqVY32r0fiY/ # yTkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBR0ngWs1lXMbuKk/TuY09gfqgHq4TAf # BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ # hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQl # MjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBe # MFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Nl # cnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAM # BgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQE # AwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAg3TfL6D3fAvlVmT9/lvO3P0G3W1itLDr # fWeJBDlp4Oypoflg9i5zyUySiBGsZ4jnLfcDICfMkMsEfFh4Azr28KnarC1GjODa # 3q7SOhSPa4Y4XmisTTZwWcx2Sw8JZC/bwhA3vUXNHRklXeQYNwlpJ1d7r1WrteBe # eREk1iATWkEvQqaNjqc93EYAGFX2ixRmwKzXEb0lr0lG3iNiA6kcQuMQW0YjUPta # h1wwj59IRrF3y/spw2Z3An7Mza5YGU9uF4Ib082DB3F4qC1WKP9h5MqMOnSO7lCy # WysS1/MB4bIsK4lyAwp4y1bBtBOW0fNkIHLHhIcW1NndUVR3ELZFBO1vc8Wamev4 # z5mqI2YF0Dt9148Th2GFWvwV3CLrvEjMz44wAG7o8E2sKWsywb/fey0QdGTmzXJC # WMkEKRE0n5Td+o1vs+0f5xsiakWdx7WdZV1tX+sxAgHj/vXcup5nAq1XDqm0B1+2 # a/Fj3IIRyQAA5ZuRMT4ecYtbTUZPouhdmvUqU3kJ2Vz+dMPiaE8SEkKu7wYo9p4r # QLEi2lXjKqD4vjV5U1DWdjXbWxa+iIq/WSvbn2s9xcX7w2aN+ubyzqM5kDnv2fqb # uL2Ocz5rTYlSHEJxcuyWTomVQyOWyHcEEWotqrhyiepbVHbItx4zZ4nrhO9n0+Hl # ocbZpzeR2AgwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqG # SIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkg # MjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4X # YDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTz # xXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7 # uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlw # aQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedG # bsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXN # xF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03 # dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9 # ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 # UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReT # wDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZ # MBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8 # RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAE # VTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAww # CgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQD # AgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb # 186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG # CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZI # hvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9 # MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2Lpyp # glYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OO # PcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8 # DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA # 0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1Rt # nWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjc # ZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq7 # 7EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ # C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 # y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYID # UDCCAjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA # gAaJdbtcMMGIFLVKMDJ6mL27pd6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmIVeYwIhgPMjAyNDAyMjcxMjM2 # NTRaGA8yMDI0MDIyODEyMzY1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6YhV # 5gIBADAKAgEAAgIBXgIB/zAHAgEAAgITUTAKAgUA6YmnZgIBADA2BgorBgEEAYRZ # CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0G # CSqGSIb3DQEBCwUAA4IBAQB1ZRwrH4x8p7YhIjO/DyHRMM3F8UdKd3TRda7DlLRJ # Cj3notEm4a3iKbp5SleT2KVFVBWnNctn+XWlDz3C8sbfEVxqe8PlTlEzO+DB1opz # /mqxEYDQo4O1DvCmlhsoAGZ+oW3obveQsx7BsGbOaZa7GdADbzL4etv2m06YMjj+ # euaGLhNlbI5v9/N1KGzIbtE/gkpQ9xgmrLXK5zEpXa3vKoxafvRDSYqVovcXdA67 # CUzTL9AbtXaCsZ5hL68xVBmoJsy6AOUdgv2BsJgwWVWOOiaZlCCp3sy9lHiisBhV # 6CaSeJOVEGqfGPpmObTKE+hpRF9ds6qtuJTM85rj6NQmMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAA # AeswDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgENHpMIvB/rdKSzGDbZVwBJZpGsBX0e85GyHZjmas # YccwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDOt2u+X2kD4X/EgQ07ZNg0 # lICG3Ys17M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHrMCIEINKso5QXIUxOgCzD4/yCfet6 # UabHAZfGtvFHhLDEyG55MA0GCSqGSIb3DQEBCwUABIICAA23G/bPBT2mONKBoGIR # smAqGGRrvgkaobDN0io9Hl5A28dCayYlo2oCBGrFNeAqIytd1vjA1zPCYCu52qz/ # 8imShqyZi4bQu/1MNKH3o6DKFt5bgGKuK86DCTPZBnp3luExE39oX4C+MCDJXGFu # 9iGKSm9JqH4IQDqLwU1B6bUAWaCBbYoJ2EtPxIoq/zUyWtkO0zum5FdN552puMO1 # j8N/GDWK0znDob6fEBVSBGKvg3GZ5Tz27fa7BMSL08oca38TE5uEotytfku3xGwP # Zrurk7N178/r5HSCW85LSsvIRoc2hvcITRjyXueyLewprPldDU9J4gQ1ot4IG920 # +lHvRQ3h3aonUXebpwBE8zzGuPM5GmdhFSV468kUM1et7ExX0lRwUiMD2IdEE+V8 # N10TjPYuiGPMazqfLsRUtdqOkvpRVP9LLZSKcGC0sX11lt9iNIHwZhVhBs53OyM5 # L29eZKOd8M/0scnNTFJiJHi1qiZvmWKniXj+nJkrksk3lh3mczNEIV951rLgJ5Hi # 4owCv9dRlOlSrdf2thPkbDGHCffeFNWXS2SqB41hfvi47sbab5slYeU6c9HzqFwS # XqeFWU68gC1UztDRJNrlqtNCwck81tlk+Q5uo8FfA9C4QlpgRUIj5x6DoLnN8Viq # HvdT27cIxR3ocBHnk/6Z82/I # SIG # End signature block
combined_dataset/train/non-malicious/sample_39_60.ps1
sample_39_60.ps1
# # Module manifest for module 'OCI.PSModules.Waas' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waas.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0ab649a-b33b-4925-a05c-7520554bdad9' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waas Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waas.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWaasAccessRulesList', 'Get-OCIWaasAddressList', 'Get-OCIWaasAddressListsList', 'Get-OCIWaasCachingRulesList', 'Get-OCIWaasCaptchasList', 'Get-OCIWaasCertificate', 'Get-OCIWaasCertificatesList', 'Get-OCIWaasCustomProtectionRule', 'Get-OCIWaasCustomProtectionRulesList', 'Get-OCIWaasDeviceFingerprintChallenge', 'Get-OCIWaasEdgeSubnetsList', 'Get-OCIWaasGoodBotsList', 'Get-OCIWaasHttpRedirect', 'Get-OCIWaasHttpRedirectsList', 'Get-OCIWaasHumanInteractionChallenge', 'Get-OCIWaasJsChallenge', 'Get-OCIWaasPoliciesList', 'Get-OCIWaasPolicy', 'Get-OCIWaasPolicyConfig', 'Get-OCIWaasPolicyCustomProtectionRulesList', 'Get-OCIWaasProtectionRule', 'Get-OCIWaasProtectionRulesList', 'Get-OCIWaasProtectionSettings', 'Get-OCIWaasRecommendationsList', 'Get-OCIWaasThreatFeedsList', 'Get-OCIWaasWafAddressRateLimiting', 'Get-OCIWaasWafBlockedRequestsList', 'Get-OCIWaasWafConfig', 'Get-OCIWaasWafLogsList', 'Get-OCIWaasWafRequestsList', 'Get-OCIWaasWafTrafficList', 'Get-OCIWaasWhitelistsList', 'Get-OCIWaasWorkRequest', 'Get-OCIWaasWorkRequestsList', 'Invoke-OCIWaasPurgeCache', 'Move-OCIWaasAddressListCompartment', 'Move-OCIWaasCertificateCompartment', 'Move-OCIWaasCustomProtectionRuleCompartment', 'Move-OCIWaasHttpRedirectCompartment', 'Move-OCIWaasPolicyCompartment', 'New-OCIWaasAddressList', 'New-OCIWaasCertificate', 'New-OCIWaasCustomProtectionRule', 'New-OCIWaasHttpRedirect', 'New-OCIWaasPolicy', 'Receive-OCIWaasRecommendations', 'Remove-OCIWaasAddressList', 'Remove-OCIWaasCertificate', 'Remove-OCIWaasCustomProtectionRule', 'Remove-OCIWaasHttpRedirect', 'Remove-OCIWaasPolicy', 'Stop-OCIWaasWorkRequest', 'Update-OCIWaasAccessRules', 'Update-OCIWaasAddressList', 'Update-OCIWaasCachingRules', 'Update-OCIWaasCaptchas', 'Update-OCIWaasCertificate', 'Update-OCIWaasCustomProtectionRule', 'Update-OCIWaasDeviceFingerprintChallenge', 'Update-OCIWaasGoodBots', 'Update-OCIWaasHttpRedirect', 'Update-OCIWaasHumanInteractionChallenge', 'Update-OCIWaasJsChallenge', 'Update-OCIWaasPolicy', 'Update-OCIWaasPolicyConfig', 'Update-OCIWaasPolicyCustomProtectionRules', 'Update-OCIWaasProtectionRules', 'Update-OCIWaasProtectionSettings', 'Update-OCIWaasThreatFeeds', 'Update-OCIWaasWafAddressRateLimiting', 'Update-OCIWaasWafConfig', 'Update-OCIWaasWhitelists' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waas' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/ConvertFrom-FahrenheitWi_1.ps1
ConvertFrom-FahrenheitWi_1.ps1
## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n\nparam([double] $Fahrenheit)\n\nSet-StrictMode -Version Latest\n\n## Convert it to Celsius\n$celsius = $fahrenheit - 32\n$celsius = $celsius / 1.8\n\n## Output the answer\n"$fahrenheit degrees Fahrenheit is $celsius degrees Celsius."
combined_dataset/train/non-malicious/sample_3_64.ps1
sample_3_64.ps1
ConvertFrom-StringData @' id_collectactivity=Collecting Basic System Information TXT id_collectingdata=Collecting Basic Data id_formattingdata=Formatting Data id_uacadminmode=Admin Mode id_uacnoprompt=No Prompt id_uacpromptcredentials=Prompt for credentials id_uacpromptconsent=Prompt for consent id_uacpromptconsentapp=Prompt for consent when programs make changes id_uac=User Account Control '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZjYKlAVLRxZn/ # BldsAXlgx4hsq41d6xZJ9Im4GER5OaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILOxYB02xEUPKP1K/GRfqOm2 # r30ZZWF4IjYVzomuc6N3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAYudADK+F2mLHo71TGEGaAnWjlABpcscZyABrMXnsLcIFUi8dwWist1gm # Lpoa+FxVWTlMpqU2MevfVCHCRB1zHCyAoDuby1p7rH7D/34wzWARav7slRw2STI/ # kshSvdttGjUnrrqFlcyEFtWQFT8OtrdtUu+7GIGSUAOy3bq4Jsx/iynLfrC3d8IK # 3pgucXmWujyz7XR+y8A/81RUK+zJl4otEx7WCOInfvJjag/mnyE+kVaMFRJcfICb # +eAyHLc7JeK8oHFaECkchbGnhfetDlp3yxxhlajd8hKyXUYoK6YW6WOb21aVAJYz # kxn+o2NoogCd1iSHKhApgbbrAVD8m6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBDY+mD3dJRtFRoi2SvLbUwmrEFifqVlHaFp6qs2cuKSQIGZutgsUoE # GBMyMDI0MTAyODExNDA0My4yMDhaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdGhcDLPznlAAEAAAH0MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU5MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEApwhOE6bQgC9qq4jJGX2A # 1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEVzZ2y2ygGgNZ3/xdZQN7f # 9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwmXeCj81EzJEIZquVdV8ST # lQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IExqKYojGreCopnIKxOvkr # 5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnuo+kDEyZwpkphsR8Zvdi+ # s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tue+LcuOcHAPgbwZvQLksK # aK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEWOEvibig7wsrTa6ZbzuMs # yTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIpMGfA3BT850nqamzSiD5L # 5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T26FjR9/I85i5ExxmhHpxM # 2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+Fy+ZywHAp9c9oWTrtjfI # KqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcXWy16ANy73v0ipCxAwUEC # 9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQrdGWhCtEs # Pid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA3cHSDxJKUDsg # acIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3gOeCt/ObDO45vfpnYG5O # S5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQiJh9upsE4TVZeKYXmbyx7 # WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA13vS3euqUl6zwe7GAhjfj # NXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDCegq8adlGH85I1EWKmfER # b1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8jcYVDH4A2C/MbLBIwikj # wiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh95UVOrQL2rbWHrHDSE3d # gdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5A4uITgyJcVdWVaN0qjs0 # eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIldyfzZqln6FsnLQ3bl+ZvV # JWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6XfYvrZQN4XKbnvSqBNAw # IPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvFHlSG6uMIWjwH0GQIIwrC # 2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17Xek4iG9R9c/7+AI6ggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0MTAyOTExMTExMFowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEAAgIRQTAHAgEAAgITcjAK # AgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAhvpi0fcwW36Vj # kxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe97LNopMBBaWBVq2RlfPa # sIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvsFxcDLB5CurWs+Z+iXqcd # rGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB9T76pHsFqwSZHJ4+hXZB # 9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S6Qpt3I6sMkaFL+Dn9fLJ # wn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn+yis2mNx8vI42scFI8SU # P7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgYCToXdfG+FZw # QAUwZ0Rw4RXVTgUC5FZ3Rc5+dSziJ3MwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60RBjWazCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9BdGhcDLPznlAAEAAAH0 # MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaNJ5IJMA0GCSqGSIb3DQEB # CwUABIICAHnVkqxGIPWK7BupNQCTBnwKnw2J/OQXZsfYyi+skk6xjtvfpuTkMGSh # eTkhOukNaPsq/hgdl8gNWVBGADCIFdmyFHJ4B+O0+iFNLIYpD/XYbg9RLBTgf4Y/ # cd+Exe7WvVu0MQm/VhdVaFUxPOMO35z0WtQK1u0XS6npD6N7cn7zWaVKGiSbtnps # Zyh0m5FBM8v15Wawipe9aiMGBaa1gPZw7QN9BWcjYYBQd2leNTPP7vLNT5ygy5uU # GJKRTa588g9C+rVr4gInzMQch8mHMRGX3ZFcjKkZ/ac8wbQ/hhG7giP6EmFU77KT # D36S/XMAkJ47XG3MPR7tMVrzyfcKX83u0WqoqBMQN0GtbntpTwmoVUUFCr3MEQ2m # 3uGF4CkkEcRr+tf24YdM7s7op42ZtCL3RuMuWZCzWLQTHbB/oEn6fNyakO7PSUFM # 5S2nkjON1yyn/dea+LBNjTOpJ62ZLMxBxmHSG6A0UM4eApfm+sWXnH7CQinh82ds # 2JOQFEXZUF5mZc/8Hz5TFapbyHWX9qw5I5+FWNF3hbOVQs//UGsFmyREDipv9XeF # REYT4WhyVF2zQ1HLBtnIJFzWhUvKz/NaJdWP/jREg21Ub5d0avKSMaWQ40wp3QVf # FgfAzHysmhkzxBPBExJS0VJHKw/N18FZBU4Qhp0QyemaE5Fkncbi # SIG # End signature block
combined_dataset/train/non-malicious/Set Logfile length_1.ps1
Set Logfile length_1.ps1
################################################################################ # Set-FileLines.ps1 # This script will maintain the PS Transcript file, or any text file, at a fixed # length and can be used to prevent such files from becoming too large, with the # option of removing any blank lines. Defaults to 10000 lines and can be placed # in $profile. # Setting lines to 0 will just remove any blank lines from the file and, in this # case, the -Blanks switch is not necessary. # Examples: # Set-FileLines 1500 c:\\Scripts\\Logfile.txt # Set-FileLines 0 c:\\scripts\\anyfile.txt # Set-FileLines 3000 -Blanks # The author can be contacted via www.SeaStarDevelopmet.Bravehost.com ################################################################################ Param ([int] $lines = 10000, [String]$file = "$pwd\\Transcript.txt", [Switch]$blanks) If ($file -notlike "*.txt") { [System.Media.SystemSounds]::Hand.Play() Write-Error "This script can only process .txt files" Exit 1 } If (!(Test-Path $file)) { [System.Media.SystemSounds]::Hand.Play() Write-Error "File $file does not exist" Exit 1 } [int]$count = 0 [int]$blankLines = 0 $errorActionPreference = 'SilentlyContinue' $content = (Get-Content $file) If ($lines -eq 0) { #Input 0 lines to have just blank lines removed. [int]$extra = 1 [int]$count = 1 [switch]$blanks = $true #Otherwise no blanks will be deleted below. } Else { $fileLength = ($content | Measure-Object -line) [int]$extra = $fileLength.Lines - $lines #The number of lines to remove. } If ($extra -gt 0) { $tempfile = [IO.Path]::GetTempFileName() Write-Output "Starting maintenance on file <$file>" $content | ForEach-Object { $count += 1 If($count -gt $extra) { #Ignore the first $extra lines. If (($blanks) -and ($_ -match '^\\s*$')) { #Skip blank lines. $blankLines++ } Else { $_ | Out-File $tempfile -Append -Force #Create new file. } } } If ($file -like "*transcript.txt") { Stop-Transcript | Out-Null } Remove-Item $file Move-Item $tempfile -Destination $file If ($lines -eq 0) { #Only interested in blank lines here. $tag = "$blankLines blank lines removed." } ElseIf ($blanks) { $tag = "$extra lines removed (+ $blankLines blank)." } Else { #Not interested in blank lines. $tag = "$extra lines removed." } If ($file -like "*transcript.txt") { Start-Transcript -append -path $file -force | Out-Null } Write-Output "Maintenance of file completed: $tag" } $ErrorActionPreference = 'Continue'
combined_dataset/train/non-malicious/Check latest BIOS Rev_2.ps1
Check latest BIOS Rev_2.ps1
$BiosRev = Get-WmiObject -Class Win32_BIOS -ComputerName $ComputerName -Credential $Credentials # Shortened URL for the Dell Support page, fileid=441102, appears to be the identifier for BIOS downloads # I tested this on a few different models of Dell workstations. $DellBIOSPage = "http://support.dell.com/support/downloads/download.aspx?c=us&cs=RC956904&l=en&s=hied&releaseid=R294848&SystemID=PLX_960&servicetag=$($BiosRev.SerialNumber)&fileid=441102" # This HTML code immediately preceed's the actual service tag, you can see it when you 'view source' on the page $DellPageVersionString = "<span id=`"Version`" class=`"para`">" If ($BiosRev.Manufacturer -match "Dell") { $DellPage = (New-Object -TypeName net.webclient).DownloadString($DellBIOSPage) # Assuming that Dell BIOS rev's remain 3 characters, I find where my string starts and add the length to it # and the substring returns the BIOS rev. $DellCurrentBios = $DellPage.Substring($DellPage.IndexOf($DellPageVersionString)+$DellPageVersionString.Length,3) If (($BiosRev.SMBIOSBIOSVersion -eq $DellCurrentBios) -eq $false) { # Download the latest installer if the Rev's don't match # Assuming Dell continues to use FTP for downloads, find the download URL # This returns just the URL portion of the HTML code $BIOSDownloadURL = $DellPage.Substring($DellPage.IndexOf("http://ftp"),(($DellPage.Substring($DellPage.IndexOf("'http://ftp"),100)).indexof(".EXE"))+3) # Pull the filename from the end of the path, the 12's indicate 8+3 that Dell is using # for filenames, if that changes this should as well. $BIOSFile = $BIOSDownloadURL.Substring(($BIOSDownloadURL.Length)-12,12) If ((Test-Path "C:\\Dell\\") -eq $false) { New-Item -Path "C:\\" -Name "Dell" -ItemType Directory } If ((Test-Path "C:\\Dell\\$($ComputerName)") -eq $false) { New-Item -Path "C:\\Dell" -Name $ComputerName -ItemType Directory } (New-Object -TypeName net.webclient).DownloadFile($BIOSDownloadURL,"C:\\Dell\\$($ComputerName)\\$($BIOSFile)") Write-Host "Latest BIOS for $($ComputerName) downloaded to C:\\Dell\\$($ComputerName)\\$($BIOSFile)" } }
combined_dataset/train/non-malicious/Get-OleDBPSObject.ps1
Get-OleDBPSObject.ps1
function Get-OleDBPSObject ([string]$ConnectionString, [string]$Query) { $ConnObj = new-object System.Data.OleDb.OleDbConnection $ConnectionString $command = New-Object System.Data.OleDb.OleDbCommand $Query, $ConnObj try { $ConnObj.Open() [System.Data.OleDB.OleDbDataReader]$reader = $command.ExecuteReader() while ($reader.Read()) { $obj = New-Object PSObject for ($i=0; $i -lt $reader.FieldCount; $i++) { $obj | Add-Member -type NoteProperty -name ($reader.GetName($i)) -value ($reader[$i]) } $obj } } catch { throw $_ } finally { $command = $null $reader.Close() $reader = $null $ConnObj.Close() $ConnObj = $null } }
combined_dataset/train/non-malicious/sample_4_63.ps1
sample_4_63.ps1
#************************************************ # TS_KB2655998_InactiveTSPorts.ps1 # Version 1.0.1 # Date: 03/21/2012 11:19:10 # Author: jasonf # Description: Checks for inactive ts ports described in http://blogs.technet.com/b/askperf/archive/2012/03/06/performance-issues-due-to-inactive-terminal-server-ports.aspx. #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_KB2655998_InactiveTSPortsTitle ` -Status $ScriptStrings.ID_KB2655998_InactiveTSPortsDesc $RootCauseDetected = $false $RootCauseName = "RC_KB2655998_InactiveTSPorts" $PublicContent = "http://blogs.technet.com/b/askperf/archive/2012/03/06/performance-issues-due-to-inactive-terminal-server-ports.aspx" $InternalContent = "" $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "8056" # *************************** # Data Gathering # *************************** $InformationCollected = new-object PSObject #Detect number of inactive TS ports Function CountInactiveTSPorts { # .SYNOPSIS # Counts the number of inactive TS ports # .DESCRIPTION # .NOTES # .LINK # .EXAMPLE # .OUTPUTS # Number of inactive TS ports # .PARAMETER if (($OSVersion.Build -eq 7601) -or ($OSVersion.Build -eq 7600)) { #Windowa 2008 R2 SP1, Windows 2008 R2 $arrInactiveTSPorts = Get-ChildItem "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceClasses\{28d78fad-5a12-11d1-ae5b-0000f803a8c2}\##?#Root#RDPBUS#0000#{28d78fad-5a12-11d1-ae5b-0000f803a8c2}" -recurse | Where-Object {$_.GetValue("Port Description") -eq "Inactive TS Port"} $NumberInactiveTSPorts = $arrInactiveTSPorts.count + 1 return $NumberInactiveTSPorts } if ($OSVersion.Build -lt 7600) { #Windows 2008, Windows 2003 $arrInactiveTSPorts = Get-ChildItem "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceClasses\{28d78fad-5a12-11d1-ae5b-0000f803a8c2}\##?#Root#RDPDR#0000#{28d78fad-5a12-11d1-ae5b-0000f803a8c2}" -recurse | Where-Object {$_.GetValue("Port Description") -eq "Inactive TS Port"} $NumberInactiveTSPorts = $arrInactiveTSPorts.count + 1 return $NumberInactiveTSPorts } } #Check if RDS Role/ Terminal Services app mode is installed Function isRDSEnabled { $RDSEnabled = $false if ((Get-CimInstance -Class Win32_OperatingSystem -Property ProductType).ProductType -ne 1) #Server { $TSSetting = (Get-CimInstance -Class Win32_TerminalServiceSetting -Namespace "root\CIMV2\TerminalServices").TerminalServerMode if (($null -ne $TSSetting) -and ($TSSetting -eq 1)) { $RDSEnabled = $true } } return $RDSEnabled } # ************** # Detection Logic # ************** $RDSEnabled = isRDSEnabled if ($RDSEnabled) { $NumberInactiveTSPorts = CountInactiveTSPorts if ($NumberInactiveTSPorts -ge 200) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Number of inactive TS ports" -value $NumberInactiveTSPorts $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -Verbosity $Verbosity -Visibility $Visibility -InformationCollected $InformationCollected -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_KB2655998_InactiveTSPortsST -MessageVersion 2 } else { if ($RDSEnabled) { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD4ERaMJ0EqFr+x # toOxxsw0v6/lf+xT2Rx8DpnjoVs8a6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOtN # tE1vbrTIn6BKlNDiTwUIZAdcaZsB/x8Fekqa4lW9MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAX3yfNYTMcju+fyZleIubeMqnzOMk0iAM6cz9 # Haq7oXKPE3w5cyDe7tNuiFj3DjRZVvY1UWHrHiPctP1gm/aZOzKOyJdizwsJkuDT # BneelP00TwYUMJW3jtDJJTunyZrXw6ijAeW3zbX1yCRSXV6GOST2lqoEpKdNfVBF # AxHbLKa0jKFVp9wSrpLrdnaZFNPopSPy26GHUAP6Zp3eijFv350W0ayEQIQHsf63 # xTe79G7O4i6FBt27G64ciFIsYmBaE7w3p+oYw6S6ZWWj0SQ2Ttf+LBPpq27ZPz/F # G4YrNIvwq6LMRF3932ga63NCIEP/oxoF2FWb2KRpSak+JzDNcKGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAoz1XGaUWjpECIqe+ABqN2Z+qhwDIVjw7C # 2SKCFz4OJQIGZutLSAPVGBMyMDI0MTAyODExNDA0My40OTVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4 # fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d # U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh # hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn # ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM # KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L # 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr # 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf # RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi # aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA # 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49 # tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA # p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf # OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG # Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3 # kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU # 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T # y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd # gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt # uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3 # XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS # Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl # cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0 # MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA # AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH # yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq # WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW # cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a # Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4 # swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgeRc246f0Ov7dwlYFVajd5YIR6pqpZGHtJExKwrgFf1UwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj # SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk # D9cXZckbMA0GCSqGSIb3DQEBCwUABIICAK5Gxf0EE55/1xbg2y1DufOUdU69QBIt # c6ywgUBFwbpyzyGCnE9LQVdO7yoLzyjyTW9+35EEav3Iwz46EEi72yi5Dv9wfkHd # e0gHfprjruzb4+ZPHfF11RXbgbBWRQxaDKGh6MQyO/1j81mlzmJz0/TLB+TWJ+KQ # UUFJslD9XlLpl9F/ZlX2ViZf7OpuibjJRWJ7vK5d7O9LGU1abhakxEi9eeku9naZ # B2eLOO7jFmT/pYgq7uWz4Ley2o2Sby0yC4uS3Qsry4FXCipFDv3ukPDx1g+nYdMK # bpre6/eqladFZdDXKtSedbH98qmz8uqJdrluxE5z7ocJXmzHFZE5xmsGWGGyV8VK # U0Xw13qKObxtxzqXAfFQoEUasvdqNARSPW2D0/KUkJ0S30J+Ne2fzKZGfWofyny/ # MBsP0LiSXz9vG7BrRvLTsLwp5EVL/1mMdOdLuRX8w4bC95ZicBlztYnbli3vMqM6 # wWtRYvMqT0v2tQt8YmmmgEJ4R+67Ca6fjJjXDIOFdd9w3PD02Zotk4ogBCZj9ZxF # UIHAkL0Wb7u3DujmSY4NLwTCDmaiR/J0VkJze505p7qt8TlvE/GfcIi841xiUHvX # EorzXKJ6H7RXTRKhdTHf3C7sXczpibIrSfp1zPy2rJsTpOyKK+htrs2czJ4P7FNW # /qS0bqHFOPOy # SIG # End signature block
combined_dataset/train/non-malicious/Create VMKernel on vDS.ps1
Create VMKernel on vDS.ps1
@@ New-VMHostNetworkAdapter -VMHost $myHost -VirtualSwitch "myVDS"-PortGroup "vdPortGroup"
combined_dataset/train/non-malicious/853.ps1
853.ps1
Get-AzLocation | select Location $location = "eastus" $resourceGroup = "rotatekeystestrg" New-AzResourceGroup -Name $resourceGroup -Location $location $storageAccountName = "contosotestkeys" New-AzStorageAccount -ResourceGroupName $resourceGroup ` -Name $storageAccountName ` -Location $location ` -SkuName Standard_LRS ` $storageAccountKey = (Get-AzStorageAccountKey -ResourceGroupName $resourceGroup -Name $storageAccountName).Value[0] Write-Host "storage account key 1 = " $storageAccountKey New-AzStorageAccountKey -ResourceGroupName $resourceGroup ` -Name $storageAccountName ` -KeyName key1 $storageAccountKey = (Get-AzStorageAccountKey -ResourceGroupName $resourceGroup -Name $storageAccountName).Value[0] Write-Host "storage account key 1 = " $storageAccountKey
combined_dataset/train/non-malicious/3132.ps1
3132.ps1
function Get-IPv4Subnet { [CmdletBinding(DefaultParameterSetName='CIDR')] param( [Parameter( Position=0, Mandatory=$true, HelpMessage='IPv4-Address which is in the subnet')] [IPAddress]$IPv4Address, [Parameter( ParameterSetName='CIDR', Position=1, Mandatory=$true, HelpMessage='CIDR like /24 without "/"')] [ValidateRange(0,31)] [Int32]$CIDR, [Parameter( ParameterSetName='Mask', Position=1, Mandatory=$true, Helpmessage='Subnetmask like 255.255.255.0')] [ValidateScript({ if($_ -match "^(254|252|248|240|224|192|128).0.0.0$|^255.(254|252|248|240|224|192|128|0).0.0$|^255.255.(254|252|248|240|224|192|128|0).0$|^255.255.255.(254|252|248|240|224|192|128|0)$") { return $true } else { throw "Enter a valid subnetmask (like 255.255.255.0)!" } })] [String]$Mask ) Begin{ } Process{ switch($PSCmdlet.ParameterSetName) { "CIDR" { $Mask = (Convert-Subnetmask -CIDR $CIDR).Mask } "Mask" { $CIDR = (Convert-Subnetmask -Mask $Mask).CIDR } } $CIDRAddress = [System.Net.IPAddress]::Parse([System.Convert]::ToUInt64(("1"* $CIDR).PadRight(32, "0"), 2)) $NetworkID_bAND = $IPv4Address.Address -band $CIDRAddress.Address $NetworkID = [System.Net.IPAddress]::Parse([System.BitConverter]::GetBytes([UInt32]$NetworkID_bAND) -join (".")) $HostBits = ('1' * (32 - $CIDR)).PadLeft(32, "0") $AvailableIPs = [Convert]::ToInt64($HostBits,2) $NetworkID_Int64 = (Convert-IPv4Address -IPv4Address $NetworkID.ToString()).Int64 $FirstIP = [System.Net.IPAddress]::Parse((Convert-IPv4Address -Int64 ($NetworkID_Int64 + 1)).IPv4Address) $LastIP = [System.Net.IPAddress]::Parse((Convert-IPv4Address -Int64 ($NetworkID_Int64 + ($AvailableIPs - 1))).IPv4Address) $Broadcast = [System.Net.IPAddress]::Parse((Convert-IPv4Address -Int64 ($NetworkID_Int64 + $AvailableIPs)).IPv4Address) $AvailableIPs += 1 $Hosts = ($AvailableIPs - 2) $Result = [pscustomobject] @{ NetworkID = $NetworkID FirstIP = $FirstIP LastIP = $LastIP Broadcast = $Broadcast IPs = $AvailableIPs Hosts = $Hosts } $Result.PSObject.TypeNames.Insert(0,'Subnet.Information') $DefaultDisplaySet = 'NetworkID', 'Broadcast', 'IPs', 'Hosts' $DefaultDisplayPropertySet = New-Object System.Management.Automation.PSPropertySet('DefaultDisplayPropertySet',[string[]]$DefaultDisplaySet) $PSStandardMembers = [System.Management.Automation.PSMemberInfo[]]@($DefaultDisplayPropertySet) $Result | Add-Member MemberSet PSStandardMembers $PSStandardMembers $Result } End{ } }
combined_dataset/train/non-malicious/sample_30_90.ps1
sample_30_90.ps1
# # Module manifest for module 'OCI.PSModules.Jms' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Jms.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '7a9fc2a3-fd30-429b-bb7a-b66e5815c207' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Jms Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jms.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIJmsFleetInstallationSites', 'Disable-OCIJmsDrs', 'Enable-OCIJmsDrs', 'Get-OCIJmsAnnouncementsList', 'Get-OCIJmsBlocklistsList', 'Get-OCIJmsCryptoAnalysisResult', 'Get-OCIJmsCryptoAnalysisResultsList', 'Get-OCIJmsDrsFile', 'Get-OCIJmsDrsFilesList', 'Get-OCIJmsExportSetting', 'Get-OCIJmsExportStatus', 'Get-OCIJmsFleet', 'Get-OCIJmsFleetAdvancedFeatureConfiguration', 'Get-OCIJmsFleetAgentConfiguration', 'Get-OCIJmsFleetDiagnosesList', 'Get-OCIJmsFleetsList', 'Get-OCIJmsInstallationSitesList', 'Get-OCIJmsJavaFamiliesList', 'Get-OCIJmsJavaFamily', 'Get-OCIJmsJavaMigrationAnalysisResult', 'Get-OCIJmsJavaMigrationAnalysisResultsList', 'Get-OCIJmsJavaRelease', 'Get-OCIJmsJavaReleasesList', 'Get-OCIJmsJreUsageList', 'Get-OCIJmsPerformanceTuningAnalysisResult', 'Get-OCIJmsPerformanceTuningAnalysisResultsList', 'Get-OCIJmsWorkItemsList', 'Get-OCIJmsWorkRequest', 'Get-OCIJmsWorkRequestErrorsList', 'Get-OCIJmsWorkRequestLogsList', 'Get-OCIJmsWorkRequestsList', 'Invoke-OCIJmsRequestCryptoAnalyses', 'Invoke-OCIJmsRequestJavaMigrationAnalyses', 'Invoke-OCIJmsRequestJfrRecordings', 'Invoke-OCIJmsRequestPerformanceTuningAnalyses', 'Invoke-OCIJmsScanJavaServerUsage', 'Invoke-OCIJmsScanLibraryUsage', 'Invoke-OCIJmsSummarizeApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeApplicationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationUsage', 'Invoke-OCIJmsSummarizeInstallationUsage', 'Invoke-OCIJmsSummarizeJavaServerInstanceUsage', 'Invoke-OCIJmsSummarizeJavaServerUsage', 'Invoke-OCIJmsSummarizeJreUsage', 'Invoke-OCIJmsSummarizeLibraryUsage', 'Invoke-OCIJmsSummarizeManagedInstanceUsage', 'Invoke-OCIJmsSummarizeResourceInventory', 'Move-OCIJmsFleetCompartment', 'New-OCIJmsAgentDeployScript', 'New-OCIJmsBlocklist', 'New-OCIJmsDrsFile', 'New-OCIJmsFleet', 'Remove-OCIJmsBlocklist', 'Remove-OCIJmsCryptoAnalysisResult', 'Remove-OCIJmsDrsFile', 'Remove-OCIJmsFleet', 'Remove-OCIJmsFleetInstallationSites', 'Remove-OCIJmsJavaMigrationAnalysisResult', 'Remove-OCIJmsPerformanceTuningAnalysisResult', 'Stop-OCIJmsWorkRequest', 'Update-OCIJmsDrsFile', 'Update-OCIJmsExportSetting', 'Update-OCIJmsFleet', 'Update-OCIJmsFleetAdvancedFeatureConfiguration', 'Update-OCIJmsFleetAgentConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jms' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2542.ps1
2542.ps1
$a = "XSQLUTIL18", "XSQLUTIL19" $a | % ` { $ServerName = $_; cd sqlserver:\ cd sql\$ServerName\default\databases $DBs = dir; $DBs | % ` { $LastBackupDate = $_.LastBackupDate; $LastLogBackupDate = $_.LastLogBackupDate; $LastDiffBackupDate = $_.LastDifferentialBackupDate; invoke-sqlcmd -ServerInstance "XSQLUTIL18" -Database "dbamaint" -query "Insert BackupInfo SELECT '$ServerName', '$lastBackupDate', '$LastLogBackupDate', '$LastDiffBackupDate'" -SuppressProviderContextWarning $ServerName; $_.Name; } }
combined_dataset/train/non-malicious/sample_54_23.ps1
sample_54_23.ps1
# # Module manifest for Dell Command | PowerShell Provider 'DellBIOSProvider' # # Generated by: Dell BizClient Team # # Generated on: 4/30/2014 # @{ # Script module or binary module file associated with this manifest RootModule = 'DellBIOSProviderARM64.dll' # Version number of this module. ModuleVersion = '2.8.0' # ID used to uniquely identify this module GUID = 'c1b58280-3210-441f-9be5-8f27a363412f' # Author of this module Author = 'Dell BizClient Team' # Company or vendor of this module CompanyName = 'Dell Inc.' # Copyright statement for this module Copyright = 'Copyright 2015 - 2024 Dell Inc. All rights reserved.' # Description of the functionality provided by this module Description = "The 'Dell Command | PowerShell Provider' provides native configuration capability of Dell Optiplex, Latitude, Precision, XPS Notebook and Venue 11 systems within PowerShell." # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '3.0' # Name of the Windows PowerShell host required by this module PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module PowerShellHostVersion = '' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module CLRVersion = '' # Processor architecture (None, X86, Amd64, IA64) required by this module ProcessorArchitecture = 'None' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @() # Modules to import as nested modules of the module specified in ModuleToProcess NestedModules = "DellBIOSProviderARM64.psm1" # Functions to export from this module FunctionsToExport = '*' # Cmdlets to export from this module CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module ModuleList = @() # List of all files packaged with this module FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = @("Dell","Command","BIOS","System","Configuration","Management","Provider") # A URL to the license for this module. LicenseUri = 'http://en.community.dell.com/techcenter/enterprise-client/w/wiki/6901.dell-command-powershell-provider' # A URL to the main website for this project. ProjectUri = 'http://en.community.dell.com/techcenter/enterprise-client/w/wiki/6901.dell-command-powershell-provider' # A URL to an icon representing this module. IconUri = '' # ReleaseNotes of this module ReleaseNotes = 'http://en.community.dell.com/techcenter/enterprise-client/w/wiki/6901.dell-command-powershell-provider' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = 'http://en.community.dell.com/techcenter/enterprise-client/w/wiki/6901.dell-command-powershell-provider' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIqwQYJKoZIhvcNAQcCoIIqsjCCKq4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+N3kn7KxzFrNV # /bucJPzsdHoWmjj4sjr1S++vYifBnqCCElwwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ATCCA+mgAwIBAgIQKcjO4K8g4fYFFpiqGB6UiDANBgkqhkiG9w0BAQ0FADBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yMzA5MjExNTMxMjZaFw0y # NDA5MjExNTMxMjVaMH4xCzAJBgNVBAYTAlVTMQ4wDAYDVQQIEwVUZXhhczETMBEG # A1UEBxMKUm91bmQgUm9jazERMA8GA1UEChMIRGVsbCBJbmMxJDAiBgNVBAsTG0RV # UCBDbGllbnQgQ3JlYXRpb24gU2VydmljZTERMA8GA1UEAxMIRGVsbCBJbmMwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQCMaBhwV7jJkdmP+tXH06aqD1fq # fge3rGr6hGz+V/ifIReHg8LxzLxOspMPj6t8IpXRcpkV3tt3fg793FCg4jfSWVmR # inwVJOHD8bR6XUNfLbtS/1M/PsSQijNKdSbL1nDKcIF5JfeN6CgkdU9AateJGLKF # Qc9YUgbNnnwlrHWjQmV78Cu4TDz7dOxjrwnRMTXe9wPL+38nwRZYOo97bBYmtTjW # LGfZOfg3e9DypJykJ1kQqGUa9O5PLAfvQb+NOi8gSpn3+XkliY29xx0ocQQrGDG8 # +KzfjXjGArElKBwjVirQaLhpBeeaWuDNeKTcJOzYL9Sh9IzVNpuBPwiImin5Za7S # KwyEPlPAsFgCduEsKCoWq67MPx0z7bGRPwp5Y03KZGJUDxQAG+PlI3jvjFZiZ6YB # Xi4TStiisY6t0Ol5kpE2lKHp3Pt/9iam1x7/y0EiQtkMXTuep1qdc3Waa7s0jEDD # 3/T4AknlkfhROxP85xaii32M9In0Tqr1hPm3pqsCAwEAAaOCASgwggEkMAwGA1Ud # EwEB/wQCMAAwHQYDVR0OBBYEFBFKGdzeU/CRsp0sA1HLF7oe6ORSMB8GA1UdIwQY # MBaAFO+funmwc/IlHnicA1KcG1OE3o3tMGcGCCsGAQUFBwEBBFswWTAjBggrBgEF # BQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYBBQUHMAKGJmh0dHA6 # Ly9haWEuZW50cnVzdC5uZXQvb3ZjczItY2hhaW4ucDdjMDEGA1UdHwQqMCgwJqAk # oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvb3ZjczIuY3JsMA4GA1UdDwEB/wQE # AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzATBgNVHSAEDDAKMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQ0FAAOCAgEAGtZRY5WmdTQbQGP/Nx77+u6udEUQn40GDjXPfT4j # nVlhJ99N35giv1mWstRXxOqY7YauotNcUNzep1d8oV5/YKc7+x0s/ZwuNQmLtVyb # VSrDy7DJiYNle/4am6GDefIUMMWgr8BGY8n/LdDVfL9Gir72V+HOe2N4cVnti0Ti # U9/1ebEdhKd/a0awP+mh8EZG7OJ41A1JkPc4rjsh3yfQi5AQ4P1RF1hSgudkZpQI # 8051WnnwjStKEWA2uiX3x2z63TvrPtdaJoYbtIniUx9ZVg3373sV8StFwPcyPzqX # 9Eod7Goj4D+Vg3bB73jjG+miuykSjxNHVnhNB7EnCVffnsD5hJHRXGRCZvof59id # NhpkuF0G4ZIYDrAF06HvJ4kxyGZCiNi6oJxfyndhG4FsCPI4XiE0n1N25lx1GeJZ # tgRH7okPBMOu3rYTQDH2+g85yNBwap18EC7XDTyi7H/Ih616pG9ca9Xv4MsptRU9 # 6UXqPemiXG9TbuEsBWgu6YYx0qBMlIT+bqDbghkpeXrF/zRjDBAD9p38VHnqay3B # r4RTbap/gUMQzgD2P2f6axjAg3yZaXab1qtI7VZptyXmVK7nRPwXCZmTR6SnxCaS # 7gD2GtIZiCiztpBq6zJEQhS39BQoXVV0bQ7k+m1ZX2VW0z8Ld54PZlbc8vnP1YcA # iyowggZwMIIEWKADAgECAhBx71V0rzVUw1osafZvS2vNMA0GCSqGSIb3DQEBDQUA # MGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQD # DDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9y # aXR5IC0gQ1NCUjEwHhcNMjEwNTA3MTkyMDQ1WhcNNDAxMjI5MjM1OTAwWjBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAJ6ZdhcanlYXCGMsk02DYYQzNAK22WKg3sIOuSBMyFedD91U # Ww0M1gHdL0jhkQnh28gVBIK2e/DY1jA7GXFw+6iml/YpXaQMqfRTPlfbDE5u/Hbb # XyTpql9D45PnDs/KJbzETDALWg/mBvTlbgyZZlhPg2HCc3xcIm8BRcUP90BPZEvQ # FwqpDh4CL6GPTPJnUNs+5J/CTz906zGk0JTQmbwwkglqyyTNoth2UtBOdZhPZFrS # XoP0WMBdanXE2D9kOosUDdh24eq5a+cRcEkROGMTbvHG+r0QRTUH5nYV0HUWqsJD # V/6r/mNzRiKguPPkx3BGCfmpN0Gas0tsH3Byowf2NZJ0EWRu+QLVwJKV8ZdZfg3u # oiXycVW4m42/ze6u3fsM564yTlCNod/Rc7/Bzn912qu/0K2COMXniO2ibTqGEbfX # sOGoizsMQReaX+RbmMidAJ/3c9LD6Z8Fh3khg9YL7dHMCJ/g8cXJWLpTX9SHsYtZ # qNJezWnQPvrEOQmvtLXt5zz6IofWc/kXlWrDHPVVeF/U+gvAWz+MeBUOWkw6buUm # mNAnzCDfwIY7eo1lRn7ZYV6p9K4+1PyvRcc6s4UESovICV2zewIoWeOGfYCiWEBm # YuA4VYOrnylBJrq76dhk+La7KHPNFUrXnnPjZkyxUZ2BI4vIhneytiw3InAhAgMB # AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTvn7p5sHPy # JR54nANSnBtThN6N7TAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz # BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu # bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni # cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBFBgNV # HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0 # Lm5ldC9ycGEwCAYGZ4EMAQQBMA0GCSqGSIb3DQEBDQUAA4ICAQBe84aZNcF57vAQ # r9eSQ9KF0FvgmKDgcVHJFMtQmmAOsAQmSbHP6bqbCKHaQ13UbyOiufhAx0f+TQEL # SJA/yNxqtD5TNSi+QEpHhWoed0DMgH9htDxPeajmo6agfkSGcb8SG5WBcvcNpdDe # Z5/Gorjxavn8/nRmxmTmeT1qA2FOSx/MIGLLAhjsY+1+cT+WugteaCJn7B/A0gUW # ZrGypOr8xZWjjRKl9Y3vGyDNmffnMvNZcR/dlOZ55VIjEFYq/Fk4v795JZJqx/2r # Z3dxsQR9Na0UwT6o/CMXVggYfNd6ImuRasw1RW1PO51DnQW4nfP8NCFcBBgyVzg0 # wcqDI0amiCMhxn4UgKux77sLrAk/7lORMbPiVESqtX0wPCwjnOg/o1jqQAgXoyBf # esAM26r/AxYDDXRkIpqUXjA1dhP10+Hj4AfK2epFiEacVNUQ4vMyCUC251wXMv7M # r+ttz2A8dfPuXGBAVRu1Wa9yI2hNnHQEDBDJr1Bbpw1mD5blmpXgIKIa0LDuOEme # KmeekZZsmNvEEG1gfB5uSOe2fq8zBxJx772VO76pg9RCfbenNNdfhpG1r1ZY2lV9 # F73bvM1kQRWNMVEGT7Qusos9nPNN41gDVMysiPhSPE5LRgklGf8V56eYRi59uurj # 43z/+bkZlb52uQ15sgJRGkrIn4jCQzGCF7swghe3AgEBMGMwTzELMAkGA1UEBhMC # VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAMTH0VudHJ1c3QgQ29k # ZSBTaWduaW5nIENBIC0gT1ZDUzICECnIzuCvIOH2BRaYqhgelIgwDQYJYIZIAWUD # BAIBBQCgfDAQBgorBgEEAYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGC # NwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQx # IgQgsbyH/vZprAzOrubcb5ffJn67vDuSlTZHa92oWsRNbagwDQYJKoZIhvcNAQEB # BQAEggGANNiJkD+CTjVXPN8pEDHrIJpQdFNS4uWzWmlWSV06oo+oTMjswBnqyu3n # oZ7vHFyzqyZk/sU3a10njD0COwjbYXVQktNywzmomI6WWZM4F5zrXDnX/1ds201d # S4pNuAkjpfPnxzYaZgigteVAhXPMRGINNoRT89XKKaF17bK4MV469uXXfNeiF4T9 # +onc9xLr/yN8TTHqPeFvupGTTEZI/BGmihl8kI5xIL+OkFrpfbu8mqSPnzWgiyMd # d+bT8+ZOB93AxaCLnVNMLo5sLnRoqEWiOGwvbtcJtbSqTDf8Fd+qlEeGvneCRO2C # Ex113nOzrJqBHwEdoAeNx01R7BLBZpatPAfxSpEDcIUzFS4WwPlDIFn/vi5cNMD0 # XKGibN7BKSQtd6N3G5rftvQ8ljaw5kBxJ6zLz572hybYJ6eIBqHhzPwymeaVwVN7 # CgiRl5g91VK3Fmh84tbM00zBha8LKf7fCWSaUotf4Fypir86cS6L3Nw7zpnEahQ5 # iPW2WRpCoYIVKzCCFScGCisGAQQBgjcDAwExghUXMIIVEwYJKoZIhvcNAQcCoIIV # BDCCFQACAQMxDTALBglghkgBZQMEAgEwgfMGCyqGSIb3DQEJEAEEoIHjBIHgMIHd # AgEBBgpghkgBhvpsCgMFMDEwDQYJYIZIAWUDBAIBBQAEIOWvwPtjM+2mTfTyEHaj # HW/1qmQI+1FJHAAQDs30bcN3AggdEdCpD31YrBgPMjAyNDA0MTkxMDE2MDVaMAMC # AQGgeaR3MHUxCzAJBgNVBAYTAkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQH # EwZPdHRhd2ExFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1 # c3QgVGltZXN0YW1wIEF1dGhvcml0eSAtIFRTQTGggg9YMIIEKjCCAxKgAwIBAgIE # OGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChMLRW50cnVzdC5uZXQxQDA+ # BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBpbmNvcnAuIGJ5IHJlZi4g # KGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5IEVudHJ1c3QubmV0IExp # bWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRpZmljYXRpb24gQXV0aG9y # aXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3MjQxNDE1MTJaMIG0MRQw # EgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3LmVudHJ1c3QubmV0L0NQ # U18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc # KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEGA1UEAxMqRW50cnVzdC5u # ZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgpMIIBIjANBgkqhkiG9w0B # AQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQqK0vRvwtKTY7tgHalZ7d4 # QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQesYGpjX24zGtLA/ECDNyr # pUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuXMlBvPci6Zgzj/L24ScF2 # iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVTXTzWnLLPKQP5L6RQstRI # zgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/HoZdenoVve8AjhUiVBcA # kCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH4QIDAQABo0IwQDAOBgNV # HQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVeSB0RGAvtiJ # uQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADubj1abMOdTmXx6eadNl9cZ # lZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExoU8aAghOY+rat2l098c5u # 9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6YfzX1XEC+bBAlahLVu2B06 # 4dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5bu/8j72gZyxKTJ1wDLW8w # 0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+bYQLCIt+jerXmCHG8+c8 # eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/ErfF6adulZkMV8gzURZVEw # ggUTMIID+6ADAgECAgxY2hP/AAAAAFHODfcwDQYJKoZIhvcNAQELBQAwgbQxFDAS # BgNVBAoTC0VudHJ1c3QubmV0MUAwPgYDVQQLFDd3d3cuZW50cnVzdC5uZXQvQ1BT # XzIwNDggaW5jb3JwLiBieSByZWYuIChsaW1pdHMgbGlhYi4pMSUwIwYDVQQLExwo # YykgMTk5OSBFbnRydXN0Lm5ldCBMaW1pdGVkMTMwMQYDVQQDEypFbnRydXN0Lm5l # dCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAoMjA0OCkwHhcNMTUwNzIyMTkwMjU0 # WhcNMjkwNjIyMTkzMjU0WjCBsjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1 # c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVy # bXMxOTA3BgNVBAsTMChjKSAyMDE1IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9y # aXplZCB1c2Ugb25seTEmMCQGA1UEAxMdRW50cnVzdCBUaW1lc3RhbXBpbmcgQ0Eg # LSBUUzEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZI+YUpOh8S4Vx # WPv4geZyi11Gw4gAHzjQiuHWblYw5a/aZFB9whM5+71mtNqE+4PQKB/LduhgUGmb # 885PE+LBPsHfEssyo/heRCIOzDrpjUm5YHTI3lQ9QV5DXyhGqaa3yhArIrxbTVuM # F2UShv0sd9XFoIzKwoPgR1d853CuYkUnMRgK1MCkGFVS92DGBEuz3WgybhAfNBG4 # Enhk8e6p4PfjsSKPNFply4r04UVQdN+Tl6Y05tBMO583SVKnU06fLmdc7Zb8pb90 # UYjjqo692bEvX1AwFvRRYCJrmcv/4VQ7uftEOKUIOSObaUf6PMTQ56rfRrLs8ooZ # rCmyOJV1AgMBAAGjggEjMIIBHzASBgNVHRMBAf8ECDAGAQH/AgEAMA4GA1UdDwEB # /wQEAwIBBjA7BgNVHSAENDAyMDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDov # L3d3dy5lbnRydXN0Lm5ldC9ycGEwMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzAB # hhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAyBgNVHR8EKzApMCegJaAjhiFodHRw # Oi8vY3JsLmVudHJ1c3QubmV0LzIwNDhjYS5jcmwwEwYDVR0lBAwwCgYIKwYBBQUH # AwgwHQYDVR0OBBYEFMPCcdJ712gFrjs5mzQlDGIDx1doMB8GA1UdIwQYMBaAFFXk # gdERgL7YibkIozH5oSQJFrlwMA0GCSqGSIb3DQEBCwUAA4IBAQAdJOeadFuqcPyx # DjFF1ywAf2Y6K6CaNKqsY22J+Z/fDXf9JCP8T5y3b4/z9B+2wf3WHMSMiGbBY426 # V3fTuBoeyFGtzGA2GodqKOoRZd7MPCyMdLfoUEPTzCjoFWwRKp8UlSnJBVe1Zzbo # PKmD70HBIRbTfvctEUdmdmCCEmmMdlVzD98vS13pbCP4B/a1fdZpRZxYfWEu/HhL # Q06JkUZELKBTqEWh9hZYu5ET8kvF3wvA564per1Fs+dwMOc0jut69tO10d5rE5lG # s4vSTZN1tfFvv9wAKMIlv7zno2U07D8NHZeM+qqIIqQYNdsFjnbjEMgpj2PQrqwY # 2drEn1ESMIIGDzCCBPegAwIBAgIQB9cTU9olYbRh6ZBHikzOBDANBgkqhkiG9w0B # AQsFADCBsjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAm # BgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsT # MChjKSAyMDE1IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25s # eTEmMCQGA1UEAxMdRW50cnVzdCBUaW1lc3RhbXBpbmcgQ0EgLSBUUzEwHhcNMjQw # MTE5MTY0NjI4WhcNMjkwNjAxMDAwMDAwWjB1MQswCQYDVQQGEwJDQTEQMA4GA1UE # CBMHT250YXJpbzEPMA0GA1UEBxMGT3R0YXdhMRYwFAYDVQQKEw1FbnRydXN0LCBJ # bmMuMSswKQYDVQQDEyJFbnRydXN0IFRpbWVzdGFtcCBBdXRob3JpdHkgLSBUU0Ex # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAx5I4QTn/oD9fTU2KlzHj # m4fDeAVpNgtSs6qDXbDSvX6+g6BfXp6X89s1F6n52xVifMr2xck0FeIRpZKxLuBp # VF0OK75VxgGMhWOySS01X+VOQ8RxC6S0HjRN/0XI/k/hMOjpZWxrZdO+1Cxo0K0E # m2q50FT7NQCQMcbYaGpdr+p+0PmdE+/OnWNkQnIHhfsGMYvjnQum1TLbUqVODDzB # wJrRfwJ3YxPN8z08HgJLNobgBLR4d+SbL+GJKt6CXevkGtyNunukn4+ObHXrA+CA # BL+xCRz6YXqzm4G3C8kTCnjtCPbMpl9CRxI6R3h2/rzamT9k6zdeKt9S4pmw/e+E # ypE6orCnsbZWHD9E+H6R73imJP7eKR749fdRf7Z4LYe0vQC5xh7g6OET7u5f117u # pHx1YM6hNZBYwqu1SEN76cd3iYmLxqGMaZfPbnpD/vRf+2PlJOrf4BCQpxKQzBut # CIrRjYUgom6hixYnlTHTz24DKZ9EwicIrLf0iU035CWJWlMsUw2CFHPG7MWw2YfY # mxLuJjpfly9wyTB4oVpKbdJISg9Van72W+KHX9oRG3e+Gl73SAqYcQx9riqBfbKe # kWAO0dlqMBKK5JrspktvhQZJEA6FSD8u5hTPWuNPOCqv1zEAvCyWlZKtc896HFHL # /i3pwC5YDgoVZcuIezIbYA0CAwEAAaOCAVswggFXMAwGA1UdEwEB/wQCMAAwHQYD # VR0OBBYEFENoH2+fItD4Xwn3/LjlI8aOB0KSMB8GA1UdIwQYMBaAFMPCcdJ712gF # rjs5mzQlDGIDx1doMGgGCCsGAQUFBwEBBFwwWjAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3AuZW50cnVzdC5uZXQwMwYIKwYBBQUHMAKGJ2h0dHA6Ly9haWEuZW50cnVz # dC5uZXQvdHMxLWNoYWluMjU2LmNlcjAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8v # Y3JsLmVudHJ1c3QubmV0L3RzMWNhLmNybDAOBgNVHQ8BAf8EBAMCB4AwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwQgYDVR0gBDswOTA3BgpghkgBhvpsCgEHMCkwJwYI # KwYBBQUHAgEWG2h0dHBzOi8vd3d3LmVudHJ1c3QubmV0L3JwYTANBgkqhkiG9w0B # AQsFAAOCAQEAvrDc/bz6Zqf8Ix3z2Vdi9CTfHS/5WMvKzAx9z26H9W6CWive41/G # zhrkCK+OBAEe/wL4BVO4qGKFe5mrRXvZqrEXg9EpfpMh6DaIQiE4+/sNgcnDiozK # Kl5mr/mc9I18Evt6bTqKsAD3O3ClD7u1U6nhxikm6twSSi9dWgS4quOHC33Ingb+ # aWZLjqf0vjDJpeKQoaiBDT5HIZJQXTLk8lbPqZQhuzDCdxgRmiau8eI+L/w/iTM3 # XZTn3RrF5cxmbPoAzpbigO34LKfFaBNpfARErQjV+avJrRdm1S8LV/Cbz1weqw0n # Rmn+qLcFJY7gshUzSl+6nIvQKAk8tYWy4TGCBJgwggSUAgEBMIHHMIGyMQswCQYD # VQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3 # dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMTUgRW50 # cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MSYwJAYDVQQDEx1F # bnRydXN0IFRpbWVzdGFtcGluZyBDQSAtIFRTMQIQB9cTU9olYbRh6ZBHikzOBDAL # BglghkgBZQMEAgGgggGlMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkq # hkiG9w0BCQUxDxcNMjQwNDE5MTAxNjA1WjApBgkqhkiG9w0BCTQxHDAaMAsGCWCG # SAFlAwQCAaELBgkqhkiG9w0BAQswLwYJKoZIhvcNAQkEMSIEIKD4XYVXwbLOBZFh # sT93BZtS17r6BH6Brogo3DAY0Z/kMIIBCwYLKoZIhvcNAQkQAi8xgfswgfgwgfUw # gfIEIChJ9zEY10FFBWFzzT7sy71TS14O8PoGFo2w4nNJA+6PMIHNMIG4pIG1MIGy # MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMf # U2VlIHd3dy5lbnRydXN0Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIw # MTUgRW50cnVzdCwgSW5jLiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MSYwJAYD # VQQDEx1FbnRydXN0IFRpbWVzdGFtcGluZyBDQSAtIFRTMQIQB9cTU9olYbRh6ZBH # ikzOBDALBgkqhkiG9w0BAQsEggIAX1KTIB0RxIfE/hxgMDUPMhjLZlkfJBVarCGU # AOsMElleP1pmLaORQcl9X59cJXA2rbdmykuuxUluuSQxEhfc0jACckiL818i4jz7 # dsI6Vpal4ic2f9lUJU79hKF+ztf9lme5dRBqhhTF/3jtXgTnVPgMfaqVcKWJJmAJ # msBEwoblEp+AnwzGQgh291TAxkUly/MV170BMRbqLE4AvVyDmNF/woDe/RT9mzNX # Y3lym2F0ACFvpaUtS8buzquOZH5X3pcVja8wHOzKJOy+i2C7384CG/ELd6Raqi5U # CxWDMl8rlzGP0ul5JzBUcSxnwoxKECOKzw1xeC8U0FdDKMKCT3/PCVGIih9CHqpb # LjRgpZEZu9gixx6Jq4TKIPzJVCOGbe3LTLw+yTm1PLUfWMSesk33e+XfteSA9kVJ # VBQDHL0/3rawvf8ofsPhlLlc7rDxk8WiQrAb+zR+33huXnM3RuaMpxUKo7EKYUs3 # oU6xET32Pot7ORLx4z53FpED9unA4ik0BS9tPlHllKdDiCR6sVvTPvR8LTWhcdIZ # +9ptf3EdHXp8WU7kp0Gf1ATfRianOJ3n4NV+WpvKuUdK2EnvqtRe8KfdCuZhroOk # a/slTjEEqnLMmRIupKz/6HnIJf+SDlI0i3ElPFjvNvp9Gk+N37DP9UNAwVhnHJy6 # rHc+sr8= # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_9.ps1
sample_5_9.ps1
#************************************************ # TS_ProLiantDL385NMICrashDump.ps1 # Version 1.0.1 # Date: 5/16/2012 # Author: v-alyao # Description: [Idea ID 2753] [Windows] HP DL385 G5p machine cannot generate dump file # Rule number: 2753 # Rule URL: //sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=2753 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 2753 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ProLiantDL385NMICrashDump" $PublicContent = "" $InternalContent = "http://bemis.partners.extranet.microsoft.com/8/Pages/2714828_en-US.aspx" $Verbosity = "Warning" $Visibility = "3" $SupportTopicsID = "8114" $InformationCollected = new-object PSObject # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer #- Windows Server 2003, Windows Server 2008, Windows Sertver 2008 R2 #- HP DL385 G5 (and variants: HP DL385 G5*) if((($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2)) -or #Server 2003 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or # Server 2008 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1))) #Win 7/Server 2008 R2 { $manufacturer="HP" $productName="ProLiant DL385 G5" $computerInfo=Get-CimInstance -Class Win32_ComputerSystem if(($null -ne $computerInfo) -and ($computerInfo.Manufacturer -eq $manufacturer) -and ($computerInfo.Model.Contains($productName))) { $RuleApplicable=$true } } #Check the NMICrashDump key, If exists and equal 1, return true Function CheckCrashDump() { $RedRegKey="HKLM:\System\CurrentControlSet\Control\CrashControl" $RedNMICrashDump=1 if(Test-Path -Path $RedRegKey) { $NMICrashDump=(Get-ItemProperty($RedRegKey)).NMICrashDump if(($null -ne $NMICrashDump) -and ($NMICrashDump -eq $RedNMICrashDump)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "System Model" -value $computerInfo.Model add-member -inputobject $InformationCollected -membertype noteproperty -name "NMICrashDump Value" -value $NMICrashDump return $true } } return $false } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { $RootCauseDetected = CheckCrashDump if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -InternalContentURL $InternalContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_ProLiantDL385NMICrashDump_SD } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAau/7RK2LhPaxL # szGpt7AEmGxncazEmXbHadCqjbMstaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILsw # 7waZelse5HYgm/jAIYHs6yJc0CWPfeJmrmbAh0XwMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAleXRxzM8J0XJXcW3pi883bK8TkVb0QZsSoEf # OGGDoGDvf+CvfOLIP9yqFppr1x07A4GR0wGq9EHU51GotSO1hq25gsicDT0GAFcU # OpClmxkq1X/Dx9oc/BxuPs73uvWz03Gvwn2GmhyvFG23KstLfugBY6+YeFpIAdFm # U6J+vPFr7wexhHknDW57cSgdKQV7/b+LedFNtrn/zhgQFvcEFuDK/8P63LVDF1JK # a6m5YqP6XtuoqUUMtC/zigt5G9w8C4kWKHok5R0Am9wWWn6JaUo6/kxQHNsNzucZ # FwN07734odbnEa9OzjLSgEArl1NXOHWzjETXu1DR2ztB+EEeJ6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBxZNSY+0fMu209tkG/0dmQx1bmaKRWENog # RlACPl3YlQIGZuto66IAGBMyMDI0MTAyODExNDAzOS40MzhaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgOFse8qUQE+x1/GZw8gDbNhjB/Of7iJm66aizEofahq0wgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICADMIeM6hZ+BMgugLokhlZ/lgP9O0A7dB # s75q/6UUcQwrEzmjSPZVoVy9UdNzIOQ4HXIaJkQXmjkID/O1T86E8uWInmguCTc+ # c8Mu2mTbuQ0/lHBhaUK/ZeOcu0uZq8svsmvPdgtdF71LQ5zmXQpjJDSRlbz8LnZM # r22ywoRAcwQENF5y9pj7JFpRODTIqiJXxVlCjkXpdNTo/jluPU+NAIEf6vNuNnoN # xyymNqk3r7iOPqRS8f4APjYR0sqjBE8rsNyoRofmpb2m1So0XJaT8Mf/RMcKD4eN # 0S9VGDF13drKp6W6bu1mMvTodMdFBUUVheAcGTzMyIc6XczFHl+L0aK+tjdrWsWS # tu3poV7pJvD12jPt7XF30olft7924hNoO/lHJ8h1CwpUb/s12fxlL2XruEuDHLoC # 0MXAgdBeEVYU6kk944OoGTW3eELkTqx38pFRxdcIn8zYgwN5hhpl7WMz+LbNOKXk # nybFQebxzmgduXCncgZ3+1q5+1MRs4+HTST/X5HT7I2+2bTCgAfDDrmUZ5loWvy/ # UTskefVpcvPmy7mKrAI+sNc34EaUJMsSjp1ERfkYv+XfoQDdqyFLZo7gqTaiZFwo # uoHNECbZM6DPj2+5sa8om74apH56OQMeHZ4IkNd5H5pos9nurlUwQe39/e8B0V9b # tUyRuD7yzi8A # SIG # End signature block
combined_dataset/train/non-malicious/FuncionInfo_1.types.ps1xml.ps1
FuncionInfo_1.types.ps1xml.ps1
<?xml version="1.0" encoding="utf-8" ?> <Types> <Type> <Name>System.Management.Automation.FunctionInfo</Name> <Members> <ScriptProperty> <Name>Verb</Name> <GetScriptBlock> if ($this.Name.Contains("-")) { $this.Name.Substring(0,$this.Name.Indexof("-")) } else { $null } </GetScriptBlock> </ScriptProperty> <ScriptProperty> <Name>Noun</Name> <GetScriptBlock> if ($this.Name.Contains("-")){ $this.Name.Substring(($this.Name.Indexof("-")+1),($this.Name.length - ($this.Name.Indexof("-")+1))) } else { $this.Name } </GetScriptBlock> </ScriptProperty> <ScriptProperty> <Name>Prefix</Name> <GetScriptBlock> $prefix_val = $((gmo $this.Module).ExportedFunctions.Values + (gcm -mo $this.ModuleName -CommandType "Function") | where { $_.Verb -eq $this.Verb } | group { $_.Definition } | % { $names = $_.Group | Select -Expand Name; $ofs = "-"; $verb,[string]$noun = @($names)[0] -split "-"; foreach($name in $names){ if ( $name.contains("-") ) { $name.substring($name.IndexOf("-") + 1, $name.LastIndexOf($noun) - $name.IndexOf("-") - 1 ) } } } | where {$_} | select -unique | foreach { $_ | where {$this.Noun -match $_ } }) if ( $prefix_val ) { $prefix_val } else { $null } </GetScriptBlock> </ScriptProperty> <ScriptProperty> <Name>InternalName</Name> <GetScriptBlock> $prefix = $this.Prefix if ($prefix) { "$($this.Verb)-$($this.Noun.Replace($prefix, $null))" } else { "$($this.Name)" } </GetScriptBlock> </ScriptProperty> </Members> </Type> </Types>
combined_dataset/train/non-malicious/sample_14_86.ps1
sample_14_86.ps1
ConvertFrom-StringData @' id_systemfiles_title=System Files id_systemfiles_status=Collecting System Files id_systemfilesdirectorylistings_title=System Files Directory Listings id_systemfilesdirectorylistings_status=Collecting System Files Directory Listings id_systemfilesacllistings_title=System Files ACL Listings id_systemfilesacllistings_status=Collecting System Files ACL Listings id_dcompermissions_title=DCOM Permissions id_dcompermissions_status=Collecting DCOM Permissions id_environmentvariables_title=Environment Variables id_environmentvariables_status=Collecting Environment Variables id_ipconfig_title=IPConfig id_ipconfig_status=Collecting IPConfig id_systempolicies_title=System Policies id_systempolicies_status=Collecting System Policies id_proxysettings_title=Proxy Settings id_proxysettings_status=Collecting Proxy Settings id_etllogs_title=ETL Logs id_etllogs_status=Collecting ETL Logs id_rootcertificates_title=Root Certificates id_rootcertificates_status=Collecting Root Certificates id_runningservices_title=Running Services id_runningservices_status=Collecting Running Services id_otherlogs_title=Other Logs id_otherlogs_status=Collecting Other Logs '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3Rq26OvTBcD52 # orzeRWGllCq2lvdJSTdxO5HlQFqAyaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBw+ # ricoCZSZIxSsTvnL3Jqxo/a7RHFjSVSgnlQaWNXEMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmxZ+xUkUqVIVWS/NwFW2RLUuHzYVXXquM4H8 # /1sYGKSydYc94/Gd2z+M6F454d8GO4J1v0bu2i+PH5PuQs82uJrAyUKJihTCmaFG # LP4RHW6ygJYnCdI82T356EduQ+CmuelWPmoRgDPbNcttcDMfYkKGncQ/Vmh9k3Ne # MWrrF8WTyw5qstdkmeucIyZj5QG2aXUHnePyW6YFTInXalgq9ngGX/YADJVTXtO4 # AxIkSp3c5IK1zea+tSwMFAazWVZ60ysgUeVPzIICHHSzMdgiOd9v8ZflS+E+JS9b # 0gwqkkX4T5zi5tGZa1qjlTplDvOsRa8dbkZyt5J8vOAd/j/XSaGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAvJDGWd0+kKOSmMEcaJwjiYYHUGtIMC1+S # SHqIVmBkqgIGZuto66IiGBMyMDI0MTAyODExNDA0MC40MTVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgKZzcqM522l3FBq9x1Ba2q58RheWVN9erFiCsi+PaFTkwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAFN0vQT8CacdrHTsmRZv5aePx2grM1s0 # VmOBlVEKmnn4ieSlmNxAY4U9Jff2Kg23rNI015HozFGPCXhmcBOBPU64/2ecKLqt # UyKVEEYq2qk5JXeMchVSlTLNiioNSOuwBDk6e7bkoZ5w7f1xE/e+5kwB5Rq2oLpO # XGI7cSkWyLvRQSQvV7Bx7YqYCbhpP87R16BezTcpVSt2xGnIkpCD6GpEF1Yqz0go # wpaJERB7gRWQz1lkEwmMeiCW2TnEF7oKK6UJWxx7V5hjyolTWlG81R+8V37Lyjgw # IMhDk/4zm0grK8UxTVnB8SMWIfWhiHw/evX8oY6KRyhEatMiBi4wXVvGZN7WX4Sj # SvEH5KskA7ticB28azk4CbOPx4iZQM11uuVaik/pmXThMJ8Z2soF6qUl/VExxvvP # H6uoqcHoluTf238S7+fjKBcWvQRmKjp0Zw9p7h1yv8wGW3wqxgd9JPRasCl9sy5Y # D1zOMMg7USj/0L1uUm0aPJgHEFcuhjmLXfY5D0XyLXWo1sGUOA8hvH9VFdNbbXAH # 37YDA4/CW7cN8oj2neA19y1sjuU9MSLSjGERx2QmEZ20Dqe934+7Uh9108zdZBXY # B8X2CuTSBspQMId40SLZSRRvkv/CmjN2NXWkJerGxbeMWqMo7rSv+bavfO230IAK # bbLAEZiF8A1u # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_38.ps1
sample_23_38.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Updates a ServiceBus Topic .Description Updates a ServiceBus Topic #> function Set-AzServiceBusTopic{ [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.ISbTopic])] [CmdletBinding(DefaultParameterSetName = 'SetExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of the Topic.")] [Alias('TopicName')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the Topic. ${Name}, [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of ServiceBus namespace")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of ServiceBus namespace ${NamespaceName}, [Parameter(ParameterSetName = 'SetExpanded', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName = 'SetExpanded', HelpMessage = "The ID of the target subscription.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName = 'SetViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.IServiceBusIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(HelpMessage = "ISO 8061 timeSpan idle interval after which the topic is automatically deleted. The minimum duration is 5 minutes.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.TimeSpan] # timeSpan. ${AutoDeleteOnIdle}, [Parameter(HelpMessage = "ISO 8601 default message timespan to live value. This is the duration after which the message expires, starting from when the message is sent to Service Bus. This is the default value used when TimeToLive is not set on a message itself.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.TimeSpan] # timeSpan. ${DefaultMessageTimeToLive}, [Parameter(HelpMessage = "ISO 8601 timeSpan structure that defines the duration of the duplicate detection history. The default value is 10 minutes.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.TimeSpan] # timeSpan. ${DuplicateDetectionHistoryTimeWindow}, [Parameter(HelpMessage = "Value that indicates whether server-side batched operations are enabled.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.Management.Automation.SwitchParameter] # Value that indicates whether server-side batched operations are enabled. ${EnableBatchedOperations}, [Parameter(HelpMessage = "A value that indicates whether Express Entities are enabled. An express topic holds a message in memory temporarily before writing it to persistent storage.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.Management.Automation.SwitchParameter] # A value that indicates whether Express Entities are enabled. An express topic holds a message in memory temporarily before writing it to persistent storage. ${EnableExpress}, [Parameter(HelpMessage = "Value that indicates whether the topic supports ordering.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.Management.Automation.SwitchParameter] # Value that indicates whether the topic supports ordering. ${SupportOrdering}, [Parameter(HelpMessage = "The maximum delivery count. A message is automatically deadlettered after this number of deliveries. default value is 10.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.Int32] # The maximum delivery count. A message is automatically deadlettered after this number of deliveries. default value is 10. ${MaxSizeInMegabytes}, [Parameter(HelpMessage = "Maximum size (in KB) of the message payload that can be accepted by the topic. This property is only used in Premium today and default is 1024.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.Int64] # Maximum size (in KB) of the message payload that can be accepted by the topic. This property is only used in Premium today and default is 1024. ${MaxMessageSizeInKilobytes}, [Parameter(HelpMessage = "Enumerates the possible values for the status of a messaging entity.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Body')] [System.String] ${Status}, [Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(HelpMessage = "Run the command asynchronously")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process{ try{ $hasAutoDeleteOnIdle = $PSBoundParameters.Remove('AutoDeleteOnIdle') $hasDefaultMessageTimeToLive = $PSBoundParameters.Remove('DefaultMessageTimeToLive') $hasDuplicateDetectionHistoryTimeWindow = $PSBoundParameters.Remove('DuplicateDetectionHistoryTimeWindow') $hasEnableBatchedOperations = $PSBoundParameters.Remove('EnableBatchedOperations') $hasEnableExpress = $PSBoundParameters.Remove('EnableExpress') $hasMaxMessageSizeInKilobytes = $PSBoundParameters.Remove('MaxMessageSizeInKilobytes') $hasMaxSizeInMegabytes = $PSBoundParameters.Remove('MaxSizeInMegabytes') $hasRequiresDuplicateDetection = $PSBoundParameters.Remove('RequiresDuplicateDetection') $hasSupportOrdering = $PSBoundParameters.Remove('SupportOrdering') $hasStatus = $PSBoundParameters.Remove('Status') $hasAsJob = $PSBoundParameters.Remove('AsJob') $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') $topic = Get-AzServiceBusTopic @PSBoundParameters # 2. PUT $null = $PSBoundParameters.Remove('InputObject') $null = $PSBoundParameters.Remove('ResourceGroupName') $null = $PSBoundParameters.Remove('NamespaceName') $null = $PSBoundParameters.Remove('Name') $null = $PSBoundParameters.Remove('SubscriptionId') $hasProperty = $false if ($hasAutoDeleteOnIdle) { $topic.AutoDeleteOnIdle = $AutoDeleteOnIdle $hasProperty = $true } if ($hasDefaultMessageTimeToLive) { $topic.DefaultMessageTimeToLive = $DefaultMessageTimeToLive $hasProperty = $true } if ($hasDuplicateDetectionHistoryTimeWindow) { $topic.DuplicateDetectionHistoryTimeWindow = $DuplicateDetectionHistoryTimeWindow $hasProperty = $true } if ($hasEnableBatchedOperations) { $topic.EnableBatchedOperations = $EnableBatchedOperations $hasProperty = $true } if ($hasEnableExpress) { $topic.EnableExpress = $EnableExpress $hasProperty = $true } if ($hasEnablePartitioning) { $topic.EnablePartitioning = $EnablePartitioning $hasProperty = $true } if ($hasMaxMessageSizeInKilobytes) { $topic.MaxMessageSizeInKilobytes = $MaxMessageSizeInKilobytes $hasProperty = $true } if ($hasMaxSizeInMegabytes) { $topic.MaxSizeInMegabytes = $MaxSizeInMegabytes $hasProperty = $true } if ($hasStatus) { $topic.Status = $Status $hasProperty = $true } if ($hasSupportOrdering) { $topic.SupportOrdering = $SupportOrdering $hasProperty = $true } if (($hasProperty -eq $false) -and ($PSCmdlet.ParameterSetName -eq 'SetViaIdentityExpanded')){ throw 'Please specify the property you want to update on the -InputObject. Refer https://go.microsoft.com/fwlink/?linkid=2204584#behavior-of--inputobject for example.' } if ($hasAsJob) { $PSBoundParameters.Add('AsJob', $true) } if ($PSCmdlet.ShouldProcess("ServiceBus Topic $($topic.Name)", "Create or update")) { Az.ServiceBus.private\New-AzServiceBusTopic_CreateViaIdentity -InputObject $topic -Parameter $topic @PSBoundParameters } } catch{ throw } } } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB1cMIIDvZvFqOO # z6isnuX+X54H7URYbKV64g+b9RNgbaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIfg # GwxC9at25LomDrewPe0wraW6uVpYv8CG07OhGGo7MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA65CW5yoxirNE92HijeUOx3KatGBSpS4FotZ2 # zlbeXEBuue67yRPqtPpl/ndBxWVnByEBRiyhZVDbED2GliK8gSrQLybsuE5uZLWO # i+rfAgYMe7fSM/nckvQ4gl8Ku8rKG/Y32y5btGXUNuxuP0j5YoaImQnQj7KyKCNQ # 7Mu0pShoaDGnZaGgRnYMPAxYuaeQbkUA7IBRtjW2iE3NDI3YH4JlOu2/o6B4b0uO # sZtmTKc6hE1KsX6/c83jhu8YxMjksKcgZnT32JNbPzu1VOOAyXjzIoy2VcrIxZrs # h51iOyngb4YomikOYoq6RkRupunOfR8FMsz/Oj93CUni1/ldR6GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCjd4wCt198Dimuim0y4BfB59Z5/LBBtN+h # R2Phdh2BcwIGZjOaePoMGBMyMDI0MDUxNjA2NDIxMi4xMjdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kdzAi # GA8yMDI0MDUxNjAxNDgzOVoYDzIwMjQwNTE3MDE0ODM5WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp7+R3AgEAMAoCAQACAhdjAgH/MAcCAQACAhPkMAoCBQDp8TX3 # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAGgUSBK7uVURyU4HK/dJr1vV # D5ZLQF2IVTBpgme2LkAyRNPOKxKPE5Ryfb8O9qjgD8qFoiA1ozsu7EFE0Z9/Rqk8 # 4cbeSEfs3ona7Atp4Vjb6SxQgYFjGDlB43H0tjt6UrRKDp7ulM/Hpx9N96oEvr+s # FS9/5M9THX/JkjED/UJ+Ow3mjJ+TZHdAn+/N0bYvK61QpGQeV3lgEa7Xx8hzYx0V # aMYL7Zwea7M7OuTf1U0JtHqhpE4iAMv/UePbfUzs3zF3kt0adYNWzXmf1pdu4KO2 # ssdUPFHWHCJ3gTkcOB6yFOZidY/WZAQAG5gZWAUqBxPDLoUWk+QuDrzBDwv9igUx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfI+MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAzdw0o+uvyYUlT+tVAHlkF # wu7SSL/OnmFVN5R/VFJ5AjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPja # Ph0uMVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQggJX3 # U7IzUMEK7mnRzIEEZ3gJGNt/5ZfESO4QGjDmG2swDQYJKoZIhvcNAQELBQAEggIA # IPuoC7BL965oqNVfbViQw2nLcZ8YGAf+rjchN1L3eR4yjGGLYEogsb8se/+Ne6BY # YEL3GST+fhgYOndnQqNp/P4lrpMgRUSFBMQEwlVJemjn1GrX9a6jkWIK9lK44vT5 # i8YxHD1m1dHzokhIApqtbWdjLu6JoeGBF2SzUziWFKjA5rM+ETFhLORa0liAe/+z # 9LodFaSdqFAUyI8PR2cedN3Qqb7+5J2vEd+NzEkAp16ba8JVUSdo1b+BODIQqipn # 8w/DvqyHG6cuVO2Mu3uddgVbiwHES+KPuNB1PdRAMT/gSPQos99tpImx1Hwwqi4G # QlUokESO/8VKC8JkDIt1DcFCOT9ww1ePYxfZAUDfYPk0LikJ8QkaMLZ5A1UROv7A # SJqB7vxPGXnzL0HanjR6iwlEhQiqqshqCb8NOY5o/aFWIvScm7UqwrDyWJNCeNjg # O5+ZgT2oHUHDMTze80cb96donHUGoG9rCGRDgUJUHOhV/B1A6enowEnrTjehtFCO # 9w1DVTSAAUV+8wWeXPteoqxU2YP1lzelKHROl2YEpa9qcqBmG/LVVod7IpV1kAQm # Rz85nqZQyrEgx0NkC3EB+9gGV0mML1G+nfdkGoO4izi3yYRTCFPBgb5I3XaK5uZV # NT7aeVJO40YoDXImYvnsgFhsJ6gVHzwyCZJadivfstk= # SIG # End signature block
combined_dataset/train/non-malicious/Security group monitor_2.ps1
Security group monitor_2.ps1
#Get group membership for a list of security #groups and export to an XML for comparison #against baseline. # $script:WorkingDirectory = split-path $myinvocation.Mycommand.Definition -parent Function Re-Baseline { #First, declare array and hashtable. $securitygroups = @() $table = @{} #Import Security Group list from XML and add to "securitygroups" array. $securitygroupsxml = [XML] (gc "$script:WorkingDirectory\\sg.xml") $securitygroups += $securitygroupsxml.objs.S #Get membership for each group foreach($securitygroup in $securitygroups){ $dom = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $root = [ADSI] "LDAP://$($dom.Name)" $searcher = New-Object System.DirectoryServices.DirectorySearcher $root $searcher.filter = "(&(objectCategory=group)(objectClass=group)(sAMAccountName=$securitygroup))" $group = $searcher.findone() $table += @{"$securitygroup"= $group.properties.member} } #Export hashtable to XML. So nice. $table | export-clixml $script:WorkingDirectory\\baseline.xml } # #First, declare hashtable. $comparetable = @{} #Import Security Group list from XML and add to "securitygroups" array. $securitygroupsxml = [XML] (gc "$script:WorkingDirectory\\sg.xml") $securitygroups = $securitygroupsxml.objs.S #Get membership for each group and create a compare table. foreach($securitygroup in $securitygroups){ $dom = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $root = [ADSI] "LDAP://$($dom.Name)" $searcher = New-Object System.DirectoryServices.DirectorySearcher $root $searcher.filter = "(&(objectCategory=group)(objectClass=group)(sAMAccountName=$securitygroup))" $group = $searcher.findone() $comparetable += @{"$securitygroup"= $group.properties.member} } #Export hashtable to XML. So nice. $comparetable | export-clixml "$script:WorkingDirectory\\compare.xml" #Import baseline XML to hashtable. $baselinetable = @{} $baselinetable += import-clixml "$script:WorkingDirectory\\baseline.xml" #Import baseline XML to hashtable. $comparetable = @{} $comparetable += import-clixml "$script:WorkingDirectory\\compare.xml" #Compare respective Keys and Values for $comparetable against #$baselinetable and get differences. $passtoemailsubuser = @() $passtoemailbody = @() foreach($securitygroup in $securitygroups) { If($comparetable."$securitygroup" -eq $NULL) { If($baselinetable."$securitygroup" -eq $NULL) { (get-date).tostring() + " - Security Group $securitygroup is empty in the compare and the baseline" >> $script:WorkingDirectory\\log.txt } Else { foreach($entry in $baselinetable."$securitygroup") {$passtoemailbody += "`r" + $entry + " " + "`r`r" + "***WAS REMOVED FROM***: " + "`r`r" + $securitygroup + "`r`r"} $passtoemailbody += "`r" + $securitygroup + " " + "`r`r" + "in AD contains no more objects" + "`r`r" (get-date).tostring() + " - $securitygroup in AD contains no more objects" >> $script:WorkingDirectory\\log.txt } } Else { $baseline = @($baselinetable."$securitygroup") $compare = @($comparetable."$securitygroup") $results = Compare-Object $baseline $compare foreach($result in $results){ if (($result.equals.isinstance -eq $true) -and ($result.sideindicator -eq "=>")) {$passtoemailbody += "`r" + $result.inputobject + " " + "`r`r" + "***WAS ADDED TO***: " + "`r`r" + $securitygroup + "`r`r" $user = $result.inputobject $searcher.filter = "(&(objectCategory=person)(objectClass=user)(distinguishedname=$user))" $user = $searcher.FindOne() $passtoemailsubuser += $user.properties.samaccountname $mod = $true } if (($result.equals.isinstance -eq $true) -and ($result.sideindicator -eq "<=")) {$passtoemailbody += "`r" + $result.inputobject + " " + "`r`r" + "***WAS REMOVED FROM***: " + "`r`r" + $securitygroup + "`r`r" $user = $result.inputobject $searcher.filter = "(&(objectCategory=person)(objectClass=user)(distinguishedname=$user))" $user = $searcher.FindOne() $passtoemailsubuser += $user.properties.samaccountname $mod = $true }} } } if ($mod -eq $true) { $from = New-Object System.Net.Mail.MailAddress "from@address.com" $to = New-Object System.Net.Mail.MailAddress "to@address.com" $message = new-object System.Net.Mail.MailMessage $from, $to $message.Subject = "The following accounts were involved in a security group modification: $passtoemailsubuser" $message.Body = "Note the following security group modification information: `r`r $passtoemailbody" $server = "SMTPSERVERNAME" $client = new-object system.net.mail.smtpclient $server $client.port = 125 $client.Send($message) foreach($entry in $passtoemailbody) {(get-date).tostring() + " - " + $Entry >> $script:WorkingDirectory\\Log.txt} (get-date).tostring() + " - Group Membership compare has been baselined" >> $script:WorkingDirectory\\log.txt re-baseline } else { $from = New-Object System.Net.Mail.MailAddress "from@address.com" $to = New-Object System.Net.Mail.MailAddress "to@address.com" $message = new-object System.Net.Mail.MailMessage $from, $to $message.Subject = "No modifications to the audited security groups have been made." $message.Body = "No modifications to the audited security groups have been made." $server = "SMTPSERVERNAME" $client = new-object system.net.mail.smtpclient $server $client.port = 125 $client.Send($message) "No Changes have been made" }
combined_dataset/train/non-malicious/Get-User_2.ps1
Get-User_2.ps1
function Get-User($user) { # this function should be passed the CN of the user to be returned $dom = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $root = [ADSI] "LDAP://$($dom.Name)" $searcher = New-Object System.DirectoryServices.DirectorySearcher $root $searcher.filter = "(&(objectCategory=person)(objectClass=user)(cn=$user))" $user = $searcher.FindOne() [System.Collections.Arraylist]$names = $user.Properties.PropertyNames [System.Collections.Arraylist]$props = $user.Properties.Values $userobj = New-Object System.Object for ($i = 0; $i -lt $names.Count) { $userobj | Add-Member -type NoteProperty -Name $($names[$i]) -Value $($props[$i]) $i++ } $userobj.pwdlastset = [System.DateTime]::FromFileTime($userobj.pwdlastset) $userobj.lastlogontimestamp = [System.DateTime]::FromFileTime($userobj.lastlogontimestamp) return $userobj }
combined_dataset/train/non-malicious/sample_13_14.ps1
sample_13_14.ps1
ConvertFrom-StringData @' id_appliedsectemploutput=Applied Security Templates id_appliedsectemplobtaining=Gathering applied security templates '@ # SIG # Begin signature block # MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDMO44RTwPSzkwb # nqjwOLKr2rtbSa9yaD7TVGOq+rCar6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMfT # 8tUBctfXR2/YKi5tlzg2fBbKRz7CDW977mUbEuNAMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAer4bEJ7SlWq/sStroMJ9CuPyBp7UOZUVzo6F # GCl/AAfhAQgEmU6qsBE9TETzGfMT1Y8drv45+RGqWXDJy2rumDi7szon+0kUpP/P # XvIIhHW6P9dpDJNNJrM8fwS2hmvqw7bgJuonawF8tNuWmECndJMwbq+oMGrvq7ab # nh+q9zWg4C22MLKKslgjN4EVTATaacG5aM0AcROa6sA9gB3Bzg3/lAaJoXKSB7uz # 9K/qm6/CHHKZjgKQtFfgVSnsEJcyNrZRrTZz3Bja/wuaVt+d8x2MjFleZGFdHNzh # 82RK9vviW6z6hEbHxms+pcPt+XfK1rES19uZmf5/VcnVR2tnNaGCF68wgherBgor # BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCP/OyGFMMqnSyGXjXry2v4Q0zG2qn0IA7G # z1e2JHYCKgIGZutLSAOMGBIyMDI0MTAyODExNDA0MC40NFowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH/Ejh8 # 98Fl1qEAAQAAAf8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NEMxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ # 6JXSkHtuDz+pz+aSIN0lefMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1T # hUKQBkReq+TE/lA1O0Ebkil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGH # F8cVXu+G2aocsIKYPGFk+YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCed # xR22nXGMaYKl0EzKCT8rSHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9Mwq # NgPqkt4E/SFkOHk/d/jGEYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvR # J1HupCW/mnAM16tsrdhIQMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v3 # 98gSk8CULxiKzFdoZfhGkMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G # 5bN1SKvRneOI461oOrtd3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJp # uiLXa6xXxrG2VP90J48Lid1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0Dj # Lezob6BDfmj3SPaLpqZprwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj21 # 2xZMiBlZU5JL25QeFJiRuAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFMP6leT+tP93sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQA5I03kykuLK6ebzrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCn # pa2CiUitq2K9eM4bWUiNrIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86 # J699uwjNOT8bnX66JQmTvvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZm # Or87hn89yZUa2MamzZMK0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ # 3w3nqOmX2Si0uF293z1Fs6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd # 0thMAj3WBM1QXsED2rUS9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPL # Q8PzdoK3v1FrQh0MgxK7BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52B # F7y1d0auAOgF65U4r5xEKVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K26 # 6VhhxEr3mqKEXSKtCzr9Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDdd # FE7AC/TXogK5PyFjUifJbuPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJj # g4a4ZTVJdofj0lI/e3zIZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVy # c+TBEsVE9cWymaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snaZTAiGA8yMDI0MTAyODA5Mzk0OVoYDzIwMjQx # MDI5MDkzOTQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydplAgEAMAoCAQAC # AgU8AgH/MAcCAQACAhQpMAoCBQDqyyvlAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAC5Q0mZXZYSZmBYEzcnJMnCN3t5Hxb7Mh+9aVdlRs4Ds6h6ctOa91ofI # +MgGrNVVf46wKYwDisJIGIVXK3u8PunDoLSBDsbvikcTgar2Kxq7z1XrIVlvRypa # BzGly9Hn5cWIqjG02tn4gI1A0tIClGHW0Vn0Cc5rqkQATmkArMUWn+IpkZWd51Zx # aIPp3Jg+OInXRmWUMkCQh5L/CjIpVWoRHGKp+e+aHgX30Fpj7f3ssB8u9ZBpDtpj # yQ1q8MjADCb9YW1jNLAW/+CVOOA5Ke8WHeYrqB7VGJwwzdVOWr98Dm9KK7r1r7iz # APhAkFRjuT7rUWTleVm7qGj0XE7U7w4xggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCDgCnOm7m3+BXeVdUrXDY/61q84qgMcCmX4ROG7u3+vojCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONI # RXy6nKf9MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAH/Ejh898Fl1qEAAQAAAf8wIgQg7T5lmlzzvfxlHMbUmRWINSo0bA6YaFy+4mQP # 1xdlyRswDQYJKoZIhvcNAQELBQAEggIAW9Cnmwccf/woZbhRbVM/N1VFrHOrmCm4 # b4sgOxLhJoRAuEaoYlDZUNdxOEGmzQrqU9VDaWOElmNjMdOgSNbn1KVSf8VdJWn9 # TyFmAA2a+uITGJcIcok9npv9DU1SbbMS29FN2h4ur+/BQwzosKol4wu33qPDUhwR # gYJcFOTNg5pJRTYGp/LtWmu5jpiHoZciYoa6IbJGb3CQa92E1HAnfrFmwEbuBVAF # AdNoxwy03vLXbtNkrH/cSBuX13mIVjRK4wmLQINfWGd/ig4ybFWNNelclsWzW0Aj # gX+SBhvEwKmtG364L9zKWvRMGk6Mjyqs+LKieCFNAdDTrQV9PjubLeEX415CABKF # DJinhzfPjMw+DhV/jxPZY9a3LYtuUQ6SB5VOleA6zNi2yv3qZfBYtiV89EiT0XGg # 2fHWUIYEpYiY4p/HHExIH+8FreH10e+qlL+mp24otkEQFxOTN+1vN/eBcYWfYDTv # tDGdDCwcCXBRDkS+ijcZGqNRB65p1imcX8bK9fte50w/GtWyrhLLHW1a/dfVlbzV # r9vxHiloZ+uF7KsLy+6MplPUvbZsWYSzUNtSZps2T0CLLBbpkQx3ds9a91A9D5GB # xgVsdoBejt7YTB27aDTBsJ0YXeftkuue4Yx11cwaXF0J/o+cbLGAj9+oMges+2w5 # n5bU7Vz0rdA= # SIG # End signature block
combined_dataset/train/non-malicious/NPS Server Synchronize.ps1
NPS Server Synchronize.ps1
###Network Policy Server Synchronization Script #This script copies the configuration from the NPS Master Server and imports it on this server. #The Account that this script runs under must have Local Administrator rights to the NPS Master. #This was designed to be run as a scheduled task on the NPS Secondary Servers on an hourly,daily, or as-needed basis. #Last Modified 01 Dec 2009 by JGrote <jgrote AT enpointe NOSPAM-DOTCOM> ###Variables #NPSMaster - Your Primary Network Policy Server you want to copy the config from. $NPSMaster = "Server1" #NPSConfigTempFile - A temporary location to store the XML config. Use a UNC path so that the primary can save the XML file across the network. Be sure to set secure permissions on this folder, as the configuration including pre-shared keys is temporarily stored here during the import process. $NPSConfigTempFile = "\\\\server2\\C$\\Temp\\NPSConfigTemp\\NPSConfig-$NPSMaster.xml" #Create an NPS Sync Event Source if it doesn't already exist if (!(get-eventlog -logname "System" -source "NPS-Sync")) {new-eventlog -logname "System" -source "NPS-Sync"} #Write an error and exit the script if an exception is ever thrown trap {write-eventlog -logname "System" -eventID 1 -source "NPS-Sync" -EntryType "Error" -Message "An Error occured during NPS Sync: $_. Script run from $($MyInvocation.MyCommand.Definition)"; exit} #Connect to NPS Master and export configuration $configExportResult = invoke-command -ComputerName $NPSMaster -ArgumentList $NPSConfigTempFile -scriptBlock {param ($NPSConfigTempFile) netsh nps export filename = $NPSConfigTempFile exportPSK = yes} #Verify that the import XML file was created. If it is not there, it will throw an exception caught by the trap above that will exit the script. $NPSConfigTest = Get-Item $NPSConfigTempFile #Clear existing configuration and import new NPS config $configClearResult = netsh nps reset config $configImportResult = netsh nps import filename = $NPSConfigTempFile #Delete Temporary File remove-item -path $NPSConfigTempFile #Compose and Write Success Event $successText = "Network Policy Server Configuration successfully synchronized from $NPSMaster. Export Results: $configExportResult Import Results: $configImportResult Script was run from $($MyInvocation.MyCommand.Definition)" write-eventlog -logname "System" -eventID 1 -source "NPS-Sync" -EntryType "Information" -Message $successText
combined_dataset/train/non-malicious/Start-Countdown.ps1
Start-Countdown.ps1
function Start-Countdown{ <# .Synopsis Initiates a countdown on your session. Can be used instead of Start-Sleep. Use case is to provide visual countdown progress during "sleep" times .Example Get-Countdown -Seconds 10 This method will clear the screen and display descending seconds .Example Get-Countdown -Seconds 10 -ProgressBar This method will display a progress bar on screen without clearing. .Link http://www.vtesseract.com/ .Description ==================================================================== Author(s): Josh Atwell <josh.c.atwell@gmail.com> File: Start-Countdown.ps1 Date: 2012-04-19 Revision: 1.0 References: www.vtesseract.com ==================================================================== Disclaimer: This script is written as best effort and provides no warranty expressed or implied. Please contact the author(s) if you have questions about this script before running or modifying ==================================================================== #> Param( [INT]$Seconds = (Read-Host "Enter seconds to countdown from"), [Switch]$ProgressBar, [String]$Message = "Blast Off!" ) Clear-Host while ($seconds -ge 1){ If($ProgressBar){ Write-Progress -Activity "Countdown" -SecondsRemaining $Seconds -Status "Time Remaining" Start-Sleep -Seconds 1 }ELSE{ Write-Output $Seconds Start-Sleep -Seconds 1 Clear-Host } $Seconds -- } Write-Output $Message }
combined_dataset/train/non-malicious/sample_65_84.ps1
sample_65_84.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ [CmdletBinding(DefaultParametersetName="Unsecure")] param ( [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $ExistingClientConnectionEndpoint, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [switch] $Force, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [switch] $X509Credential, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $ServerCertThumbprint, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreLocation, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreName, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $FindValueThumbprint ) if(-not $Force) { $confirmation = Read-Host ("Do you want to remove the current node? [Y] Yes [N] No (default is 'N')") if($confirmation -ne 'Y') { Write-Host "The current node is not removed." -ForegroundColor Red exit 1 } } $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } [System.Collections.ArrayList]$IpAddr = (Get-NetIPAddress | select-object IPAddress).IPAddress [void]$IpAddr.Add("localhost") [void]$IpAddr.Add([System.Net.Dns]::GetHostName()) $IsClientEndpointLocal = ($null -ne ($IpAddr | ? {$ExistingClientConnectionEndpoint -match $_})) if($IsClientEndpointLocal) { Write-host "Please provide a client connection endpoint for another node, not the node to be removed." -ForegroundColor "Red" exit 1 } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" if(!$(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!$(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!$(Test-Path $SystemFabricModulePath)) { Write-Host "Run the script local to the Standalone package directory." exit 1 } $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" # Invoke in separate AppDomain if($X509Credential.IsPresent) { $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $ExistingClientConnectionEndpoint, $true, $ServerCertThumbprint, $StoreLocation, $StoreName, $FindValueThumbprint) } else { $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $ExistingClientConnectionEndpoint) } Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $DeployerBinPath, [Parameter(Mandatory=$true)] [string] $ServiceFabricPowershellModulePath, [Parameter(Mandatory=$true)] [string] $ExistingClientConnectionEndpoint, [Parameter(Mandatory=$false)] [bool] $X509Credential, [Parameter(Mandatory=$false)] [string] $ServerCertThumbprint, [Parameter(Mandatory=$false)] [string] $StoreLocation, [Parameter(Mandatory=$false)] [string] $StoreName, [Parameter(Mandatory=$false)] [string] $FindValueThumbprint ) #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath #Remove Node Try { # Connect to the existing cluster if($X509Credential) { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint } else { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint } Get-ServiceFabricNode | ft Remove-ServiceFabricNode -Force -Verbose } Catch { Write-Host "Remove node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } -args $argList -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCm3I9tJF9v/Xen # UzJQkmoTYvfssXLWLhgV6P7w8tSgRaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILhfTuMOzA6U2oyOU8WXNlcj # GEknV5aCSqOOoBkdg0lBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAqnwLg6+Xew86rNWlt4lwMWoyAd73+ZxNF7K3Epn8eTD7sYLPEIFqhOmV # tXjq0UK2194dS/y5RxLIvWRimwo4ylkLrDwDlyoxZG9zTV/t1G/dg/9LjaIKb0n/ # YUSly2NIj+U0fDeAnZIYzQ3UMJzXSGrLOU8kBsGvGg19LmhTg2O8ezSpuz7ZjLm1 # nipJCt5gIxQTcLfQuLCOhyuLqtIfk04jmvo9hYUJhilDMLaIi4h59jTl1sTV3oZ2 # l6QQ1qD6ggOZ02/zV6RhNOUs4vJ/EIvR1TFhrM/3CAVoIuIpNwvLlhtm/NqEAxF1 # eN38tz8W5EeivP4srr3yBEuxUXykEKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDLE/hr4dWxCcYgJ3k/h4EAYdxCdU33ZtuYZjoR8Q9auAIGZbqfp6Kx # GBMyMDI0MDIxNTE3NTAxMS4yOTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl4OVUwIhgPMjAyNDAyMTUxNTE4NDVaGA8yMDI0MDIxNjE1MTg0NVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6Xg5VQIBADAKAgEAAgIBcwIB/zAHAgEAAgIR0DAK # AgUA6XmK1QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKCvblXsjSLTfd3P # 2QAQZYrNwkQ+oIyY49nPcXdtze0vTtWfJp93KvNmW7EacU5+5PJvRdZwUMOgaWcg # EEzMxyxYm8/DmXBrrpJhnYLohJO7QNl5GLxhMXF+RS/JBObcDi9W3g5gSeo8C+3x # c2BhlJiOuQ3e9kXbp7yyoJsu+4rvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgPqmRxoyIawBO5hGnIxZ6wuI22vWREM8e9pbO4zmkXtMwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIB7rxM/LsedRyf1X20Ifl3wW+XS9YShocIhKX9T9 # BZOBMA0GCSqGSIb3DQEBCwUABIICAGHfLu29pNXqC+7yAL/axzC4hCKXEQrMVV/w # fCQd/m+NMtAizNC7Aj/EMNGi4b76UxyV4reh/dZdBiEj9gz2RNI308mJeiZ+eqgB # FRRS0nhSIzmhqSaKMlqni/wRrdYoas71cV5lJHgBr35IbkcDLRqobQav/cWO9GDW # fNY+PD2b013Sftv7aTpFKy7dk/6aA2c8HJTr6iSaQNg2njGfdtlAEhB3bLEIfum4 # HTgTHTI1lAjAmHpP7zNIc4ToMwKU01MiQMuVHkksbgjy94rAnjskn26Iija7m+jw # GVOmy8IXzKLGWTExgXS4hnqfPkrz7RO3UaHUg384deutIGQRQHcwCDgJXii0fewp # 0UD4s7KQmFUhZ0iW7qbhae5Ua2m9T2iLGPv3Z+DGkeIT2Fyf7qutSB0Dgq4a7rOL # bi3J7zBVZcfJSbA8mSw78LDDjkVP8qVvM85L9CYnnTHLw22L6bSRG6nBgUuZEXCA # /t9ydw4o5FLq2Nmzi+zSpmkdIoB8sVsZWQmBwyCBpyEh2hXJqYjLUusPmBf3KWkz # foIP0zVMUQK0+crUrxMjlhTM1hcP5wa3yosu9bWyL64DXcmCSjtYNEvvlgND30g/ # lUDlmsmcxOP4NbPTglF2bFvy0DmaXsNEIOxzfLBqikruI+Is8+/StlhbpWs8MqNz # LKbau7Oj # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_26.ps1
sample_1_26.ps1
# # Module manifest for module 'OCI.PSModules.Cims' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cims.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '368f2b49-11f4-438a-ad66-755a6282f6fd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cims Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cims.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCICimsUser', 'Get-OCICimsCsiNumber', 'Get-OCICimsIncident', 'Get-OCICimsIncidentResourceTypesList', 'Get-OCICimsIncidentsList', 'Get-OCICimsStatus', 'New-OCICimsIncident', 'Update-OCICimsIncident' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cims' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/List Object Discoveries.ps1
List Object Discoveries.ps1
# Enumerate OpsMgr 2007 Object Discoveries targeted to Windows Server # Date: 13/10/2008 # Author: Stefan Stranger (help from Jeremy Pavleck and Marco Shaw) get-discovery |? {$_.Target -match (get-monitoringclass | where {$_.Name -eq "Microsoft.Windows.Server.Computer"}).Id} | select Name, DisplayName
combined_dataset/train/non-malicious/Compare Table & DataRow_1.ps1
Compare Table & DataRow_1.ps1
function Compare-DataRow { param( $a, $b) # @bernd_k http://pauerschell.blogspot.com/ $diff = '' $a_columncount = $a.Table.columns.count $b_columncount = $b.Table.columns.count if ( $a_columncount -ne $b_columncount) { Write-host "Tables have different number of columns" } foreach ( $i in 0..($a_columncount - 1)) { if ($a.item($i) -ne $b.item($i)) { $diff += ' ' + $a.item($i) + ' <> ' + $b.item($i) +';' } } $diff } function Compare-Table { param( $a, $b) # @bernd_k http://pauerschell.blogspot.com/ $diff = '' $a_rowcount = $a.Rows.count $b_rowcount = $b.Rows.count if ( $a_rowcount -ne $b_rowcount1) { Write-host "Tables have different number of columns" } foreach ( $i in 0..($a_rowcount - 1)) { Compare-DataRow $a.rows[$i] $b.rows[$i] } $diff } Compare-DataRow $a.tables[0].rows[0] $b.tables[0].rows[0] Compare-Table ($a.tables[0]) ($b.tables[0])
combined_dataset/train/non-malicious/sample_4_49.ps1
sample_4_49.ps1
# # Module manifest for module 'OCI.PSModules.Databasemigration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemigration.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '75c40824-63ca-4f44-8abc-b6d5cb895ad8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemigration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemigration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemigrationMigrationObjects', 'Connect-OCIDatabasemigrationionDiagnostics', 'Get-OCIDatabasemigrationAdvisorReport', 'Get-OCIDatabasemigrationConnection', 'Get-OCIDatabasemigrationConnectionsList', 'Get-OCIDatabasemigrationExcludedObjectsList', 'Get-OCIDatabasemigrationJob', 'Get-OCIDatabasemigrationJobOutputContent', 'Get-OCIDatabasemigrationJobOutputsList', 'Get-OCIDatabasemigrationJobsList', 'Get-OCIDatabasemigrationMigration', 'Get-OCIDatabasemigrationMigrationObjectsList', 'Get-OCIDatabasemigrationMigrationObjectTypesList', 'Get-OCIDatabasemigrationMigrationParametersList', 'Get-OCIDatabasemigrationMigrationsList', 'Get-OCIDatabasemigrationParameterFileVersion', 'Get-OCIDatabasemigrationParameterFileVersionsList', 'Get-OCIDatabasemigrationWorkRequest', 'Get-OCIDatabasemigrationWorkRequestErrorsList', 'Get-OCIDatabasemigrationWorkRequestLogsList', 'Get-OCIDatabasemigrationWorkRequestsList', 'Invoke-OCIDatabasemigrationCloneMigration', 'Invoke-OCIDatabasemigrationEvaluateMigration', 'Invoke-OCIDatabasemigrationMakeCurrentParameterFileVersion', 'Invoke-OCIDatabasemigrationResumeJob', 'Invoke-OCIDatabasemigrationRetrieveSupportedPhases', 'Invoke-OCIDatabasemigrationSuspendJob', 'Move-OCIDatabasemigrationConnectionCompartment', 'Move-OCIDatabasemigrationMigrationCompartment', 'New-OCIDatabasemigrationConnection', 'New-OCIDatabasemigrationMigration', 'New-OCIDatabasemigrationParameterFileVersion', 'Remove-OCIDatabasemigrationConnection', 'Remove-OCIDatabasemigrationJob', 'Remove-OCIDatabasemigrationMigration', 'Remove-OCIDatabasemigrationMigrationObjects', 'Remove-OCIDatabasemigrationParameterFileVersion', 'Start-OCIDatabasemigrationMigration', 'Stop-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationConnection', 'Update-OCIDatabasemigrationJob', 'Update-OCIDatabasemigrationMigration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemigration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2623.ps1
2623.ps1
param([string]$DName ) configuration LabDC_DHCP{ param( [string[]] $ComputerName = 'localhost' ,[string] $DomainName ) Import-DscResource -Module xDHCPServer xDhcpServerScope DHCPScope { Ensure = 'Present' IPStartRange = '10.10.10.10' IPEndRange = '10.10.10.250' Name = 'LabDomainScope' SubnetMask = '255.255.255.0' LeaseDuration = '00:24:00' State = 'Active' AddressFamily = 'IPv4' } xDhcpServerOption DHCPOption { Ensure = 'Present' ScopeID = '10.10.10.0' DnsDomain = $DomainName DnsServerIPAddress = '10.10.10.1' AddressFamily = 'IPv4' DependsOn = '[xDhcpServerScope]DHCPScope' } } If(!(Test-Path 'C:\Temp')){New-Item -ItemType Directory 'C:\Temp'} Set-Location 'C:\Temp' $config = @{AllNodes = @(@{NodeName = 'localhost';PSDscAllowPlainTextPassword = $true})} LabDC_DHCP -DomainName $DName -ConfigurationData $config Start-DscConfiguration -Path .\LabDC_DHCP -Verbose -Force -Wait -debug
combined_dataset/train/non-malicious/486.ps1
486.ps1
function Add-HostFileEntry{ [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $IP, [Parameter(Mandatory=$true)] [String] $DNS ) $HostFile = "$env:windir\System32\drivers\etc\hosts" [string]$LastLine = Get-Content $HostFile | select -Last 1 if($IP -match [regex]"(([2]([0-4][0-9]|[5][0-5])|[0-1]?[0-9]?[0-9])[.]){3}(([2]([0-4][0-9]|[5][0-5])|[0-1]?[0-9]?[0-9]))"){ if(!(Get-HostFileEntries | where{$_.DNS -eq $DNS})){ if($LastLine -ne ""){ Add-Content -Path $HostFile -Value "`n" } Write-Host "Add entry to hosts file: $IP`t$DNS" Add-Content -Path $HostFile -Value "$IP $DNS" Set-Content -Path $HostFile -Value (Get-Content -Path $HostFile | %{if($_.StartsWith(" }else{ Write-Error "$DNS is already in use!" } }else{ Write-Error "IP address is not valid!" } }
combined_dataset/train/non-malicious/sample_16_91.ps1
sample_16_91.ps1
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
combined_dataset/train/non-malicious/sample_66_9.ps1
sample_66_9.ps1
<# : batch portion @REM ---------------------------------------------------------------------------- @REM Licensed to the Apache Software Foundation (ASF) under one @REM or more contributor license agreements. See the NOTICE file @REM distributed with this work for additional information @REM regarding copyright ownership. The ASF licenses this file @REM to you under the Apache License, Version 2.0 (the @REM "License"); you may not use this file except in compliance @REM with the License. You may obtain a copy of the License at @REM @REM http://www.apache.org/licenses/LICENSE-2.0 @REM @REM Unless required by applicable law or agreed to in writing, @REM software distributed under the License is distributed on an @REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY @REM KIND, either express or implied. See the License for the @REM specific language governing permissions and limitations @REM under the License. @REM ---------------------------------------------------------------------------- @REM ---------------------------------------------------------------------------- @REM Apache Maven Wrapper startup batch script, version 3.3.2 @REM @REM Optional ENV vars @REM MVNW_REPOURL - repo url base for downloading maven distribution @REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven @REM MVNW_VERBOSE - true: enable verbose log; others: silence the output @REM ---------------------------------------------------------------------------- @IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) @SET __MVNW_CMD__= @SET __MVNW_ERROR__= @SET __MVNW_PSMODULEP_SAVE=%PSModulePath% @SET PSModulePath= @FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) ) @SET PSModulePath=%__MVNW_PSMODULEP_SAVE% @SET __MVNW_PSMODULEP_SAVE= @SET __MVNW_ARG0_NAME__= @SET MVNW_USERNAME= @SET MVNW_PASSWORD= @IF NOT "%__MVNW_CMD__%"=="" (%__MVNW_CMD__% %*) @echo Cannot start maven from wrapper >&2 && exit /b 1 @GOTO :EOF : end batch / begin powershell #> $ErrorActionPreference = "Stop" if ($env:MVNW_VERBOSE -eq "true") { $VerbosePreference = "Continue" } # calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties $distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl if (!$distributionUrl) { Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" } switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { "maven-mvnd-*" { $USE_MVND = $true $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" $MVN_CMD = "mvnd.cmd" break } default { $USE_MVND = $false $MVN_CMD = $script -replace '^mvnw','mvn' break } } # apply MVNW_REPOURL and calculate MAVEN_HOME # maven home pattern: ~/.m2/wrapper/dists/{apache-maven-<version>,maven-mvnd-<version>-<platform>}/<hash> if ($env:MVNW_REPOURL) { $MVNW_REPO_PATTERN = if ($USE_MVND) { "/org/apache/maven/" } else { "/maven/mvnd/" } $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace '^.*'+$MVNW_REPO_PATTERN,'')" } $distributionUrlName = $distributionUrl -replace '^.*/','' $distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' $MAVEN_HOME_PARENT = "$HOME/.m2/wrapper/dists/$distributionUrlNameMain" if ($env:MAVEN_USER_HOME) { $MAVEN_HOME_PARENT = "$env:MAVEN_USER_HOME/wrapper/dists/$distributionUrlNameMain" } $MAVEN_HOME_NAME = ([System.Security.Cryptography.MD5]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' $MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" exit $? } if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" } # prepare tmp dir $TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile $TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" $TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null trap { if ($TMP_DOWNLOAD_DIR.Exists) { try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } } } New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null # Download and Install Apache Maven Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." Write-Verbose "Downloading from: $distributionUrl" Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" $webclient = New-Object System.Net.WebClient if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) } [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 $webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null # If specified, validate the SHA-256 sum of the Maven distribution zip file $distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum if ($distributionSha256Sum) { if ($USE_MVND) { Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." } Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." } } # unzip and move Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null Rename-Item -Path "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" -NewName $MAVEN_HOME_NAME | Out-Null try { Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null } catch { if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { Write-Error "fail to move MAVEN_HOME" } } finally { try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } } Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD"
combined_dataset/train/non-malicious/sample_7_22.ps1
sample_7_22.ps1
# Load Common Library # Load Reporting Utilities #_#$debug = $false . ./utils_cts.ps1 . ./TS_RemoteSetup.ps1 trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } if (FirstTimeExecution) { $RemoteServerCore = .\DC_ServerCoreR2Setup.ps1 if ($null -ne $RemoteServerCore) { $ExpressionArray = @() $ItemNumber = 0 $ExpressionToRunOnMachine = @' Run-DiagExpression .\DC_BasicSystemInformation.ps1 -MachineName $Env:COMPUTERNAME Run-DiagExpression .\DC_ClusterLogs.ps1 -LocalOnly .\TS_AutoAddCommands_Remote.ps1 '@ foreach ($MachineName in $RemoteServerCore){ if ($ItemNumber -eq 0) { #Execute TS_BasicClusterInfo only in one node $ExpressionArray += ($ExpressionToRunOnMachine + "`n Run-DiagExpression .\TS_BasicClusterInfo.ps1") } else { $ExpressionArray += $ExpressionToRunOnMachine } $ItemNumber += 1 } ExecuteRemoteExpression -ComputerNames $RemoteServerCore -Expression $ExpressionArray -ShowDialog } EndDataCollection } else { #2nd execution. Delete the temporary flag file then exit EndDataCollection -DeleteFlagFile $True } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFaAaTMsscIVly # MmnV8ktOXwNJG3XmWISHrBzwlPhgeaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII52 # Ix9/YCc3nkdd+tR3JZmWQU9EPuAL2R1c686PDrc2MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmXfOe64uqNoEaWbHiMzG4gB/UhsLAqsWRDDa # mFo3JmaEIhywJY8+Ze3MyfjLpt2hQhVEQGnFa+e/Ma6D86hpQsk6vuWqE70tiLq7 # eBf0UNXBZq4Y1YDJwxRM7bJrhDZFjJkgrygTEHDc/+T4f4oUnzTiPwqDSH1eeS+A # c1Xxp6+NxAEbY6KwmziEcDc7iY2RHbFHJoXXv2LjZ7J6arPCvkADoGFdjHT5YKXX # 0G7EvzG+BqK8e9f59MAt4LqLhyHT5olvBA6UzklwmAiCAtRiyaOptnepmf08/Lep # WWFJ3KrYDgbbzGp1K1I+u9VRuIvrOoOGl7qrGLmEMBmYT6DCA6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAG5blKJpjaCJgHMULK3AVmiiLFfQVhK0Gn # r66lMR/PHAIGZutgsUn5GBMyMDI0MTAyODExNDA0Mi4zNThaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdG # hcDLPznlAAEAAAH0MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU5MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # pwhOE6bQgC9qq4jJGX2A1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEV # zZ2y2ygGgNZ3/xdZQN7f9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwm # XeCj81EzJEIZquVdV8STlQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IE # xqKYojGreCopnIKxOvkr5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnu # o+kDEyZwpkphsR8Zvdi+s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tu # e+LcuOcHAPgbwZvQLksKaK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEW # OEvibig7wsrTa6ZbzuMsyTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIp # MGfA3BT850nqamzSiD5L5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T2 # 6FjR9/I85i5ExxmhHpxM2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+ # Fy+ZywHAp9c9oWTrtjfIKqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcX # Wy16ANy73v0ipCxAwUEC9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBQrdGWhCtEsPid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA3cHSDxJKUDsgacIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3 # gOeCt/ObDO45vfpnYG5OS5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQi # Jh9upsE4TVZeKYXmbyx7WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA1 # 3vS3euqUl6zwe7GAhjfjNXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDC # egq8adlGH85I1EWKmfERb1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8 # jcYVDH4A2C/MbLBIwikjwiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh # 95UVOrQL2rbWHrHDSE3dgdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5 # A4uITgyJcVdWVaN0qjs0eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIld # yfzZqln6FsnLQ3bl+ZvVJWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6 # XfYvrZQN4XKbnvSqBNAwIPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvF # HlSG6uMIWjwH0GQIIwrC2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17X # ek4iG9R9c/7+AI6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0 # MTAyOTExMTExMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEA # AgIRQTAHAgEAAgITcjAKAgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAhvpi0fcwW36VjkxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe # 97LNopMBBaWBVq2RlfPasIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvs # FxcDLB5CurWs+Z+iXqcdrGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB # 9T76pHsFqwSZHJ4+hXZB9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S # 6Qpt3I6sMkaFL+Dn9fLJwn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn # +yis2mNx8vI42scFI8SUP7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgI9rDGs5UDW+eHBjbc5arcmPJtKmmHKkGWRK4NAPwlw0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60 # RBjWazCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9BdGhcDLPznlAAEAAAH0MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaN # J5IJMA0GCSqGSIb3DQEBCwUABIICABbirr6m8o67PYuuI9ScQGZCZtqWtKWuBRoe # B3GoXPNLOmC/W0z4U7p23H3QEXRvCXQ3UUbblHTsr0GEegoBVF8J1QPMQD/JDC9k # J1uOA9EvDEwFr1hz+qaW3nCrp6ZDo6nqtIPsFr3rsrI1QGRl72zRy/8iRLHHF1c9 # 80t7pGsaIpZ3LBLtJWHZXljZOPkpN66FwbxEs3Vl/eAZWYVMCdTGSYTu3Nc2FBpF # O/zuFdJ24fY1OABGFiTL3hT19YnmDqokFfyBGRdGKHC75QFBYlSBntczOqi9OSBG # sTZdhwQrFVImunvHMBknJE8Tdq1A4GXQuJeLkMYZNP474rGNQT9cFirUTqLqjpzt # CpjX0/uBZNHVOlKQRc61n3hRl3iELf5BDSMvSdS3AJDfOV2ZTnikN9EISOFSNcH1 # DnUrM6hv2vzMuowoOSM4P6aWRm0eLSLV9rS9e0xuMBGJxDMWAwsE7XJpAbTBwhb5 # IVwykcA1A1yPYoApn+Vn6MsAqwTbIaHMq/bi75GUH/9qxToi1SVpox+jzoqypOC3 # 1oofYa7A7tKBTWZcm1IwSgp8pQnluo2kgMrpuziyWc99ki9IYqiC1ixj6E9DdKrF # bSHwmN28c9LnsRSeeg3g41fQeY2HlaaOaZkA56pyB93yJCEg9EF2KEDjo100NNsR # qqIby4/i # SIG # End signature block
combined_dataset/train/non-malicious/sample_20_67.ps1
sample_20_67.ps1
<######################################################################################################### # File: Run-Task.ps1 # # .DESCRIPTION # # Run powershell scripts using scheduled task. It requires two pre-defined variables ($taskName and $script). # # Copyright (c) Microsoft Corp 2016. # #########################################################################################################> $ScriptFile = $env:LocalAppData + "\$taskName.ps1" $ResultFile = $env:temp + "\$taskName.log" if (Test-Path $ResultFile) { Remove-Item $ResultFile } $Script | Out-File $ScriptFile if (-Not(Test-Path $ScriptFile)) { $message = "Failed to create file:" + $ScriptFile Write-Error $message return #If failed to create script file, no need continue just return here } #Create a scheduled task $User = [Security.Principal.WindowsIdentity]::GetCurrent() $Role = (New-Object Security.Principal.WindowsPrincipal $User).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator) $arg = "-NoProfile -NoLogo -NonInteractive -ExecutionPolicy Bypass -c $ScriptFile >> $ResultFile 2>&1" if(!$Role) { Write-Warning "To perform some operations you must run an elevated PowerShell console." } $Scheduler = New-Object -ComObject Schedule.Service #Try to connect to schedule service 3 time since it may fail the first time for ($i=1; $i -le 3; $i++) { Try { $Scheduler.Connect() Break } Catch { if($i -ge 3) { Write-EventLog -LogName Application -Source "SME Register $taskName" -EntryType Error -EventID 1 -Message "Can't connect to Schedule service" Write-Error "Can't connect to Schedule service" -ErrorAction Stop } else { Start-Sleep -s 1 } } } $RootFolder = $Scheduler.GetFolder("\") #Delete existing task if($RootFolder.GetTasks(0) | Where-Object {$_.Name -eq $TaskName}) { Write-Debug("Deleting existing task" + $TaskName) $RootFolder.DeleteTask($TaskName,0) } $Task = $Scheduler.NewTask(0) $RegistrationInfo = $Task.RegistrationInfo $RegistrationInfo.Description = $TaskName $RegistrationInfo.Author = $User.Name $Triggers = $Task.Triggers $Trigger = $Triggers.Create(7) #TASK_TRIGGER_REGISTRATION: Starts the task when the task is registered. $Trigger.Enabled = $true $Settings = $Task.Settings $Settings.Enabled = $True $Settings.StartWhenAvailable = $True $Settings.Hidden = $False $Settings.ExecutionTimeLimit = "PT20M" # 20 minutes $Action = $Task.Actions.Create(0) $Action.Path = "powershell" $Action.Arguments = $arg #Tasks will be run with the highest privileges $Task.Principal.RunLevel = 1 #Start the task to run in Local System account. 6: TASK_CREATE_OR_UPDATE $RootFolder.RegisterTaskDefinition($TaskName, $Task, 6, "SYSTEM", $Null, 1) | Out-Null #Wait for running task finished $RootFolder.GetTask($TaskName).Run(0) | Out-Null while($Scheduler.GetRunningTasks(0) | Where-Object {$_.Name -eq $TaskName}) { Start-Sleep -s 1 } #Clean up $RootFolder.DeleteTask($TaskName,0) Remove-Item $ScriptFile if (Test-Path $ResultFile) { Get-Content -Path $ResultFile | Out-String -Stream Remove-Item $ResultFile } # TODO: output errors occurred # SIG # Begin signature block # MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQmEClCN3KaY3c # V9q63zAitqvwWUSgYxISuu1ZiGGSh6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC3Q # e5mmi/p8JWN1soxZ8mKHM7Tm9KaDR0i5hIk0q2FHMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAtQQkeO4zkiTnXFHDFiRg7QVyGnY/+riQJhFl # dUoy76mtSGA3ZlR3pCHxwJvxS8yQDig8iDjctplS+x4kZSi2Zr1viRSbUtZceLoE # 2RfrDSvFqE4+I/ouIKhlnImCl/EcHYk64Vl3JZqHzeVgilhU6IFgE9fmYhCHl8L5 # sYZRT0/QGw+c4CLUcMiLSyUHovNP/2tsx0DC7Ayxnsn6JqQIvYIjrcugIFv+qU/R # Uvt3nSe+PLY1tnc+p9na4q+ZPvTCIklfQfCDtueAuQrXKDY4ZyO3ujlzir+zguqi # ydmxujOsQGiYRdbWRSRiIbq0/Ho3u5dEVXWJ7tsk1BplNfi76qGCF5YwgheSBgor # BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAMTFEFNR2batdkOjy7Ivm/qLYT/kRMYRG9 # 9MPRExPpGgIGZeeoDsRJGBIyMDI0MDMwODEwMDMxNi4yNVowBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjpFMDAyLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB7gXTAjCymp2nAAEA # AAHuMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDU0NFoXDTI1MDMwNTE4NDU0NFowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL7xvKXXooSJrzEpLi9UvtEQ # 45HsvNgItcS1aB6rI5WWvO4TP4CgJri0EYRKNsdNcQJ4w7A/1M94popqV9NTldIa # OkmGkbHn1/EwmhNhY/PMPQ7ZECXIGY4EGaIsNdENAkvVG24CO8KIu6VVB6I8jxXv # 4eFNHf3VNsLVt5LHBd90ompjWieMNrCoMkCa3CwD+CapeAfAX19lZzApK5eJkFNt # Tl9ybduGGVE3Dl3Tgt3XllbNWX9UOn+JF6sajYiz/RbCf9rd4Y50eu9/Aht+TqVW # rBs1ATXU552fa69GMpYTB6tcvvQ64Nny8vPGvLTIR29DyTL5V+ryZ8RdL3Ttjus3 # 8dhfpwKwLayjJcbc7AK0sDujT/6Qolm46sPkdStLPeR+qAOWZbLrvPxlk+OSIMLV # 1hbWM3vu3mJKXlanUcoGnslTxGJEj69jaLVxvlfZESTDdas1b+Nuh9cSz23huB37 # JTyyAqf0y1WdDrmzpAbvYz/JpRkbYcwjfW2b2aigfb288E72MMw4i7QvDNROQhZ+ # WB3+8RZ9M1w9YRCPt+xa5KhW4ne4GrA2ZFKmZAPNJ8xojO7KzSm9XWMVaq2rDAJx # pj9Zexv9rGTEH/MJN0dIFQnxObeLg8z2ySK6ddj5xKofnyNaSkdtssDc5+yzt74l # syMqZN1yOZKRvmg3ypTXAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUEIjNPxrZ3CCe # vfvF37a/X9x2pggwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAHdnIC9rYQo5ZJWk # GdiTNfx/wZmNo6znvsX2jXgCeH2UrLq1LfjBeg9cTJCnW/WIjusnNlUbuulTOdrL # af1yx+fenrLuRiQeq1K6AIaZOKIGTCEV9IHIo8jTwySWC8m8pNlvrvfIZ+kXA+ND # Bl4joQ+P84C2liRPshReoySLUJEwkqB5jjBREJxwi6N1ZGShW/gner/zsoTSo9CY # BH1+ow3GMjdkKVXEDjCIze01WVFsX1KCk6eNWjc/8jmnwl3jWE1JULH/yPeoztot # Iq0PM4RQ2z5m2OHOeZmBR3v8BYcOHAEd0vntMj2HueJmR85k5edxiwrEbiCvJOyF # TobqwBilup0wT/7+DW56vtUYgdS0urdbQCebyUB9L0+q2GyRm3ngkXbwId2wWr/t # dUG0WXEv8qBxDKUk2eJr5qeLFQbrTJQO3cUwZIkjfjEb00ezPcGmpJa54a0mFDlk # 3QryO7S81WAX4O/TmyKs+DR+1Ip/0VUQKn3ejyiAXjyOHwJP8HfaXPUPpOu6TgTN # zDsTU6G04x/sMeA8xZ/pY51id/4dpInHtlNcImxbmg6QzSwuK3EGlKkZyPZiOc3O # cKmwQ9lq3SH7p3u6VFpZHlEcBTIUVD2NFrspZo0Z0QtOz6cdKViNh5CkrlBJeOKB # 0qUtA8GVf73M6gYAmGhl+umOridAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAIijptU29+UXFtRYINDdhgrLo76ToIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDplMk+MCIY # DzIwMjQwMzA3MjMxNjE0WhgPMjAyNDAzMDgyMzE2MTRaMHcwPQYKKwYBBAGEWQoE # ATEvMC0wCgIFAOmUyT4CAQAwCgIBAAICGQcCAf8wBwIBAAICE40wCgIFAOmWGr4C # AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK # MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAHxJBQw7rJ+NpQDPOhJb1nCON # kHmpdpMqQJQNxYKjy7xFIUf2SMkYMinQoBBjEijt/vcu1gu+CdRhRMQ71rUFVy7B # owkG0FWhTUN7ZIdEY1rRXxqiVn8JqgcU/NaTh0m9hFzToeW8c2WmpLdEsm+tOgd/ # B/OyQB29IbpQgyg8/nmShSclhdgxaHjEkBVrAiYbwC+3oTEZbZDvqcxWqWmHRzvp # 7SWHZpnBYb/mHSSBe+rBVn7AZ/KwEGNLmmb9ta2oBy2swK3f/kPhIW8R2IPocpyr # gkTH2lJrMv8+oRKzson8zNaUgYDoOMHctQxSsYwjbM/3B6usscPIotFkLUdqvzGC # BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 7gXTAjCymp2nAAEAAAHuMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIGYe+5y6GdnohmH+L0Uoqomc # dXCIoo4MONa5MIDCyX77MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgT1B3 # FJWF+r5V1/4M+z7kQiQHP2gJL85B+UeRVGF+MCEwgZgwgYCkfjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAiBCD5wkRy # 9tpduzexZpEwcinJwIqLMpAKPWqLrYLD8qrSZjANBgkqhkiG9w0BAQsFAASCAgA0 # q6Hzzo0rLCBZ4MUDIfmLnQNkkHs7Q3QpTVIUHgz+wH11viAMxZqypdSrEiOy2ddY # Hh+M1HFVcP+LHq6NwJkuFSGngEPcblMVEwYRFYZsSwDoekCEk1u3Twys0FrjsI3E # aZuQeKBW6HRzWOW1Ldc/yIZOUspKgFQUIPOvgdK55UOPQGMewJahLZiAwwIre/qG # M2sXYML2SqlmSL/8delvdPu25vl6lhxRiXikpjhRr+BK0bXGoLHu/eg/F//zr1Bt # CLxaUExvvDkARB5+Ob0QMXFoDZTfo07oAwuze39v5cKt8P6acPK6V5OZ6HRVllc9 # nO3EYwB4IuLjoQ17iRUdT2qnQJRjlMnXA4s0e4Bw3iMRM0fQMayLZkqgvoDoMyI1 # fjlUmqCTL/kWcND7VoeTSESVHK22EnkF/mbQACE61EqZBwspZvCAPSN07j27dK1N # 6vDzJOrwJj/jSnN9DcAbdLtUvrfe4gNS0QkaKI1wuSJtsDC4c1avdWB+Xh3gNmIb # HdmlZjTT+o+6EecMtFd79VZH5oumYSb7lfTLBcdQlzHXyX6N4GF/GTkLEEPE8JeV # +H/l13yog0sktCm7rUao/yMER2Pm7AduuYc+ElKPhdVP6AcEgfXmjwdO7vnYmK5c # VNBLcs+jE8pel0QaCvAdridLfgVXreBcMEbrXG/h6w== # SIG # End signature block
combined_dataset/train/non-malicious/sample_27_64.ps1
sample_27_64.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. Microsoft.PowerShell.Management\Get-Item function:Clear-Host | Microsoft.PowerShell.Management\Set-Item function:__clearhost function Clear-Host { [Alias('cls')] param() __clearhost if ($host.Runspace.LanguageMode -eq [System.Management.Automation.PSLanguageMode]::FullLanguage) { $psEditor.Window.Terminal.Clear() } } if (!$IsMacOS -or $IsLinux) { Microsoft.PowerShell.Utility\Set-Alias -Name clear -Value Clear-Host -Option AllScope } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAbovJceGZv5iie # oFeWBCUcylf9xUhhSdEO8vRtO0aojKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIANJ0YnRQMG0nOCoBWeq736x # qzn1ybGzlb/yzwInv3qpMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAiwtiUSnin8jXRlE+fTsqpg/a3NFQb9XOD7wsE4Go2EehGEbJCVvISedi # Z/MhSt+JKoHqrVquIAMn+wKiXZn9rSRwBsrGj7EvuJBO/vBr7qwLxOdqqnkX+hgf # zzn0lmCX4oFFMIn+zW8ZkcTs/+yHz4w8yIomKNZmLBBh1YqWyF1kUFtmL49FHGmQ # CK41nMJQrXObawNfcaltjFxc0xcMtlEe9v5yhXxmeVhUayuG4It6yhoIz6v11Ez6 # hnYTEWvII67JkwGMW/ZbjKrqrdRDIyGBcg195yyPCoAHfm/e+cBB7S+xZrVCNTwo # afKE2E/LMBHRQayrJfDNv2Fqu2Sw9aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDf6bILCHbNhK7F1uhdlLNeRV6BrZGpKEY28zxYfzBIfwIGZfyDOu8p # GBMyMDI0MDQxNjIxMDgzNC40MzNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnJRdwwIhgPMjAyNDA0MTcwMjQ1NDhaGA8yMDI0MDQxODAyNDU0OFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6clF3AIBADAHAgEAAgIHyTAHAgEAAgISuzAKAgUA # 6cqXXAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAALa47B008Gj/WlPeFRf # Zy5y11xY5b2qWtqT6WMLEh4d650CDSWJ2/Ei5r1oRCUp9f8ffoxJyzLDm6NEBvnP # 4UVGaBE5WK8W8g68Gk7dpmOcHt4zCP3ylEQLQFLIXQzFCHOrQLW+ArYPhrdzYyH6 # T0zJV04knCFIBFLSSjMDmB2vMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg0CRGTF55rbssjXfnPidXzykuuZcG4lYdrHUwEgfNOwowgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIGrL99szCpBl7kSgVwTECzsJphQbtoULSl0lrbArOjvN # MA0GCSqGSIb3DQEBCwUABIICAFnxIXOdNq1151T5av+ZyP6xyZ2428tgsegDuVWn # 9OoiqzbzqwlPOX8vQsuOBFeLgW9JHO1bgo9FMyZ+Fve6eOCvIVqeUSNOJtyw6fTw # O5T5bIyqyNUJTkeXhS1pvenjen3JRjmaxWB7UI5sheJlJXAYCiS+T26QY66GGZiK # yG7OfQBGeVFu+BZ0ADxU+M5X2HTLUaHj+2qUsogmLUDe82e8mpIxSLyDQYR1ikHO # mxFppZ0J3b+nVk2Fiws5N6D51t8dGnaE1l5spEus7QKnQS/i3T372dcgP2Rhrlan # +rp6weyIitXB6uL1vD01k800hEqXUoiacvXSOM/p1P1yINlnuEfA3+KS51xAeIh1 # NWKrjhgWQY4PFrsdHc61t1Z9WTzN4vumw3CXDSqo+IKRX1G1A3lXeLRxUotHiPT2 # X3dqX4KgJuRYhpKUL8Dm5fJ5LQ5A5Fu0evVQfMePipNRv7m48/7mOGc3+OQV6NTg # L0LteWaWB72/T7KqnIESNvlocD+TjXWAKfOItPpugwkwYdAeMntHHXhDUyqfzuV6 # wHT0CjXGXOMW1cXofxMxVN2+5BP41Mk6VIeKkaL/nL/icPFEte2c+ARsTvIAakg6 # APpBG+kLPaj6R1wBnSN5OmiCJiVT+wQVZ8Bf02yOponSE2ha31LYlxX6Ynp4se3s # LO/o # SIG # End signature block
combined_dataset/train/non-malicious/sample_19_74.ps1
sample_19_74.ps1
# # Module manifest for module 'OCI.PSModules.Onesubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Onesubscription.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '22bf5ba6-749f-401c-8b99-0cf5afbd2958' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Onesubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Onesubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOnesubscriptionAggregatedComputedUsagesList', 'Get-OCIOnesubscriptionBillingSchedulesList', 'Get-OCIOnesubscriptionCommitment', 'Get-OCIOnesubscriptionCommitmentsList', 'Get-OCIOnesubscriptionComputedUsage', 'Get-OCIOnesubscriptionComputedUsagesList', 'Get-OCIOnesubscriptionInvoicelineComputedUsagesList', 'Get-OCIOnesubscriptionInvoicesList', 'Get-OCIOnesubscriptionOrganizationSubscriptionsList', 'Get-OCIOnesubscriptionRateCardsList', 'Get-OCIOnesubscriptionSubscribedService', 'Get-OCIOnesubscriptionSubscribedServicesList', 'Get-OCIOnesubscriptionSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Onesubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_62_61.ps1
sample_62_61.ps1
# # Module manifest for module 'OCI.PSModules.Networkloadbalancer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll' # Version number of this module. ModuleVersion = '89.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '89.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend', 'Get-OCINetworkloadbalancerBackendHealth', 'Get-OCINetworkloadbalancerBackendSet', 'Get-OCINetworkloadbalancerBackendSetHealth', 'Get-OCINetworkloadbalancerBackendSetsList', 'Get-OCINetworkloadbalancerBackendsList', 'Get-OCINetworkloadbalancerHealth', 'Get-OCINetworkloadbalancerHealthChecker', 'Get-OCINetworkloadbalancerHealthsList', 'Get-OCINetworkloadbalancerListener', 'Get-OCINetworkloadbalancerListenersList', 'Get-OCINetworkloadbalancersList', 'Get-OCINetworkloadbalancersPoliciesList', 'Get-OCINetworkloadbalancersProtocolsList', 'Get-OCINetworkloadbalancerWorkRequest', 'Get-OCINetworkloadbalancerWorkRequestErrorsList', 'Get-OCINetworkloadbalancerWorkRequestLogsList', 'Get-OCINetworkloadbalancerWorkRequestsList', 'Move-OCINetworkloadbalancerCompartment', 'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend', 'New-OCINetworkloadbalancerBackendSet', 'New-OCINetworkloadbalancerListener', 'Remove-OCINetworkloadbalancer', 'Remove-OCINetworkloadbalancerBackend', 'Remove-OCINetworkloadbalancerBackendSet', 'Remove-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancer', 'Update-OCINetworkloadbalancerBackend', 'Update-OCINetworkloadbalancerBackendSet', 'Update-OCINetworkloadbalancerHealthChecker', 'Update-OCINetworkloadbalancerListener', 'Update-OCINetworkloadbalancerNetworkSecurityGroups' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Lock close button.ps1
Lock close button.ps1
$code = @' using System; using System.Runtime.InteropServices; namespace CloseButtonToggle { internal static class WinAPI { [DllImport("kernel32.dll")] internal static extern IntPtr GetConsoleWindow(); [DllImport("user32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool DeleteMenu(IntPtr hMenu, uint uPosition, uint uFlags); [DllImport("user32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool DrawMenuBar(IntPtr hWnd); [DllImport("user32.dll")] internal static extern IntPtr GetSystemMenu(IntPtr hWnd, [MarshalAs(UnmanagedType.Bool)]bool bRevert); const uint SC_CLOSE = 0xf060; const uint MF_BYCOMMAND = 0; internal static void ChangeCurrentState(bool state) { IntPtr hMenu = GetSystemMenu(GetConsoleWindow(), state); DeleteMenu(hMenu, SC_CLOSE, MF_BYCOMMAND); DrawMenuBar(GetConsoleWindow()); } } public static class Status { public static void Disable() { WinAPI.ChangeCurrentState(false); //its 'true' if need to enable } } } '@ Add-Type $code [CloseButtonToggle.Status]::Disable()
combined_dataset/train/non-malicious/sample_62_50.ps1
sample_62_50.ps1
# # Module manifest for module 'OCI.PSModules.Mysql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Mysql.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ad8c5447-7619-4d20-8318-cfb7688ec98d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Mysql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mysql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIMysqlHeatWaveCluster', 'Copy-OCIMysqlBackup', 'Get-OCIMysqlBackup', 'Get-OCIMysqlBackupsList', 'Get-OCIMysqlChannel', 'Get-OCIMysqlChannelsList', 'Get-OCIMysqlConfiguration', 'Get-OCIMysqlConfigurationsList', 'Get-OCIMysqlDbSystem', 'Get-OCIMysqlDbSystemsList', 'Get-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlHeatWaveClusterMemoryEstimate', 'Get-OCIMysqlReplica', 'Get-OCIMysqlReplicasList', 'Get-OCIMysqlShapesList', 'Get-OCIMysqlVersionsList', 'Get-OCIMysqlWorkRequest', 'Get-OCIMysqlWorkRequestErrorsList', 'Get-OCIMysqlWorkRequestLogsList', 'Get-OCIMysqlWorkRequestsList', 'Invoke-OCIMysqlResumeChannel', 'Move-OCIMysqlBackupCompartment', 'New-OCIMysqlBackup', 'New-OCIMysqlChannel', 'New-OCIMysqlConfiguration', 'New-OCIMysqlDbSystem', 'New-OCIMysqlHeatWaveClusterMemoryEstimate', 'New-OCIMysqlReplica', 'Remove-OCIMysqlBackup', 'Remove-OCIMysqlChannel', 'Remove-OCIMysqlConfiguration', 'Remove-OCIMysqlDbSystem', 'Remove-OCIMysqlHeatWaveCluster', 'Remove-OCIMysqlReplica', 'Reset-OCIMysqlChannel', 'Restart-OCIMysqlDbSystem', 'Restart-OCIMysqlHeatWaveCluster', 'Start-OCIMysqlDbSystem', 'Start-OCIMysqlHeatWaveCluster', 'Stop-OCIMysqlDbSystem', 'Stop-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlBackup', 'Update-OCIMysqlChannel', 'Update-OCIMysqlConfiguration', 'Update-OCIMysqlDbSystem', 'Update-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlReplica' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mysql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_47_73.ps1
sample_47_73.ps1
# # Module manifest for module 'OCI.PSModules.Containerengine' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Containerengine.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a2abf0e1-9176-4de5-88c9-38563bb69eee' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Containerengine Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Containerengine.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Complete-OCIContainerengineCredentialRotation', 'Disable-OCIContainerengineAddon', 'Get-OCIContainerengineAddon', 'Get-OCIContainerengineAddonOptionsList', 'Get-OCIContainerengineAddonsList', 'Get-OCIContainerengineCluster', 'Get-OCIContainerengineClusterMigrateToNativeVcnStatus', 'Get-OCIContainerengineClusterOptions', 'Get-OCIContainerengineClustersList', 'Get-OCIContainerengineCredentialRotationStatus', 'Get-OCIContainerengineNodePool', 'Get-OCIContainerengineNodePoolOptions', 'Get-OCIContainerengineNodePoolsList', 'Get-OCIContainerenginePodShapesList', 'Get-OCIContainerengineVirtualNode', 'Get-OCIContainerengineVirtualNodePool', 'Get-OCIContainerengineVirtualNodePoolsList', 'Get-OCIContainerengineVirtualNodesList', 'Get-OCIContainerengineWorkloadMapping', 'Get-OCIContainerengineWorkloadMappingsList', 'Get-OCIContainerengineWorkRequest', 'Get-OCIContainerengineWorkRequestErrorsList', 'Get-OCIContainerengineWorkRequestLogsList', 'Get-OCIContainerengineWorkRequestsList', 'Invoke-OCIContainerengineClusterMigrateToNativeVcn', 'Invoke-OCIContainerengineInstallAddon', 'New-OCIContainerengineCluster', 'New-OCIContainerengineKubeconfig', 'New-OCIContainerengineNodePool', 'New-OCIContainerengineVirtualNodePool', 'New-OCIContainerengineWorkloadMapping', 'Remove-OCIContainerengineCluster', 'Remove-OCIContainerengineNode', 'Remove-OCIContainerengineNodePool', 'Remove-OCIContainerengineVirtualNodePool', 'Remove-OCIContainerengineWorkloadMapping', 'Remove-OCIContainerengineWorkRequest', 'Start-OCIContainerengineCredentialRotation', 'Update-OCIContainerengineAddon', 'Update-OCIContainerengineCluster', 'Update-OCIContainerengineClusterEndpointConfig', 'Update-OCIContainerengineNodePool', 'Update-OCIContainerengineVirtualNodePool', 'Update-OCIContainerengineWorkloadMapping' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Containerengine' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_4_39.ps1
sample_4_39.ps1
# Copyright ?008, Microsoft Corporation. All rights reserved. if($debug -eq $true){[void]$shell.popup("Run TS_Virtualization.ps1")} Import-LocalizedData -BindingVariable VirtualizationStrings Write-DiagProgress -Activity $VirtualizationStrings.ID_Virtualization -Status $VirtualizationStrings.ID_VirtualizationObtaining #$CommandToExecute = "cscript.exe GetVirtualEnv.VBS /GenerateScriptedDiagAlertXML" #$OutputFiles = $Computername + "_Virtualization.*" #RunCmD -commandToRun $CommandToExecute -sectionDescription $VirtualizationStrings.ID_Virtualization -filesToCollect $OutputFiles -fileDescription $VirtualizationStrings.ID_VirtualizationOutput ## Andret: Decomissioning alert for virtualization as this will be more and more common moving forward #$VirtualizationAlertXMLFileName = $Computername + "_VirtualizationAlerts.XML" #if (test-path $VirtualizationAlertXMLFileName) { # Update-DiagRootCause -id RC_Virtualization -Detected $true #} # $VirtualizationInfo = new-object PSObject $Script:MicrosoftVirtualizationEnv = $false $Script:VMWareVirtualizationEnv = $false $Script:VirtualMachineSoftware = "" $Script:VMIntegrationsInstalled = $false $Script:VMToolsInstalled = $false Function DetectMSVirtualizationSoftware() { $VMBugRegPath = "HKLM:SYSTEM\CurrentControlSet\Services\vmbus" if(Test-Path $VMBugRegPath) { $VMBugStart = (Get-ItemProperty -Path $VMBugRegPath).Start if(($VMBugStart -eq 0) -or ($VMBugStart -eq 1)) { $Script:VirtualMachineSoftware = "Hyper-V" $VMService = Get-CimInstance -query "Select Name from Win32_Service where Name = 'vmickvpexchange'" if($null -ne $VMService) { $Script:VMIntegrationsInstalled = $true } } else { $Script:VirtualMachineSoftware = "Virtual Server" Get-CimInstance -query "Select Name, Started from Win32_Service where Name = 'VPCMap'" | ForEach-Object { if($_.Started -eq $true) { $Script:VirtualMachineSoftware = "Virtual PC" } else { $Script:VirtualMachineSoftware = "Virtual Server" } } $VMService = Get-CimInstance -query "Select Name, Started from Win32_Service where Name = '1-vmsrvc'" if($null -ne $VMService) { $Script:VMIntegrationsInstalled = $true } } } } Function DetectVMWareVirtualizationSoftware() { $Script:VirtualMachineSoftware = "VMWare" $VMService = Get-CimInstance -query "Select Name, Started from Win32_Service where Name = 'VMTools'" if($null -ne $VMService) { $Script:VMToolsInstalled = $true } } Function DetectVirtualizationEnv() { $Manufacturer = (Get-CimInstance -class 'Win32_ComputerSystem').Manufacturer if($Manufacturer.Contains("Microsoft")) { $Script:MicrosoftVirtualizationEnv = $true DetectMSVirtualizationSoftware } elseif($Manufacturer.Contains("VMware")) { $Script:VMWareVirtualizationEnv = $true DetectVMWareVirtualizationSoftware } } DetectVirtualizationEnv #region Rule 5850 Detect Azure Virtual Machine $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_VirtualMachineInAzureCheck" # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return ($Script:MicrosoftVirtualizationEnv -and ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or # Windows Server 2008 R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or # Windows 8 ($OSVersion.Major -eq 10))) # Win10 } Function Confirm-AzureVM { $detected = $False #[void][System.Reflection.Assembly]::LoadWithPartialName('System.Serviceprocess') #$vmbus = [System.ServiceProcess.ServiceController]::GetDevices() | where {$_.Name -eq 'vmbus'} $VmbusRegistryKeysPath = "Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vmbus" if(Test-Path $VmbusRegistryKeysPath) { $vmbus = Get-Service vmbus -ErrorAction SilentlyContinue If($vmbus.Status -eq 'Running') { Add-Type -Path .\AzureDHCPClient.cs $client = New-Object Microsoft.WindowsAzure.Internal.AzureDHCPClient try { [Microsoft.WindowsAzure.Internal.AzureDHCPClient]::GetDhcpInterfaces() | ForEach-Object { $val = $client.DhcpRequestParams($_.Id, 245) if($val -And $val.Length -eq 4) { $detected = $True } } $client.Dispose() } catch { $client.Dispose() } } } return $detected } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (Confirm-AzureVM) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } #endregion if($Script:MicrosoftVirtualizationEnv -or $Script:VMWareVirtualizationEnv) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Virtual Machine Software" -value $Script:VirtualMachineSoftware if($Script:MicrosoftVirtualizationEnv) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Integration Services Installed" -value $Script:VMIntegrationsInstalled if($RootCauseDetected) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Windows Azure" -value $true } else { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Windows Azure" -value $false } } elseif($Script:VMWareVirtualizationEnv) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "VMTools installed" -value $Script:VMToolsInstalled } $VirtualizationInfo | ConvertTo-Xml2 | update-diagreport -id ("zzz_Virtualization Report") -name ("Virtual Environment Information") -verbosity informational } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDepAhNJk+viUZO # l+ysWIgWx7ydxY/N+prqIYxIYnaRJaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGEM # 35s+TctsSx50y0MMHVGUw9Zl5ryJb2j/ehjIurZXMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAAuvxvK092vPrjfj8sCthPx+apUtS1lzaPFGA # SURQVfuMEd/I5lB0g4V21lIMH+sc6+9gYyq/4oPXBeuzKgaYTMZvc530dH86jEQf # jDdG2VCtp3j4ul2DYqZxlvu0u7O9gQDll28YiIplF4jpbP6g6Q43bkyXR8/N0l0u # tUujz/FoqYfYu2NjfcjM4OyFCGlxZut4Vtjj2iqN7Q5mFDyjh2FoQtj+MpcUGYAg # OVHQQXGRTbajh75cbuJezSZM243iyxYiAuSMT2WC3BHpX26CEv+ANpLRbGBzAps3 # jG8mIeiQP0haT8XUqhGVF8MnwlfGMENBOWPbbP8Q7jeHyvgeW6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB31kQVZMUJvSCOln8RTe9vSu5H+yZLngp1 # 221S3TkvjgIGZus6esm5GBMyMDI0MTAyODExNDA0MS4zNTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9n # jXWrpPGxAAEAAAH5MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tD1MH3yAHWHNVslC+CBTj/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BO # JUiYg7fDJ2AxGVGyovUtgGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONW # y6lOyGZwZpxfV2EX4qAh6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2 # ps8Nc1xr41N8Qi3KVJLYX0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2 # KDJ2sQRFFF/egCxKgogdF3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN # 8hiMc8Z47RRJuIWCOeyIJ1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57 # ITXsD9DPOob8tjtsefPcQJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5D # HM4ovCmD3lifgYnzjOry4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby # 44kGVK8MzY9s32Dy1THnJg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRV # Ux2G/0Tr7Dk3fpCU8u+5olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1 # HvNIBpSNNuTBQk7FBvu+Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSJ7aO6nJXJI9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAZiAJgFbkf7jfhx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG # 2CcdoXaq7VgpVkNf1uvIhrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0kt # H+EkEuGXs9DBLyt71iutVkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2 # q5TjmrgEKyPe3TApAio8cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/ui # zP1NuHSxF/V1ks/2tCEoriicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+U # d9Va3Iw9Bs4ccrkgBjLtg3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y # 6Si3AaNINt/pOMKU6l4AW0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qI # VBZJ2XQpnhEuRbh+AgpmRn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhnc # FetJ0ZK36wxAa3FiPgBebRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B # 0s8RiFBMf/W7+O7EPZ+wMH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojz # uCEahSAcq86yjwQeTPN9YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAK # mIcdwhqgZvyp6UaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0 # MTAyOTA4MjgwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEA # AgIIXjAHAgEAAgITcTAKAgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAZdq+OU23EaUchwQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2Dewx # IzsFz1t8ELbs/7V+b+lLZ25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh8 # 4y9kT8c5HUYL5kF2NJiqgHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e7 # 2AvfpKtUZO94WfnvRVAu4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpU # qnrIVhOqTZE0I5GJiVJydAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGE # u6OFzH+g6bBiUu/BsmlodM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgCQ3Y5O1ylBOYJyP7LkZIQvevtOe7egKSXPh1bV+0KvcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5S # bGLYEDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +R9njXWrpPGxAAEAAAH5MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkH # B7rdMA0GCSqGSIb3DQEBCwUABIICAEebm+T4SRX0p7ROMn6E6Xp+b3RwtpQhOzJD # 4O/OE9/1g2yZLqI9WD9z+J3TeVT1xjiMQY+aSyck78wPqRqq1A/EvKnlaw2tfvW/ # XZ/eNZM34O6opPW57cycbPlDL5Ai8uAEqrfEBAAirLqrczp22HJo/9KZU4Kjwle6 # lNAOu4LqJnocqyJawuApTsG9FAV3ld7E4V4GYJn3JsyDkV0T/w/iSyvbswWqeV+E # U+qB/3lK/lCEcIcFjVZtL3q2ZjCIyI5MNJBpMOZTe62NJPrMZPm+9j61EDjlRSRb # bW+hu8r2cXw91DvELnnJcLSdHQGUWj23lbZvaChXr1lfnv3A8zbX+dF3nNAGHqd0 # upt9wNX8if0qHseci7WrjRh6kxC3T/titdR2uIdeZ2+EEuLrWP49rse9o05uM74f # hmEUNJi/LqhOCIcPizuRAV3lfZ5rXsJSiQxMqQrCO9SbyHgWidViNhTuNWev++ry # 04mP1WbHMP6GqfW5fTR7j1tmLBIFDsbbBwto+Zz0Vwh2CXdt+CSaBSvG3kir8MOg # zx4hQd5EweOfk3Qlf0HMxD8UgY4jc23QmVm3Sqt4kjjg35H1Qz0Yz+msrZBFxKis # vxn3CJdxzdXgU7G6tEmyhSg862pV4IVEacy2bTQTHqNy13gxKn+asY7ggKqQ3eL/ # PF5SEaTk # SIG # End signature block
combined_dataset/train/non-malicious/1332.ps1
1332.ps1
function Start-PowerShellProcess { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $CommandLine, [Parameter(Mandatory=$true)] [pscredential] $Credential ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $outFile = '{0}-{1}-stdout' -f (Split-Path -Leaf -Path $PSCommandPath),([IO.Path]::GetRandomFileName()) $outFile = Join-Path -Path $env:TEMP -ChildPath $outFile Write-Debug $outFile '' | Set-Content -Path $outFile $errFile = '{0}-{1}-stderr' -f (Split-Path -Leaf -Path $PSCommandPath),([IO.Path]::GetRandomFileName()) $errFile = Join-Path -Path $env:TEMP -ChildPath $errFile Write-Debug $errFile '' | Set-Content -Path $errFile try { Write-Debug -Message ('{0} > powershell.exe {1}' -f (Get-Location).ProviderPath,$CommandLine) $p = Start-Process -FilePath "powershell.exe" ` -ArgumentList $CommandLine ` -Credential $Credential ` -RedirectStandardOutput $outFile ` -RedirectStandardError $errFile ` -Wait ` -WindowStyle Hidden ` -PassThru $p.WaitForExit() $stdOut = Get-Content -Path $outFile -Raw if( $stdOut ) { Write-Verbose -Message $stdOut } $stdErr = Get-Content -Path $errFile -Raw if( $stdErr ) { Write-Error -Message $stdErr return } if( $p.ExitCode -ne 0 ) { Write-Error -Message ('Unknown error running PowerShell as user {0}: exit code {1}{2}{3}' -f $Credential.UserName,$p.ExitCode,([Environment]::NewLine),$stdOut) return } if( $stdOut ) { return Get-Content -Path $outFile } } finally { Remove-Item -Path $outFile,$errFile -ErrorAction SilentlyContinue } }
combined_dataset/train/non-malicious/Move-Template.ps1
Move-Template.ps1
#requires -version 2.0 Function Move-Template{ <# .Synopsis Move a VM template .Description Move a VM template either to a new host via vmotion or to a new datastore via svmotion .Parameter Name Name of the VM to be migrated .Parameter VIObject Template to be migrated .Parameter VMHost VMHost to vmotion the template to .Parameter Datastore Datastore to svmotion template to .Example Move-Template -Name W2k8R201 -VMHost (Get-VMHost ESX1) VMotion W2k8R201 template to the ESX1 host. .Example Move-Template -Name W2k8R201 -Datastore (Get-Datastore NFS2) sVMotion W2k8R201 template to the NFS2 Datastore. .Example Get-Template | Move-Template -Datastore (Get-Datastore NFS2) sVMotion all templates onto the NFS2 Datastore .Example Get-Template CentOS_5_2_x64 | Move-Template -Datastore (Get-Datastore NFS2) -VMHost (Get-VMHost ESX03) sVMotion the CentOS_5_2_x64 templates onto the NFS2 Datastore, and then vmotion said template onto ESX03 .link Get-Template New-Template Remove-Template Set-Template #> [CmdletBinding(SupportsShouldProcess=$true,SupportsTransactions=$False,ConfirmImpact="low",DefaultParameterSetName="")] param( [Parameter(Mandatory=$true,Position=0,HelpMessage="Name of template to move", ParameterSetName="vmotionByName")] [Parameter(Mandatory=$true,Position=0,HelpMessage="Name of template to move", ParameterSetName="svmotionByName")] [Parameter(Mandatory=$true,Position=0,HelpMessage="Name of template to move", ParameterSetName="ByName")] [STRING] $Name, [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Managed object of the template to be migrated", ParameterSetName="vmotionByObject")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Managed object of the template to be migrated", ParameterSetName="svmotionByObject")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Managed object of the template to be migrated", ParameterSetName="ByObject")] [VMware.VimAutomation.Client20.TemplateImpl[]] $Template, [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="VMHost to vmotion the template to", ParameterSetName="vmotionByName")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="VMHost to vmotion the template to", ParameterSetName="vmotionByObject")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="VMHost to vmotion the template to", ParameterSetName="ByObject")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="VMHost to vmotion the template to", ParameterSetName="ByName")] [VMware.VimAutomation.Client20.VMHostImpl] $VMHost, [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Datastore to svmotion the template to", ParameterSetName="svmotionByName")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Datastore to svmotion the template to", ParameterSetName="svmotionByObject")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Datastore to svmotion the template to", ParameterSetName="ByObject")] [Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Datastore to svmotion the template to", ParameterSetName="ByName")] [VMware.VimAutomation.Client20.DatastoreImpl] $Datastore ) Process{ switch ($pscmdlet.parametersetname) { "vmotionByName" { if ($pscmdlet.ShouldProcess($Name,"vmotion Template to $($VMHost.name)")){ $template = Get-Template -Name $Name -verbose:$False $vm = Set-Template -Template $template -ToVM -verbose:$False -confirm:$False Move-VM -VM $VM -Destination $VMHost -verbose:$False -Confirm:$false (Get-View -VIObject $VM -verbose:$False).MarkAsTemplate() } } "vmotionByObject" { Foreach ($tmp in $Template) { if ($pscmdlet.ShouldProcess($tmp.Name,"vmotion Template to $($VMHost.name)")){ $vm = Set-Template -Template $tmp -ToVM -verbose:$False -confirm:$False Move-VM -VM $VM -Destination $VMHost -verbose:$False -Confirm:$false (Get-View -VIObject $VM -verbose:$False).MarkAsTemplate() } } } "svmotionByName" { if ($pscmdlet.ShouldProcess($Name,"svmotion Template to $($Datastore.name)")){ $template = Get-Template -Name $Name -verbose:$False $vm = Set-Template -Template $template -ToVM -verbose:$False -confirm:$False Move-VM -VM $VM -Datastore $Datastore -verbose:$False -Confirm:$false (Get-View -VIObject $VM -verbose:$False).MarkAsTemplate() } } "svmotionByObject" { Foreach ($tmp in $Template) { if ($pscmdlet.ShouldProcess($tmp.Name,"svmotion Template to $($Datastore.name)")){ $vm = Set-Template -Template $tmp -ToVM -verbose:$False -confirm:$False Move-VM -VM $VM -Datastore $Datastore -verbose:$False -Confirm:$false (Get-View -VIObject $VM -verbose:$False).MarkAsTemplate() } } } "ByName" { if ($pscmdlet.ShouldProcess($Name,"vmotion Template to $($VMHost.name) and svmotion to $($Datastore.name)")){ $template = Get-Template -Name $Name -verbose:$False $vm = Set-Template -Template $template -ToVM -verbose:$False -confirm:$False Move-VM -VM $VM -Datastore $Datastore -verbose:$False -Confirm:$false Move-VM -VM $VM -Destination $VMHost -verbose:$False -Confirm:$false (Get-View -VIObject $VM -verbose:$False).MarkAsTemplate() } } "ByObject" { Foreach ($tmp in $Template) { if ($pscmdlet.ShouldProcess($tmp.Name,"vmotion Template to $($VMHost.name) and svmotion to $($Datastore.name)")){ $vm = Set-Template -Template $tmp -ToVM -verbose:$False -confirm:$False Move-VM -VM $VM -Datastore $Datastore -verbose:$False -Confirm:$false Move-VM -VM $VM -Destination $VMHost -verbose:$False -Confirm:$false (Get-View -VIObject $VM -verbose:$False).MarkAsTemplate() } } } } } }
combined_dataset/train/non-malicious/sample_64_47.ps1
sample_64_47.ps1
# # Module manifest for module 'OCI.PSModules.Dataintegration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataintegration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataintegrationApplication', 'Get-OCIDataintegrationApplicationDetailedDescription', 'Get-OCIDataintegrationApplicationsList', 'Get-OCIDataintegrationCompositeState', 'Get-OCIDataintegrationConnection', 'Get-OCIDataintegrationConnectionsList', 'Get-OCIDataintegrationConnectionValidation', 'Get-OCIDataintegrationConnectionValidationsList', 'Get-OCIDataintegrationCopyObjectRequest', 'Get-OCIDataintegrationCopyObjectRequestsList', 'Get-OCIDataintegrationCountStatistic', 'Get-OCIDataintegrationDataAsset', 'Get-OCIDataintegrationDataAssetsList', 'Get-OCIDataintegrationDataEntitiesList', 'Get-OCIDataintegrationDataEntity', 'Get-OCIDataintegrationDataFlow', 'Get-OCIDataintegrationDataFlowsList', 'Get-OCIDataintegrationDataFlowValidation', 'Get-OCIDataintegrationDataFlowValidationsList', 'Get-OCIDataintegrationDependentObject', 'Get-OCIDataintegrationDependentObjectsList', 'Get-OCIDataintegrationDisApplication', 'Get-OCIDataintegrationDisApplicationDetailedDescription', 'Get-OCIDataintegrationDisApplicationsList', 'Get-OCIDataintegrationDisApplicationTaskRunLineagesList', 'Get-OCIDataintegrationExportRequest', 'Get-OCIDataintegrationExportRequestsList', 'Get-OCIDataintegrationExternalPublication', 'Get-OCIDataintegrationExternalPublicationsList', 'Get-OCIDataintegrationExternalPublicationValidation', 'Get-OCIDataintegrationExternalPublicationValidationsList', 'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList', 'Get-OCIDataintegrationFunctionLibrariesList', 'Get-OCIDataintegrationFunctionLibrary', 'Get-OCIDataintegrationImportRequest', 'Get-OCIDataintegrationImportRequestsList', 'Get-OCIDataintegrationPatch', 'Get-OCIDataintegrationPatchChangesList', 'Get-OCIDataintegrationPatchesList', 'Get-OCIDataintegrationPipeline', 'Get-OCIDataintegrationPipelinesList', 'Get-OCIDataintegrationPipelineValidation', 'Get-OCIDataintegrationPipelineValidationsList', 'Get-OCIDataintegrationProject', 'Get-OCIDataintegrationProjectsList', 'Get-OCIDataintegrationPublishedObject', 'Get-OCIDataintegrationPublishedObjectsList', 'Get-OCIDataintegrationReference', 'Get-OCIDataintegrationReferencesList', 'Get-OCIDataintegrationRuntimeOperator', 'Get-OCIDataintegrationRuntimeOperatorsList', 'Get-OCIDataintegrationRuntimePipeline', 'Get-OCIDataintegrationRuntimePipelinesList', 'Get-OCIDataintegrationSchedule', 'Get-OCIDataintegrationSchedulesList', 'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList', 'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun', 'Get-OCIDataintegrationTaskRunLineagesList', 'Get-OCIDataintegrationTaskRunLogsList', 'Get-OCIDataintegrationTaskRunsList', 'Get-OCIDataintegrationTaskSchedule', 'Get-OCIDataintegrationTaskSchedulesList', 'Get-OCIDataintegrationTasksList', 'Get-OCIDataintegrationTaskValidation', 'Get-OCIDataintegrationTaskValidationsList', 'Get-OCIDataintegrationTemplate', 'Get-OCIDataintegrationTemplatesList', 'Get-OCIDataintegrationUserDefinedFunction', 'Get-OCIDataintegrationUserDefinedFunctionsList', 'Get-OCIDataintegrationUserDefinedFunctionValidation', 'Get-OCIDataintegrationUserDefinedFunctionValidationsList', 'Get-OCIDataintegrationWorkRequest', 'Get-OCIDataintegrationWorkRequestErrorsList', 'Get-OCIDataintegrationWorkRequestLogsList', 'Get-OCIDataintegrationWorkRequestsList', 'Get-OCIDataintegrationWorkspace', 'Get-OCIDataintegrationWorkspacesList', 'Move-OCIDataintegrationCompartment', 'Move-OCIDataintegrationDisApplicationCompartment', 'New-OCIDataintegrationApplication', 'New-OCIDataintegrationApplicationDetailedDescription', 'New-OCIDataintegrationConnection', 'New-OCIDataintegrationConnectionValidation', 'New-OCIDataintegrationCopyObjectRequest', 'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow', 'New-OCIDataintegrationDataFlowValidation', 'New-OCIDataintegrationDisApplication', 'New-OCIDataintegrationDisApplicationDetailedDescription', 'New-OCIDataintegrationEntityShape', 'New-OCIDataintegrationExportRequest', 'New-OCIDataintegrationExternalPublication', 'New-OCIDataintegrationExternalPublicationValidation', 'New-OCIDataintegrationFolder', 'New-OCIDataintegrationFunctionLibrary', 'New-OCIDataintegrationImportRequest', 'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline', 'New-OCIDataintegrationPipelineValidation', 'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule', 'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun', 'New-OCIDataintegrationTaskSchedule', 'New-OCIDataintegrationTaskValidation', 'New-OCIDataintegrationUserDefinedFunction', 'New-OCIDataintegrationUserDefinedFunctionValidation', 'New-OCIDataintegrationWorkspace', 'Remove-OCIDataintegrationApplication', 'Remove-OCIDataintegrationApplicationDetailedDescription', 'Remove-OCIDataintegrationConnection', 'Remove-OCIDataintegrationConnectionValidation', 'Remove-OCIDataintegrationCopyObjectRequest', 'Remove-OCIDataintegrationDataAsset', 'Remove-OCIDataintegrationDataFlow', 'Remove-OCIDataintegrationDataFlowValidation', 'Remove-OCIDataintegrationDisApplication', 'Remove-OCIDataintegrationDisApplicationDetailedDescription', 'Remove-OCIDataintegrationExportRequest', 'Remove-OCIDataintegrationExternalPublication', 'Remove-OCIDataintegrationExternalPublicationValidation', 'Remove-OCIDataintegrationFolder', 'Remove-OCIDataintegrationFunctionLibrary', 'Remove-OCIDataintegrationImportRequest', 'Remove-OCIDataintegrationPatch', 'Remove-OCIDataintegrationPipeline', 'Remove-OCIDataintegrationPipelineValidation', 'Remove-OCIDataintegrationProject', 'Remove-OCIDataintegrationSchedule', 'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun', 'Remove-OCIDataintegrationTaskSchedule', 'Remove-OCIDataintegrationTaskValidation', 'Remove-OCIDataintegrationUserDefinedFunction', 'Remove-OCIDataintegrationUserDefinedFunctionValidation', 'Remove-OCIDataintegrationWorkspace', 'Start-OCIDataintegrationWorkspace', 'Stop-OCIDataintegrationWorkspace', 'Update-OCIDataintegrationApplication', 'Update-OCIDataintegrationApplicationDetailedDescription', 'Update-OCIDataintegrationConnection', 'Update-OCIDataintegrationCopyObjectRequest', 'Update-OCIDataintegrationDataAsset', 'Update-OCIDataintegrationDataFlow', 'Update-OCIDataintegrationDisApplication', 'Update-OCIDataintegrationDisApplicationDetailedDescription', 'Update-OCIDataintegrationExportRequest', 'Update-OCIDataintegrationExternalPublication', 'Update-OCIDataintegrationFolder', 'Update-OCIDataintegrationFunctionLibrary', 'Update-OCIDataintegrationImportRequest', 'Update-OCIDataintegrationPipeline', 'Update-OCIDataintegrationProject', 'Update-OCIDataintegrationReference', 'Update-OCIDataintegrationSchedule', 'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun', 'Update-OCIDataintegrationTaskSchedule', 'Update-OCIDataintegrationUserDefinedFunction', 'Update-OCIDataintegrationWorkspace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2154.ps1
2154.ps1
Describe "Verify PowerShell Runs" { BeforeAll{ $options = (Get-PSOptions) $path = split-path -path $options.Output Write-Verbose "Path: '$path'" -Verbose $rootPath = split-Path -path $path $mount = 'C:\powershell' $container = 'mcr.microsoft.com/powershell:nanoserver-1803' } it "Verify Version " { $version = docker run --rm -v "${rootPath}:${mount}" ${container} "${mount}\publish\pwsh" -NoLogo -NoProfile -Command '$PSVersionTable.PSVersion.ToString()' $version | Should -match '^7\.' } }